StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

Cisco StealthWatch ื”ื™ื ื• ืคืชืจื•ืŸ ืื ืœื™ื˜ื™ ื‘ืชื—ื•ื ืื‘ื˜ื—ืช ื”ืžื™ื“ืข ื”ืžืขื ื™ืง ื ื™ื˜ื•ืจ ืžืงื™ืฃ ืฉืœ ืื™ื•ืžื™ื ื‘ืจืฉืช ืžื‘ื•ื–ืจืช. StealthWatch ืžื‘ื•ืกืก ืขืœ ืื™ืกื•ืฃ NetFlow ื•-IPFIX ืžื ืชื‘ื™ื, ืžืชื’ื™ื ื•ื”ืชืงื ื™ ืจืฉืช ืื—ืจื™ื. ื›ืชื•ืฆืื” ืžื›ืš, ื”ืจืฉืช ื”ื•ืคื›ืช ืœื—ื™ื™ืฉืŸ ืจื’ื™ืฉ ื•ืžืืคืฉืจืช ืœืžื ื”ืœ ื”ืžืขืจื›ืช ืœื”ืกืชื›ืœ ืขืœ ืžืงื•ืžื•ืช ืฉืืœื™ื”ื ืฉื™ื˜ื•ืช ืื‘ื˜ื—ืช ืจืฉืช ืžืกื•ืจืชื™ื•ืช, ื›ืžื• ื—ื•ืžืช ื”ืืฉ ืฉืœ ื”ื“ื•ืจ ื”ื‘ื, ืื™ื ืŸ ื™ื›ื•ืœื•ืช ืœื”ื’ื™ืข.

ื‘ืžืืžืจื™ื ืงื•ื“ืžื™ื ื›ื‘ืจ ื›ืชื‘ืชื™ ืขืœ StealthWatch: ื”ื™ื›ืจื•ืช ืจืืฉื•ื ื” ื•ื”ื–ื“ืžื ื•ื™ื•ืชื• - ืคืจื™ืกื” ื•ืชืฆื•ืจื”. ื›ืขืช ืื ื™ ืžืฆื™ืข ืœื”ืžืฉื™ืš ื”ืœืื” ื•ืœื“ื•ืŸ ื›ื™ืฆื“ ืœืขื‘ื•ื“ ืขื ืื–ืขืงื•ืช ื•ืœื—ืงื•ืจ ืื™ืจื•ืขื™ ืื‘ื˜ื—ื” ืฉื”ืคืชืจื•ืŸ ืžื™ื™ืฆืจ. ื™ื”ื™ื• 6 ื“ื•ื’ืžืื•ืช ืฉืื ื™ ืžืงื•ื•ื” ืฉื™ืชื ื• ืžื•ืฉื’ ื˜ื•ื‘ ืœื’ื‘ื™ ื”ืชื•ืขืœืช ืฉืœ ื”ืžื•ืฆืจ.

ืจืืฉื™ืช, ื™ืฉ ืœื•ืžืจ ืฉืœ-StealthWatch ื™ืฉ ื—ืœื•ืงื” ืžืกื•ื™ืžืช ืฉืœ ืื–ืขืงื•ืช ื‘ื™ืŸ ืืœื’ื•ืจื™ืชืžื™ื ื•ื”ื–ื ื•ืช. ื”ืจืืฉื•ื ื™ื ื”ื ืกื•ื’ื™ื ืฉื•ื ื™ื ืฉืœ ืื–ืขืงื•ืช (ื”ืชืจืื•ืช), ื›ืืฉืจ ืžื•ืคืขืœื•ืช, ืืชื” ื™ื›ื•ืœ ืœื–ื”ื•ืช ื“ื‘ืจื™ื ื—ืฉื•ื“ื™ื ื‘ืจืฉืช. ื”ืฉื ื™ ื”ื ืื™ืจื•ืขื™ื ื‘ื™ื˜ื—ื•ื ื™ื™ื. ืžืืžืจ ื–ื” ื™ืกืชื›ืœ ืขืœ 4 ื“ื•ื’ืžืื•ืช ืฉืœ ืืœื’ื•ืจื™ืชืžื™ื ืฉื”ื•ืคืขืœื• ื•-2 ื“ื•ื’ืžืื•ืช ืฉืœ ืขื“ื›ื•ื ื™ื.

1. ื ื™ืชื•ื— ื”ืื™ื ื˜ืจืืงืฆื™ื•ืช ื”ื’ื“ื•ืœื•ืช ื‘ื™ื•ืชืจ ื‘ืชื•ืš ื”ืจืฉืช

ื”ืฉืœื‘ ื”ืจืืฉื•ื ื™ ื‘ื”ื’ื“ืจืช StealthWatch ื”ื•ื ื”ื’ื“ืจืช ืžืืจื—ื™ื ื•ืจืฉืชื•ืช ืœืงื‘ื•ืฆื•ืช. ื‘ืœืฉื•ื ื™ืช ืžืžืฉืง ื”ืื™ื ื˜ืจื ื˜ ืชืฆื•ืจื” > ื ื™ื”ื•ืœ ืงื‘ื•ืฆื•ืช ืžืืจื— ื™ืฉ ืœืกื•ื•ื’ ืจืฉืชื•ืช, ืžืืจื—ื™ื ื•ืฉืจืชื™ื ืœืงื‘ื•ืฆื•ืช ืžืชืื™ืžื•ืช. ืืชื” ื™ื›ื•ืœ ื’ื ืœื™ืฆื•ืจ ืงื‘ื•ืฆื•ืช ืžืฉืœืš. ืื’ื‘, ื ื™ืชื•ื— ืื™ื ื˜ืจืืงืฆื™ื•ืช ื‘ื™ืŸ ืžืืจื—ื™ื ื‘-Cisco StealthWatch ื”ื•ื ื“ื™ ื ื•ื—, ืžื›ื™ื•ื•ืŸ ืฉืืชื” ื™ื›ื•ืœ ืœื ืจืง ืœืฉืžื•ืจ ืžืกื ื ื™ ื—ื™ืคื•ืฉ ืœืคื™ ื–ืจื, ืืœื ื’ื ืืช ื”ืชื•ืฆืื•ืช ืขืฆืžืŸ.

