Creating a Custom Fingerprint for Clients
Client fingerprints identify operating systems based on the SYN packet a host sends when it connects to a TCP application running on another host on the network.
If the management center does not have direct contact with monitored hosts, you can specify a device that is managed by the management center and is closest to the host you intend to fingerprint when specifying client fingerprint properties.
Before you begin the fingerprinting process, obtain the following information about the host you want to fingerprint:
-
The number of network hops between the host and the management center or the device you use to obtain the fingerprint. (Cisco strongly recommends that you directly connect the management center or the device to the same subnet that the host is connected to.)
-
The network interface (on the management center or the device) that is connected to the network where the host resides.
-
The actual operating system vendor, product, and version of the host.
-
Access to the host in order to generate client traffic.
Procedure
Step 1 | Choose . | ||
Step 2 | Click Custom Operating Systems. | ||
Step 3 | Click Create Custom Fingerprint. | ||
Step 4 | From the Device drop-down list, choose the management center or the device that you want to use to collect the fingerprint. | ||
Step 5 | Enter a Fingerprint Name. | ||
Step 6 | Enter a Fingerprint Description. | ||
Step 7 | From the Fingerprint Type list, choose Client. | ||
Step 8 | In the Target IP Address field, enter an IP address of the host you want to fingerprint. Note that the fingerprint will only be based on traffic to and from the host IP address you specify, not any of the host’s other IP addresses (if it has any). | ||
Step 9 | In the Target Distance field, enter the number of network hops between the host and the device that you chose earlier to collect the fingerprint.
| ||
Step 10 | From the Interface list, choose the network interface that is connected to the network segment where the host resides.
| ||
Step 11 | If you want to display custom information in the host profile for fingerprinted hosts (or if the host you want to fingerprint does not reside in the OS Vulnerability Mappings section), choose Use Custom OS Display and provide the values you want to display for the following:
| ||
Step 12 | In the OS Vulnerability Mappings section, choose the operating system, product, and versions you want to use for vulnerability mapping. You must specify Vendor and Product values in this section if you want to use the fingerprint to identify vulnerabilities for matching hosts or if you do not assign custom operating system display information. To map vulnerabilities for all versions of an operating system, specify only the Vendor and Product values.
Example:Example: | ||
Step 13 | Click Create. The status briefly shows
| ||
Step 14 | Using the IP address you specified as the target IP address, access the host you are trying to fingerprint and initiate a TCP connection to the appliance. To create an accurate fingerprint, traffic must be seen by the appliance collecting the fingerprint. If you are connected through a switch, traffic to a system other than the appliance may not be seen by the system. Example:
|
What to do next
-
Activate the fingerprint as described in Activating and Deactivating Fingerprints.