4-10
User Guide for Cisco Security MARS Local Controller
78-17020-01
Chapter 4 Configuring Firewall Devices
Cisco Firewall Devices (PIX, ASA, and FWSM)
Step 5
Enter the IP address of the interface that publishes syslog messages or SNMP notifications, or both in
the Reporting IP field.
Note
If the device is running Cisco ASA, PIX 7.0, or FWSM, this address corresponds to the address from
which the admin context syslog messages are published.
To learn more about the reporting IP address, its role, and dependencies, see
Understanding Access IP,
Reporting IP, and Interface Settings, page 2-8
.
Step 6
If you entered an address in the Access IP field, select
TELNET
,
SSH
, or
FTP
from the Access Type
list, and continue with the procedure that matches your selection:
•
Configure Telnet Access for Devices in MARS, page 2-11
•
Configure SSH Access for Devices in MARS, page 2-12
•
Configure FTP Access for Devices in MARS, page 2-12
Note
If you select the FTP access type and you are defining a Cisco ASA, PIX 7.0, or FWSM, you cannot
discover the non-admin context settings. Therefore, this access type is not recommended.
For more information on determining the access type, see
Selecting the Access Type, page 2-10
.
Step 7
(Optional) To enable MARS to retrieve MIB objects for this reporting device, enter the device’s
read-only community string in the SNMP RO Community field.
Before you can specify the SNMP RO string, you must define an access IP address. MARS uses the
SNMP RO string to read MIBs related to a reporting device’s CPU usage, network usage, and device
anomaly data and to discover device and network settings .
Step 8
(Optional) To enable MARS to monitor this device for anomalous resource usage, select
Yes
from the
Monitor Resource Usage list.
Result
: MARS monitors the device for anomalous consumption of resources, such as memory and CPU.
If anomalies are detected, MARS generates an incident. Resource utilization statistics are also used to
generate reports. For more information, see
Configuring Resource Usage Data, page 2-41
.
Step 9
(Cisco ASA, FWSM, and PIX 7.0 Only) do one of the following:
•
Click
Discover
to let MARS contact the device and conduct a topology and context configuration
discovery. Information about the security contexts is presented in the Context section of the main
page. To edit discovered contexts, continue with
Edit Discovered Security Contexts, page 4-13
.
•
Click
Next
to commit your changes and allow for manual definition of security contexts or modules.
Continue with
Add Security Contexts Manually, page 4-11
,
Add Discovered Contexts, page 4-12
,
or
Add an IPS Module to a Cisco Switch or Cisco ASA, page 6-11
.
For PIX and FWSM, you can add one or more security contexts. For Cisco ASA, you can add one
or more security contexts or Advanced Inspection and Prevention (AIP) modules, running the Cisco
IPS 5.x software.