ืžืœื›ืชื—ื™ืœื”, ื‘ืžืžืฉืง ื”ืื™ื ื˜ืจื ื˜ ืขืœื™ืš ืœืขื‘ื•ืจ ืœืœืฉื•ื ื™ืช ื ื™ืชื•ื— > ื—ื™ืคื•ืฉ ื–ืจื™ืžื”. ืœืื—ืจ ืžื›ืŸ ืขืœื™ืš ืœื”ื’ื“ื™ืจ ืืช ื”ืคืจืžื˜ืจื™ื ื”ื‘ืื™ื:

  • ืกื•ื’ ื—ื™ืคื•ืฉ - ืฉื™ื—ื•ืช ืžื•ื‘ื™ืœื•ืช (ื”ืื™ื ื˜ืจืืงืฆื™ื•ืช ื”ืคื•ืคื•ืœืจื™ื•ืช ื‘ื™ื•ืชืจ)
  • ื˜ื•ื•ื— ื–ืžืŸ - 24 ืฉืขื•ืช (ืคืจืง ื–ืžืŸ, ืืชื” ื™ื›ื•ืœ ืœื”ืฉืชืžืฉ ื‘ืื—ืจ)
  • ืฉื ื—ื™ืคื•ืฉ - ืฉื™ื—ื•ืช ืžื•ื‘ื™ืœื•ืช ื‘ืคื ื™ื-ื‘ืคื ื™ื (ื›ืœ ืฉื ื™ื“ื™ื“ื•ืชื™)
  • ื ื•ืฉื - ืงื‘ื•ืฆื•ืช ืžืืจื—ื•ืช โ†’ ืžืืจื—ื™ื ืคื ื™ืžื™ื™ื (ืžืงื•ืจ - ืงื‘ื•ืฆืช ืžืืจื—ื™ื ืคื ื™ืžื™ื™ื)
  • ื—ื™ื‘ื•ืจ (ืชื•ื›ืœ ืœืฆื™ื™ืŸ ื™ืฆื™ืื•ืช, ื™ื™ืฉื•ืžื™ื)
  • ืขืžื™ืช - ืงื‘ื•ืฆื•ืช ืžืืจื— โ†’ ืžืืจื—ื™ื ืคื ื™ืžื™ื™ื (ื™ืขื“ - ืงื‘ื•ืฆืช ืฆืžืชื™ื ืคื ื™ืžื™ื™ื)
  • ื‘ืืคืฉืจื•ื™ื•ืช ืžืชืงื“ืžื•ืช, ื ื™ืชืŸ ื‘ื ื•ืกืฃ ืœืฆื™ื™ืŸ ืืช ื”ืืกืคืŸ ืฉืžืžื ื• ื™ื•ืฆื’ื• ื”ื ืชื•ื ื™ื, ืžื™ื•ืŸ ื”ืคืœื˜ (ืœืคื™ ื‘ืชื™ื, ื–ืจืžื™ื ื•ื›ื•'). ืื ื™ ืืฉืื™ืจ ืืช ื–ื” ื›ื‘ืจื™ืจืช ืžื—ื“ืœ.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืœืื—ืจ ืœื—ื™ืฆื” ืขืœ ื”ื›ืคืชื•ืจ ื—ื™ืคื•ืฉ ืžื•ืฆื’ืช ืจืฉื™ืžื” ืฉืœ ืื™ื ื˜ืจืืงืฆื™ื•ืช ืฉื›ื‘ืจ ืžืžื•ื™ื ื•ืช ืœืคื™ ื›ืžื•ืช ื”ื ืชื•ื ื™ื ืฉื”ื•ืขื‘ืจื”.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ื‘ื“ื•ื’ืžื” ืฉืœื™ ื”ืžืืจื— 10.150.1.201 (ืฉืจืช) ืžื•ืขื‘ืจ ื‘ืชื•ืš ืฉืจืฉื•ืจ ืื—ื“ ื‘ืœื‘ื“ 1.5 GB ืชื ื•ืขื” ืœืžืืจื— 10.150.1.200 (ืœืงื•ื—) ืœืคื™ ืคืจื•ื˜ื•ืงื•ืœ MySQL. ืœึทื—ึฐืฆึธืŸ ื ื”ืœ ืขืžื•ื“ื•ืช ืžืืคืฉืจ ืœืš ืœื”ื•ืกื™ืฃ ืขื•ื“ ืขืžื•ื“ื•ืช ืœื ืชื•ื ื™ ื”ืคืœื˜.

ืœืื—ืจ ืžื›ืŸ, ืœืคื™ ืฉื™ืงื•ืœ ื“ืขืชื• ืฉืœ ื”ืžื ื”ืœ, ืชื•ื›ืœ ืœื™ืฆื•ืจ ื›ืœืœ ืžื•ืชืื ืื™ืฉื™ืช ืฉืชืžื™ื“ ื™ืคืขื™ืœ ืกื•ื’ ื–ื” ืฉืœ ืื™ื ื˜ืจืืงืฆื™ื” ื•ื™ื•ื“ื™ืข ืœืš ื‘ืืžืฆืขื•ืช SNMP, ืื™ืžื™ื™ืœ ืื• Syslog.

2. ื ื™ืชื•ื— ืฉืœ ืื™ื ื˜ืจืืงืฆื™ื•ืช ืœืงื•ื—-ืฉืจืช ื”ืื™ื˜ื™ื•ืช ื‘ื™ื•ืชืจ ื‘ืจืฉืช ืขื‘ื•ืจ ืขื™ื›ื•ื‘ื™ื

ืชื’ื™ื•ืช SRT (ื–ืžืŸ ืชื’ื•ื‘ื” ืฉืœ ืฉืจืช), RTT (ื–ืžืŸ ื ืกื™ืขื” ื”ืœื•ืš ื•ืฉื•ื‘) ืžืืคืฉืจื™ื ืœืš ืœื’ืœื•ืช ืขื™ื›ื•ื‘ื™ื ื‘ืฉืจืช ื•ืขื™ื›ื•ื‘ื™ื ื›ืœืœื™ื™ื ื‘ืจืฉืช. ื›ืœื™ ื–ื” ืฉื™ืžื•ืฉื™ ื‘ืžื™ื•ื—ื“ ื›ืืฉืจ ืืชื” ืฆืจื™ืš ืœืžืฆื•ื ื‘ืžื”ื™ืจื•ืช ืืช ื”ืกื™ื‘ื” ืœืชืœื•ื ื•ืช ืžืฉืชืžืฉื™ื ืขืœ ื™ื™ืฉื•ื ืฉืคื•ืขืœ ืœืื˜.

