SlideShare a Scribd company logo
1 of 19
Download to read offline
HP ArcSightย ESM
Software Version: 6.8c
IPv6 Standard Content Guide
November 12, 2014
Legal Notices
Warranty
The only warranties for HP products and services are set forth in the express warranty statements accompanying such products
and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or
editorial errors or omissions contained herein.
The information contained herein is subject to change without notice.
The network information used in the examples in this document (including IP addresses and hostnames) is for illustration
purposes only.
HP ArcSight products are highly flexible and function as you configure them. The accessibility, integrity, and confidentiality of
your data is your responsibility. Implement a comprehensive security strategy and follow good security practices.
This document is confidential.
Restricted Rights Legend
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211
and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items
are licensed to the U.S. Government under vendor's standard commercial license.
Copyright Notice
ยฉ Copyright 2014 Hewlett-Packard Development Company, L.P.
Follow this link to see a complete statement of copyrights and acknowledgements:
http://www.hpenterprisesecurity.com/copyright
Support
Phone A list of phone numbers is available on the HP ArcSight Technical Support
Page:ย https://softwaresupport.hp.com/documents/10180/14684/esp-support-
contact-list
Support Web Site https://softwaresupport.hp.com
Protect 724 Community https://protect724.hp.com
Contact Information
HP ESM (6.8c) Page 2 of 19
Contents
Chapter 1: IPv6 Overview 4
What is Standard Content? 4
Standard Content Packages 6
IPv6 Content 7
Chapter 2: Installation and Configuration 8
Installing the IPv6 Package 8
Configuring IPv6 Content 9
Chapter 3: IPv6 Use Case 10
IPv6 Resources 10
Send Documentation Feedback 19
HP ESM (6.8c) Page 3 of 19
Chapter 1: IPv6 Overview
This chapter discusses the following topics.
What is Standard Content? 4
Standard Content Packages 6
IPv6 Content 7
What is Standard Content?
Standard content is a series of coordinated resources (filters, rules, dashboards, reports, and so on)
that address common security and management tasks. Standard content is designed to give you
comprehensive correlation, monitoring, reporting, alerting, and case management out-of-the box with
minimal configuration. The content provides a full spectrum of security, network, and configuration
monitoring tasks, as well as a comprehensive set of tasks that monitor the health of the system.
Standard content is installed using a series of packages, some of which are installed automatically with
the ArcSight Manager to provide essential system health and status operations. The remaining
packages are presented as install-time options organized by category.
Standard content consists of the following:
l ArcSight Core Security content is installed automatically with the ArcSight Manager and consists
of key resources for monitoring Microsoft Windows, firewall, IPS and IDS, NetFlow, and other
essential security information.
l ArcSight Administration content contains several packages that provide statistics about the
health and performance of ArcSight products.
n ArcSight Administration is installed automatically with the ArcSight Manager and is essential for
managing and tuning the performance of content and components.
n ArcSight Admin DB CORR is installed automatically with the ArcSight Manager for the CORR-
Engine (Correlation Optimized Retention and Retrieval) and provides information on the health of
the CORR-Engine.
Note: The ArcSight Admin DB CORR content package is installed automatically when you
perform a new ArcSight Manager installation. However package installation is different
during upgrade. If you are upgrading your system from a previous version, check to see if
the package is installed after upgrade. If the package is not installed, install it from the
ArcSight Console.
n ArcSight Content Management is an optional package that shows information about content
package synchronization with the ArcSight Content Management feature. The information
HP ESM (6.8c) Page 4 of 19
includes a history of content packages synchronized from a primary source to multiple
destinations, and any common issues or errors encountered. You can install this package during
ArcSight Manager installation or from the ArcSight Console any time after installation.
n ArcSight ESMย HA Monitoring is an optional package that lets you monitor systems that use the
ESM High Availability Module. You can install this package during ArcSight Manager installation
or from the ArcSight Console any time after installation.
n ArcSight Search Filters is installed automatically with the ArcSight Manager for use in the
ArcSight Command Center. You cannot edit or use these filters in the ArcSight Console. For
information about the search filters, refer to the ArcSight Command Center Userโ€™s Guide.
Note: The ArcSight Search Filters content package is installed automatically when you
perform a new ArcSight Manager installation. However package installation is different
during upgrade. If you are upgrading your system from a previous version, check to see if
the package is installed after upgrade. If the package is not installed, install it from the
ArcSight Console.
l ArcSight System content is installed automatically with the ArcSight Manager and consists of
three packages: ArcSight Core, ArcSight Groups, and ArcSight Networks. ArcSight Core and
ArcSight Groups contain resources required for basic security processing functions, such as threat
escalation and priority calculations, as well as basic throughput channels required for out-of-the-box
functionality. The ArcSight Networks package contains the zones that were in the ArcSight Core
package in previous releases, in addition to local and global network resources.
l ArcSight Foundation content (such as Cisco Monitoring, Configuration Monitoring, Intrusion
Monitoring, IPv6, NetFlow Monitoring, Network Monitoring, and Workflow) provide a coordinated
system of resources with real-time monitoring capabilities for a specific area of focus, as well as
after-the-fact analysis in the form of reports and trends. You can extend these foundations with
additional resources specific to your needs or you can use them as a template for building your own
resources and tasks. You can install a Foundation during installation or from the ArcSight Console
any time after installation.
l Shared Libraries - ArcSight Administration and several of the ArcSight Foundations rely on a
series of common resources that provide core functionality for common security scenarios.
Dependencies between these resources and the packages they support are managed by the
Package resource.
n Anti Virus content is a set of filters, reports, and report queries used by ArcSight Foundations,
such as Configuration Monitoring and Intrusion Monitoring.
n Conditional Variable Filters content is a library of filters used by variables in standard content
report queries, filters, and rule definitions. The Conditional Variable Filters are used by ArcSight
Administration and certain ArcSight Foundations, such as Configuration Monitoring, Intrusion
Monitoring, Network Monitoring, and Workflow.
n Global Variables content is a set of variables used to create other resources and to provide
event-based fields that cover common event information, asset, host, and user information, and
IPv6 Standard Content Guide
Chapter 1: IPv6 Overview
HP ESM (6.8c) Page 5 of 19
commonly used timestamp formats. The Global Variables are used by ArcSight Administration
and certain ArcSight Foundations.
n Monitoring Support Data content is a set of active lists that store mapping information for HTTP
return status code classes, Cisco firewall syslog message types, and encoded logon types.
n Network filters content is a set of filters required by ArcSight Administration and certain ArcSight
Foundations, such as Intrusion Monitoring and Network Monitoring.
Caution: The resources in the ArcSight Core Security, ArcSight Administration, ArcSight DB
CORR, Conditional Variable Filters, Global Variables, and Network Filters content packages are
not locked even though they manage core functionality; HP recommends that you do not delete or
modify these resources unless you are an advanced user who understands fully the resources and
their dependencies.
Standard Content Packages
Standard content comes in packages (.arb files) that are either installed automatically or presented as
install-time options. The following graphic outlines the packages.
The ArcSight Core Security, ArcSight Administration, and ArcSight System packages at the base
provide content required for basic functionality. The common packages in the center contain shared
resources that support multiple packages. The packages shown on top are ArcSight Foundations that
address common network security and management scenarios.
IPv6 Standard Content Guide
Chapter 1: IPv6 Overview
HP ESM (6.8c) Page 6 of 19
Depending on the options you install, you will see the ArcSight Core Security, ArcSight Administration,
and ArcSight System resources and some or all of the other package content.
Caution: When creating your own packages, you can explicitly include or exclude system
resources in the package. Exercise caution if you delete packages that might have system
resources. Make sure the system resources either belong to a locked group or are themselves
locked. For more information about packages, refer to the ArcSight Console Userโ€™s Guide.
IPv6 Content
The IPv6 content reports on data that comes from networks with IPv6 addresses.
This guide describes the IPv6 content. For information about ArcSight Core Security, ArcSight
Administration, or ArcSight System content, refer to the ArcSight Core Security, ArcSight
Administration, and ArcSight System Standard Content Guide. For information about an optional
ArcSight Foundation, refer to the Standard Content Guide for that Foundation. ESM documentation is
available on Protect 724 (https://protect724.hp.com).
IPv6 Standard Content Guide
Chapter 1: IPv6 Overview
HP ESM (6.8c) Page 7 of 19
Chapter 2: Installation and Configuration
This chapter discusses the following topics:
