Alienvault Data Source Integration - Cisco ASA
Alienvault Data Source Integration - Cisco ASA
Alienvault Data Source Integration - Cisco ASA
This document covers the end-to-end configuration to enable Cisco ASA as a data source for AlienVault OSSIM or USM. Data Sources provide log event data for investigation by security analysts and automatic correlation into security alerts.
Data Source Name: cisco-asa Connection Type: Syslog Data Source ID: 1636
Connect to the ASA box via telnet or SSH, enter enable mode to begin configuration: enable Enter the configure mode by typing the following command: config terminal Type the following lines: no logging timestamp logging trap notification logging host inside <IP Address of AlienVault Sensor> Press Ctrl + Z to exit config mode. Save the configuration changes: copy running-config startup-config
Page 1 of 4
Open the Console on the Alienvault Appliance, or log in over Secure Shell (SSH) as the root user Select and accept the Jailbreak This Appliance option to gain command line access. Create a new configuration file to save incoming ASA logs: nano w /etc/rsyslog.d/cisco-asa.conf Add the following line to the file, one for each Cisco ASA device you are sending logs from if ($fromhost-ip == 'IP Address of ASA') then /var/log/cisco-asa.log end the file with this line: & ~ Press Ctrl-W to save the file, Ctrl-X to exit the editor Restart the Syslog Collector /etc/init.d/rsyslog restart
Page 2 of 4
Create a new log rotation configuration file nano w /etc/logrotate.d/cisco-asa Add the follows content to the file: /var/log/cisco-asa.log { rotate 4 # save 4 days of logs daily # rotate files daily missingok notifempty compress delaycompress sharedscripts postrotate invoke-rc.d rsyslog reload > /dev/null endscript }
Page 3 of 4
Re-enter the Console Configuration Client alienvault-setup Navigate to Configure Sensor and then to Select Data Sources Scroll down the list of data sources, press space to activate the cisco-asa plugin Select OK, and back out to the top-level menu Select Apply Changes A summary of the changes to be made will be displayed, and the sensor reconfigured.
Log Events should begin to appear in the Web UI under Analysis -> Security Events (SIEM) If they do not, first validate that you are receiving syslog packets from the source device tcpdump -i eth0 -v -w /dev/null src <IP Address> and port 514 (the count of captured packets should indicate logs being sent) Press Ctrl-C to exit this tool when finished Restart the Syslog Collector and the Sensor agent /etc/init.d/rsyslog restart /etc/init.d/ossim-agent restart Search for any errors regarding the plugin in the Agent Logs cat /var/log/ossim/agent* | grep plugin_id=1636
Page 4 of 4