Cisco IOS
To add a Cisco IOS device, complete the following steps.
Step 1: Configure the Device
FireMon strives to provide up-to-date product information, however we are not always aware when vendors change their device UI. If any Configure the Device procedure differs from your device version (UI location of fields, not information needed), please consult your device's user guide.
- On the Cisco device, add a user account for the Security Manager data collector with Level 15 permissions. Write down the user name and password; you will need this information for a later step.
- Enable Authorization.
- Enable SSH access from the Data Collector IP address on your Cisco device.
- If you expect to have ACL traffic, make sure that the keyword “log” is at the end of each ACE. This step is completed on your Cisco device. It is necessary if you want to use the Rule Usage Analysis features in Security Manager.
-
Run the command ip access-list logging hash-generation in each Cisco IOS device to generate the MD5 hash value for each ACL. We use this hash to correlate the matches to the rule in Security Manager. Once the hashes are in the access-list file, you would expect to see in devpack.log (with DEBUG enabled).
- Set the data collector as a syslog logging server on the Cisco device. Ensure that the Syslog Logging Level is set at a notification level of Informational.
- Enable logging.
Step 2: Onboard the Device in the Administration Module
Contact FireMon Support to receive a specific device pack (a .jar file) if it was not included in the FMOS GA release. Review the steps to upload a device pack.
After onboarding, if you change any device settings, confirm that those updates were automatically applied to the discovered devices.
- On the toolbar, click Device > Devices.
- Click Create, and then click Cisco > IOS.
- General Properties section.
To prevent errors in device group-level device maps and incorrect reporting data, all devices added in Administration must have unique IP addresses. If devices with duplicate IP addresses must be added within a domain, it is strongly recommended that those devices be separated into discrete device groups, where no duplicate IP addresses are included in the same device group. Devices with duplicate IP addresses will cause errors in the All Devices device map, and may cause incorrect data in reports, even if they are in discrete device groups.
- In the Name box, type the name of the device as you want to see it in SIP.
- In the Description box, type an optional description of the device being added.
- In the Management IP Address box, type the IP address of the device.
- In the Data Collector Group box, select the IP address of the data collector group that will collect data from this device.
- In the Central Syslog Server box, select the syslog server from the list (optional).
Syslog fields are optional if the device uses the same IP for syslog and management.
A central syslog server is required only if syslog messages come from a different IP. A central syslog server must be created before it can be assigned to a device. To track usage via syslog, the device must support Level 3+.
- In the Syslog Match Names box, type the syslog match name (optional). You can enter multiple comma-separated names.
- By default, the Automatically Retrieve Configuration checkbox is selected.
- In the External ID box, type a unique identifier to be used when the device identifier is different than what is displayed in SIP.
- Collection Configuration is enabled on the management station or by duplicating and then editing the default configuration (Device > Collection Configuration). Default is what is set on the installed device pack.
Managed By will list the management station this device is a child of.
Credentials
- In the User Name box, type the administrator user name that was created during device configuration.
- In the Password box, type the administrator password that was created during device configuration.
- In the Enable User Name box, type the user name that is used to log into “enable” mode, which restricts administrative access to this device.
Cisco's default Enable User Name is blank. If you have not updated the Enable User Name, simply leave this field blank to represent the default system user name. However, you must enter a password in the Enable Password field.
- In the Enable Password box, type the password that is used to log into “enable” mode, which restricts administrative access to this device.
Retrieval
- By default, the Protocol is SSH and the Port is 22.
- Policy Automation section.
A valid Policy Automation license is required to complete this section and you can create a secondary Level 15 account with HTTPS access in the Cisco UI.
Advanced Automation Options
- Select the Generate CLI Automation Commands checkbox if you want automation to generate CLI commands rather than attempt API calls.
- Monitoring section.
- Log Monitoring
Minimum version required for Hit Counters: IOS 12.4(22)T IOS XE Release 3.6S
By default, the Enable Log Monitoring checkbox is selected. To disable this automatic function, clear the checkbox.
