Device Configuration Guide for Cisco Security MARS, Release 6.x
Cisco Firewall Devices

Table Of Contents

Configuring Cisco Firewall Devices

Cisco Firewall Devices (PIX, ASA, and FWSM)

Bootstrap the Cisco Firewall Device

Enable Telnet Access on a Cisco Firewall Device

Enable SSH Access on a Cisco Firewall Device

Send Syslog Files From Cisco Firewall Device to MARS

Device-Side Tuning for Cisco Firewall Device Syslogs

Logging Message Command

List of Cisco Firewall Message Events Processed by MARS

Add and Configure a Cisco Firewall Device in MARS

Add Security Contexts Manually

Add Discovered Contexts

Edit Discovered Security Contexts

Failover Considerations for PIX, ASA, and Modules in ASA


Configuring Cisco Firewall Devices


Revised: July 31, 2008

This chapter describes how to bootstrap Cisco firewall devices and add them to MARS as reporting devices. Firewall devices come in several form factors: hardware appliances, software applications running on a host, modules that are installed in switches and routers, and modules that install in multifunction security devices.

Multifunction security devices, such as the Cisco Adaptive Security Appliance (ASA), also support non-firewall modules, such as intrusion detection or prevention systems (IDS/IPS) and Content Security and Control Security Services (CSC-SSM). This chapter does not focus on configuring non-firewalling modules. Instead, they are discussed in Chapter 9, "Cisco IPS Modules" and Chapter 32, "Cisco CSC SSM".

This chapter contains the following topics:

Cisco Firewall Devices (PIX, ASA, and FWSM)

Failover Considerations for PIX, ASA, and Modules in ASA

Cisco Firewall Devices (PIX, ASA, and FWSM)

MARS support for Cisco firewall devices includes the following:

PIX Security Appliance

Cisco Adaptive Security Appliance (ASA)

Cisco Firewall Services Modules (FWSM)

For the complete list of supported software releases by platform, refer to the latest Supported and Interoperable Devices and Software for Cisco Security MARS Local Controller document.

Because these PIX software is mostly backward compatible, the commands required to bootstrap PIX security appliance remain consistent across the releases. In addition, Cisco ASA and FWSM have much in common with PIX command set.

The taskflow required to configure MARS to monitor a Cisco firewall device is as follows:

1. Configure the Cisco firewall device to accept administrative sessions from MARS (to discover settings).

For Cisco ASA, PIX 7.0, 7.2, and 8.0, and FWSM device types, you configure the admin context to accept these sessions.


Note To be monitored by MARS, the Cisco ASA, PIX 7.0, 7.2, and 8.0, and FWSM device types have the following two requirements: each context requires a unique routable IP address for sending syslog messages to MARS, and each context must have a unique name (hostname+ domain name).


2. Configure the Cisco firewall device to publish its syslog events to MARS.

For Cisco ASA, PIX 7.0, 7.2, and 8.0, and FWSM device types, you must configure the admin context and each security context.


Note MARS uses syslog events to discover information about the network topology. It uses SNMP to discover CPU utilization and related information.


3. Within MARS, define the Cisco firewall device by providing the administrative connection information.


Note Before you can add an FWSM module in a switch, you must add and configure the base module (the Cisco switch) in MARS. For more information, Chapter 15, "Cisco Switch Devices".


For Cisco ASA, PIX 7.0, 7.2, and 8.0, and FWSM, the basic device type represents the admin context. However you must also define or discover each security context and any installed Advanced Inspection and Prevention (AIP) modules running IPS 5.0.

To configure MARS to accept syslog event data and to pull device configurations settings from a Cisco firewall device, you must perform the following tasks:

Bootstrap the Cisco Firewall Device

Add and Configure a Cisco Firewall Device in MARS

Bootstrap the Cisco Firewall Device

You should configure your Cisco firewall devices to act as reporting devices and manual mitigation devices because they perform multiple roles on your network. MARS can benefit from the proper configuration of specific features:

IDS/IPS signature detection. While it does not boast the most efficient or comprehensive set of signatures, the built-in IDS and IPS signature matching features of the Cisco firewall device can be critical in detecting an attempted attack.