Installing the IPv6 Package 8
Configuring IPv6 Content 9
Installing the IPv6 Package
The IPv6 Foundation package is one of the standard content packages presented as install-time
options. If you selected all the standard content packages to be installed at installation time, the
packages and their resources are installed in the ArcSight Database and available in the Navigator
panel resource tree. The package icons in the Navigator panel package view appear blue.
If you opted to exclude a Foundation package during ArcSight Manager installation, the package is
imported into the Packages tab in the Navigator panel automatically, but is not available in the resource
view. The package icon in the package view appears grey.
To install a package that is imported, but not installed:
1. On the Navigator panel Packages tab, navigate to the package you want to install.
2. Right-click the package and select Install Package.
3. In the Install Package dialog, click OK.
4. When the installation is complete, review the summary report and click OK.
The package resources are fully installed to the ArcSight Database, the resources are fully enabled and
operational, and available in the Navigator panel resource tree.
To uninstall a package that is installed:
1. On the Navigator Panel Packages tab, navigate to the package you want to uninstall.
2. Right-click the package and select Uninstall Package.
3. In the Uninstall Package dialog, click OK.
4. The progress of the uninstall displays in the Progress tab of the Uninstalling Packages dialog. If a
message displays indicating that there is a conflict, select an option in the Resolution Options
area and click OK.
5. When uninstall is complete, review the summary and click OK.
HP ESM (6.8c) Page 8 of 19
The package is removed from the ArcSight Database and the Navigator panel resource tree, but
remains available in the Navigator panel Packages tab, and can be re-installed at another time.
If you do not want the package to be available in any form, you can delete the package.
To delete a package and remove it from the ArcSight Console and the ArcSight Database:
1. On the Navigator Panel Packages tab, navigate to the package you want to delete.
2. Right-click the package and select Delete Package.
3. When prompted for confirmation, click Delete.
The package is removed from the Navigator panel Packages tab.
Configuring IPv6 Content
The IPv6 content is triggered by events from IPv6-enabled SmartConnectors. Contact your HP
ArcSight sales representative for a list of IPv6-enabled SmartConnectors.
A network model keeps track of the network nodes participating in the event traffic. Modeling your
network and categorizing critical assets using the standard asset categories is what activates some of
the standard content and makes it effective. For information about populating the network model, refer
to the ArcSight Console Userโ€™s Guide. To learn more about the architecture of the ESM network
modeling tools, refer to the ESM 101 guide.
The IPv6 content contains many reports. You can run reports on demand, automatically on a regular
schedule, or both. By default, IPv6 reports are not scheduled to run automatically. Evaluate the reports
that come with IPv6, and schedule the reports that are of interest to your organization and business
objectives. For instructions about how to schedule reports, refer to the ArcSight Console Userโ€™s Guide.
IPv6 Standard Content Guide
Chapter 2: Installation and Configuration
HP ESM (6.8c) Page 9 of 19
Chapter 3: IPv6 Use Case
The IPv6 content shows data that comes from networks with IPv6 addresses.
Standard content resources are grouped together in the ArcSight Console in use case resources. A use
case resource provides a way to see a set of resources that help address a specific security issue or
business requirement.
To view the resources associated with the IPv6 use case resource:
1. In the Navigator panel, select the Use Cases tab.
2. Open the ArcSight Foundation/IPv6 group.
3. Right-click the IPv6 use case resource and select the Open Use Case option, or double-click the
use case resource.
IPv6 Resources
The following table lists all the resources in the IPv6 use case.
Resource Description Type URI
Monitor Resources
Successful
Logins by
Destination
IPv6
Address
This report shows authentication
successes from login attempts by
destination IPv6 address. A chart shows
the top destination addresses with
successful login attempts. A table
shows the count of authentication
successes by destination-source pair
and by user.
Report ArcSight Foundation/IPv6/
Top Alert
IPv6
Destinations
This report shows the top IDS and IPS
alert destinations per day.
Report ArcSight Foundation/IPv6/
Top IDS
Signature
IPv6
Sources per
Day
This report shows the Top IDS signature
sources per day.
Report ArcSight Foundation/IPv6/
Resources that Support the IPv6 Use Case
HP ESM (6.8c) Page 10 of 19
Resource Description Type URI
Attacker
IPv6 Counts
by ArcSight
Priority
This report displays a table with the
priority, attacker IPv6 address and the
count of attack events where the
category significance starts with
Compromise or Hostile.
Report ArcSight Foundation/IPv6/
Attacker
Counts by
IPv6 Device
This report displays a table with the
device IPv6 address, attacker IPv6
address, and the count of attacker
events where the category significance
starts with Compromise or Hostile.
Report ArcSight Foundation/IPv6/
Top IDS
Signature
IPv6
Destinations
per Day
This report shows the top IDS signature
destinations per day.
Report ArcSight Foundation/IPv6/
Target
Counts by
IPv6
Attacker
This report displays the attacker
address, target address, and the sum of
the aggregated event count for events
matching the Attack Events filter.
Report ArcSight Foundation/IPv6/
Target
Counts by
IPv6 Device
This report displays the device address,
target address, and the sum of the
aggregated event count for events
matching the Attack Events filter.
Report ArcSight Foundation/IPv6/
Denied
Outbound
Connections
by IPv6
Address
This report shows a summary of the
denied outbound traffic by local address.
A chart shows the top IPv6 addresses
with the highest denied connections
count. A report lists all the addresses
sorted by connection count.
Report ArcSight Foundation/IPv6/
Target IPv6
Counts by
ArcSight
Priority
This report displays the priority, target
address, and the sum of the aggregated
event count for events matching the
Attack Events filter.
Report ArcSight Foundation/IPv6/
Top Alert
IPv6
Sources
This report shows the top IDS and IPS
alert sources per day. A chart shows the
top IDS and IPS alert source IP
addresses. A table shows the top alert
source IP addresses, as well as the
device vendor and product of the
reporting device.
Report ArcSight Foundation/IPv6/
Resources that Support the IPv6 Use Case, continued
IPv6 Standard Content Guide
Chapter 3: IPv6 Use Case
HP ESM (6.8c) Page 11 of 19
Resource Description Type URI
Successful
Logins by
Source IPv6
Address
This report shows authentication
successes from login attempts by
source IPv6 address. A chart shows the
top source addresses with successful
login attempts. A table shows the count
of authentication successes by source-
destination pair and by user.
Report ArcSight Foundation/IPv6/
Top IPv6
Talkers
This report shows the Top talkers and a
detailed list of the top talkers.
Report ArcSight Foundation/IPv6/
Denied
Inbound
Connections
by IPv6
Address
This report shows a summary of the
denied inbound traffic by foreign
address. A chart shows the top IPv6
addresses with the highest denied
connections count. A report lists all the
addresses sorted by connection count.
Report ArcSight Foundation/IPv6/
Top N
Attacked
IPv6
Targets
This report displays a 3D Stacking Bar
Chart showing the Target Address and
the sum of the Aggregated Event Count
for events matching the Attack Events
filter. It was deprecated.
Report ArcSight Foundation/IPv6/
Alert Counts
by IPv6
Device
This report shows the count of IDS and
IPS alerts by device. A chart shows the
top device IPv6 addresses with the
highest counts. A table shows the list of
all the devices, grouped by device
vendor and product, then sorted by
count.
Report ArcSight Foundation/IPv6/
Top IPv6
Attackers
This report displays a chart of the
attacker address, and the count of
events where the category significance
starts with Compromise or Hostile.
Report ArcSight Foundation/IPv6/
Top N IPv6
Attacker
Details
This report displays the priority, attacker
address, and the count of attack events
where the category significance starts
with Compromise or Hostile. The query
uses the sum of the aggregated event
count instead of counting the EventID
so that attackers are not split by the
attack type.
Report ArcSight Foundation/IPv6/
Resources that Support the IPv6 Use Case, continued
IPv6 Standard Content Guide
Chapter 3: IPv6 Use Case
HP ESM (6.8c) Page 12 of 19
Resource Description Type URI
Failed
Logins by
Destination
IPv6
Address
This report shows authentication failures
from login attempts by destination IPv6
address. A chart shows the top
destination addresses with failed login
attempts. A table shows the count of
authentication failures by destination-
source pair and by user.
Report ArcSight Foundation/IPv6/
Failed
Logins by
Source IPv6
Address
This report shows authentication failures
from login attempts by source IPv6
address. A chart shows the top source
addresses with failed login attempts. A
table shows the count of authentication
failures by source-destination pair and
by user.
Report ArcSight Foundation/IPv6/
Attacker
Counts By
IPv6 Target
This report displays the attacker IPv6
address, the event name, and the count
of attack events where the category
significance starts with Compromise or
Hostile, for the address specified in the
parameters.
Report ArcSight Foundation/IPv6/
Target IPv6
Counts by
Event Name
This report displays the event name,
target address, and the sum of the
aggregated event count for events
matching the Attack Events filter.
Report ArcSight Foundation/IPv6/
Library Resources
Protected This is a site asset category. Asset
Category
Site Asset
Categories/Address Spaces
Agent IPv6
Address
This variable is an alias for Device
Custom IPv6 Address4.
Global
Variable
ArcSight
Foundation/Variables
Library/IPv6
Target IPv6
Address
