Configure Cisco Secure Firewall Threat Defense Collection
Collecting Cisco Secure Firewall Threat Defense logs enables Alert Logic to run our common firewall analytics on data from your Cisco Secure Firewall Threat Defense devices. These analytics identify suspicious communication with internet hosts which Alert Logic considers threat actors. Significant security findings from your Cisco Secure Firewall Threat Defense devices will result in the creation of incidents that can be managed in the Alert Logic console.
You must complete the following to send data from your Cisco Secure Firewall Threat Defense device(s) to Alert Logic:
- Download and install the remote collector
- Configure Cisco Secure Firewall Threat Defense device
- Verify log collection
Download and install the remote collector
To send data from your Cisco Secure Firewall Threat Defense device(s) to Alert Logic, you must first download and install the remote collector in the same network as the Cisco Secure Firewall Threat Defense device(s).
To download and install the remote collector:
- Review the requirements for the remote collector as outlined in Requirements for the Alert Logic Remote Collector and ensure all requirements are met.
- Complete the following instructions for Linux or Windows, making sure to choose a host in the same network as the Cisco Secure Firewall Threat Defense device(s).
- While installing the remote collector, note the IP of the host where the collector is installed. This IP will be needed when configuring the Cisco Secure Firewall Threat Defense device.
Configure Cisco Secure Firewall Threat Defense device
Once the remote collector is installed, the Cisco Secure Firewall Threat Defense device needs to be configured to send data to the collector. This process requires three key steps - creating a server profile, creating a log forwarding profile, and applying the log forwarding profile.
For setups using Device Manager:
- In the Cisco Secure Firewall Threat Defense Device Manager, navigate to System Settings > Logging Settings.
- Make sure Data Logging is enabled, and the Severity level is set to Information.
- Click the gray plus (+) button to add a syslog server.
- Enter the IP address of your remote collector, choose the protocol you prefer, and enter 1515 as the port.
- Choose the interface that can reach the remote collector.
- Click OK.
- Select the new syslog server, and then click OK.
- Click Save at the bottom of the screen.
- Navigate to Policies.
- Find the access policies you want to log. Under Actions, click Edit.
- Click the Logging tab.
- Select the Log at Beginning and End of Connection checkbox.
- Under Send Connection Events to, select the syslog server you configured.
- Click OK.
- Deploy the new configuration from the Pending Changes button.
For setups using Cisco Secure Firewall Threat Defense Management Console:
- In the Cisco Secure Firewall Threat Defense Management Console, navigate to Policies > Actions > Alerts.
- Click Create Alert to open a drop-down menu, and then select Create Syslog Alert.
- In the Name box, enter any name for the alert.
- In the Host box, enter the hostname or IP address of remote collector.
- In the Port box, enter 1515.
- In the Facility box, enter LOCAL7.
- In the Severity box, enter INFO.
- Click Save.
- Navigate to Policies > Access Control Policy.
- For the access rules you want to log, navigate to the Logging tab.
- Select the Log at Beginning of Connection and Log at End of Connection checkboxes.
- Under Send Connection Events to, select the Syslog checkbox, and then select the syslog alert you created above.
- Click Save.
Verify log collection
Once you have installed the remote collector and configured the Cisco Secure Firewall Threat Defense device, it is recommended to verify that log collection is successful. It may take up to 15 minutes for Alert Logic to begin receiving logs.
- Log in to the Alert Logic console and use the following link to access the Search console with criteria already entered:
- Uncomment either of the two commented lines with SQL parameters and replace either $COLLECTOR_ID or $COLLECTOR_IP with your preferred identifier for the remote collector.
- Click Search.
- Verify logs display for the remote collector.