Viewing IDS Alarms
The device sends the following SNMP traps for the IDS feature:
■ | Traps that notify the detection of malicious attacks: |
● | acIDSPolicyAlarm: The device sends this alarm whenever a threshold of a specific IDS Policy rule is crossed. The trap displays the crossed severity threshold (Minor or Major), IDS Policy and IDS Rule, and the IDS Policy-Match index. |
● | acIDSThresholdCrossNotification: The device sends this event for each scope (IP address) that crosses the threshold. In addition to the crossed severity threshold (Minor or Major) of the IDS Policy-Match index, this event shows the IP address (or IP address:port) of the malicious attacker. |
If the severity level is raised, the alarm of the former severity is cleared and the device sends a new alarm with the new severity. The alarm is cleared after a user-defined timeout during which no thresholds have been crossed.
➢ | To configure IDS alarm cleared timeout: |
1. | Open the IDS General Settings page (Setup menu > Signaling & Media tab > Intrusion Detection folder > IDS General Settings). |
2. | From the 'IDS Alarm Clear Period' field (IDSAlarmClearPeriod), enter the timeout (in seconds) after which the alarm is cleared if no IDS thresholds have been crossed during the timeout. |
3. | Click Apply. |
This "quiet" timeout period must be at least twice the 'Threshold Window' value (configured in Configuring IDS Policies). For example, if you configure 'IDS Alarm Clear Period' to 20 sec and 'Threshold Window' to 15 sec, the 'IDS Alarm Clear Period' parameter is ignored and the alarm is cleared only after 30 seconds (2 x 15 sec).
The figure below displays an example of IDS alarms in the Active Alarms table (Viewing Active Alarms). In this example, a Minor threshold alarm is cleared and replaced by a Major threshold alarm:
■ | acIDSBlacklistNotification event: The device sends this event whenever an attacker (remote host at IP address and/or port) is added to or removed from the blocked list. To view the IDS blocked list, see Viewing IDS Active Blocked List. |
You can also view IDS alarms through CLI:
■ | To view all active IDS alarms: |
# show voip ids active-alarm all
■ | To view all IP addresses that have crossed the threshold for an active IDS alarm: |
# show voip ids active-alarm match <IDS Match Policy ID> rule <IDS Rule ID>
The IP address is displayed only if the 'Threshold Scope' parameter is set to IP or IP+Port; otherwise, only the alarm is displayed.
The device also sends IDS notifications and alarms in syslog messages to a syslog server. This occurs only if you have configured syslog (see Enabling Syslog). An example of a syslog message with IDS alarms and notifications is shown below:
The table below lists the syslog text messages per malicious event:
Types of Malicious Events and Syslog Text String
Reason |
|
---|---|
Description |
Syslog String |
Connection Abuse |
|
TLS authentication failure |
abuse-tls-auth-fail |
WebSocket establishment failure |
abuse-websocket-fail |
Malformed Messages |
|
Message exceeds a user-defined maximum message length (50K) |
malformed-invalid-msg-len |
Any SIP parser error |
malformed-parse-error |
Message policy match |
malformed-message-policy |
Basic headers not present |
malformed-miss-header |
Content length header not present (for TCP) |
malformed-miss-content-len |
Header overflow |
malformed-header-overflow |
Authentication Failure |
|
Local authentication ("Bad digest" errors) |
auth-establish-fail |
Remote authentication (SIP 401/407 is sent if original message includes authentication) |
auth-reject-response |
Dialog Establishment Failure |
|
Classification failure |
establish-classify-fail |
Routing failure (no matched routing rule) |
establish-route-fail |
Other local rejects (prior to SIP 180 response) |
establish-local-reject |
Remote rejects (prior to SIP 180 response) |
establish-remote-reject |
Malicious signature pattern detected |
establish-malicious-signature-db-reject |
CAC threshold exceeded |
establish-cac-reject |
Abnormal Flow |
|
Requests and responses without a matching transaction user (except ACK requests) |
flow-no-match-tu |
Requests and responses without a matching transaction (except ACK requests) |
flow-no-match-transaction |