This field denotes the Target IPv6
address. The term target is dependent
upon the originator field, i.e., Source or
Destination, depending on the specific
event. If the originator field is
Destination, return Device Custom IPv6
Address2 (aliased as Destination IPv6
Address), or return Device Custom IPv6
Address1 (aliased as Source IPv6
Address)
Global
Variable
ArcSight
Foundation/Variables
Library/IPv6
Resources that Support the IPv6 Use Case, continued
IPv6 Standard Content Guide
Chapter 3: IPv6 Use Case
HP ESM (6.8c) Page 13 of 19
Resource Description Type URI
Source IPv6
Address
This variable is an alias for Device
Custom IPv6 Address1.
Global
Variable
ArcSight
Foundation/Variables
Library/IPv6
Destination
IPv6
Address
This variable is an alias for Device
Custom IPv6 Address2.
Global
Variable
ArcSight
Foundation/Variables
Library/IPv6
Attacker
IPv6
Address
This field denotes the Attacker IPv6
address. The term attacker is dependent
upon the originator field, i.e., Source or
Destination, depending on the specific
event. If the originator field is Source,
return Device Custom IPv6 Address1
(aliased as Source IPv6 Address), or
return Device Custom IPv6 Address2
(aliased as Destination IPv6 Address)
Global
Variable
ArcSight
Foundation/Variables
Library/IPv6
Device IPv6
Address
This variable is an alias for Device
Custom IPv6 Address3.
Global
Variable
ArcSight
Foundation/Variables
Library/IPv6
Attack IPv6
Events
This filter selects events where the
category significance starts with
/Compromise or /Hostile.
Filter ArcSight Foundation/IPv6/
External
Source
This filter identifies events originating
from outside the company network.
Filter ArcSight
Foundation/Common/Network
Filters/Boundary Filters
Inbound
Events
This filter identifies events coming from
the outside network targeting inside the
company network.
Filter ArcSight
Foundation/Common/Network
Filters/Location Filters
External
Target
This filter identifies events targeting the
outside network.
Filter ArcSight
Foundation/Common/Network
Filters/Boundary Filters
Outbound
Events
This filter identifies events originating
from inside the company network,
targeting the outside network.
Filter ArcSight
Foundation/Common/Network
Filters/Location Filters
Internal
Source
This filter identifies events coming from
inside the company network.
Filter ArcSight
Foundation/Common/Network
Filters/Boundary Filters
Resources that Support the IPv6 Use Case, continued
IPv6 Standard Content Guide
Chapter 3: IPv6 Use Case
HP ESM (6.8c) Page 14 of 19
Resource Description Type URI
Internal
Target
This filter identifies events targeting
inside the company network.
Filter ArcSight
Foundation/Common/Network
Filters/Boundary Filters
IDS -IPS
IPv6 Events
This filter passes Intrusion Detection
System (IDS) and Intrusion Prevention
System (IPS) events.
Filter ArcSight Foundation/IPv6/
Denied
Inbound
Connections
by IPv6
Address
This query identifies the count of denied
inbound connections by foreign address
(address and hostname).
Query ArcSight Foundation/IPv6/
Failed
Logins by
IPv6
Source-
Destination
Pair
This query returns authentication failure
events from login attempts. The query
returns the source address, source host
name, destination address, destination
host name, user name, user ID, count of
failed logins, and device group.
Query ArcSight Foundation/IPv6/
Denied
Outbound
Connections
by IPv6
Address
This query identifies the count of denied
outbound connections by local address
(address and hostname).
Query ArcSight Foundation/IPv6/
Failed
Logins by
Destination
IPv6
Address
(Chart)
This query returns authentication failure
events from login attempts, including the
count of failed login attempts by
destination address.
Query ArcSight Foundation/IPv6/
Target IPv6
Counts by
Event Name
This query returns the event name,
target address and the sum of the
aggregated event count for events
matching the Attack Events filter.
Query ArcSight Foundation/IPv6/
Top 10 IPv6
Attackers
This query identifies the attacker
address, and the count of events where
the category significance starts with
Compromise or Hostile. The query uses
the sum of the aggregated event count
instead of counting the EventID so that
attackers are not split by the attack
type.
Query ArcSight Foundation/IPv6/
Resources that Support the IPv6 Use Case, continued
IPv6 Standard Content Guide
Chapter 3: IPv6 Use Case
HP ESM (6.8c) Page 15 of 19
Resource Description Type URI
Target
Counts by
IPv6
Attacker
This query returns the attacker address,
target address and the sum of the
aggregated event count for events
matching the Attack Events filter.
Query ArcSight Foundation/IPv6/
Target
Counts by
IPv6 Device
This query returns the device address,
target address and the sum of the
aggregated event count for events
matching the Attack Events filter.
Query ArcSight Foundation/IPv6/
Top 10
Attacked
IPv6
Targets
This query selects the Target IPv6
Address and the sum of the Aggregated
Event Count for events matching the
Attack IPv6 Events filter.
Query ArcSight Foundation/IPv6/
Attacker
Counts by
IPv6 Device
This query identifies the device address,
attacker address, and the count of
events where the category significance
starts with Compromise or Hostile.
Query ArcSight Foundation/IPv6/
Successful
Logins by
Source IPv6
Address
(Chart)
This query returns authentication
success events from login attempts.
Query ArcSight Foundation/IPv6/
Alert Counts
by IPv6
Device
This query returns the count of IDS and
IPS alerts by device vendor, product,
address and hostname.
Query ArcSight Foundation/IPv6/
Top 10 IPv6
Talkers
This query returns the attacker address
and the count of events in which the
category significance starts with
Compromise or Hostile. The query uses
the sum of the aggregated event count
instead of counting the EventID so that
attackers are not split by the event
name.
Query ArcSight Foundation/IPv6/
Top IDS
Signature
IPv6
Sources per
Day
This query over base IDS/Network
events returns the attacker address,
device vendor, device product, and the
count of the events within the query
timeframe.
Query ArcSight Foundation/IPv6/
Resources that Support the IPv6 Use Case, continued
IPv6 Standard Content Guide
Chapter 3: IPv6 Use Case
HP ESM (6.8c) Page 16 of 19
Resource Description Type URI
Top IDS
Signature
IPv6
Destinations
per Day
This query over base IDS/Network
events returns the target address,
device vendor, device product, and the
count of the events within the query
timeframe.
Query ArcSight Foundation/IPv6/
Successful
Logins by
Destination
IPv6
Address
(Chart)
This query returns authentication
success events from login attempts,
including the count of failed login
attempts by destination address.
Query ArcSight Foundation/IPv6/
Top Alert
IPv6
Sources
This query identifies the count of IDS
and IPS alerts by source address,
device vendor, and device product.
Query ArcSight Foundation/IPv6/
Top 10 IPv6
Attacker
Details
This query identifies the priority,
attacker address, and the count of
events where the category significance
starts with Compromise or Hostile. The
query uses the sum of the aggregated
event count instead of counting the
EventID so that attackers are not split
by the attack type.
Query ArcSight Foundation/IPv6/
Target IPv6
Counts by
ArcSight
Priority
This query returns the priority, target
address and the sum of the aggregated
event count for events matching the
Attack Events filter.
Query ArcSight Foundation/IPv6/
Attacker
Counts By
IPv6 Target
This query identifies the attacker IPv6
address, the event name, and the count
of events where the category
significance starts with Compromise or
Hostile for the target information given in
the parameters.
Query ArcSight Foundation/IPv6/
Failed
Logins by
Source IPv6
Address
(Chart)
This query returns authentication failure
events from login attempts, including the
count of failed login attempts by source
address.
Query ArcSight Foundation/IPv6/
Resources that Support the IPv6 Use Case, continued
IPv6 Standard Content Guide
Chapter 3: IPv6 Use Case
HP ESM (6.8c) Page 17 of 19
Resource Description Type URI
Attacker
IPv6 Counts
by ArcSight
Priority
This query identifies the priority,
attacker address, and the count of
events where the category significance
starts with Compromise or Hostile.
Query ArcSight Foundation/IPv6/
Successful
Logins by
IPv6
Source-
Destination
Pair
This query returns authentication
success events from login attempts.
Query ArcSight Foundation/IPv6/
Top Alert
IPv6
Destinations
This query returns the count of IDS and
IPS alerts by destination address,
device vendor, and device product.
Query ArcSight Foundation/IPv6/
Top 10 IPv6
Targets
This query returns the target address
and the sum of the aggregated event
count for events matching the Attack
Events filter used in the following
reports: Top N Targets, Top N Targets
(3D Pie Chart), Top N Targets (Bar
Chart), Top N Targets (Inverted Bar
Chart), Top N Targets (Pie Chart), Top
N Targets (Table and Chart), and Top N
Targets (Table).
Query ArcSight Foundation/IPv6/
Simple
Table
Portrait
This template is designed to show a
table. The orientation is portrait.
Report
Template
ArcSight System/1 Table
Simple
Chart
Portrait
This template is designed to show one
chart. The orientation is portrait.
Report
Template
ArcSight System/1
Chart/Without Table
Chart and
Table
Landscape
This template is designed to show one
chart and a table. The orientation is
landscape.
Report
Template
ArcSight System/1
Chart/With Table
Chart and
Table
Portrait
This template is designed to show one
chart and a table. The orientation is
portrait.
Report
Template
ArcSight System/1
Chart/With Table
Resources that Support the IPv6 Use Case, continued
IPv6 Standard Content Guide
Chapter 3: IPv6 Use Case
HP ESM (6.8c) Page 18 of 19
Send Documentation Feedback
If you have comments about this document, you can contact the documentation team by email. If an
email client is configured on this system, click the link above and an email window opens with the
following information in the subject line:
Feedback on IPv6 Standard Content Guide (ESM 6.8c)
Just add your feedback to the email and click send.
If no email client is available, copy the information above to a new message in a web mail client, and
send your feedback to arc-doc@hp.com.
We appreciate your feedback!
HP ESM (6.8c) Page 19 of 19

