C H A P T E R
4-1
User Guide for Cisco Security MARS Local Controller
78-17020-01
4
Configuring Firewall Devices
Revised: May 25, 2007
This chapter describes how to bootstrap firewall devices and add them to MARS as reporting devices.
Firewall devices come in several form factors: hardware appliances, software applications running on a
host, modules that are installed in switches and routers, and modules that install in multifunction security
devices.
Multifunction security devices, such as the Cisco Adaptive Security Appliance (ASA), also support
non-firewall modules, such as intrusion detection or prevention systems (IDS/IPS). This chapter does
not focus on configuring non-firewalling modules. Such discussions are provided in
Configuring
Network-based IDS and IPS Devices, page 6-1
.
This chapter explains how to bootstrap and add the following firewall devices to MARS:
•
Cisco Firewall Devices (PIX, ASA, and FWSM), page 4-1
•
NetScreen ScreenOS Devices, page 4-14
•
Check Point Devices, page 4-22
Cisco Firewall Devices (PIX, ASA, and FWSM)
MARS support for Cisco firewall devices includes the following:
•
PIX Security Appliance
•
Cisco Adaptive Security Appliance (ASA)
•
Cisco Firewall Services Modules (FWSM)
For the complete list of supported software releases by platform, refer to the latest
Supported and
Interoperable Devices and Software for Cisco Security MARS Local Controller
document.
Because these PIX software is mostly backward compatible, the commands required to bootstrap PIX
security appliance remain consistent across the releases. In addition, Cisco ASA and FWSM have much
in common with PIX command set.
The taskflow required to configure MARS to monitor a Cisco firewall device is as follows:
1.
Configure the Cisco firewall device to accept administrative sessions from MARS (to discover
settings).
For Cisco ASA, PIX 7.0, and FWSM device types, you configure the admin context to accept these
sessions.