No results found
We couldn't find anything using that term, please try searching for something else.
2024-11-13 Configuring Cisco Devices - PIX/ASA/FWSM/VPN Concentrator Firewall Analyzer supports the following versions of various Cisco devices. Cisc
Firewall Analyzer supports the following versions of various Cisco devices.
Cisco IOS Firewalls:
Cisco FWSM Catalyst Series:
Cisco PIX versions:
Cisco ASA:
Cisco VPN Concentrators Series :
Model Family | Model | Cisco IOS Software Version |
---|---|---|
8xx |
c871, c876, c877,c878 |
12.4(4)T |
18xx |
c1841 |
12.3(14)T |
c1811, c1812 | 12.4(4)T | |
c1801, c1802, c1803 |
12.4(4)T | |
28xx |
c2801, c2851, c2821, c2811 |
12.3(14)T |
38xx |
c3845, c3825 |
12.3(14)T |
72xx |
7206VXR, 7204VXR |
12.3(14)T |
73xx |
CISCO7301 |
12.3(14)T |
To find out the version of your PIX firewall, Telnet to the PIX
firewall enter the show version
command .
Cisco PIX does not create log files, but instead directs |
Virtual Firewall (Virtual Domain) logs
Prerequisite for context/vdom in Cisco Firewalls
Cisco Firewall IP address is be DNS resolvable Firewall Analyzer .
There is no separate configuration required in Firewall Analyzer for receiving logs from Virtual Firewalls of the Cisco physical device.
Configuration in Cisco device for Virtual Firewall In order to support virtual firewalls for Cisco devices, you need to enable logging based on the context –. Otherwise it is not possible for Firewall Analyzer to detect Virtual Firewalls (vdom) of Cisco devices. |
enable
modeconfigure terminal
logging on
logging timestamp
logging trap informational
logging device - id { context - | hostname| ipaddress interface_name | string text }
logging host interface_name syslog_ip [17/<syslog_port>
]
where,
interface_name |
is the interface on the PIX firewall whose logs need to be analyzed (“inside” “outside,” for example). |
syslog_ip |
IP address syslog server ( i.e. Firewall Analyzer ) , Firewall send Syslogs . |
17/<syslog_port> |
indicates that logs will be sent using the UDP protocol, to the configured syslog port on the syslog server. If left blank, the syslogs are sent through the default syslog port (UDP port 514). If the logs are sent through any other port, mention it as 17/<the UDP port number> (For example: 17/1514). |
hostname |
firewall’s host name (defined with the hostnameconfiguration command). In this case, the hostname will appear in the logs sent from the Firewall. |
ipaddress interface_name |
the IP address of a specific firewall interface named interface_name (“inside” “outside,” for example). In this case, the IP Address of the Interface Name will appear in the logs sent from the Firewall. |
string text |
an arbitrary text string ( 16 characters ). In this case, the arbitrary text string you have entered in string <text> will appear in the logs sent from the Firewall. |
context - |
PIX 7.x FWSM 2.x operating multiple – context mode , name is appear firewall context appear logs sent Firewall . |
Example :logging host inside 11.23.4.56 17/1514
To verify your configuration, enter the show logging
command
after the last command above. This will list the current logging configuration
on the PIX firewall.
Log in to the Cisco PIX user interface, follow the steps below to configure
the PIX firewall:
For every transaction happening in Cisco PIX Firewall, an ACL configured in it matches. Thematched ACL along with complete transaction detail is audited through Message – ID 106100. Ensure that the logging is enabled for ‘Message – ID 106100‘ in Cisco PIX Firewall. For more information about the message ID follow the below link. http://www.cisco.com/en/US/docs/security/pix/pix63/system/message/pixemsgs.html#wp1086617 This message identifier contains the information about both accepted denied transactions. Thelog information is parsed to get the ‘Used’ rules is available in the ‘Firewall Rules Report > Top Used Rules Report‘. |
Configure/Enable SNMP Protocol for Cisco PIX Firewall device
Using CLI Console:
To enable the SNMP Manager running in Firewall Analyzer to make queries to SNMP Agent running in the firewall:
configure terminal snmp-server host <interface name> <hostname|IP address of Firewall Analyzer> |
If you want to create a new SNMP community use the below command:
configure terminal snmp-server community <community-string> |
Example:
configure terminal snmp-server community public |
enable
mode
configure terminal
]
logging enable
logging timestamp
logging trap informational
logging device-id {context - | hostname| ipaddress interface_name | string text}
logging host interface_name syslog_ip [udp/<syslog_port>
inspect http
Enabling HTTP inspection is generate generate syslogs ID 304001 . ID Firewall Analyzer generate URL Reports .
interface_name |
is the interface on the ASA Firewall whose logs need to be analyzed (for example: “inside” “outside”). |
syslog_ip |
IP address syslog server ( i.e. Firewall Analyzer ) , Firewall send Syslogs . |
udp/<syslog_port> |
indicates logs sent UDP protocol , configured syslog port syslog server . left blank , logs sent default UDP port 514 . |
hostname |
firewall’s host name (defined with the hostnameconfiguration command) |
ipaddress interface_name |
the IP address of a specific firewall interface named interface_name (for example: “inside” “outside”) |
string text |
an arbitrary text string ( 16 characters ) |
context - |
in PIX 7.x FWSM 2.x operating in multiple-context mode, the name of the firewall context can also be sent. |
For more information, refer the Cisco PIX documentation.