Accept/Deny Logs. The logging of accepted as well as denied sessions aids in false positive analysis.

Administrative Access. Administrative access ensure MARS access to several key pieces of data:

Route and ARP tables, which aid in network discovery and MAC address mapping.

NAT and PAT translation tables, which aid in address resolution and attack path analysis, exposing the real instigator of attacks.

OS Settings, from which MARS determines the correct ACLs to block detected attacks, which paste into a management session with the Cisco firewall device.

To bootstrap the Cisco firewall device, you must identify the MARS Appliance as an administrative host Enabling administrative access allows MARS to discover the Cisco firewall device configuration settings. To enable administrative access, you must make sure that the MARS Appliance is granted Telnet or SSH administrative access to the firewall device. If you use FTP access type, make sure that you have added its configuration file to an FTP server to allow MARS access to the FTP server.

In addition to configuring specific event types and administrative access, syslog messages should be sent to the MARS Appliance. To prepare the Cisco firewall device to send these messages to the MARS Appliance, you must configure the logging settings associated with each firewall device on your network. To prepare a firewall device to generate the syslog messages and direct them to a specific MARS Appliance, you must:

1. Enable logging on the firewall device.

Before a firewall device can generate syslog messages, you must enable logging for one or more interfaces. In addition, if you configured your firewall device in a failover pair, you can specify the standby firewall device to generate syslog messages as well. You can enable the device to ensure that the standby unit's syslog messages stay synchronized if failover occurs. However, this option results in twice as much traffic on the MARS Appliance.

2. Select the log facility and queue size.

To generate meaningful reports about the network activity of a firewall device and to monitor the security events associated with that device, you must select the appropriate logging level. The logging level generates the syslog details required to track session-specific data. After you select a logging level, you can define a syslog rule that directs traffic to the MARS Appliance.

3. Do one of the following:

Select the log level to debug, or

Change the severity level of required events to a level other than debug and select that log level.

The debug log level generates syslog messages that assist you in debugging. it also generates logs that identify the commands issued during FTP sessions and the URLs requested during HTTP sessions. It includes all emergency, alert, critical, error, warning, notification, and information messages. Alternatively, you can change the severity level of the required messages using the logging message command described in Device-Side Tuning for Cisco Firewall Device Syslogs.


Note Full URLs, such as www.cisco.com/foo.html, are included in HTTP session logs and FTP command data is logged only if web filtering (N2H2\SecureComputing or WebSense) is enabled on the reporting device. If web filtering is not enabled, then the HTTP session log does not include the hostname (although the destination host's IP and the Request-URI are included, such as 192.168.1.1:/foo.htm) and FTP command data is not logged at all. Caveats exist with HTTP session logging, such as if the HTTP session request is broken across packets, then the hostname data might not be included in the log data.


4. Identify the target MARS Appliance and the protocol and port pair that it listens on.

By directing syslog messages generated by a firewall device to MARS, you can process and study the messages.


Tip When monitoring a failover pair of Cisco firewall devices, you should designate the primary Cisco firewall device as the device to be monitored. If failover occurs, the secondary device assumes the IP address of the primary, which ensures that session correlation is maintained after the failover. The same focus on the primary is true for performing any bootstrap operations. The secondary device will synchronize with the configuration settings of the primary.


To enable administrative connections to the firewall device, select from the following options:

Enable Telnet Access on a Cisco Firewall Device

Enable SSH Access on a Cisco Firewall Device

Send Syslog Files From Cisco Firewall Device to MARS

To configure log settings, see Send Syslog Files From Cisco Firewall Device to MARS.

Enable Telnet Access on a Cisco Firewall Device


Step 1 Log in to the Cisco firewall device with administrator's privileges.

Step 2 Enter the command:

telnet <MARS IP address> <netmask of MARS IP address> <interface name>

where interface name can be inside, outside, DMZ.


Enable SSH Access on a Cisco Firewall Device


Step 1 Log in to the Cisco firewall device with administrator's privileges.

