The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes Firepower module’s system/ traffic events and various method of sending these events to an external logging server.
Cisco recommends that you have knowledge of these topics:
The information in this document is based on these software and hardware versions:
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.
Type of Events
Firepower Module events can be categorized in two types:-
To configure a Syslog Server for traffic events, Navigate to Configuration > ASA Firepower Configuration > Policies > Actions Alerts and click the Create Alert drop-down menu and choose option Create Syslog Alert. Enter the values for the Syslog server.
Name: Specify the name which uniquely identifies the Syslog server.
Host: Specify the IP address/hostname of Syslog server.
Port: Specify the port number of Syslog server.
Facility: Select any facility that is configured on your Syslog server.
Severity: Select any Severity that is configured on your Syslog server.
Tag: Specify tag name that you want to appear with the Syslog message.
To configure an SNMP Trap server for traffic events, Navigate to ASDM Configuration > ASA Firepower Configuration > Policies > Actions Alerts and click the Create Alert drop-down menu and choose option Create SNMP Alert.
Name: Specify the name which uniquely identifies the SNMP Trap server.
Trap Server: Specify IP address/hostname of SNMP trap server.
Version: Firepower Module supports SNMP v1/v2/v3. Select the SNMP version from the drop down menu.
Community string: If you select v1 or v2 in Version option, Specify the SNMP community name.
Username: If you select v3 in Version option, the system prompts User Name field. Specify the username.
Authentication: This option is a part of SNMP v3 configuration. It provides authentication based on the Hash
algorithm using either MD5 or SHA algorithms. In Protocol drop down menu select the hash algorithm & enter
password in Password option. If you do not want to use this feature, then select None option.
Privacy: This option is a part of SNMP v3 configuration. It provides encryption using DES algorithm. In Protocol drop menu select the option as DES& enter password in Password field. If you do not want to use data encryption feature, then choose None option.
Connection Events are generated when traffic hits an access rule with logging enabled. In order to enable the external logging for connection events, navigate to (ASDM Configuration > ASA Firepower Configuration > Policies > Access Control Policy) edit the access rule and navigate to logging option.
Select the logging option either log at Beginning and End of Connection or log at End of Connection. Navigate to Send Connection Events to option and specify where to send events.
In order to send events to an external Syslog server, select Syslog, and then select a Syslog alert response from the drop-down list. Optionally, you can add a Syslog alert response by clicking the add icon.
To send connection events to an SNMP trap server, select SNMP Trap, and then select an SNMP alert response from the drop-down list. Optionally, you can add an SNMP alert response by clicking the add icon.
Intrusion events are generated when a signature (snort rules) matches some malicious traffic. In order to enable the external logging for intrusion events, navigate to ASDM Configuration > ASA Firepower Configuration > Policies> Intrusion Policy > Intrusion Policy. Either create a new Intrusion policy or edit existing Intrusion Policy.Navigate to Advanced Setting > External Responses.
In order to send intrusion events to an external SNMP server, select Enabled option in SNMP Alerting and then click the Edit option.
Trap Type: The trap type is used for IP addresses that appear in the alerts. If your network management system correctly renders the INET_IPV4 address type, then you can select as Binary. Otherwise, select as String.
SNMP Version: Select either Version 2 or Version 3 radio button.
SNMP v2 option
Trap Server: Specify the IP address/hostname of SNMP Trap server, as shown in this image.
Community String: Specify the community name.
SNMP v3 Option
Trap Server: Specify the IP address/hostname of SNMP Trap server, as shown in this image.
Authentication Password: Specifypassword required for authentication. SNMP v3 uses the hash function to authenticate the password.
Private Password: Specify password for encryption. SNMP v3 uses Data Encryption Standard (DES) block cipher to encrypt this password.
User Name: Specify the Username.
In order to send intrusion events to an external Syslog server, select option Enabled in Syslog Alerting then click the Edit option, as shown in this image.
Logging Host:Specify the IP address/hostname of Syslog server.
Facility: Select any facility that is configured on your Syslog server.
Severity: Select any Severity that is configured on your Syslog server.
IP Security Intelligence/DNS Security Intelligence/URL Security Intelligence events are generated when traffic matches any IP address/domain name/URL Security Intelligence database. In order to enable the external logging for IP/ URL/DNS Security Intelligence Events, navigate to (ASDM Configuration > ASA Firepower Configuration > Policies > Access Control Policy > Security Intelligence),
Click the icon as shown in the image to enable the logging for IP/DNS/URL Security Intelligence. Clicking the icon prompts a dialog box to enable logging and option to send the events to the external server.
In order to send events to an external Syslog server, select Syslog, and then select a Syslog alert response from the drop-down list. Optionally, you can add a Syslog alert response by clicking the add icon.
In order to send connection events to an SNMP trap server, select SNMP Trap, and then select an SNMP alert response from the drop-down list. Optionally, you can add an SNMP alert response by clicking the add icon.
SSL events are generated when traffic matches any rule in SSL policy, in which logging is enabled. In order to enable the external logging for SSL traffic, navigate to ASDM Configuration > ASA Firepower Configuration > Policies > SSL. Edit the existing or create a new rule and navigate to logging option.Select log at End of Connection option.
Then navigate to Send Connection Events to and specify where to send the events.
To send events to an external Syslog server, select Syslog, and then select a Syslog alert response from the drop-down list. Optionally, you can add a Syslog alert response by clicking the add icon.
To send connection events to an SNMP trap server, select SNMP Trap, and then select an SNMP alert response from the drop-down list. Optionally, you can add an SNMP alert response by clicking the add icon.
System events show the status of Firepower Operating System. SNMP manager can be used to poll these systems events.
To configure SNMP server in order to poll system events from Firepower Module, you need to configure a System Policy which makes the information available in firepower MIB (Management Information Base) which can be polled by the SNMP server.
Navigate to ASDM Configuration > ASA Firepower Configuration > Local > System Policy and click the SNMP.
SNMP Version: Firepower Module supports SNMP v1/v2/v3. Specify the SNMP version.
Community string: If you select v1/ v2 in SNMP version option, type the SNMP community name in the Community String field.
Username: If you select the v3 option in version option. Click the Add User button and specify the Username in the username field.
Authentication: This option is a part of SNMP v3 configuration. It provides authentication based on the Hashed Message Authentication Code using MD5 or SHA algorithms. Choose Protocol for hash algorithm & enter password
in Password field. If you do not want to use authentication feature then select None option.
Privacy: This option is a part of SNMP v3 configuration. It provides encryption using DES/AES algorithm. Select protocol for encryption & enter password in Password field. If you do not want data encryption feature then choose None option.
Note: A management information base (MIB)is a collection of information that is organized hierarchically. MIB file (DCEALERT.MIB) for Firepower Module is available at directory location (/etc/sf/DCEALERT.MIB) which can be fetched from this directory location.
There is currently no verification procedure available for this configuration.
There is currently no specific troubleshooting information available for this configuration.