CANES 2 Flashcards
Main references for CANES Core
CANES SW4 IETM – EE689-2X-IEM-004- AN/USQ-208C(V)
C5ISR
Navy Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance
Navy Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance (C5ISR) consists of:
Navy Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance (C5ISR) consists of:
2 CANES online resources
Naval Information Warfare Systems Command (NAVWAR) Acquisition Integrated Logistics Online Repository (SAILOR)
Navy Enterprise Service Desk (NESD)
CDS provides
Cross Domain Solutions (CDS) provides client access to the UNCLAS, SR, and SECRET enclaves
CDS Transfer Guard provides the capability to disseminate data from systems accredited at the same or lower classification levels
Sanitizes and downgrades data for release to systems withdifferent classification levels
Fault Isolation Strategy Six Step Process:
- Recognize symptom(s)
- Define symptom(s)
- List probable faulty function
- Localize the faulty function
- Localize trouble to the faulty component
- Analyze the failure
The hardware components used in CANES can be broken down into the following four functional areas:
Data Processing
Data Storage
Data Transfer
Power Distribution
Servers are installed in the CANES equipment racks and provide VMware vSAN storage for hoste apps and virtual machines.
The HP DL380 G10
One of this is the Witness server and is installed in the SECRET enclave only. It enables MAC-1 failover/failback to occur automatically.
As such it is considered critical equipment and must always remain powered on.
HP DL20 G10 this unit is located in the VTC rack (Unit 51 or 52) depending on the installation
Most likely not connected
The Line Console 0 (con 0) in the Cisco IOS represents the physical console port, and is configured via the Line Interface:
Access the Line Interface from Global Config Mode by typing: Line Con 0 followed by the Enter key
Changing the Line Interface configuration without required proper approvals in not authorized
To verify the configuration is unchanged from baseline settings
From Privileged EXEC mode type: show running-config | begin line
Compare the Line Con 0 configs to the ship’s network template
Viewing Local Accounts
Cisco Switch and Router
From Privilege EXEC mode, type: show run | include username
Verify local accounts list and privilege level
Cisco Default Privilege Levels
Level 0: log out, enable, disable, help, and exit commands
Level 1: Read-only access
Level 15: Full router or switch control
Cisco Local Account Creation
From Global Config mode, type: Username <new> privilege <privilege> password <new></new></privilege></new>
Local Account Deletion
From Global Config mode, type: no username <username></username>
Show Running Config | Section OSPF
command shows the OSPF section of the running configuration
Results can be used to compare baseline settings
Show IP OSPF Neighbors
command shows the state of adjacency; OSPF requires full adjacency to function
Results show ip address ospf neighbors’ connecting interface – the CANES Border Firewall interface that connects to the Backbone router-switch
Show IP OSPF Interface
command: shows OSPF information per interface
Show IP OSPF Database
command: shows all router IDs in the OSPF area
Show IP Route
command: shows directly connected, static, link local, and OSPF learned network routes
Exchange Troubleshooting
The _____ Diagram is a helpful resource when errors occur
Exchange Troubleshooting
The Email and Calendar Service Troubleshooting Fault Isolation Diagram is a helpful resource when errors occur
Exchange Toolbox is installed on
CANES EX01/02 and IAEXET
It is a Microsoft Management Console (MMC) snap-in that you can use to view information about and act on queues and messages in queues
Exchange Toolbox includes Queue Viewer
System Admins can use Queue Viewer to perform the following actions
Remove messages
Suspend messages
Resume messages
Redirect messages
Accessing Queue Viewer
Log in to IAEXET with System Administrator credentials
Navigate to Start > Microsoft Server Exchange 2016 > Exchange Toolbox and click on Queue Viewer
Click on Queue Viewer under Mailflow Tools
Exchange Troubleshooting (cont.)