Step 2 Enter the command:

 ssh <MARS IP address> <netmask of the MARS IP address> <interface name>

where interface name can be inside, outside, DMZ.


Send Syslog Files From Cisco Firewall Device to MARS

To send syslog messages to the MARS Appliance, you must enable logging, select the log facility and queue size, and specify the log level to debug.

Before You Begin

When preparing a Cisco firewall device to publish syslog messages, consider the following restrictions:

In releases prior to 4.2.1, do not customize the priority of any syslog messages. If you do, MARS fails to parse those messages.

Do not configure EMBLEM format for syslog messages. Make sure that the format EMBLEM extension is not used on the following command in the configuration:

logging host <interface name> <PN-MARS's IP address> format EMBLEM

To configure the firewall device to forward syslog message to MARS, follow these steps:


Step 1 Log in to the Cisco firewall device with administrator's privileges.

Step 2 To enable logging, enter one of the following commands:

(PIX and Cisco ASA) logging enable

(FWSM) logging on

Step 3 To specify the MARS Appliance as a target logging host, enter the following command:

logging host <interface name> <MARS IP address>

Step 4 To set the log level to debug, which ensures that HTTP and FTP session logs are generated, enter the following command:

logging trap debugging


Tip Alternatively, you can tune the event settings as defined in Device-Side Tuning for Cisco Firewall Device Syslogs.


The debug messages contain the HTTP URL address information. Therefore, you can create keyword-based rules matching against the firewall message itself. For example, if the debug messages are enabled and users were logging to "http://mail.cisco.com", you could create keyword-based rules that matched against "mail.yahoo.com."


Note Full URLs, such as www.cisco.com/foo.html , are included in HTTP session logs and FTP command data is logged only if web filtering (N2H2\SecureComputing or WebSense) is enabled on the reporting device. If web filtering is not enabled, then the HTTP session log does not include the hostname (although the destination host's IP and the Request-URI are included, such as 192.168.1.1:/foo.htm ) and FTP command data is not logged at all. Caveats exist with HTTP session logging, such as if the HTTP session request is broken across packets, then the hostname data might not be included in the log data.


Debug messages are also preferred for troubleshooting. You can define inspection rules that match on on debug-level keywords, which send notifications to the appropriate group. Refer to PIX debug messages for interesting keywords.

Cisco recommends enabling debug for optimal use of your STM solution. If a Cisco firewall device is unable to sustain debug-level messages due to performance reasons, the informational level should be used. In non-debug mode, the URL information is not available; only the 5 tuple is available for queries and reports.

Step 5 For FWSM, enter the following command:

logging rate-limit <eps rate desired> 1

Step 6 For Cisco ASA, PIX 7.0, 7.2, and 8.0, and FWSM, repeat Step 2 through Step 5 for each context defined, admin and security.

Step 7 (Cisco ASA only) If an Advanced Inspection and Prevention (AIP) module is installed, you need to prepare that module as you would any IPS 5.0 module. For more information, see Chapter 9, "Cisco IPS Modules".


Device-Side Tuning for Cisco Firewall Device Syslogs

The default level for many of the events that are studied by MARS is the debug level, which can generate a high volume of additional events that are not used by MARS. If you are experiencing an influx of these other events, you can use the logging message command to either turn off events or change the severity level of the event to a level that generates required messages but not as many as debug.

This topic identifies the commands to use to change the log level from the command line, as well as identifies those messages consumed by MARS and their default severity level.

Logging Message Command

The following references provide details for using the logging message command on the appropriate firewall device:

Cisco ASA and Cisco PIX

"Changing the Severity Level of a System Log Message" in Cisco Security Appliance Command Line Configuration Guide, Version 7.2

http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/monitor.html#wp1065731

"Disabling a System Log Message" in Cisco Security Appliance Command Line Configuration Guide, Version 7.2

http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/monitor.html#wp1065706

"Logging Message Command" in Cisco Security Appliance System Log Messages, Version 7.2

http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/l2_72.html#wp1689570

Cisco Security Appliance System Log Messages, Version 7.2

http://www.cisco.com/en/US/docs/security/asa/asa72/system/message/logmsgs.html

Cisco FWSM

"Changing the Severity Level of a System Log Message" in Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide, 3.1

http://www.cisco.com/en/US/docs/security/fwsm/fwsm32/configuration/guide/monitr_f.html#wp1099894