More Related Content

What's hot

What's hot (20)

NetFlow Monitoring Standard Content Guide for ESM 6.5c
NetFlow Monitoring Standard Content Guide for ESM 6.5c	NetFlow Monitoring Standard Content Guide for ESM 6.5c
NetFlow Monitoring Standard Content Guide for ESM 6.5c
ย 
Esm scg network_6.0c
Esm scg network_6.0cEsm scg network_6.0c
Esm scg network_6.0c
ย 
ESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdfESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdf
ย 
Oracle Database Backup Cloud Service
Oracle Database Backup Cloud ServiceOracle Database Backup Cloud Service
Oracle Database Backup Cloud Service
ย 
Workflow Standard Content Guide for ESM 6.5c
Workflow Standard Content Guide for ESM 6.5cWorkflow Standard Content Guide for ESM 6.5c
Workflow Standard Content Guide for ESM 6.5c
ย 
Oracle Autonomous Health Service- For Protecting Your On-Premise Databases- F...
Oracle Autonomous Health Service- For Protecting Your On-Premise Databases- F...Oracle Autonomous Health Service- For Protecting Your On-Premise Databases- F...
Oracle Autonomous Health Service- For Protecting Your On-Premise Databases- F...
ย 
What's new in oracle trace file analyzer 18.2.0
What's new in oracle trace file analyzer 18.2.0What's new in oracle trace file analyzer 18.2.0
What's new in oracle trace file analyzer 18.2.0
ย 
What's new in Oracle ORAchk & EXAchk 19.2
What's new in Oracle ORAchk & EXAchk 19.2What's new in Oracle ORAchk & EXAchk 19.2
What's new in Oracle ORAchk & EXAchk 19.2
ย 
TFA Collector - what can one do with it
TFA Collector - what can one do with it TFA Collector - what can one do with it
TFA Collector - what can one do with it
ย 
Data Mobility for the Oracle Database by JWilliams and RGonzalez
Data Mobility for the Oracle Database by JWilliams and RGonzalezData Mobility for the Oracle Database by JWilliams and RGonzalez
Data Mobility for the Oracle Database by JWilliams and RGonzalez
ย 
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
ย 
Oracle Trace File Analyzer Overview
Oracle Trace File Analyzer OverviewOracle Trace File Analyzer Overview
Oracle Trace File Analyzer Overview
ย 
New in Oracle Universal Installer (OUI)
New in Oracle Universal Installer (OUI) New in Oracle Universal Installer (OUI)
New in Oracle Universal Installer (OUI)
ย 
What's new in Oracle and Exachk version 18.4.0
What's new in Oracle and Exachk version 18.4.0What's new in Oracle and Exachk version 18.4.0
What's new in Oracle and Exachk version 18.4.0
ย 
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should knowAIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
ย 
Exachk Customer Presentation
Exachk Customer PresentationExachk Customer Presentation
Exachk Customer Presentation
ย 
Understanding oracle rac internals part 2 - slides
Understanding oracle rac internals   part 2 - slidesUnderstanding oracle rac internals   part 2 - slides
Understanding oracle rac internals part 2 - slides
ย 
Using MySQL Containers
Using MySQL ContainersUsing MySQL Containers
Using MySQL Containers
ย 
AIOUG-GroundBreakers-Jul 2019 - 19c RAC
AIOUG-GroundBreakers-Jul 2019 - 19c RACAIOUG-GroundBreakers-Jul 2019 - 19c RAC
AIOUG-GroundBreakers-Jul 2019 - 19c RAC
ย 
Eci sparc
Eci sparcEci sparc
Eci sparc
ย 

Similar to IPv6 Standard Content Guide for ESM 6.8c

Similar to IPv6 Standard Content Guide for ESM 6.8c (20)

ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ย 
Esm scg configuration_6.0c
Esm scg configuration_6.0cEsm scg configuration_6.0c
Esm scg configuration_6.0c
ย 
Esm5.5 scg net_flow
Esm5.5 scg net_flowEsm5.5 scg net_flow
Esm5.5 scg net_flow
ย 
NetFlow Monitoring 1.1 Standard Content Guide
NetFlow Monitoring 1.1 Standard Content GuideNetFlow Monitoring 1.1 Standard Content Guide
NetFlow Monitoring 1.1 Standard Content Guide
ย 
Network Monitoring Standard Content Guide for ESM 6.5c
Network Monitoring Standard Content Guide for ESM 6.5c	Network Monitoring Standard Content Guide for ESM 6.5c
Network Monitoring Standard Content Guide for ESM 6.5c
ย 
Configuration Monitoring Standard Content Guide for ESM 6.5c
Configuration Monitoring Standard Content Guide for ESM 6.5c	Configuration Monitoring Standard Content Guide for ESM 6.5c
Configuration Monitoring Standard Content Guide for ESM 6.5c
ย 
ESM5.6_SCG_Workflow.pdf
ESM5.6_SCG_Workflow.pdfESM5.6_SCG_Workflow.pdf
ESM5.6_SCG_Workflow.pdf
ย 
Esm5.5 scg workflow
Esm5.5 scg workflowEsm5.5 scg workflow
Esm5.5 scg workflow
ย 
Esm5.5 scg workflow
Esm5.5 scg workflowEsm5.5 scg workflow
Esm5.5 scg workflow
ย 
Esm scg workflow_6.0c
Esm scg workflow_6.0cEsm scg workflow_6.0c
Esm scg workflow_6.0c
ย 
Workflow Standard Content Guide
Workflow Standard Content GuideWorkflow Standard Content Guide
Workflow Standard Content Guide
ย 
Cisco Monitoring Standard Content Guide for ESM 6.5c
Cisco Monitoring Standard Content Guide for ESM 6.5c	Cisco Monitoring Standard Content Guide for ESM 6.5c
Cisco Monitoring Standard Content Guide for ESM 6.5c
ย 
ArcMC 2.5.1 Release Notes
ArcMC 2.5.1 Release Notes	ArcMC 2.5.1 Release Notes
ArcMC 2.5.1 Release Notes
ย 
ESM_UpgradingTo5.6.pdf
ESM_UpgradingTo5.6.pdfESM_UpgradingTo5.6.pdf
ESM_UpgradingTo5.6.pdf
ย 
Esm5.5 scg network (1)
Esm5.5 scg network (1)Esm5.5 scg network (1)
Esm5.5 scg network (1)
ย 
IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide	IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide
ย 
ArcMC 2.6 Release Notes
ArcMC 2.6 Release NotesArcMC 2.6 Release Notes
ArcMC 2.6 Release Notes
ย 
ESM 6.9.1c Release Notes
ESM 6.9.1c Release NotesESM 6.9.1c Release Notes
ESM 6.9.1c Release Notes
ย 
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
ย 
Firewall Monitoring 1.1 Security Use Case Guide
Firewall Monitoring 1.1 Security Use Case Guide	Firewall Monitoring 1.1 Security Use Case Guide
Firewall Monitoring 1.1 Security Use Case Guide
ย 

More from Protect724migration

More from Protect724migration (20)

Upgrade Guide for ESM 6.8c
Upgrade Guide for ESM 6.8cUpgrade Guide for ESM 6.8c
Upgrade Guide for ESM 6.8c
ย 
Arcsight ESM Support Matrix
Arcsight ESM Support MatrixArcsight ESM Support Matrix
Arcsight ESM Support Matrix
ย 
HPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support MatrixHPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support Matrix
ย 
ESM 101 for ArcSight Express v4.0
ESM 101 for ArcSight Express v4.0ESM 101 for ArcSight Express v4.0
ESM 101 for ArcSight Express v4.0
ย 
ArcSight Web User's Guide for ESM 6.5c
ArcSight Web User's Guide for ESM 6.5c	ArcSight Web User's Guide for ESM 6.5c
ArcSight Web User's Guide for ESM 6.5c
ย 
Installation Guide for ESM 6.8c
Installation Guide for ESM 6.8cInstallation Guide for ESM 6.8c
Installation Guide for ESM 6.8c
ย 
Administrator's Guide for ESM 6.5c
Administrator's Guide for ESM 6.5c	Administrator's Guide for ESM 6.5c
Administrator's Guide for ESM 6.5c
ย 
Administrator's Guide for ArcSight Express v4.0
Administrator's Guide for ArcSight Express v4.0Administrator's Guide for ArcSight Express v4.0
Administrator's Guide for ArcSight Express v4.0
ย 
ESM 101 for ESM 6.8c
ESM 101 for ESM 6.8cESM 101 for ESM 6.8c
ESM 101 for ESM 6.8c
ย 
ESM 101 for ESM 6.5c
ESM 101 for ESM 6.5c	ESM 101 for ESM 6.5c
ESM 101 for ESM 6.5c
ย 
Arcsight ESM Support Matrix
Arcsight ESM Support MatrixArcsight ESM Support Matrix
Arcsight ESM Support Matrix
ย 
Upgrade Guide for ESM 6.5c
Upgrade Guide for ESM 6.5c	Upgrade Guide for ESM 6.5c
Upgrade Guide for ESM 6.5c
ย 
Forwarding Connector Release Notes for version 6.0.4.6830.0
Forwarding Connector Release Notes for version 6.0.4.6830.0	Forwarding Connector Release Notes for version 6.0.4.6830.0
Forwarding Connector Release Notes for version 6.0.4.6830.0
ย 
Forwarding Connector User's Guide for version 6.0.4.6830.0
Forwarding Connector User's Guide for version 6.0.4.6830.0	Forwarding Connector User's Guide for version 6.0.4.6830.0
Forwarding Connector User's Guide for version 6.0.4.6830.0
ย 
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
ย 
Intrusion Monitoring Standard Content Guide for ESM 6.5c
Intrusion Monitoring Standard Content Guide for ESM 6.5c	Intrusion Monitoring Standard Content Guide for ESM 6.5c
Intrusion Monitoring Standard Content Guide for ESM 6.5c
ย 
HPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support MatrixHPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support Matrix
ย 
Asset Model Import FlexConnector Developer's Guide
Asset Model Import FlexConnector Developer's GuideAsset Model Import FlexConnector Developer's Guide
Asset Model Import FlexConnector Developer's Guide
ย 
Risk Insight High Availability Tech Note for ESM 6.8c
Risk Insight High Availability Tech Note for ESM 6.8cRisk Insight High Availability Tech Note for ESM 6.8c
Risk Insight High Availability Tech Note for ESM 6.8c
ย 
ESM_101_5.6.pdf
ESM_101_5.6.pdfESM_101_5.6.pdf
ESM_101_5.6.pdf
ย 

Recently uploaded

CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Kakori Lucknow best sexual service Online โ˜‚๏ธ
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Kakori Lucknow best sexual service Online  โ˜‚๏ธCALL ON โžฅ8923113531 ๐Ÿ”Call Girls Kakori Lucknow best sexual service Online  โ˜‚๏ธ
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Kakori Lucknow best sexual service Online โ˜‚๏ธ
anilsa9823
ย 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
bodapatigopi8531
ย 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
ย 
CHEAP Call Girls in Pushp Vihar (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female serviceCALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
anilsa9823
ย 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
ย 

Recently uploaded (20)

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
ย 
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Kakori Lucknow best sexual service Online โ˜‚๏ธ
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Kakori Lucknow best sexual service Online  โ˜‚๏ธCALL ON โžฅ8923113531 ๐Ÿ”Call Girls Kakori Lucknow best sexual service Online  โ˜‚๏ธ
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Kakori Lucknow best sexual service Online โ˜‚๏ธ
ย 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
ย 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
ย 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanโ€™s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanโ€™s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanโ€™s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanโ€™s ...
ย 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
ย 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
ย 
Vip Call Girls Noida โžก๏ธ Delhi โžก๏ธ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida โžก๏ธ Delhi โžก๏ธ 9999965857 No Advance 24HRS LiveVip Call Girls Noida โžก๏ธ Delhi โžก๏ธ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida โžก๏ธ Delhi โžก๏ธ 9999965857 No Advance 24HRS Live
ย 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
ย 
CHEAP Call Girls in Pushp Vihar (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
ย 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
ย 
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female serviceCALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
ย 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
ย 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
ย 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
ย 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
ย 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
ย 
Shapes for Sharing between Graph Data Spacesย - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spacesย - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spacesย - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spacesย - and Epistemic Querying of RDF-...
ย 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
ย 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
ย 

