Cisco ASA (syslog)

Configure Cisco ASA for syslog forwarding to Radiant Security.

In this guide, you'll configure Cisco ASA to send alerts and events to Radiant Security. Cisco ASA is an enterprise-grade firewall that uses access control lists (ACLs) to manage network traffic and includes features like IPS and VPN, which generate valuable security data for detection and analysis.

Prerequisites

Add the data connector in Radiant Security

  1. Log in to Radiant Security.

  2. From the navigation menu, click Settings > Data Connectors and click + Add Connector.

  3. Search for and select the Cisco ASA option and then click Data Feeds.

  4. Under Select your data feeds, select Cisco ASA and click Credentials.

  5. Under Credential Name, give the credential an identifiable name (e.g. Cisco ASA - Token ). If you already have a credential in place, select it from the drop-down menu. Click Add Connector.

  6. In the Connector tag field, enter a random value. This value will act as the salt to randomize the Token you’ll download in the next step.

  7. Click Add Connector.

  8. Copy and save the Token value using the clipboard option or downloading the Token file. Download the SSL certificate, as you will need it when configuring the syslog source (Cisco ASA) in the next section.

  9. Click Done to save your changes.

Licenses

No additional license is required to forward syslog events, but an additional license is required to activate the IPS module.

Import a digital certificate via Cisco ASDM

In this step, you will upload the Radiant Security certificate via Cisco Adaptive Security Device Manager (ASDM).

  1. Log into the Cisco ASDM.

  2. Navigate to Configuration > Device Management > Certificate Management > CA Certificates.

  3. Click Add.

  4. On the Install Certificate pane, fill in the following details:

    1. Trustpoint Name: Radiant-Security-Syslog

    2. Select either Install from a file to import the .PEM file, or select Paste certificate in PEM format to paste the encoded certificate into the text box.

  5. Click Install Certificate.

  6. Click OK.

Import a digital certificate via CLI

Optionally, you can choose to import the Radiant Security certificate via CLI on the Cisco ASA.

  1. Log into the Cisco ASA CLI.

  2. Enter enable to access privileged mode.

  3. Enter conf t to access the configuration mode.

  4. Create a new Trustpoint by entering: crypto ca trustpoint radiant-security-syslog

  5. Enter exit to exit the Trustpoint configuration.

  6. Copy the base64 encoded certificate provided by Radiant Security.

  7. Import the CA Certificate by entering: crypto ca authenticate radiant-security-syslog

  8. Paste the encoded digital certificate into the terminal.

  9. On the last line of the certificate's text, hit Enter to skip a line and then type quit.

  10. Enter yes to accept the certificate.

  1. Enter exit to exit the configuration mode.

  2. Enter write mem to save the configuration.

Forward syslog events

Before you begin, it's important to have security features enabled and properly configured to generate detections and block malicious behavior on the network. Here's a list of the security features and how to check their status:

  1. Log into the Cisco ASA device CLI.

  2. Enter enable to access privileged mode.

  3. Enter conf t to access the configuration mode.

  4. Enter logging enable to enable logging.

  5. Enable the timestamp field by entering: logging timestamp rfc5424

  6. Setup the firewall to include the Token provided by Radiant during the connector setup (substitute <TOKEN> by the token generated for you at connector creation): logging device-id string <TOKEN>

  7. Enable the username field by entering: no logging hide username

  8. Enable the device to keep receiving connections if the syslog connection is down: logging permit-hostdown

  9. Set the firewall to use IP addresses instead of object names with: no names

  10. Set the logging level to informational: logging trap informational

  11. Setup syslog forwarding by entering the following command: /logging host {external_interface} cluster.syslog.radiantsecurity.ai TCP/6514 secure

  12. Enter exit to the configuration.

  13. Enter write mem to save the configuration and write it to memory.

Last updated