"Disabling a System Log Message" in Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide, 3.1

http://www.cisco.com/en/US/docs/security/fwsm/fwsm31/configuration/guide/monitr_f.html#wp1099869

"Logging Message Command" in Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Command Reference, 3.1

http://www.cisco.com/en/US/docs/security/fwsm/fwsm31/command/reference/l2.html#wp1565791

Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Logging Configuration and System Log Messages, 3.1

http://www.cisco.com/en/US/docs/security/fwsm/fwsm31/system/message/fwsm_log.html

List of Cisco Firewall Message Events Processed by MARS

The following list of events are processed by MARS. By changing the severity level for these events to ensure they are within the logging level you have selected, you can typically reduce the load on your firewall logging by 5-15%. However, the primary consumer of resources will remain the session detail events, which are processed and analyzed by MARS.

Starting with MARS version, the system can correctly parse syslogs at customized logging levels. Therefore, you can move the syslogs processed by MARS to a lower level and then set the log to that level, for example logging level 6. Use the command logging messagemessage-id level level on the ASA, or PIX, to move a syslog message to a new level.

The following syslog message IDs are those required for proper sessionization. If you change the logging level of the firewall, ensure that the following messages IDs are generated at the new level so the MARS Appliance receives them.


Note The syslog message IDs listed below are required for sessionization. However, other logs at the debug or informational levels may exist that you may require for other purposes. for example, a specific URL accessed by one user if you are doing URL filtering on the security appliance. Refer to the Logging Message Command for pointers to the full message list for each firewall device type.


