Configure Cisco ASA for syslog forwarding to Radiant Security.
Summary
Cisco ASA is an enterprise class firewall solution that provides control over connections coming in and out the network by using access control lists (ACLs). Cisco ASA also offers additional security features like IPS and VPN, which also generates helpful alerts and events that can be used to enrich detections and analysis.
In this guide, you’ll complete the following steps:
- Add the data connector in Radiant Security
- Import a digital certificate via Cisco ASDM or Import a digital certificate via CLI
- Forward syslog events
Prerequisites
The ASDM and CLI user should have Admin privileges (privilege 15).
Licenses
No additional license is required to forward syslog events, but an additional license is required to activate the IPS module.
Import a digital certificate via Cisco ASDM
In this step, you will upload the Radiant Security certificate via Cisco Adaptive Security Device Manager (ASDM).
- Log into the Cisco ASDM.
- Navigate to Configuration > Device Management > Certificate Management > CA Certificates.
- Click Add.
- On the Install Certificate pane, fill in the following details:
- Trustpoint Name:
Radiant-Security-Syslog
- Select either Install from a file to import the .PEM file, or select Paste certificate in PEM format to paste the encoded certificate into the text box.
- Trustpoint Name:
- Click Install Certificate.
- Click OK.
Import a digital certificate via CLI
Optionally, you can choose to import the Radiant Security certificate via CLI on the Cisco ASA.
- Log into the Cisco ASA CLI.
- Enter enable to access privileged mode.
- Enter conf t to access the configuration mode.
- Create a new Trustpoint by entering: crypto ca trustpoint radiant-security-syslog
- Enter exit to exit the Trustpoint configuration.
- Copy the base64 encoded certificate provided by Radiant Security.
- Import the CA Certificate by entering: crypto ca authenticate radiant-security-syslog
- Paste the encoded digital certificate into the terminal.
- On the last line of the certificate's text, hit Enter to skip a line and then type quit.
- Enter yes to accept the certificate.
- Enter exit to exit the configuration mode.
- Enter write mem to save the configuration.
Forward syslog events
Before you begin, it's important to have security features enabled and properly configured to generate detections and block malicious behavior on the network. Here's a list of the security features and how to check their status:
- Threat Detection
- IPS:
- Log into the Cisco ASA device CLI.
- Enter enable to access privileged mode.
- Enter conf t to access the configuration mode.
- Enter logging enable to enable logging.
- Enable the timestamp field by entering: logging timestamp rfc5424
- Setup the firewall to include the Token provided by Radiant during the connector setup (substitute <TOKEN> by the token generated for you at connector creation): logging device-id string <TOKEN>
- Enable the username field by entering: no logging hide username
- Enable the device to keep receiving connections if the syslog connection is down: logging permit-hostdown
- Set the firewall to use IP addresses instead of object names with: no names
- Set the logging level to informational: logging trap informational
- Setup syslog forwarding by entering the following command: logging host {external_interface} primary.syslog.radiantsecurity.ai TCP/6514 secure
- Enter exit to the configuration.
- Enter write mem to save the configuration and write it to memory.
We value your opinion. Did you find this article helpful? Share your thoughts by clicking here or reach to our Product and Customer Success teams at support@radiantsecurity.ai
Last updated: 2024-08-23