AWS Management Station

To add an AWS management station, complete the following steps.

Step 1: Configure the Device

FireMon strives to provide up-to-date product information, however we are not always aware when vendors change their device UI. If any Configure the Device procedure differs from your device version (UI location of fields, not information needed), please consult your device's user guide.

To utilize Amazon Web Services (AWS), you will need to create a virtual private cloud (VPC). This is done from the AWS Management Console.

  1. Create the VPC.
    • Networking > VPC.
    • Click Launch VPC Wizard.
    • Select a VPC configuration that best fits your business requirements, and then click Select.
    • Enter the required data specific to your business requirements, and then click Create VPC.
  2. Create a user account.
    • From the AWS Management Console > Administration & SecurityIdentity & Access Management.
    • Click Users > Create New Users.
    • Enter a user name, and then select the Generate an access key for each user check box.
    • Click Create.

    Note Be sure the Generate an access key for each user check box is selected before clicking Create.

    • Click Show User Security Credentials, and write down the Access Key ID and Secret Access Key or click Download Credentials. These will be needed to add the device in Security Manager.
  3. Attach a policy to the user.
    • Click the user name.
    • Click Attach Policy.
    • Select the check box for AmazonEC2ReadOnlyAccess, and then click Attach Policy.

Step 2: Onboard the Device in the Administration Module

  1. On the toolbar, click Device > Management Stations.
  1. Click Create, and then click Amazon > AWS Organizations.
  1. General Properties section.
  1. In the Name box, type the name of the device as you want to see it in SIP.
  2. In the Description box, type an optional description of the device being added.
  3. The Management IP Address box can be left blank.

A Management IP Address is not needed, however assigning an arbitrary, but unique IP is suggested. For example, 0.0.0.0 or 1.1.1.1 with an incremental increase for each similar vendor management station used (0.0.0.0, 0.0.0.1, 0.0.0.2, etc.). If you don't enter an IP address, logs about the device are sent to a specific directory that is named after the device ID. If you have the IP address in the system it will be used to name the directory, which makes it easier for support to find. For example, a non-IP address device would have a directory with domain_deviceID (example: 1_61).

  1. In the Data Collector Group box, select the IP address of the data collector group that will collect data from this device.
  2. In the Central Syslog Server box, select the syslog server from the list (optional).

Syslog fields are optional if the device uses the same IP for syslog and management.
A central syslog server is required only if syslog messages come from a different IP. A central syslog server must be created before it can be assigned to a device. To track usage via syslog, the device must support Level 3+.

  1. In the Syslog Match Names box, type the syslog match names (optional). You can enter multiple names separated by a comma.
  2. By default, the Automatically Retrieve Configuration check box is selected.
  3. In the External ID box, type a unique identifier to be used when the device identifier is different than what is displayed in SIP.
  4. For Collection Configuration, enable Update Rule Documentation on Member Devices to allow Rule Documentation fields on member devices to inherit a value from the management station. Any management stations Rule Documentation field updates will override updates on the member device. A rule marked to be removed will not be updated.
  1. Device Settings section.

Credentials

  • Access Key ID—this is provided by AWS.
  • Access Key Secret— this is provided by AWS.
  1. Retrieval section.

Scheduled Retrieval

Select the Enable Scheduled Retrieval check box to perform a retrieval at a set time regardless of change detection. This will activate additional fields to complete.

  • Set the Scheduled Retrieval Time to fit your requirements.

  • Select the Scheduled Retrieval Time Zone from the list.

Check for Change Retrieval

Select the Enable Check for Change check box to check for configuration changes after the specified interval and perform a retrieval if changes are detected. This will activate an additional field to complete.

  • The default Check for Change Interval time is 1440 minutes (every 24 hours). You can change the check interval time to best fit your requirements. The minimum required interval is 60 minutes (1 hour).

  1. Click Save.
    Devices being managed will be listed in the Discovered Devices section.