<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Integration of trend Micro Control Manager solution with Extreme Networks through the Distributed IPS Connect module in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/integration-of-trend-micro-control-manager-solution-with-extreme/m-p/36746#M4252</link>
    <description>The simplest way to test it is uning the C&amp;amp;C botnet callback (as I used).&lt;BR /&gt;
&lt;BR /&gt;
Once configured, you can simple using a web browser to go to a C&amp;amp;C server like&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="http://www.antibasic.ga/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.antibasic.ga/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
This will cause the event triggering&lt;BR /&gt;
&lt;BR /&gt;
Have a nice day&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Mon, 11 Dec 2017 14:56:00 GMT</pubDate>
    <dc:creator>Luca_Messori</dc:creator>
    <dc:date>2017-12-11T14:56:00Z</dc:date>
    <item>
      <title>Integration of trend Micro Control Manager solution with Extreme Networks through the Distributed IPS Connect module</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/integration-of-trend-micro-control-manager-solution-with-extreme/m-p/36744#M4250</link>
      <description>I've done a lab on the integration between the TMMC and the Extreme Networks solution using the Distributed IPS connect module present on the EMC server.&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Lab environment&lt;/B&gt;&lt;BR /&gt;
Extreme Management Center (EMC) version 8.0.4&lt;BR /&gt;
ExtremeControl version 8.0.4&lt;BR /&gt;
Trend Micro  Control Manager version 6.0 Build 1327&lt;BR /&gt;
Trend Micro Officescan version 12.1&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Lab network: actors and data flows&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-89672-m7nq6m-Schema_inline.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5990iEBF00AF35816AE51/image-size/large?v=v2&amp;amp;px=999" role="button" title="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-89672-m7nq6m-Schema_inline.png" alt="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-89672-m7nq6m-Schema_inline.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
All conversations beetween different vendor are done using standard protocols: Trend Micro TMCM speaks with EMC using syslog and EMC speaks with switches using Radius or SNMP.&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Lab configurations&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
First of all I have configured TMCM to export via syslog the relevant security events to EMC server:&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-78418-1f5zcf-TMCM_Syslog_inline.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5868i4AE62D6F16614284/image-size/large?v=v2&amp;amp;px=999" role="button" title="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-78418-1f5zcf-TMCM_Syslog_inline.png" alt="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-78418-1f5zcf-TMCM_Syslog_inline.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
This is a global configuration. After that I have configured TMCM to send only some kind of syslog messages to the EMC (for example C&amp;amp;C botnet callback):&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-70483-1t9vtu8-TMCM_Syslog_events_inline.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1182i21F5E99D225928FD/image-size/large?v=v2&amp;amp;px=999" role="button" title="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-70483-1t9vtu8-TMCM_Syslog_events_inline.png" alt="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-70483-1t9vtu8-TMCM_Syslog_events_inline.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
In my lab I have configured TMCM in order to not send messages related to blocked malware.&lt;BR /&gt;
&lt;BR /&gt;
This is all for TMCM.&lt;BR /&gt;
&lt;BR /&gt;
After that I have configured EMC Distributed IPS Connect module. I have enabled the module:&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-125897-1qsrvjr-EMC_IPS_inline.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5744iA95D067B155D67E4/image-size/large?v=v2&amp;amp;px=999" role="button" title="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-125897-1qsrvjr-EMC_IPS_inline.png" alt="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-125897-1qsrvjr-EMC_IPS_inline.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
and then I have configured the rules to add infected or hacked host to the Quarantine_MAC group:﻿&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-54337-1o7xcf-EMC_IPS_rules_inline.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4271i1199D9037AB45AE6/image-size/large?v=v2&amp;amp;px=999" role="button" title="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-54337-1o7xcf-EMC_IPS_rules_inline.png" alt="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-54337-1o7xcf-EMC_IPS_rules_inline.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
And finally, I have created a NAC rule to move the hosts in Quarantine_MAC Group in a quarantine VLAN. This rule should be placed before other client  rules:&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-28316-16u8tol-NAC_Rule_inline.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/373iF2147DF9AC418F23/image-size/large?v=v2&amp;amp;px=999" role="button" title="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-28316-16u8tol-NAC_Rule_inline.png" alt="81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-28316-16u8tol-NAC_Rule_inline.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 07 Dec 2017 22:44:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/integration-of-trend-micro-control-manager-solution-with-extreme/m-p/36744#M4250</guid>
      <dc:creator>Luca_Messori</dc:creator>
      <dc:date>2017-12-07T22:44:00Z</dc:date>
    </item>
    <item>
      <title>RE: Integration of trend Micro Control Manager solution with Extreme Networks through the Distributed IPS Connect module</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/integration-of-trend-micro-control-manager-solution-with-extreme/m-p/36745#M4251</link>
      <description>Hi Luca,&lt;BR /&gt;
&lt;BR /&gt;
Were you able to simulate any TMCM events to test?</description>
      <pubDate>Fri, 08 Dec 2017 04:56:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/integration-of-trend-micro-control-manager-solution-with-extreme/m-p/36745#M4251</guid>
      <dc:creator>Dorian_Perry</dc:creator>
      <dc:date>2017-12-08T04:56:00Z</dc:date>
    </item>
    <item>
      <title>RE: Integration of trend Micro Control Manager solution with Extreme Networks through the Distributed IPS Connect module</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/integration-of-trend-micro-control-manager-solution-with-extreme/m-p/36746#M4252</link>
      <description>The simplest way to test it is uning the C&amp;amp;C botnet callback (as I used).&lt;BR /&gt;
&lt;BR /&gt;
Once configured, you can simple using a web browser to go to a C&amp;amp;C server like&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="http://www.antibasic.ga/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.antibasic.ga/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
This will cause the event triggering&lt;BR /&gt;
&lt;BR /&gt;
Have a nice day&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Dec 2017 14:56:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/integration-of-trend-micro-control-manager-solution-with-extreme/m-p/36746#M4252</guid>
      <dc:creator>Luca_Messori</dc:creator>
      <dc:date>2017-12-11T14:56:00Z</dc:date>
    </item>
  </channel>
</rss>

