Implementing SAL (SaaS) for Cloud-Delivered Firewall Management Center-Managed Devices
To deploy this integration, you must set up event data storage in SAL (SaaS) using either syslog or a direct connection.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
To deploy this integration, you must set up event data storage in SAL (SaaS) using either syslog or a direct connection.
|
Type |
Description |
|---|---|
|
Cisco Secure Firewall Threat Defense |
|
|
Regional cloud |
|
|
Data plan |
|
|
Accounts |
When you purchase a license for this integration, you are provided with a Security Cloud Control tenant account to support the integration. |
|
Connectivity |
The Firewall Threat Defense devices must be able to connect outbound on port 443 to the Cisco Security Cloud at the following addresses:
|
This procedure provides information about the configuration for sending syslog messages for security events (connection, security intelligence, intrusion, file, and malware events) from devices managed by Security Cloud Control.
Configure policies to generate security events, and verify that the events you expect to see are displayed in the applicable tables under the AnalyticsEvents & Logs menu.
Gather information relating to the syslog server IP address, port, and protocol (UDP or TCP).
Ensure that your devices can reach the syslog server.
|
Step 1 |
In the left pane, click to open the Services page. |
|
Step 2 |
Click and select Cloud-Delivered FMC and then click Configuration. |
|
Step 3 |
Configure the syslog settings for your threat defense device: |
|
Step 4 |
Configure the general logging settings for the access control policy (including file and malware logging): |
|
Step 5 |
Enable logging for security intelligence events for the access control policy: |
|
Step 6 |
Enable syslog logging for each rule in the access control policy:
|
If you have made all the required changes, deploy your changes to the managed devices.
Configure the cloud-delivered Firewall Management Center to send events directly to SAL (SaaS). Follow this procedure to enable the Cisco cloud event global setting in the cloud-delivered Firewall Management Center. When needed, you can exclude individual FTD devices from sending event logs to SAL (SaaS). For more information, see Enable or Disable Threat Defense Devices to Send Event logs to SAL (SaaS) Using a Direct Connection.
Onboard devices to the cloud-delivered Firewall Management Center, assign licenses to these devices, and configure these devices to send events directly to SAL (SaaS).
Enable connection logging on a per-rule basis by editing a rule and choosing the Log at Beginning of Connection and Log at End of Connection options.
|
Step 1 |
Log in to Security Cloud Control. |
|
Step 2 |
In the left pane, click . |
|
Step 3 |
Click Cloud-Delivered FMC, and in the System pane that is located at the right-side, click Cisco Cloud Events. |
|
Step 4 |
In the Configure Cisco Cloud Events widget, do the following:
|
Enable or disable the FTD devices managed by the Cloud-Delivered Firewall Management Center to send events directly to SAL (SaaS). This device-level control allows you to optionally exclude specific FTD devices from sending event logs to the Cisco cloud to reduce traffic or to maintain a combination of SAL and on-premises event log storage.
![]() Note |
|
Onboard devices to the Cloud-Delivered Firewall Management Center, assign licenses to these devices, and configure these devices to send events directly to SAL (SaaS).
Enable connection logging on a per-rule basis by editing a rule and choosing the Log at Beginning of Connection and Log at End of Connection options.
|
Step 1 |
Log in to Security Cloud Control. |
|
Step 2 |
From the left pane, click Inventory. |
|
Step 3 |
Click the Devices tab to view the device. |
|
Step 4 |
Click the FTD tab to view FTD devices. |
|
Step 5 |
Choose the FTD devices whose configurations you want to edit, from the Security Devices list. |
|
Step 6 |
In the Device Management pane, click Cloud Events. |
|
Step 7 |
Click the Send Events to the Cisco Cloud toggle button to enable or disable the configuration. |
|
Step 8 |
Click Save. |