IPv6 Standard Content Guide for ESM 6.8c

  • 1. HP ArcSightย ESM Software Version: 6.8c IPv6 Standard Content Guide November 12, 2014
  • 2. Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. The network information used in the examples in this document (including IP addresses and hostnames) is for illustration purposes only. HP ArcSight products are highly flexible and function as you configure them. The accessibility, integrity, and confidentiality of your data is your responsibility. Implement a comprehensive security strategy and follow good security practices. This document is confidential. Restricted Rights Legend Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Copyright Notice ยฉ Copyright 2014 Hewlett-Packard Development Company, L.P. Follow this link to see a complete statement of copyrights and acknowledgements: http://www.hpenterprisesecurity.com/copyright Support Phone A list of phone numbers is available on the HP ArcSight Technical Support Page:ย https://softwaresupport.hp.com/documents/10180/14684/esp-support- contact-list Support Web Site https://softwaresupport.hp.com Protect 724 Community https://protect724.hp.com Contact Information HP ESM (6.8c) Page 2 of 19
  • 3. Contents Chapter 1: IPv6 Overview 4 What is Standard Content? 4 Standard Content Packages 6 IPv6 Content 7 Chapter 2: Installation and Configuration 8 Installing the IPv6 Package 8 Configuring IPv6 Content 9 Chapter 3: IPv6 Use Case 10 IPv6 Resources 10 Send Documentation Feedback 19 HP ESM (6.8c) Page 3 of 19
  • 4. Chapter 1: IPv6 Overview This chapter discusses the following topics. What is Standard Content? 4 Standard Content Packages 6 IPv6 Content 7 What is Standard Content? Standard content is a series of coordinated resources (filters, rules, dashboards, reports, and so on) that address common security and management tasks. Standard content is designed to give you comprehensive correlation, monitoring, reporting, alerting, and case management out-of-the box with minimal configuration. The content provides a full spectrum of security, network, and configuration monitoring tasks, as well as a comprehensive set of tasks that monitor the health of the system. Standard content is installed using a series of packages, some of which are installed automatically with the ArcSight Manager to provide essential system health and status operations. The remaining packages are presented as install-time options organized by category. Standard content consists of the following: l ArcSight Core Security content is installed automatically with the ArcSight Manager and consists of key resources for monitoring Microsoft Windows, firewall, IPS and IDS, NetFlow, and other essential security information. l ArcSight Administration content contains several packages that provide statistics about the health and performance of ArcSight products. n ArcSight Administration is installed automatically with the ArcSight Manager and is essential for managing and tuning the performance of content and components. n ArcSight Admin DB CORR is installed automatically with the ArcSight Manager for the CORR- Engine (Correlation Optimized Retention and Retrieval) and provides information on the health of the CORR-Engine. Note: The ArcSight Admin DB CORR content package is installed automatically when you perform a new ArcSight Manager installation. However package installation is different during upgrade. If you are upgrading your system from a previous version, check to see if the package is installed after upgrade. If the package is not installed, install it from the ArcSight Console. n ArcSight Content Management is an optional package that shows information about content package synchronization with the ArcSight Content Management feature. The information HP ESM (6.8c) Page 4 of 19
  • 5. includes a history of content packages synchronized from a primary source to multiple destinations, and any common issues or errors encountered. You can install this package during ArcSight Manager installation or from the ArcSight Console any time after installation. n ArcSight ESMย HA Monitoring is an optional package that lets you monitor systems that use the ESM High Availability Module. You can install this package during ArcSight Manager installation or from the ArcSight Console any time after installation. n ArcSight Search Filters is installed automatically with the ArcSight Manager for use in the ArcSight Command Center. You cannot edit or use these filters in the ArcSight Console. For information about the search filters, refer to the ArcSight Command Center Userโ€™s Guide. Note: The ArcSight Search Filters content package is installed automatically when you perform a new ArcSight Manager installation. However package installation is different during upgrade. If you are upgrading your system from a previous version, check to see if the package is installed after upgrade. If the package is not installed, install it from the ArcSight Console. l ArcSight System content is installed automatically with the ArcSight Manager and consists of three packages: ArcSight Core, ArcSight Groups, and ArcSight Networks. ArcSight Core and ArcSight Groups contain resources required for basic security processing functions, such as threat escalation and priority calculations, as well as basic throughput channels required for out-of-the-box functionality. The ArcSight Networks package contains the zones that were in the ArcSight Core package in previous releases, in addition to local and global network resources. l ArcSight Foundation content (such as Cisco Monitoring, Configuration Monitoring, Intrusion Monitoring, IPv6, NetFlow Monitoring, Network Monitoring, and Workflow) provide a coordinated system of resources with real-time monitoring capabilities for a specific area of focus, as well as after-the-fact analysis in the form of reports and trends. You can extend these foundations with additional resources specific to your needs or you can use them as a template for building your own resources and tasks. You can install a Foundation during installation or from the ArcSight Console any time after installation. l Shared Libraries - ArcSight Administration and several of the ArcSight Foundations rely on a series of common resources that provide core functionality for common security scenarios. Dependencies between these resources and the packages they support are managed by the Package resource. n Anti Virus content is a set of filters, reports, and report queries used by ArcSight Foundations, such as Configuration Monitoring and Intrusion Monitoring. n Conditional Variable Filters content is a library of filters used by variables in standard content report queries, filters, and rule definitions. The Conditional Variable Filters are used by ArcSight Administration and certain ArcSight Foundations, such as Configuration Monitoring, Intrusion Monitoring, Network Monitoring, and Workflow. n Global Variables content is a set of variables used to create other resources and to provide event-based fields that cover common event information, asset, host, and user information, and IPv6 Standard Content Guide Chapter 1: IPv6 Overview HP ESM (6.8c) Page 5 of 19
  • 6. commonly used timestamp formats. The Global Variables are used by ArcSight Administration and certain ArcSight Foundations. n Monitoring Support Data content is a set of active lists that store mapping information for HTTP return status code classes, Cisco firewall syslog message types, and encoded logon types. n Network filters content is a set of filters required by ArcSight Administration and certain ArcSight Foundations, such as Intrusion Monitoring and Network Monitoring. Caution: The resources in the ArcSight Core Security, ArcSight Administration, ArcSight DB CORR, Conditional Variable Filters, Global Variables, and Network Filters content packages are not locked even though they manage core functionality; HP recommends that you do not delete or modify these resources unless you are an advanced user who understands fully the resources and their dependencies. Standard Content Packages Standard content comes in packages (.arb files) that are either installed automatically or presented as install-time options. The following graphic outlines the packages. The ArcSight Core Security, ArcSight Administration, and ArcSight System packages at the base provide content required for basic functionality. The common packages in the center contain shared resources that support multiple packages. The packages shown on top are ArcSight Foundations that address common network security and management scenarios. IPv6 Standard Content Guide Chapter 1: IPv6 Overview HP ESM (6.8c) Page 6 of 19
  • 7. Depending on the options you install, you will see the ArcSight Core Security, ArcSight Administration, and ArcSight System resources and some or all of the other package content. Caution: When creating your own packages, you can explicitly include or exclude system resources in the package. Exercise caution if you delete packages that might have system resources. Make sure the system resources either belong to a locked group or are themselves locked. For more information about packages, refer to the ArcSight Console Userโ€™s Guide. IPv6 Content The IPv6 content reports on data that comes from networks with IPv6 addresses. This guide describes the IPv6 content. For information about ArcSight Core Security, ArcSight Administration, or ArcSight System content, refer to the ArcSight Core Security, ArcSight Administration, and ArcSight System Standard Content Guide. For information about an optional ArcSight Foundation, refer to the Standard Content Guide for that Foundation. ESM documentation is available on Protect 724 (https://protect724.hp.com). IPv6 Standard Content Guide Chapter 1: IPv6 Overview HP ESM (6.8c) Page 7 of 19