101001-101005

102001

103001-103007

104001-104004

105001-105011

105020-105021

105031-105032

105034-105040

105042-105048

106001-106002

106006-106007

106010-106027

106100-106101

107001-107003

108002-108003

108005

108007

109001-109003

109005-109008

109010-109014

109016-109034

110001-110003

111001

111003-111005

111007-111009

111111

112001

113001

113003-113023

114001-114021

199001-199003

199005-199009

199011

199012

199907-199908

201002-201006

201008-201013

202001

202005

202011

208005

209003-209005

210001-210003

210005-210008

210010

210020-210022

211001

211003

212001-212006

213001-213006

214001

215001

216003

216004

217001

218001-218004

219002

302001

302003-302004

302007-302010

302012-302023

302033

302034

302302

303002-303005

304001-304009

305005-305012

308001-308002

311001-311004

312001

313001

313003-313005

313008

314001-314006

315004

315011

316001

316002

317001-317006

318001-318009

319001-319004

320001

321001-321004

322001-322004

323001-323006

324000-324007

324300-324301

325001-325003

326001-326002

326004-326017

326019-326028

327001-327003

328001

329001

331001-331002

332001-332004

333001-333010

334001-334009

335001-335014

336001-336011

400000-400050

401001-401005

402101-402103

402106

402114-402120

402121-402127

403101-403104

403106-403110

403500-403507

404101-404102

405001-405002

405101-405107

405201

405300-405301

406001-406002

407001-407003

408001-408003

409001-409013

409023

410001-410004

411001-411004

412001-412002

413001-413006

414001-414002

415001-415020

416001

417001

417004

417006

417008-417009

418001

419001-419002

420001-420006

421001-421007

422004-422006

423001-423005

424001-424002

425001-425006

428001

431001-431002

446001

450001

500001-500004

501101

502101-502103

502111-502112

503001

504001-504002

505001-505016

506001

507001-507002

508001-508002

509001

602101-602104

602201-602203

602301-602304

603101-603109

604101-604104

605004-605005

606001-606004

607001-607002

608001-608005

609001-609002

610001-610002

610101

611101-611104

611301-611323

612001-612003

613001-613003

614001-614002

615001-615002

616001

617001-617004

620001-620002

621001-621003

621006-621010

622001

622101-622102

634001

701001-701002

702201-702212

702301-702303

702305

702307

703001-703002

709001-709007

710001-710006

711001-711002

713004

713006

713008-713010

713012

713014

713016-713018

713020

713022

713024-713037

713039-713043

713047-713052

713056

713059-713063

713065-713066

713068

713072-713076

713078

713081-713086

713088

713092

713094

713098-713099

713102-713105

713107

713109

713112-713124

713127-713149

713152

713154-713172

713174

713176-713179

713182

713184-713187

713189-713190

713193-713199

713203-713206

713208-713226

713228-713251

713254

713900-713906

714001-714007

714011

715001

715004-715009

715013

715019-715022

715027-715028

715033-715042

715044-715072

715074-715079

716001-716056

717001-717049

718001-718081

718082-718088

719001-719026

720001-720073

721001-721019

722001-722041

723001-723014

724001-724002

725001-725015

726001

730001

730002-730005

730010

731001-731003

732001-732003

733100

733102

733103

734002-734004

Add and Configure a Cisco Firewall Device in MARS

The process of adding a PIX security appliance, Cisco ASA, or FWSM to MARS involves many of the same steps, regardless of the version of software that is running. The process is exactly the same for PIX software versions 6.0, 6.1, 6.2, and 6.3. However, Cisco ASA, PIX 7.0, 7.2, and 8.0, and FWSM provide the ability to define multiple security contexts, or virtual firewalls.

Adding a Cisco ASA, PIX 7.0, 7.2, and 8.0, and FWSM to MARS has two distinct steps. First, you must define the settings for the admin context. Then, if multiple context mode is enabled, you define or discover the settings for its security contexts. These Cisco firewall device have two type of contexts: one admin context, which is used for configuration of the device itself, and one or more security contexts. For Cisco ASA, you can also define or discover any modules that are installed in the appliance.

To be monitored by MARS, the Cisco ASA, PIX 7.0, 7.2, and 8.0, and FWSM device types have the following additional requirements:

each context requires a unique routable IP address for sending syslog messages to MARS

each context must have a unique name (hostname+ domain name)


Note The Cisco ASA, PIX 7.0, 7.2, and 8.0, and FWSM can run in single context mode, which means that the system context acts as both the admin context and a security context.


To add and configure a Cisco firewall device, follow these steps:


Step 1 Do one of the following:

If you are adding an FWSM, you must be on the main page of the Cisco switch to which you are adding it. On that page, click Add Module, and select one of the following options from the Device Type list:

Cisco FWSM 1.1

Cisco FWSM 2.2

Cisco FWSM 2.3

Cisco FWSM 3.1

Cisco FWSM 3.2

If you are adding a PIX security appliance or a Cisco ASA, an Select Admin > System Setup > Security and Monitor Devices > Add, and select one of the following options from the Device Type list:

Cisco ASA 7.0

Cisco ASA 7.2

Cisco ASA 8.0

Cisco PIX 6.0

Cisco PIX 6.1

Cisco PIX 6.2

Cisco PIX 6.3

Cisco PIX 7.0

Cisco PIX 7.2

Cisco PIX 8.0

Step 2 Enter the name of the firewall device in the Device Name field.

MARS maps this name to the reporting IP address. This name is used in topology maps, queries, and in the Security and Monitoring Device list. For devices that support the discovery operation, such as routers and firewalls, MARS renames this field's value to match the name discovered in the device configuration, which typically uses the hostname.domain format. For devices that cannot be discovered, such as Windows and Linux hosts and host applications, MARS uses the provided value.

Step 3 (Optional) To enable MARS to discover settings from this firewall device, enter the administrative IP address in the Access IP field.


Note If the device is running Cisco ASA, PIX 7.0, 7.2, and 8.0, or FWSM, this address corresponds to IP address from which the syslog messages of the admin context are sent.


To learn more about the access IP address, its role, and dependencies, see Understanding Access IP, Reporting IP, and Interface Settings, page 1-10.

Step 4 Enter the IP address of the interface that publishes syslog messages or SNMP notifications, or both in the Reporting IP field.