ืฉื™ื ืœื‘: ื›ืžืขื˜ ื›ืœ ื™ืฆื•ืื ื™ Netflow ืœื ื™ื•ื“ืข ืื™ืš ืฉืœื— ืชื’ื™ SRT, RTT, ืœืขืชื™ื ืงืจื•ื‘ื•ืช ื›ืœ ื›ืš, ื›ื“ื™ ืœืจืื•ืช ื ืชื•ื ื™ื ื›ืืœื” ืขืœ FlowSensor, ืืชื” ืฆืจื™ืš ืœื”ื’ื“ื™ืจ ืฉืœื™ื—ืช ืขื•ืชืง ืฉืœ ืชืขื‘ื•ืจื” ืžื”ืชืงื ื™ ืจืฉืช. FlowSensor ื‘ืชื•ืจื• ืฉื•ืœื— ืืช ื”-IPFIX ื”ืžื•ืจื—ื‘ ืืœ FlowCollector.

ื ื•ื— ื™ื•ืชืจ ืœื‘ืฆืข ืืช ื”ื ื™ืชื•ื— ื”ื–ื” ื‘ืืคืœื™ืงืฆื™ื™ืช ื”-Java StealtWatch, ื”ืžื•ืชืงื ืช ื‘ืžื—ืฉื‘ ื”ืžื ื”ืœ.

ื›ืคืชื•ืจ ื™ืžื ื™ ื‘ืขื›ื‘ืจ ืžื•ืคืขืœ ืžืืจื—ื™ื ืžื‘ืคื ื™ื ื•ืขื‘ื•ืจ ืœื›ืจื˜ื™ืกื™ื™ื” ื˜ื‘ืœืช ื–ืจื™ืžื”.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืœื—ืฅ ืขืœ ืกื™ื ื•ืŸ ื•ืœื”ื’ื“ื™ืจ ืืช ื”ืคืจืžื˜ืจื™ื ื”ื“ืจื•ืฉื™ื. ืœื“ื•ื’ืžื:

  • ืชืืจื™ืš/ืฉืขื” - ื‘-3 ื”ื™ืžื™ื ื”ืื—ืจื•ื ื™ื
  • ื‘ื™ืฆื•ืขื™ื โ€” ื–ืžืŸ ื ืกื™ืขื” ื”ืœื•ืš ื•ืฉื•ื‘ ืžืžื•ืฆืข >=50ms

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืœืื—ืจ ื”ืฆื’ืช ื”ื ืชื•ื ื™ื, ืขืœื™ื ื• ืœื”ื•ืกื™ืฃ ืืช ืฉื“ื•ืช RTT ื•-SRT ืฉืžืขื ื™ื™ื ื™ื ืื•ืชื ื•. ืœืฉื ื›ืš, ืœื—ืฅ ืขืœ ื”ืขืžื•ื“ื” ื‘ืฆื™ืœื•ื ื”ืžืกืš ื•ื‘ื—ืจ ื‘ืœื—ืฆืŸ ื”ื™ืžื ื™ ืฉืœ ื”ืขื›ื‘ืจ ื ื”ืœ ืขืžื•ื“ื•ืช. ืœืื—ืจ ืžื›ืŸ, ืœื—ืฅ ืขืœ ืคืจืžื˜ืจื™ RTT, SRT.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืœืื—ืจ ืขื™ื‘ื•ื“ ื”ื‘ืงืฉื”, ืžื™ื™ื ืชื™ ืœืคื™ ืžืžื•ืฆืข RTT ื•ืจืื™ืชื™ ืืช ื”ืื™ื ื˜ืจืืงืฆื™ื•ืช ื”ืื™ื˜ื™ื•ืช ื‘ื™ื•ืชืจ.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ื›ื“ื™ ืœื”ื™ื›ื ืก ืœืžื™ื“ืข ืžืคื•ืจื˜, ืœื—ืฅ ืœื—ื™ืฆื” ื™ืžื ื™ืช ืขืœ ื”ื–ืจื ื•ื‘ื—ืจ ืชืฆื•ื’ื” ืžื”ื™ืจื” ืขื‘ื•ืจ Flow.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืžื™ื“ืข ื–ื” ืžืฆื™ื™ืŸ ืฉื”ืžืืจื— 10.201.3.59 ืžื”ืงื‘ื•ืฆื” ืžื›ื™ืจื•ืช ื•ืฉื™ื•ื•ืง ืœืคื™ ืคืจื•ื˜ื•ืงื•ืœ NFS ืžื•ืฉืš ืœ ืฉืจืช DNS ืœื“ืงื” ื•-23 ืฉื ื™ื•ืช ื•ื™ืฉ ืœื• ืคื™ื’ื•ืจ ื ื•ืจืื™. ื‘ื›ืจื˜ื™ืกื™ื™ื” ืžืžืฉืงื™ื ืชื•ื›ืœ ืœื’ืœื•ืช ืžืื™ื–ื” ื™ืฆื•ืืŸ ื ืชื•ื ื™ื ืฉืœ Netflow ื”ืžื™ื“ืข ื”ืชืงื‘ืœ. ื‘ื›ืจื˜ื™ืกื™ื™ื” ื˜ื‘ืœืชื™ ืžื™ื“ืข ืžืคื•ืจื˜ ื™ื•ืชืจ ืขืœ ื”ืื™ื ื˜ืจืืงืฆื™ื” ืžื•ืฆื’.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืœืื—ืจ ืžื›ืŸ, ืขืœื™ืš ืœื‘ืจืจ ืื™ืœื• ืžื›ืฉื™ืจื™ื ืฉื•ืœื—ื™ื ืชื ื•ืขื” ืืœ FlowSensor ื•ืกื‘ื™ืจ ืœื”ื ื™ื— ืฉื”ื‘ืขื™ื” ื˜ืžื•ื ื” ืฉื.