  • 8. Chapter 2: Installation and Configuration This chapter discusses the following topics: Installing the IPv6 Package 8 Configuring IPv6 Content 9 Installing the IPv6 Package The IPv6 Foundation package is one of the standard content packages presented as install-time options. If you selected all the standard content packages to be installed at installation time, the packages and their resources are installed in the ArcSight Database and available in the Navigator panel resource tree. The package icons in the Navigator panel package view appear blue. If you opted to exclude a Foundation package during ArcSight Manager installation, the package is imported into the Packages tab in the Navigator panel automatically, but is not available in the resource view. The package icon in the package view appears grey. To install a package that is imported, but not installed: 1. On the Navigator panel Packages tab, navigate to the package you want to install. 2. Right-click the package and select Install Package. 3. In the Install Package dialog, click OK. 4. When the installation is complete, review the summary report and click OK. The package resources are fully installed to the ArcSight Database, the resources are fully enabled and operational, and available in the Navigator panel resource tree. To uninstall a package that is installed: 1. On the Navigator Panel Packages tab, navigate to the package you want to uninstall. 2. Right-click the package and select Uninstall Package. 3. In the Uninstall Package dialog, click OK. 4. The progress of the uninstall displays in the Progress tab of the Uninstalling Packages dialog. If a message displays indicating that there is a conflict, select an option in the Resolution Options area and click OK. 5. When uninstall is complete, review the summary and click OK. HP ESM (6.8c) Page 8 of 19
  • 9. The package is removed from the ArcSight Database and the Navigator panel resource tree, but remains available in the Navigator panel Packages tab, and can be re-installed at another time. If you do not want the package to be available in any form, you can delete the package. To delete a package and remove it from the ArcSight Console and the ArcSight Database: 1. On the Navigator Panel Packages tab, navigate to the package you want to delete. 2. Right-click the package and select Delete Package. 3. When prompted for confirmation, click Delete. The package is removed from the Navigator panel Packages tab. Configuring IPv6 Content The IPv6 content is triggered by events from IPv6-enabled SmartConnectors. Contact your HP ArcSight sales representative for a list of IPv6-enabled SmartConnectors. A network model keeps track of the network nodes participating in the event traffic. Modeling your network and categorizing critical assets using the standard asset categories is what activates some of the standard content and makes it effective. For information about populating the network model, refer to the ArcSight Console Userโ€™s Guide. To learn more about the architecture of the ESM network modeling tools, refer to the ESM 101 guide. The IPv6 content contains many reports. You can run reports on demand, automatically on a regular schedule, or both. By default, IPv6 reports are not scheduled to run automatically. Evaluate the reports that come with IPv6, and schedule the reports that are of interest to your organization and business objectives. For instructions about how to schedule reports, refer to the ArcSight Console Userโ€™s Guide. IPv6 Standard Content Guide Chapter 2: Installation and Configuration HP ESM (6.8c) Page 9 of 19
  • 10. Chapter 3: IPv6 Use Case The IPv6 content shows data that comes from networks with IPv6 addresses. Standard content resources are grouped together in the ArcSight Console in use case resources. A use case resource provides a way to see a set of resources that help address a specific security issue or business requirement. To view the resources associated with the IPv6 use case resource: 1. In the Navigator panel, select the Use Cases tab. 2. Open the ArcSight Foundation/IPv6 group. 3. Right-click the IPv6 use case resource and select the Open Use Case option, or double-click the use case resource. IPv6 Resources The following table lists all the resources in the IPv6 use case. Resource Description Type URI Monitor Resources Successful Logins by Destination IPv6 Address This report shows authentication successes from login attempts by destination IPv6 address. A chart shows the top destination addresses with successful login attempts. A table shows the count of authentication successes by destination-source pair and by user. Report ArcSight Foundation/IPv6/ Top Alert IPv6 Destinations This report shows the top IDS and IPS alert destinations per day. Report ArcSight Foundation/IPv6/ Top IDS Signature IPv6 Sources per Day This report shows the Top IDS signature sources per day. Report ArcSight Foundation/IPv6/ Resources that Support the IPv6 Use Case HP ESM (6.8c) Page 10 of 19
  • 11. Resource Description Type URI Attacker IPv6 Counts by ArcSight Priority This report displays a table with the priority, attacker IPv6 address and the count of attack events where the category significance starts with Compromise or Hostile. Report ArcSight Foundation/IPv6/ Attacker Counts by IPv6 Device This report displays a table with the device IPv6 address, attacker IPv6 address, and the count of attacker events where the category significance starts with Compromise or Hostile. Report ArcSight Foundation/IPv6/ Top IDS Signature IPv6 Destinations per Day This report shows the top IDS signature destinations per day. Report ArcSight Foundation/IPv6/ Target Counts by IPv6 Attacker This report displays the attacker address, target address, and the sum of the aggregated event count for events matching the Attack Events filter. Report ArcSight Foundation/IPv6/ Target Counts by IPv6 Device This report displays the device address, target address, and the sum of the aggregated event count for events matching the Attack Events filter. Report ArcSight Foundation/IPv6/ Denied Outbound Connections by IPv6 Address This report shows a summary of the denied outbound traffic by local address. A chart shows the top IPv6 addresses with the highest denied connections count. A report lists all the addresses sorted by connection count. Report ArcSight Foundation/IPv6/ Target IPv6 Counts by ArcSight Priority This report displays the priority, target address, and the sum of the aggregated event count for events matching the Attack Events filter. Report ArcSight Foundation/IPv6/ Top Alert IPv6 Sources This report shows the top IDS and IPS alert sources per day. A chart shows the top IDS and IPS alert source IP addresses. A table shows the top alert source IP addresses, as well as the device vendor and product of the reporting device. Report ArcSight Foundation/IPv6/ Resources that Support the IPv6 Use Case, continued IPv6 Standard Content Guide Chapter 3: IPv6 Use Case HP ESM (6.8c) Page 11 of 19
  • 12. Resource Description Type URI Successful Logins by Source IPv6 Address This report shows authentication successes from login attempts by source IPv6 address. A chart shows the top source addresses with successful login attempts. A table shows the count of authentication successes by source- destination pair and by user. Report ArcSight Foundation/IPv6/ Top IPv6 Talkers This report shows the Top talkers and a detailed list of the top talkers. Report ArcSight Foundation/IPv6/ Denied Inbound Connections by IPv6 Address This report shows a summary of the denied inbound traffic by foreign address. A chart shows the top IPv6 addresses with the highest denied connections count. A report lists all the addresses sorted by connection count. Report ArcSight Foundation/IPv6/ Top N Attacked IPv6 Targets This report displays a 3D Stacking Bar Chart showing the Target Address and the sum of the Aggregated Event Count for events matching the Attack Events filter. It was deprecated. Report ArcSight Foundation/IPv6/ Alert Counts by IPv6 Device This report shows the count of IDS and IPS alerts by device. A chart shows the top device IPv6 addresses with the highest counts. A table shows the list of all the devices, grouped by device vendor and product, then sorted by count. Report ArcSight Foundation/IPv6/ Top IPv6 Attackers This report displays a chart of the attacker address, and the count of events where the category significance starts with Compromise or Hostile. Report ArcSight Foundation/IPv6/ Top N IPv6 Attacker Details This report displays the priority, attacker address, and the count of attack events where the category significance starts with Compromise or Hostile. The query uses the sum of the aggregated event count instead of counting the EventID so that attackers are not split by the attack type. Report ArcSight Foundation/IPv6/ Resources that Support the IPv6 Use Case, continued IPv6 Standard Content Guide Chapter 3: IPv6 Use Case HP ESM (6.8c) Page 12 of 19
  • 13. Resource Description Type URI Failed Logins by Destination IPv6 Address This report shows authentication failures from login attempts by destination IPv6 address. A chart shows the top destination addresses with failed login attempts. A table shows the count of authentication failures by destination- source pair and by user. Report ArcSight Foundation/IPv6/ Failed Logins by Source IPv6 Address This report shows authentication failures from login attempts by source IPv6 address. A chart shows the top source addresses with failed login attempts. A table shows the count of authentication failures by source-destination pair and by user. Report ArcSight Foundation/IPv6/ Attacker Counts By IPv6 Target This report displays the attacker IPv6 address, the event name, and the count of attack events where the category significance starts with Compromise or Hostile, for the address specified in the parameters. Report ArcSight Foundation/IPv6/ Target IPv6 Counts by Event Name This report displays the event name, target address, and the sum of the aggregated event count for events matching the Attack Events filter. Report ArcSight Foundation/IPv6/ Library Resources Protected This is a site asset category. Asset Category Site Asset Categories/Address Spaces Agent IPv6 Address This variable is an alias for Device Custom IPv6 Address4. Global Variable ArcSight Foundation/Variables Library/IPv6 Target IPv6 Address This field denotes the Target IPv6 address. The term target is dependent upon the originator field, i.e., Source or Destination, depending on the specific event. If the originator field is Destination, return Device Custom IPv6 Address2 (aliased as Destination IPv6 Address), or return Device Custom IPv6 Address1 (aliased as Source IPv6 Address) Global Variable ArcSight Foundation/Variables Library/IPv6 Resources that Support the IPv6 Use Case, continued IPv6 Standard Content Guide Chapter 3: IPv6 Use Case HP ESM (6.8c) Page 13 of 19
