4-11
User Guide for Cisco Security MARS Local Controller
78-17020-01
Chapter 4 Configuring Firewall Devices
Cisco Firewall Devices (PIX, ASA, and FWSM)
Step 10
(Optional) If you defined an access IP and selected and configured an access type, click
Discover
to
determine the device settings, including any security contexts and their settings.
Result
: If the username and password are correct and the MARS Appliance is configured as an
administrative host for the device, the “Discovery is done.” dialog box appears when the discovery
operation completes. Otherwise, an error message appears. After the initial pull, the MARS Appliance
pulls based on the schedule that you define. For more information, see
Scheduling Topology Updates,
page 2-39
.
Step 11
To add this device to the MARS database, click
Submit
.
Result
: The submit operation records the changes in the database tables. However, it does not load the
changes into working memory of the MARS Appliance. The activate operation loads submitted changes
into working memory.
Step 12
Click
Activate
.
Result
: MARS begins to sessionize events generated by this device and evaluate those events using the
defined inspection and drop rules. Any events published by the device to MARS before activation can
be queried using the reporting IP address of the device as a match criterion. For more information on the
activate action, see
Activate the Reporting and Mitigation Devices, page 2-27
.
Add Security Contexts Manually
You can manually define security contexts in PIX 7.0, Cisco ASA, or FWSM.
Step 1
Do one of the following:
•
(PIX 7.0 and FWSM) Click
Add Context
.
•
(Cisco ASA) Click
Add Module
.