Note If the device is running Cisco ASA, PIX 7.0, 7.2, and 8.0, or FWSM, this address corresponds to the address from which the admin context syslog messages are published.


To learn more about the reporting IP address, its role, and dependencies, see Understanding Access IP, Reporting IP, and Interface Settings, page 1-10.

Step 5 If you entered an address in the Access IP field, select TELNET, SSH, or FTP from the Access Type list, and continue with the procedure that matches your selection:

Configure Telnet Access for Devices in MARS, page 1-14

Configure SSH Access for Devices in MARS, page 1-14

Configure FTP Access for Devices in MARS, page 1-15


Note If you select the FTP access type and you are defining a Cisco ASA, PIX 7.0, 7.2, and 8.0, or FWSM, you cannot discover the non-admin context settings. Therefore, this access type is not recommended.


For more information on determining the access type, see Selection of the Access Type, page 1-11.

Step 6 (Optional) To enable MARS to retrieve MIB objects for this reporting device, enter the device's read-only community string in the SNMP RO Community field.

Before you can specify the SNMP RO string, you must define an access IP address. MARS uses the SNMP RO string to read MIBs related to a reporting device's CPU usage, network usage, and device anomaly data and to discover device and network settings.

Step 7 (Optional) To enable MARS to monitor this device for anomalous resource usage, select Yes from the Monitor Resource Usage list.

MARS monitors the device for anomalous consumption of resources, such as memory and CPU. If anomalies are detected, MARS generates an incident. Resource utilization statistics are also used to generate reports. For more information, see Configuring Resource Usage Data, page 1-23.

Step 8 (Cisco ASA, FWSM, and PIX 7.0, 7.2, and 8.0 Only) do one of the following:

Click Discover to let MARS contact the device and conduct a topology and context configuration discovery. Information about the security contexts is presented in the Context section of the main page. To edit discovered contexts, continue with Edit Discovered Security Contexts.

Click Next to commit your changes and allow for manual definition of security contexts or modules. Continue with Add Security Contexts Manually, Add Discovered Contexts, or Add an IPS Module to a Cisco Switch or Cisco ASA, page 9-2.

For PIX and FWSM, you can add one or more security contexts. For Cisco ASA, you can add one or more security contexts or Advanced Inspection and Prevention (AIP) modules, running the Cisco IPS 5.x software.

Step 9 (Optional) If you defined an access IP and selected and configured an access type, click Discover to determine the device settings, including any security contexts and their settings.

If the username and password are correct and the MARS Appliance is configured as an administrative host for the device, the "Discovery is done." dialog box appears when the discovery operation completes. Otherwise, an error message appears. After the initial pull, the MARS Appliance pulls based on the schedule that you define. For more information, see Scheduling Topology Updates, page 1-20.

Step 10 To add this device to the MARS database, click Submit.

The submit operation records the changes in the database tables. However, it does not load the changes into working memory of the MARS Appliance. The activate operation loads submitted changes into working memory.

Step 11 Click Activate.

MARS begins to sessionize events generated by this device and evaluate those events using the defined inspection and drop rules. Any events published by the device to MARS before activation can be queried using the reporting IP address of the device as a match criterion. For more information on the activate action, see Activate the Reporting and Mitigation Devices, page 1-15.


Add Security Contexts Manually

You can manually define security contexts in PIX 7.0, 7.2, and 8.0, Cisco ASA, or FWSM.


Step 1 Do one of the following:

(PIX 7.0, 7.2, and 8.0 and FWSM) Click Add Context.

(Cisco ASA) Click Add Module.

Step 2 In the Device Type list, do one of the following:

For Cisco ASA, select Cisco ASA 7.0, Cisco ASA 8.0, or Cisco ASA 8.1.

For PIX, select Cisco PIX 7.0, Cisco PIX 7.2, or Cisco PIX 8.0.

For FWSM, select Cisco FWSM x.y, where x.y is the version number of the software running on the module.

Step 3 Enter the name of the firewall device in the Device Name field.