  • 14. Resource Description Type URI Source IPv6 Address This variable is an alias for Device Custom IPv6 Address1. Global Variable ArcSight Foundation/Variables Library/IPv6 Destination IPv6 Address This variable is an alias for Device Custom IPv6 Address2. Global Variable ArcSight Foundation/Variables Library/IPv6 Attacker IPv6 Address This field denotes the Attacker IPv6 address. The term attacker is dependent upon the originator field, i.e., Source or Destination, depending on the specific event. If the originator field is Source, return Device Custom IPv6 Address1 (aliased as Source IPv6 Address), or return Device Custom IPv6 Address2 (aliased as Destination IPv6 Address) Global Variable ArcSight Foundation/Variables Library/IPv6 Device IPv6 Address This variable is an alias for Device Custom IPv6 Address3. Global Variable ArcSight Foundation/Variables Library/IPv6 Attack IPv6 Events This filter selects events where the category significance starts with /Compromise or /Hostile. Filter ArcSight Foundation/IPv6/ External Source This filter identifies events originating from outside the company network. Filter ArcSight Foundation/Common/Network Filters/Boundary Filters Inbound Events This filter identifies events coming from the outside network targeting inside the company network. Filter ArcSight Foundation/Common/Network Filters/Location Filters External Target This filter identifies events targeting the outside network. Filter ArcSight Foundation/Common/Network Filters/Boundary Filters Outbound Events This filter identifies events originating from inside the company network, targeting the outside network. Filter ArcSight Foundation/Common/Network Filters/Location Filters Internal Source This filter identifies events coming from inside the company network. Filter ArcSight Foundation/Common/Network Filters/Boundary Filters Resources that Support the IPv6 Use Case, continued IPv6 Standard Content Guide Chapter 3: IPv6 Use Case HP ESM (6.8c) Page 14 of 19
  • 15. Resource Description Type URI Internal Target This filter identifies events targeting inside the company network. Filter ArcSight Foundation/Common/Network Filters/Boundary Filters IDS -IPS IPv6 Events This filter passes Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) events. Filter ArcSight Foundation/IPv6/ Denied Inbound Connections by IPv6 Address This query identifies the count of denied inbound connections by foreign address (address and hostname). Query ArcSight Foundation/IPv6/ Failed Logins by IPv6 Source- Destination Pair This query returns authentication failure events from login attempts. The query returns the source address, source host name, destination address, destination host name, user name, user ID, count of failed logins, and device group. Query ArcSight Foundation/IPv6/ Denied Outbound Connections by IPv6 Address This query identifies the count of denied outbound connections by local address (address and hostname). Query ArcSight Foundation/IPv6/ Failed Logins by Destination IPv6 Address (Chart) This query returns authentication failure events from login attempts, including the count of failed login attempts by destination address. Query ArcSight Foundation/IPv6/ Target IPv6 Counts by Event Name This query returns the event name, target address and the sum of the aggregated event count for events matching the Attack Events filter. Query ArcSight Foundation/IPv6/ Top 10 IPv6 Attackers This query identifies the attacker address, and the count of events where the category significance starts with Compromise or Hostile. The query uses the sum of the aggregated event count instead of counting the EventID so that attackers are not split by the attack type. Query ArcSight Foundation/IPv6/ Resources that Support the IPv6 Use Case, continued IPv6 Standard Content Guide Chapter 3: IPv6 Use Case HP ESM (6.8c) Page 15 of 19
  • 16. Resource Description Type URI Target Counts by IPv6 Attacker This query returns the attacker address, target address and the sum of the aggregated event count for events matching the Attack Events filter. Query ArcSight Foundation/IPv6/ Target Counts by IPv6 Device This query returns the device address, target address and the sum of the aggregated event count for events matching the Attack Events filter. Query ArcSight Foundation/IPv6/ Top 10 Attacked IPv6 Targets This query selects the Target IPv6 Address and the sum of the Aggregated Event Count for events matching the Attack IPv6 Events filter. Query ArcSight Foundation/IPv6/ Attacker Counts by IPv6 Device This query identifies the device address, attacker address, and the count of events where the category significance starts with Compromise or Hostile. Query ArcSight Foundation/IPv6/ Successful Logins by Source IPv6 Address (Chart) This query returns authentication success events from login attempts. Query ArcSight Foundation/IPv6/ Alert Counts by IPv6 Device This query returns the count of IDS and IPS alerts by device vendor, product, address and hostname. Query ArcSight Foundation/IPv6/ Top 10 IPv6 Talkers This query returns the attacker address and the count of events in which the category significance starts with Compromise or Hostile. The query uses the sum of the aggregated event count instead of counting the EventID so that attackers are not split by the event name. Query ArcSight Foundation/IPv6/ Top IDS Signature IPv6 Sources per Day This query over base IDS/Network events returns the attacker address, device vendor, device product, and the count of the events within the query timeframe. Query ArcSight Foundation/IPv6/ Resources that Support the IPv6 Use Case, continued IPv6 Standard Content Guide Chapter 3: IPv6 Use Case HP ESM (6.8c) Page 16 of 19
  • 17. Resource Description Type URI Top IDS Signature IPv6 Destinations per Day This query over base IDS/Network events returns the target address, device vendor, device product, and the count of the events within the query timeframe. Query ArcSight Foundation/IPv6/ Successful Logins by Destination IPv6 Address (Chart) This query returns authentication success events from login attempts, including the count of failed login attempts by destination address. Query ArcSight Foundation/IPv6/ Top Alert IPv6 Sources This query identifies the count of IDS and IPS alerts by source address, device vendor, and device product. Query ArcSight Foundation/IPv6/ Top 10 IPv6 Attacker Details This query identifies the priority, attacker address, and the count of events where the category significance starts with Compromise or Hostile. The query uses the sum of the aggregated event count instead of counting the EventID so that attackers are not split by the attack type. Query ArcSight Foundation/IPv6/ Target IPv6 Counts by ArcSight Priority This query returns the priority, target address and the sum of the aggregated event count for events matching the Attack Events filter. Query ArcSight Foundation/IPv6/ Attacker Counts By IPv6 Target This query identifies the attacker IPv6 address, the event name, and the count of events where the category significance starts with Compromise or Hostile for the target information given in the parameters. Query ArcSight Foundation/IPv6/ Failed Logins by Source IPv6 Address (Chart) This query returns authentication failure events from login attempts, including the count of failed login attempts by source address. Query ArcSight Foundation/IPv6/ Resources that Support the IPv6 Use Case, continued IPv6 Standard Content Guide Chapter 3: IPv6 Use Case HP ESM (6.8c) Page 17 of 19
  • 18. Resource Description Type URI Attacker IPv6 Counts by ArcSight Priority This query identifies the priority, attacker address, and the count of events where the category significance starts with Compromise or Hostile. Query ArcSight Foundation/IPv6/ Successful Logins by IPv6 Source- Destination Pair This query returns authentication success events from login attempts. Query ArcSight Foundation/IPv6/ Top Alert IPv6 Destinations This query returns the count of IDS and IPS alerts by destination address, device vendor, and device product. Query ArcSight Foundation/IPv6/ Top 10 IPv6 Targets This query returns the target address and the sum of the aggregated event count for events matching the Attack Events filter used in the following reports: Top N Targets, Top N Targets (3D Pie Chart), Top N Targets (Bar Chart), Top N Targets (Inverted Bar Chart), Top N Targets (Pie Chart), Top N Targets (Table and Chart), and Top N Targets (Table). Query ArcSight Foundation/IPv6/ Simple Table Portrait This template is designed to show a table. The orientation is portrait. Report Template ArcSight System/1 Table Simple Chart Portrait This template is designed to show one chart. The orientation is portrait. Report Template ArcSight System/1 Chart/Without Table Chart and Table Landscape This template is designed to show one chart and a table. The orientation is landscape. Report Template ArcSight System/1 Chart/With Table Chart and Table Portrait This template is designed to show one chart and a table. The orientation is portrait. Report Template ArcSight System/1 Chart/With Table Resources that Support the IPv6 Use Case, continued IPv6 Standard Content Guide Chapter 3: IPv6 Use Case HP ESM (6.8c) Page 18 of 19
  • 19. Send Documentation Feedback If you have comments about this document, you can contact the documentation team by email. If an email client is configured on this system, click the link above and an email window opens with the following information in the subject line: Feedback on IPv6 Standard Content Guide (ESM 6.8c) Just add your feedback to the email and click send. If no email client is available, copy the information above to a new message in a web mail client, and send your feedback to arc-doc@hp.com. We appreciate your feedback! HP ESM (6.8c) Page 19 of 19