There are five areas of importance
Network
Hardware
Services
Configurations
Off ship Connectivity
Exchange Troubleshooting
Configuration Items to monitor from the Security Information and Event Management (SIEM) or the Systems Center Operations Management (SCOM) dashboard
Mail transport - Replication
Name resolution service
Encryption Service - Processes
Message Application Programming Interface (MAPI) and Mail submission
Active Directory Remote Procedure Call (RPC) Access
Directory Inquiry
Rights management
Alternate client access for Standard Mail Transfer Protocol (SMTP) Clients
Active directory Global catalogue
EdgeSync
Hub transport
Directory Queries
Lightweight Directory Access Protocol (LDAP) global catalogue queries
Registry access
Clustering
CANES is preconfigured to support the implementation of River City procedures in all enclaves
There are four OPSECON groups
OPSECON 1 - CO, XO, CMC, TAO
OPSECON 2 - OPS, EMO, CHENG
OPSECON 3 - All Officers, All Chiefs
OPSECON 4 - E-6 and Junior
Generating and Exporting ACAS Report to VRAM
From ACAS SecurityCenter, navigate to Scans > Active Scans and select desired scan to upload
Select Post Scan and then select the report configured to publish
Click Submit to save the scan, and then navigate to Reporting Report > Results to access report
Select report and click Download to save locally with a meaningful name
Select Submit button and a dialog box is displayed, indicating the upload has been sent
Server that bypasses wsav
ADNS
Encryption for CANES
Symantec Endpoint Encryption Manager > Symantec Endpoint Encryption Software Setup > Removable Media Encryption is used to restore removable drive encryption to reimaged computers
Disk encryption recovery with BitLocker:
BitLocker Recovery Key is found under Active Directory Users and Computers (ADUC) in the Trusted Platform Module (TPM)
Access the ADUC <FQDN> CANES Users and Computers > Computers
Select the computer and click on the BitLocker Recovery tab to find the BitLocker Recovery Key</FQDN>
All Federal DoD information systems are required to use devices protected by the _____ and maintain encryption standard of _____ encryption Federal Information Processing Standards (FIPS)-140-2n
All Federal DoD information systems are required to use devices protected by the TPM and maintain encryption standard of AES 256-bit encryption Federal Information Processing Standards (FIPS)-140-2n
SEE
Symantec Endpoint Encryption
Is used for hard drive encryption
Bitlocker
Is used for removable media encryption
WinZip Secure Burn
DAR
Data at rest
Three Bitlocker status
Protection Status 0 – Protection OFF
Protection Status 1 – Protection ON (Unlocked)
Protection Status 2 – Protection ON (Locked)
is used to restore removable drive encryption to reimaged computers
Symantec Endpoint Encryption Manager > Symantec Endpoint Encryption Software Setup > Removable Media Encryption
NCVI
Navy Certificate Validation Infrastructure
CLO
Cryptographic Logon
UNCLAS enclave CLO logon uses certificates on
the CAC
SECRET enclave CLO logon uses a
Secret Internet Protocol Router Network (SIPRNet) Token
3 ways to login wsav CLI
- Putty: port 22 SSH (wsav.<FQDN>)</FQDN>
- vSphere: remote MRDS, vcsa select UNCLASS_WSAV
- Remote MRDS: Cisco WSAV Management Console Shortcut
SCSM
Microsoft system Center Service Manager software that manages incidents and problems
View the connectors that transfer data to SCSM
MRDS01 > Microsoft System Center > Service Manager Console > Administration > Connectors
SCOM
System Center Operations Manager
SCOM uses _____ to monitor communication channels between an agent and its management server
If heartbeats stop, no data is transmitted to the management server
A heartbeat is a packet of data sent by an agent every 60 seconds
Three missed heartbeats generate an alert, prompting the management server to ping the computer
If the computer does not respond to the ping, an alert is generated
MECM
Microsoft Endpoint Configuration Manager
Are groups of devices or users that can be created so they can be managed as a group
Collections
MECM dashboards have several options to visually represent system data
Navigate to MECM > Monitoring > Overview > Client Status > Client > Activity Dashboard
SIEM and SAM are the names of Virtual Machines (VMs).
What are the applications installed on those VMs?
Sentinel Server and Sentinel Agent Manager are the applications installed on those VMs.
SIEM heartbeat checking
Checks heartbeat every five minutes
Analysis begins after 12 mins of no heartbeat
Unknown status after 18 days of no heartbeat
Sentinel is the security and system log collector and
analyzer application for CANES.
for SW4 is the addition of two VMs
New in NetIQ SIEM
Microsoft System Center > Operations Console.
If the Server name field is blank
type: EM01 and click Connect.
Troubleshooting VoSIP/VoIP Phones – Basic and Factory Reset (cont.)
Prerequisites for Factory Reset and steps
For SCI enclave, the phone must be on a DHCP-enabled network
For SCI enclave, a valid TFTP server must be set in DHCP option 150 or option 66
The term62.default.loads file or the term42.default.loads and the files specified in that file should be available on the TFTP server that is specified by the DHCP packet
Unplug the power cable from the phone and then plug it back in
While the phone is powering up, and before the speaker button flashes on and off, press and hold #
Continue to hold # until each line button flashes (amber) on and off in sequence
Release # and press 123456789*0#
Once the factory reset is completed, perform the steps in the IETM for Manual Cisco SCI VoIP Phone Configuration
VTC
Video Teleconference
Force-Level ships support VTC on:
UNCLAS
SECRET
Sensitive Compartmented Information (SCI)
CANES VTC service includes the Cisco Precision High Definition (HD) camera that works with the
Cisco WEBEX CODEC in SW4 to provide full teleconferencing services to CANES
VTC interfaces with Network Operations Center (NOC), Broadcast Control Authority (BCA), and
Force-level platforms to exchange audio and video
All SCI VTCs, except for the SCI VTC testing conducted by the Global Helpdesk, are scheduled through the
Joint Worldwide Intelligence Communications System (JWICS) VTC Scheduling system via http://vcwizard.dodiis.ic.gov
Download Rules of Engagement and VTC Scheduling guides
Open a web browser and navigate to: http://www.jwics.ic.gov
Download the VTC Scheduling Guide by clicking VTC Engineering > Documents tab > VTC Scheduling Guide
This document will assist with navigating the scheduling wizard to set up an SCI VTC
VTC VLANs
UNCLAS: VLAN 183
SECRET: VLAN 283
SCI: VLAN 513 (Force-level ships only)
SCI: VLAN 520 (Force-level ships only)