ื™ืชืจื” ืžื›ืš, StealthWatch ื™ื™ื—ื•ื“ื™ ื‘ื›ืš ืฉื”ื™ื ืžื ื”ืœืช ืžื ื™ืขืช ื›ืคื™ืœื•ืช ื ืชื•ื ื™ื (ืžืฉืœื‘ื™ื ืืช ืื•ืชื ื–ืจืžื™ื). ืœื›ืŸ, ืืชื” ื™ื›ื•ืœ ืœืืกื•ืฃ ื›ืžืขื˜ ืžื›ืœ ืžื›ืฉื™ืจื™ Netflow ื•ืœื ืœืคื—ื“ ืฉื™ื”ื™ื• ื”ืจื‘ื” ื ืชื•ื ื™ื ื›ืคื•ืœื™ื. ืœื”ื™ืคืš, ื‘ืชื›ื ื™ืช ื–ื• ื–ื” ื™ืขื–ื•ืจ ืœื”ื‘ื™ืŸ ืœืื™ื–ื” ื”ื•ืค ื™ืฉ ืืช ื”ืขื™ื›ื•ื‘ื™ื ื”ื’ื“ื•ืœื™ื ื‘ื™ื•ืชืจ.

3. ื‘ื™ืงื•ืจืช ืฉืœ ืคืจื•ื˜ื•ืงื•ืœื™ ื”ืฆืคื ื” ืฉืœ HTTPS

ETA (ื ื™ืชื•ื— ืชื ื•ืขื” ืžื•ืฆืคืŸ) ื”ื™ื ื˜ื›ื ื•ืœื•ื’ื™ื” ืฉืคื•ืชื—ื” ืขืœ ื™ื“ื™ ืกื™ืกืงื• ื”ืžืืคืฉืจืช ืœืš ืœื–ื”ื•ืช ื—ื™ื‘ื•ืจื™ื ื–ื“ื•ื ื™ื™ื ื‘ืชืขื‘ื•ืจื” ืžื•ืฆืคื ืช ืžื‘ืœื™ ืœืคืขื ื— ืื•ืชื”. ื™ืชืจื” ืžื›ืš, ื˜ื›ื ื•ืœื•ื’ื™ื” ื–ื• ืžืืคืฉืจืช ืœืš "ืœื ืชื—" HTTPS ืœื’ืจืกืื•ืช TLS ื•ืœืคืจื•ื˜ื•ืงื•ืœื™ื ืงืจื™ืคื˜ื•ื’ืจืคื™ื™ื ื”ืžืฉืžืฉื™ื ื‘ืžื”ืœืš ื—ื™ื‘ื•ืจื™ื. ืคื•ื ืงืฆื™ื•ื ืœื™ื•ืช ื–ื• ืฉื™ืžื•ืฉื™ืช ื‘ืžื™ื•ื—ื“ ื›ืืฉืจ ืืชื” ืฆืจื™ืš ืœื–ื”ื•ืช ืฆืžืชื™ ืจืฉืช ื”ืžืฉืชืžืฉื™ื ื‘ืชืงื ื™ ืงืจื™ืคื˜ื• ื—ืœืฉื™ื.

ืฉื™ื ืœื‘: ืชื—ื™ืœื” ืขืœื™ืš ืœื”ืชืงื™ืŸ ืืช ืืคืœื™ืงืฆื™ื™ืช ื”ืจืฉืช ื‘-StealthWatch - ื‘ื™ืงื•ืจืช ืงืจื™ืคื˜ื•ื’ืจืคื™ืช ืฉืœ ETA.

ืขื‘ื•ืจ ืœื›ืจื˜ื™ืกื™ื™ื” ืœื•ื—ื•ืช ืžื—ื•ื•ื ื™ื โ† ื‘ื™ืงื•ืจืช ืงืจื™ืคื˜ื•ื’ืจืคื™ืช ืฉืœ ETA ื•ื‘ื—ืจ ืืช ืงื‘ื•ืฆืช ื”ืžืืจื—ื™ื ืฉืื ื• ืžืชื›ื ื ื™ื ืœื ืชื—. ืขื‘ื•ืจ ื”ืชืžื•ื ื” ื”ื›ื•ืœืœืช, ื‘ื•ืื• ืœื‘ื—ื•ืจ ืžืืจื—ื™ื ืžื‘ืคื ื™ื.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืืชื” ื™ื›ื•ืœ ืœืจืื•ืช ืฉื’ืจืกืช ื”-TLS ื•ืชืงืŸ ื”ืงืจื™ืคื˜ื• ื”ืžืชืื™ื ืžื•ืคืงื™ื. ืœืคื™ ื”ืกื›ื™ืžื” ื”ืจื’ื™ืœื” ื‘ืขืžื•ื“ื” ืคืขื•ืœื•ืช ืœืš ืœ ื”ืฆื’ ื–ืจื™ืžื•ืช ื•ื”ื—ื™ืคื•ืฉ ืžืชื—ื™ืœ ื‘ืœืฉื•ื ื™ืช ื—ื“ืฉื”.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืžื”ืคืœื˜ ื ื™ืชืŸ ืœืจืื•ืช ืฉื”ืžืืจื— 198.19.20.136 ืžืขืœ ืฉืขื•ืช 12 ื”ืฉืชืžืฉ ื‘-HTTPS ืขื TLS 1.2, ืฉื‘ื• ืืœื’ื•ืจื™ืชื ื”ื”ืฆืคื ื” AES-256 ื•ืคื•ื ืงืฆื™ื™ืช Hash SHA-384. ืœืคื™ื›ืš, ETA ืžืืคืฉืจ ืœืš ืœืžืฆื•ื ืืœื’ื•ืจื™ืชืžื™ื ื—ืœืฉื™ื ื‘ืจืฉืช.

4. ื ื™ืชื•ื— ืื ื•ืžืœื™ื•ืช ื‘ืจืฉืช

Cisco StealthWatch ื™ื›ื•ืœ ืœื–ื”ื•ืช ื—ืจื™ื’ื•ืช ืชื ื•ืขื” ื‘ืจืฉืช ื‘ืืžืฆืขื•ืช ืฉืœื•ืฉื” ื›ืœื™ื: ืื™ืจื•ืขื™ ืœื™ื‘ื” (ืื™ืจื•ืขื™ื ื‘ื™ื˜ื—ื•ื ื™ื™ื), ืื™ืจื•ืขื™ ื–ื•ื’ื™ื•ืช (ืื™ืจื•ืขื™ื ืฉืœ ืื™ื ื˜ืจืืงืฆื™ื•ืช ื‘ื™ืŸ ืžืงื˜ืขื™ื, ืฆืžืชื™ ืจืฉืช) ื• ื ื™ืชื•ื— ื”ืชื ื”ื’ื•ืชื™.