- By default, Track Usage Via is set to Hit Counters.
- By default, the Count Retrieval Interval is set to 10 minutes.
- Change Monitoring
By default, the Enable Change Monitoring checkbox is selected.
- Enter an optional Alternate Syslog Source IP.
Select the Perform Change Verification checkbox to allow the Data Collector to verify there are actual changes prior to posting a revision to Security Manager. This will enable more efficient use of disk space by not posting revisions that did not change from the last normalized revision.
- Retrieval section.
Scheduled Retrieval
Select the Enable Scheduled Retrieval checkbox to perform a retrieval at a set time daily regardless of change.
- The default Check for Change Interval time is 1440 minutes (every 24 hours). You can change the check interval time to best fit your requirements. The minimum required interval is 60 minutes (1 hour).
- Set an optional time in the Check for Change Start Time box. To schedule the first retrieval for a specific time, select the Starting at checkbox and select a time. The first retrieval will run at the time you enter. All subsequent retrievals will occur at the interval you entered above, based on the time that the first retrieval occurred. If you do not select a Change Start Time, the first scheduled retrieval will occur immediately after you save the settings. Subsequent retrievals will occur at the interval you entered.
Check for Change Retrieval
Select the Enable Check for Change checkbox to enable checking for configuration changes after the specified interval, and perform a retrieval is changes are detected.
- Advanced section.
- File Retrieval Options
- Select the Disable Route File Retrieval checkbox only if you want to disable this automatic function. Disabling route file retrievals tells the Data Collector to not retrieve the route files from that specific device. This option can be selected when route files cause a timeout on retrieval or make normalization take longer than normal.
- Select the Use Batch Config Retrieval checkbox if you are manually sending configurations for this device via your data collector's batchconfig directory. While this option is enabled, online retrievals will be disabled.
- Select the Enable Deprecated Ciphers and Algorithms checkbox to allow the use of weak SSH keys to extend the OpenSSH options with deprecated ciphers and algorithms for devices that cannot update the OS to a supported OpenSSH version.
- Select the Normalize Large Dynamic Route Files checkbox to enable normalizing all dynamic routes when exceeding 120,000 lines. Be aware that normalizing large dynamic route files will cause system delays.
- SSH Key Options
- Select the Automatically Update SSH Keys checkbox if you want the data collector to automatically update the SSH key for a device when a conflict occurs.
- The Configuration Retrieval Timeout (seconds) is set to 120 seconds (2 minutes) and is the time to wait for a response during a retrieval.
- Authentication Options: Select an Enable Level if your device requires a specific authentication enable level. If left at "Default", no enable level will be specified.
- Automation Options: Select the Do Not Generate Rule Documentation checkbox to prevent automation from generating any rule comments or documentation.
- Policy Normalization Options: By default, the Process Policies without Interfaces checkbox is enabled. Clear the checkbox to skip normalizing any policies that are not connected to an inbound or outbound interface.
- File Retrieval Options
- Enforcement section.
Select one of the available enforcement options:
If this device is assigned to an enforcement or change window, it will be listed. If no assignment, changes must be manually pushed for this device.
- Supplemental Routes section.
Supplemental routes cannot be added until after a retrieval normalizes successfully. You can perform a manual retrieval before continuing.
- Select an Interface.
If you select an Interface, you will not need to select a virtual router and next virtual router. If no interface is selected, you will need to select a Virtual Router and Next Virtual Router.
- Type the Destination IP address.
- Type the Gateway IP address.
- Select a Virtual Router.
- Select a Next Virtual Router.
- Switch the Drop toggle to enable (disabled = Accept).
- Click Add.
- Click Save.
Step 3: Verify Communication
Because automatically retrieving a configuration is enabled by default, there is nothing for you to do. Security Manager will automatically attempt to retrieve a device configuration.
To do a manual retrieval, select the device row, click the Menu icon
and then click Retrieve Configuration.
It may take up to 15 minutes to see the status result of the retrieval.