4-14
User Guide for Cisco Security MARS Local Controller
78-17020-01
Chapter 4 Configuring Firewall Devices
NetScreen ScreenOS Devices
•
(PIX 7.0) Click
Edit Context
.
•
(Cisco ASA and FWSM) Click
Edit Module
.
Step 2
Enter the IP address from which the syslog messages of the security context are sent in the Reporting IP
field.
Step 3
(Optional) To enable MARS to retrieve MIB objects for this context, enter the device’s read-only
community string in the SNMP RO Community field.
Before you can specify the SNMP RO string, you must define an access IP address. MARS uses the
SNMP RO string to read MIBs related to a reporting device’s CPU usage, network usage, and device
anomaly data and to discover device and network settings .
Step 4
(Optional) To enable MARS to monitor this context for anomalous resource usage, select
Yes
from the
Monitor Resource Usage list.
Result
: MARS monitors the device for anomalous consumption of resources, such as memory and CPU.
If anomalies are detected, MARS generates an incident. Resource utilization statistics are also used to
generate reports. For more information, see
Configuring Resource Usage Data, page 2-41
.
Step 5
To save your changes, click
Submit
.
Step 6
Repeat for each discovered context.
NetScreen ScreenOS Devices
MARS can monitor NetScreen ScreenOS devices, versions 4.0 and 5.0. To enable this monitoring, you
must:
1.
Provide MARS with SNMP, SSH or Telnet administrative access to NetScreen device.
2.
Define the SNMP RO community strings to shared between the NetScreen device and MARS.
3.
Specify which syslog messages to published to MARS.
4.
Add the Netscreen Device to the MARS web interface.
To accomplish these requirements, you must perform two procedures:
•
Bootstrap the NetScreen Device, page 4-15
•
Add the NetScreen Device to MARS, page 4-20