ื ื™ืชื•ื— ื”ืชื ื”ื’ื•ืช, ื‘ืชื•ืจื•, ืžืืคืฉืจ ืœืื•ืจืš ื–ืžืŸ ืœื‘ื ื•ืช ืžื•ื“ืœ ื”ืชื ื”ื’ื•ืช ืขื‘ื•ืจ ืžืืจื— ืžืกื•ื™ื ืื• ืงื‘ื•ืฆืช ืžืืจื—ื™ื. ื›ื›ืœ ืฉืชืขื‘ื•ืจ ื™ื•ืชืจ ืชื ื•ืขื” ื“ืจืš StealthWatch, ื”ื”ืชืจืื•ืช ื™ื”ื™ื• ืžื“ื•ื™ืงื•ืช ื™ื•ืชืจ ื”ื•ื“ื•ืช ืœื ื™ืชื•ื— ื–ื”. ื‘ื”ืชื—ืœื”, ื”ืžืขืจื›ืช ืžืคืขื™ืœื” ื”ืจื‘ื” ื‘ืื•ืคืŸ ืฉื’ื•ื™, ื•ืœื›ืŸ ื™ืฉ "ืœืขื•ื•ืช" ืืช ื”ื›ืœืœื™ื ื‘ื™ื“. ืื ื™ ืžืžืœื™ืฅ ืœื”ืชืขืœื ืžืื™ืจื•ืขื™ื ื›ืืœื” ื‘ืฉื‘ื•ืขื•ืช ื”ืจืืฉื•ื ื™ื, ืžื›ื™ื•ื•ืŸ ืฉื”ืžืขืจื›ืช ืชืชืื™ื ืืช ืขืฆืžื”, ืื• ืชื•ืกื™ืฃ ืื•ืชื ืœื—ืจื™ื’ื™ื.

ืœื”ืœืŸ ื“ื•ื’ืžื” ืœื›ืœืœ ืžื•ื’ื“ืจ ืžืจืืฉ ืื ื•ืžืœื™ื”, ื”ืงื•ื‘ืข ืฉื”ืื™ืจื•ืข ื™ืคืขืœ ืœืœื ืื–ืขืงื” ืื ืžืืจื— ื‘ืงื‘ื•ืฆืช Inside Hosts ืžืงื™ื™ื ืื™ื ื˜ืจืืงืฆื™ื” ืขื ืงื‘ื•ืฆืช Inside Hosts ื•ืชื•ืš 24 ืฉืขื•ืช ื”ืชืขื‘ื•ืจื” ืชืขืœื” ืขืœ 10 ืžื’ื” ื‘ื™ื™ื˜.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืœื“ื•ื’ืžื”, ื‘ื•ืื• ื ื™ืงื— ืื–ืขืงื” ืื’ื™ืจืช ื ืชื•ื ื™ื, ืžื” ืฉืื•ืžืจ ืฉืžืงื•ืจ/ื™ืขื“ ื›ืœืฉื”ื• ื”ืขืœื”/ื”ื•ืจื“ ื›ืžื•ืช ื’ื“ื•ืœื” ื‘ืื•ืคืŸ ื—ืจื™ื’ ืฉืœ ื ืชื•ื ื™ื ืžืงื‘ื•ืฆืช ืžืืจื—ื™ื ืื• ืžืืจื—. ืœื—ืฅ ืขืœ ื”ืื™ืจื•ืข ื•ืขื‘ื•ืจ ืœื˜ื‘ืœื” ืฉื‘ื” ืžืฆื•ื™ื ื™ื ื”ืžืืจื—ื™ื ื”ืžืคืขื™ืœื™ื. ืœืื—ืจ ืžื›ืŸ, ื‘ื—ืจ ืืช ื”ืžืืจื— ืฉืื ื• ืžืขื•ื ื™ื™ื ื™ื ื‘ื• ื‘ืขืžื•ื“ื” ืื’ื™ืจืช ื ืชื•ื ื™ื.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืžื•ืฆื’ ืื™ืจื•ืข ื”ืžืฆื™ื™ืŸ ืฉ-162 "ื ืงื•ื“ื•ืช" ื–ื•ื”ื•, ื•ืœืคื™ ื”ืžื“ื™ื ื™ื•ืช, ืžื•ืชืจื•ืช 100 "ื ืงื•ื“ื•ืช" - ืืœื• ืžื“ื“ื™ StealthWatch ืคื ื™ืžื™ื™ื. ื‘ืขืžื•ื“ื” ืคืขื•ืœื•ืช ืœึดื“ื—ื•ึนืฃ ื”ืฆื’ ื–ืจื™ืžื•ืช.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืื ื—ื ื• ื™ื›ื•ืœื™ื ืœืจืื•ืช ืืช ื–ื” ืžืืจื— ื ืชื•ืŸ ืงื™ื™ื ืื™ื ื˜ืจืืงืฆื™ื” ืขื ื”ืžืืจื— ื‘ืœื™ืœื” 10.201.3.47 ืžื”ืžื—ืœืงื” ืฉื™ื•ื•ืง ื•ืžื›ื™ืจื•ืช ืœืคื™ ืคืจื•ื˜ื•ืงื•ืœ HTTPS ื•ื”ื•ืจื“ื” 1.4 GB. ืื•ืœื™ ื”ื“ื•ื’ืžื” ื”ื–ื• ืœื ืœื’ืžืจื™ ืžื•ืฆืœื—ืช, ืื‘ืœ ื–ื™ื”ื•ื™ ืฉืœ ืื™ื ื˜ืจืืงืฆื™ื•ืช ืืคื™ืœื• ืขื‘ื•ืจ ื›ืžื” ืžืื•ืช ื’ื™ื’ื”-ื‘ื™ื™ื˜ ืžืชื‘ืฆืข ื‘ื“ื™ื•ืง ื‘ืื•ืชื• ืื•ืคืŸ. ืœื›ืŸ, ื—ืงื™ืจื” ื ื•ืกืคืช ืฉืœ ื”ื—ืจื™ื’ื•ืช ืขืฉื•ื™ื” ืœื”ื•ื‘ื™ืœ ืœืชื•ืฆืื•ืช ืžืขื ื™ื™ื ื•ืช.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืฉื™ื ืœื‘: ื‘ืžืžืฉืง ื”ืื™ื ื˜ืจื ื˜ ืฉืœ SMC, ื”ื ืชื•ื ื™ื ื ืžืฆืื™ื ื‘ื›ืจื˜ื™ืกื™ื•ืช ืœื•ื—ื•ืช ืžื—ื•ื•ื ื™ื ืžื•ืฆื’ื™ื ืจืง ืขื‘ื•ืจ ื”ืฉื‘ื•ืข ื”ืื—ืจื•ืŸ ื•ื‘ื›ืจื˜ื™ืกื™ื™ื” ืฆื’ ื‘ืžื”ืœืš ื”ืฉื‘ื•ืขื™ื™ื ื”ืื—ืจื•ื ื™ื. ื›ื“ื™ ืœื ืชื— ืื™ืจื•ืขื™ื ื™ืฉื ื™ื ื™ื•ืชืจ ื•ืœื”ืคื™ืง ื“ื•ื—ื•ืช, ืขืœื™ืš ืœืขื‘ื•ื“ ืขื ืžืกื•ืฃ ื”-Java ื‘ืžื—ืฉื‘ ื”ืžื ื”ืœ.