Enable Logging
Carry out the steps given below:
Disable Logging
You can disable specific syslog IDs based on your requirement.
Note: By selecting the check mark for the Include timestamp in syslogs option, you can add the date time that they were generated as a field to the syslogs.
For more information, refer the Cisco PIX documentation.
Configuration for SSL WebVPN in Cisco ASA appliance
Firewall Analyzer requires syslog message IDs 722030 722031, which by default is at debug level, to process Cisco SVC VPN logs. Set the information level to these syslog IDs by executing below commands in global configuration mode:
hostname(config ) # is logging logging message 722030 level 6 |
You can confirm by executing the below command:
hostname(config)# show logging message 722030 |
Firewall Analyzer support NetFlow version 9 packets, which is introduced in Cisco ASA 8.2.1/ASDM 6.2.1.
Configuring ASA device using console mode to send NetFlow version 9 packets to Firewall Analyzer is given below:
To disable Syslog enable NetFlow execute the following commands:
(config)# flow-export destination inside <Firewall Analyzer Server IP> 1514
(config)# flow-export template timeout-rate 1
(config)# flow-export delay flow-create 60
(config)# logging flow-export-syslogs disable —> This command will disable logging syslog messages
( config ) # access – list netflow – export extended permit ip
( config ) # class – map netflow – export – class
(config-cmap)#match access-list netflow-export
Associate global policy map with netflow class map
If you have a global policy map, associate the above netflow class-map netflow-export-class to the global policy.
For example: if your global policy map is named global_policy_asa, you need to execute the below commands:
(config)# policy-map global_policy_asa
( config – pmap ) # class netflow – export – class
(config-pmap-c)# flow-export event-type any destination <Firewall Analyzer Server IP>if the above command fails use the below:
(config-pmap-c)# flow-export event-type all destination <Firewall Analyzer Server IP>
If you wish to create a new policy map named netflow – export – policy make this as your global policy follow the below steps:
(config)# policy-map netflow – export – policy
( config – pmap ) # class netflow – export – class
(config-pmap-c)# flow-export event-type any destination <Firewall Analyzer Server IP>command is fails fails use :
(config-pmap-c)# flow-export event-type all destination <Firewall Analyzer Server IP>Make policy map netflow – export – policy as your global policy:
(config)# service-policy netflow – export – policy global
UI mode configuration ASDM access , refer Cisco forum topic : https://supportforums.cisco.com/docs/DOC-6114
disable NetFlow Cisco ASA / ADM execute following commands:
(config)# flow-export disable
(config)# no flow-export destination inside <Firewall Analyzer Server IP> 1514
To disable NetFlow on Cisco ASA/ADM using ASDM
Configure/Enable SNMP Protocol for Cisco ASA Firewall device
Using CLI Console:
To enable the SNMP Manager running in Firewall Analyzer to make queries to SNMP Agent running in the firewall:
configure terminal snmp-server enable snmp-server host <interface name> <hostname| IP address of Firewall Analyzer> [poll] |
Example:
configure terminal snmp-server enable snmp-server host inside 192.168.101.155 poll |
If you want to create a new SNMP community use the below command:
configure terminal snmp-server community <community-string> |
Example:
configure terminal snmp-server community public |
Currently we support Cisco IOS Compatible Log Format Original Log Format for Cisco VPN Concentrator.
Importing of already saved Cisco VPN Concentrator logs is not supported because those logs are saved in either of the following formats which is not supported in Firewall Analyzer:
Follow the below steps to configure
the VPN Concentrator:
For more information, refer the Cisco VPN Concentrator documentation.
Follow the below steps to configure
the Cisco IOS Switch:
Use the following command:
configure terminal
logging on
logging trap informational
logging <IP Address>
ip inspect audit-trail
For more information, refer the Cisco IOS Switch documentation.
Configure/Enable SNMP Protocol for Cisco Firewall devices using Cisco ASDM tool
Using Web UI:
Configure SNMP parameters for SNMP Versions 1 2c
Carry out the following steps:
With this, SNMP parameters for Versions 1 2c are configured the changes are saved to the running
configuration.
To enable the SNMP Manager running in Firewall Analyzer to make queries to SNMP Agent running in the firewall:
With this, the management station is configured changes are saved to the running configuration.
Configure SNMP Parameters for Version 3:
SNMP Version 3 allows you to configure additional authentication privacy options for more secure
protocol operations by means of SNMP server groups users.
Carry out the following steps:
Note: Once a user is created, you cannot change the group to which the user belongs. |
With this, SNMP parameters for Version 3 are configured, the changes are saved to the running configuration.