MARS maps this name to the reporting IP address. This name is used in topology maps, queries, and in the Security and Monitoring Device list. For devices that support the discovery operation, such as routers and firewalls, MARS renames this field's value to match the name discovered in the device configuration, which typically uses the hostname.domain format. For devices that cannot be discovered, such as Windows and Linux hosts and host applications, MARS uses the provided value.

Step 4 Enter the name of the security context in the Context Name field.

This name must exactly match the context name defined on the device.

Step 5 Enter the IP address of the security context from which syslog messages or SNMP notifications, or both are published in the Reporting IP field.

To learn more about the reporting IP address, its role, and dependencies, see Understanding Access IP, Reporting IP, and Interface Settings, page 1-10.

Step 6 (Optional) To enable MARS to retrieve MIB objects for this security context, enter the device's read-only community string in the SNMP RO Community field.

Before you can specify the SNMP RO string, you must define an access IP address. MARS uses the SNMP RO string to read MIBs related to a security context's CPU usage, network usage, and device anomaly data and to discover device and network settings.

Step 7 To discover the settings of the defined context click Discover.

This discovery collects all of the route, NAT, and ACL-related information. In addition, the name of the device may change to the hostname.domain format if it was not already entered as such.

Step 8 To save your changes, click Submit.


Add Discovered Contexts

When you select Discover on a Cisco ASA, PIX 7.0, 7.2, and 8.0 or FWSM, MARS discovers the contexts that are defined for that firewall device. However, you must still manually add discovered contents.


Note You cannot discover a module install in a Cisco ASA; you must manually define IPS modules. However, the discovered contexts do appear under the Module area on the main page.



Step 1 Do one of the following:

(PIX 7.0, 7.2, and 8.0 and FWSM) Click Add Available Context.

(Cisco ASA) Click Add Available Module.

Step 2 Select a security context from the Select list.

Step 3 Click Add.

Step 4 Repeat for other contexts.

Step 5 To save your changes, click Submit.

After you add discovered contexts, you must edit them to provide the contact information required by MARS. Continue with Edit Discovered Security Contexts.


Edit Discovered Security Contexts


Note You must edit all discovered contexts to specify the reporting IP address and the SNMP RO community string.



Step 1 From the list of discovered contexts, select the one that you want to edit and select the action appropriate to the device type:

(PIX 7.0, 7.2, and 8.0) Click Edit Context.

(Cisco ASA and FWSM) Click Edit Module.

Step 2 Enter the IP address from which the syslog messages of the security context are sent in the Reporting IP field.

Step 3 (Optional) To enable MARS to retrieve MIB objects for this context, enter the device's read-only community string in the SNMP RO Community field.

Before you can specify the SNMP RO string, you must define an access IP address. MARS uses the SNMP RO string to read MIBs related to a reporting device's CPU usage, network usage, and device anomaly data and to discover device and network settings.

Step 4 (Optional) To enable MARS to monitor this context for anomalous resource usage, select Yes from the Monitor Resource Usage list.

MARS monitors the device for anomalous consumption of resources, such as memory and CPU. If anomalies are detected, MARS generates an incident. Resource utilization statistics are also used to generate reports. For more information, see Configuring Resource Usage Data, page 1-23.

Step 5 To save your changes, click Submit.

Step 6 Repeat for each discovered context.


Failover Considerations for PIX, ASA, and Modules in ASA

When monitoring a failover pair of Cisco firewall devices (PIX or ASA), you should designate the primary Cisco firewall device as the device to be monitored. If failover occurs, the secondary device assumes the IP address of the primary, which ensures that session correlation is maintained after the failover. The same focus on the primary is true for performing any bootstrap operations. The secondary device will synchronize with the configuration settings of the primary.

While this is true for the actual firewalls, it is not true for AIP-SSM modules. AIP-SSM modules do not swap IP addresses in the event of a failover. Therefore, to ensure that MARS receives uninterrupted IPS event data, you must configure both the primary and secondary AIP-SSM modules as child modules of the same ASA device that represents the Active/Standby pair. In this configuration, MARS will likely generate "Inactive Reporting Device" messages on the hour for the non-active AIP-SSM module.