5. ืžืฆื™ืืช ืกืจื™ืงื•ืช ืจืฉืช ืคื ื™ืžื™ื•ืช

ืขื›ืฉื™ื• ื‘ื•ืื• ื ืกืชื›ืœ ืขืœ ื›ืžื” ื“ื•ื’ืžืื•ืช ืฉืœ ืขื“ื›ื•ื ื™ื - ืื™ืจื•ืขื™ ืื‘ื˜ื—ืช ืžื™ื“ืข. ืคื•ื ืงืฆื™ื•ื ืœื™ื•ืช ื–ื• ืžืขื ื™ื™ื ืช ื™ื•ืชืจ ืื ืฉื™ ืื‘ื˜ื—ื”.

ื™ืฉื ื ืžืกืคืจ ืกื•ื’ื™ ืื™ืจื•ืขื™ ืกืจื™ืงื” ืžื•ื’ื“ืจื™ื ืžืจืืฉ ื‘-StealthWatch:

  • ืกืจื™ืงืช ื™ืฆื™ืื•ืช - ื”ืžืงื•ืจ ืกื•ืจืง ื™ืฆื™ืื•ืช ืžืจื•ื‘ื•ืช ื‘ืžืืจื— ื”ื™ืขื“.
  • Addr tcp scan - ื”ืžืงื•ืจ ืกื•ืจืง ืืช ื›ืœ ื”ืจืฉืช ื‘ืื•ืชื” ื™ืฆื™ืืช TCP, ืžืฉื ื” ืืช ื›ืชื•ื‘ืช ื”-IP ื”ื™ืขื“. ื‘ืžืงืจื” ื–ื”, ื”ืžืงื•ืจ ืžืงื‘ืœ ืžื ื•ืช TCP Reset ืื• ืื™ื ื• ืžืงื‘ืœ ืชื’ื•ื‘ื•ืช ื›ืœืœ.
  • Addr udp scan - ื”ืžืงื•ืจ ืกื•ืจืง ืืช ื›ืœ ื”ืจืฉืช ื‘ืื•ืชื” ื™ืฆื™ืืช UDP, ืชื•ืš ื›ื“ื™ ืฉื™ื ื•ื™ ื›ืชื•ื‘ืช ื”-IP ื”ื™ืขื“. ื‘ืžืงืจื” ื–ื”, ื”ืžืงื•ืจ ืžืงื‘ืœ ืžื ื•ืช ICMP Port Unreachable ืื• ืื™ื ื• ืžืงื‘ืœ ืชื’ื•ื‘ื•ืช ื›ืœืœ.
  • Ping Scan - ื”ืžืงื•ืจ ืฉื•ืœื— ื‘ืงืฉื•ืช ICMP ืœื›ืœ ื”ืจืฉืช ืขืœ ืžื ืช ืœื—ืคืฉ ืชืฉื•ื‘ื•ืช.
  • Stealth Scan tัp/udp - ื”ืžืงื•ืจ ื”ืฉืชืžืฉ ื‘ืื•ืชื” ื™ืฆื™ืื” ื›ื“ื™ ืœื”ืชื—ื‘ืจ ืœืžืกืคืจ ื™ืฆื™ืื•ืช ื‘ืฆื•ืžืช ื”ื™ืขื“ ื‘ื• ื–ืžื ื™ืช.

ื›ื“ื™ ืฉื™ื”ื™ื” ื ื•ื— ื™ื•ืชืจ ืœืžืฆื•ื ืืช ื›ืœ ื”ืกื•ืจืงื™ื ื”ืคื ื™ืžื™ื™ื ื‘ื‘ืช ืื—ืช, ืงื™ื™ืžืช ืืคืœื™ืงืฆื™ื™ืช ืจืฉืช ืขื‘ื•ืจ StealthWatch - ื”ืขืจื›ืช ื ืจืื•ืช. ืขื•ื‘ืจื™ื ืœืœืฉื•ื ื™ืช ืœื•ื—ื•ืช ืžื—ื•ื•ื ื™ื โ† ื”ืขืจื›ืช ื ืจืื•ืช โ† ืกื•ืจืงื™ ืจืฉืช ืคื ื™ืžื™ื™ื ืชืจืื” ืื™ืจื•ืขื™ ืื‘ื˜ื—ื” ื”ืงืฉื•ืจื™ื ืœืกืจื™ืงื” ื‘ืฉื‘ื•ืขื™ื™ื ื”ืื—ืจื•ื ื™ื.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืขืœ ื™ื“ื™ ืœื—ื™ืฆื” ืขืœ ื”ื›ืคืชื•ืจ ืคืจื˜ื™ื, ืชืจืื” ืืช ืชื—ื™ืœืช ื”ืกืจื™ืงื” ืฉืœ ื›ืœ ืจืฉืช, ืืช ืžื’ืžืช ื”ืชืขื‘ื•ืจื” ื•ืืช ื”ืื–ืขืงื•ืช ื”ืžืชืื™ืžื•ืช.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืœืื—ืจ ืžื›ืŸ, ืชื•ื›ืœ "ืœื”ื™ื›ืฉืœ" ื‘ื›ื ื™ืกื” ืœืžืืจื— ืžื”ื›ืจื˜ื™ืกื™ื™ื” ื‘ืฆื™ืœื•ื ื”ืžืกืš ื”ืงื•ื“ื ื•ืœืจืื•ืช ืื™ืจื•ืขื™ ืื‘ื˜ื—ื”, ื›ืžื• ื’ื ืคืขื™ืœื•ืช ื‘ืžื”ืœืš ื”ืฉื‘ื•ืข ื”ืื—ืจื•ืŸ ืขื‘ื•ืจ ืžืืจื— ื–ื”.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ื›ื“ื•ื’ืžื”, ื‘ื•ืื• ื ื ืชื— ืืช ื”ืื™ืจื•ืข ืกืจื™ืงืช ื™ืฆื™ืื•ืช ืžื”ืžืืจื— 10.201.3.149 ืขืœ 10.201.0.72, ืœื—ื™ืฆื” ืคืขื•ืœื•ืช > ื–ืจื™ืžื•ืช ืงืฉื•ืจื•ืช. ื—ื™ืคื•ืฉ ืฉืจืฉื•ืจ ืžื•ืคืขืœ ื•ืžื•ืฆื’ ืžื™ื“ืข ืจืœื•ื•ื ื˜ื™.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืื™ืš ืื ื—ื ื• ืจื•ืื™ื ืืช ื”ืžืืจื— ื”ื–ื” ืžืื—ื“ ื”ื™ืฆื™ืื•ืช ืฉืœื• 51508 / TCP ืกืจืง ืœืคื ื™ 3 ืฉืขื•ืช ืืช ืžืืจื— ื”ื™ืขื“ ืœืคื™ ื ืžืœ 22, 28, 42, 41, 36, 40 (TCP). ื—ืœืง ืžื”ืฉื“ื•ืช ืื™ื ื ืžืฆื™ื’ื™ื ืžื™ื“ืข ื’ื ืžื›ื™ื•ื•ืŸ ืฉืœื ื›ืœ ืฉื“ื•ืช Netflow ื ืชืžื›ื™ื ื‘ื™ืฆื•ืืŸ Netflow.

6. ื ื™ืชื•ื— ืชื•ื›ื ื•ืช ื–ื“ื•ื ื™ื•ืช ืฉื”ื•ืจื“ื• ื‘ืืžืฆืขื•ืช CTA

CTA (Cognitive Threat Analytics) โ€” ื ื™ืชื•ื— ืขื ืŸ ืฉืœ Cisco, ืฉืžืฉืชืœื‘ ื‘ืฆื•ืจื” ืžื•ืฉืœืžืช ืขื Cisco StealthWatch ื•ืžืืคืฉืจ ืœืš ืœื”ืฉืœื™ื ื ื™ืชื•ื— ื ื˜ื•ืœ ื—ืชื™ืžื•ืช ืขื ื ื™ืชื•ื— ื—ืชื™ืžื•ืช. ื–ื” ืžืืคืฉืจ ืœื–ื”ื•ืช ืกื•ืกื™ื ื˜ืจื•ื™ืื ื™ื™ื, ืชื•ืœืขื™ ืจืฉืช, ืชื•ื›ื ื•ืช ื–ื“ื•ื ื™ื•ืช ืฉืœ Zero Day ื•ืชื•ื›ื ื•ืช ื–ื“ื•ื ื™ื•ืช ืื—ืจื•ืช ื•ืœื”ืคื™ืฅ ืื•ืชืŸ ื‘ืชื•ืš ื”ืจืฉืช. ื›ืžื• ื›ืŸ, ื˜ื›ื ื•ืœื•ื’ื™ื™ืช ETA ืฉื”ื•ื–ื›ืจื” ื‘ืขื‘ืจ ืžืืคืฉืจืช ืœืš ืœื ืชื— ืชืงืฉื•ืจืช ื–ื“ื•ื ื™ืช ื›ื–ื• ื‘ืชืขื‘ื•ืจื” ืžื•ืฆืคื ืช.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืžืžืฉ ื‘ื›ืจื˜ื™ืกื™ื™ื” ื”ืจืืฉื•ื ื” ื‘ืžืžืฉืง ื”ืื™ื ื˜ืจื ื˜ ื™ืฉ ื™ื™ืฉื•ืžื•ืŸ ืžื™ื•ื—ื“ ื ื™ืชื•ื— ืื™ื•ืžื™ื ืงื•ื’ื ื™ื˜ื™ื‘ื™. ืกื™ื›ื•ื ืงืฆืจ ืžืฆื‘ื™ืข ืขืœ ืื™ื•ืžื™ื ืฉื–ื•ื”ื• ืขืœ ืžืืจื—ื™ื ืฉืœ ืžืฉืชืžืฉื™ื: ื˜ืจื•ื™ืื ื™ื•ืช, ืชื•ื›ื ื•ืช ื”ื•ื ืื”, ืชื•ื›ื ื•ืช ืคืจืกื•ื ืžืขืฆื‘ื ื•ืช. ื”ืžื™ืœื” "ืžื•ืฆืคืŸ" ืžืฆื™ื™ื ืช ืœืžืขืฉื” ืืช ื”ืขื‘ื•ื“ื” ืฉืœ ETA. ืขืœ ื™ื“ื™ ืœื—ื™ืฆื” ืขืœ ืžืืจื—, ื›ืœ ื”ืžื™ื“ืข ืขืœื™ื•, ืื™ืจื•ืขื™ ืื‘ื˜ื—ื”, ื›ื•ืœืœ ื™ื•ืžื ื™ CTA, ืžื•ืคื™ืข.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ืขืœ ื™ื“ื™ ืจื™ื—ื•ืฃ ืžืขืœ ื›ืœ ืฉืœื‘ ื‘-CTA, ื”ืื™ืจื•ืข ืžืฆื™ื’ ืžื™ื“ืข ืžืคื•ืจื˜ ืขืœ ื”ืื™ื ื˜ืจืืงืฆื™ื”. ืœื ื™ืชื•ื— ืžืœื, ืœื—ืฅ ื›ืืŸ ืฆืคื” ื‘ืคืจื˜ื™ ื”ืื™ืจื•ืข, ื•ืชื•ืขื‘ืจ ืœืงื•ื ืกื•ืœื” ื ืคืจื“ืช ื ื™ืชื•ื— ืื™ื•ืžื™ื ืงื•ื’ื ื™ื˜ื™ื‘ื™.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ื‘ืคื™ื ื” ื”ื™ืžื ื™ืช ื”ืขืœื™ื•ื ื”, ืžืกื ืŸ ืžืืคืฉืจ ืœืš ืœื”ืฆื™ื’ ืื™ืจื•ืขื™ื ืœืคื™ ืจืžืช ื—ื•ืžืจื”. ื›ืืฉืจ ืืชื” ืžืฆื‘ื™ืข ืขืœ ื—ืจื™ื’ื” ืกืคืฆื™ืคื™ืช, ื™ื•ืžื ื™ื ืžื•ืคื™ืขื™ื ื‘ืชื—ืชื™ืช ื”ืžืกืš ืขื ืฆื™ืจ ื–ืžืŸ ืžืชืื™ื ื‘ืฆื“ ื™ืžื™ืŸ. ืœืคื™ื›ืš, ืžื•ืžื—ื” ืื‘ื˜ื—ืช ื”ืžื™ื“ืข ืžื‘ื™ืŸ ื‘ื‘ื™ืจื•ืจ ืื™ื–ื” ืžืืจื— ื ื’ื•ืข, ืœืื—ืจ ืื™ืœื• ืคืขื•ืœื•ืช, ื”ื—ืœ ืœื‘ืฆืข ืื™ืœื• ืคืขื•ืœื•ืช.

ืœื”ืœืŸ ื“ื•ื’ืžื” ื ื•ืกืคืช - ื˜ืจื•ื™ืื ื™ ื‘ื ืงืื™ ืฉื”ื“ื‘ื™ืง ืืช ื”ืžืืจื— 198.19.30.36. ืžืืจื— ื–ื” ื”ื—ืœ ืœืงื™ื™ื ืื™ื ื˜ืจืืงืฆื™ื” ืขื ื“ื•ืžื™ื™ื ื™ื ื–ื“ื•ื ื™ื™ื, ื•ื”ื™ื•ืžื ื™ื ืžืฆื™ื’ื™ื ืžื™ื“ืข ืขืœ ื–ืจื™ืžืช ื”ืื™ื ื˜ืจืืงืฆื™ื•ืช ื”ืœืœื•.

StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3
StealthWatch: ื ื™ืชื•ื— ื•ื—ืงื™ืจื” ืฉืœ ืื™ืจื•ืขื™ื. ื—ืœืง 3

ื‘ืฉืœื‘ ื”ื‘ื, ืื—ื“ ื”ืคืชืจื•ื ื•ืช ื”ื˜ื•ื‘ื™ื ื‘ื™ื•ืชืจ ืฉื™ื›ื•ืœื™ื ืœื”ื™ื•ืช ื”ื•ื ืœื”ืกื’ืจ ืืช ื”ืžืืจื— ื‘ื–ื›ื•ืช ื”ื™ืœื™ื“ ืฉื™ืœื•ื‘ ืขื Cisco ISE ืœื”ืžืฉืš ื˜ื™ืคื•ืœ ื•ื ื™ืชื•ื—.

ืžืกืงื ื”

ืคืชืจื•ืŸ Cisco StealthWatch ื”ื•ื ืื—ื“ ื”ืžื•ื‘ื™ืœื™ื ื‘ื™ืŸ ืžื•ืฆืจื™ ื ื™ื˜ื•ืจ ื”ืจืฉืช ื”ืŸ ืžื‘ื—ื™ื ืช ื ื™ืชื•ื— ืจืฉืช ื•ื”ืŸ ืžื‘ื—ื™ื ืช ืื‘ื˜ื—ืช ืžื™ื“ืข. ื”ื•ื“ื•ืช ืœื•, ืืชื” ื™ื›ื•ืœ ืœื–ื”ื•ืช ืื™ื ื˜ืจืืงืฆื™ื•ืช ืœื ืœื’ื™ื˜ื™ืžื™ื•ืช ื‘ืชื•ืš ื”ืจืฉืช, ืขื™ื›ื•ื‘ื™ื ื‘ืืคืœื™ืงืฆื™ื•ืช, ื”ืžืฉืชืžืฉื™ื ื”ืคืขื™ืœื™ื ื‘ื™ื•ืชืจ, ื—ืจื™ื’ื•ืช, ืชื•ื›ื ื•ืช ื–ื“ื•ื ื™ื•ืช ื•-APTs. ื™ืชืจ ืขืœ ื›ืŸ, ืืชื” ื™ื›ื•ืœ ืœืžืฆื•ื ืกื•ืจืงื™ื, ื’ื•ืœืฉื™ื ื•ืœื‘ืฆืข ื‘ื™ืงื•ืจืช ืงืจื™ืคื˜ื• ืฉืœ ืชืขื‘ื•ืจืช HTTPS. ืืชื” ื™ื›ื•ืœ ืœืžืฆื•ื ืืคื™ืœื• ื™ื•ืชืจ ืžืงืจื™ ืฉื™ืžื•ืฉ ื‘ ืงืฉืจ.

ืื ืชืจืฆื• ืœื‘ื“ื•ืง ืขื“ ื›ืžื” ื”ื›ืœ ืขื•ื‘ื“ ื‘ืฆื•ืจื” ื—ืœืงื” ื•ื™ืขื™ืœื” ื‘ืจืฉืช ืฉืœื›ื, ืฉืœื— ื‘ืงืฉื”.
ื‘ืขืชื™ื“ ื”ืงืจื•ื‘, ืื ื• ืžืชื›ื ื ื™ื ืขื•ื“ ืžืกืคืจ ืคืจืกื•ืžื™ื ื˜ื›ื ื™ื™ื ืขืœ ืžื•ืฆืจื™ ืื‘ื˜ื—ืช ืžื™ื“ืข ืฉื•ื ื™ื. ืื ืืชื” ืžืขื•ื ื™ื™ืŸ ื‘ื ื•ืฉื ื–ื”, ืขืงื•ื‘ ืื—ืจ ื”ืขื“ื›ื•ื ื™ื ื‘ืขืจื•ืฆื™ื ืฉืœื ื• (ืžื‘ืจืง, ืคื™ื™ืกื‘ื•ืง, VK, ื‘ืœื•ื’ ืคืชืจื•ื ื•ืช TS)!

ืžืงื•ืจ: www.habr.com

ื”ื•ืกืคืช ืชื’ื•ื‘ื”