Cisco Secure Firewall - SNMP
Cisco Secure Firewall - Application and Identity-based Firewall
Cisco Secure Firewall - Failover
Cisco Secure Firewall - Intrusion Protection System
Cisco Secure Firewall - IP Stack
Cisco Secure Firewall - Threat Detection
Cisco Secure Firewall - Transparent Firewall
Cisco Secure Firewall - User Authentication
Overview
Cisco Secure Firewall Threat Defense (FTD) is a threat-focused, next-gen firewall (NGFW) with unified management. It provides advanced threat protection before, during, and after attacks.The Cisco Secure Firewall Management Center (FMC) is the centralized event and policy manager for Cisco Secure Firewall Threat Defense (FTD), both on-premises and virtual.
This integration enrich and ingests the following logs from Cisco Secure FTD using Cisco Secure FMC:
- User Authentication Logs
- SNMP Logs
- Failover Logs
- Transparent Firewall Logs
- Threat Detection Logs
- Security Events
- IP Stack Logs
- Application Firewall Logs
- Identity-based Firewall Logs
- Command Interface Logs
- OSPF Rotuing Logs
- RIP Routing Logs
- Resource Manager Logs
- VPN Failover Logs
- Intrusion Protection System Logs
- Dynamic Access Policies
- IP Address Assignment
Visualize detailed insights into SNMP requests, identity-based firewall logs, real time threat analysis, security detection and observation, and compliance monitoring with the out-of-the-box dashboards.
Setup
Installation
To install the Cisco Secure Firewall integration, run the following Agent installation command and the steps below. For more information, see the Integration Management documentation.
Note: This step is not necessary for Agent version >= 7.52.0.
Linux command:
sudo -u dd-agent -- datadog-agent integration install datadog-cisco_secure_firewall==1.0.0
Configuration
Cisco Secure Firewall
Collecting logs is disabled by default in the Datadog Agent. Enable it in datadog.yaml
:
Add this configuration block to your cisco_secure_firewall.d/conf.yaml
file to start collecting your Cisco Secure Firewall logs.
See the sample cisco_secure_firewall.d/conf.yaml for available configuration options.
logs:
- type: tcp/udp
port: <PORT>
service: cisco-secure-firewall
source: cisco-secure-firewall
Restart the Agent.
Configure Syslog Message Forwarding from Cisco Secure Firewall Management Center:
- Select Devices > Platform Settings and create or edit an FTD policy.
- Select Syslog > Logging Setup.
- Enable Logging: Turns on data plane system logging for the Firepower Threat Defense device.
- Enable Logging on the failover standby unit: Turns on logging for the standby for the Firepower Threat Defense device, if available.
- Click Save.
- Select Syslog > Syslog Settings.
- Select LOCAL7(20) from Facility drop-down list.
- Check the checkbox named Enable Timestamp on Syslog Messages to include the date and time a message was generated in the syslog message.
- Select RFC 5424 (yyyy-MM-ddTHH:mm:ssZ) from the Timestamp Format dropdown list.
- If you want to add a device identifier to syslog messages (which is placed at the beginning of the message), check the Enable Syslog Device ID check box and then select the type of ID.
- Interface: To use the IP address of the selected interface, regardless of the interface through which the appliance sends the message. Select the security zone that identifies the interface. The zone must map to a single interface.
- User Defined ID: To use a text string (up to 16 characters) of your choice.
- Host Name: To use the hostname of the device.
- Click Save.
- Select Syslog > Syslog Server.
- Check the Allow user traffic to pass when TCP syslog server is down checkbox, to allow traffic if any syslog server that is using the TCP protocol is down.
- Click Add to add a new syslog server.
- In the IP Address dropdown menu, select a network host object that contains the IP address of the syslog server.
- Choose the protocol (either TCP or UDP) and enter the port number for communications between the Firepower Threat Defense device and the syslog server.
- Select Device Management Interface or Security Zones or Named Interfaces to communicate with the syslog server.
- Security Zones or Named Interfaces: Select the interfaces from the list of Available Zones and click Add.
- Click OK.
- Click Save.
- Go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not active until you deploy them.
Validation
Run the Agent’s status subcommand and look for cisco_secure_firewall
under the Checks section.
Data Collected
Logs
The Cisco Secure Firewall integration collects user authentication, SNMP, failover, transparent firewall, IP stack, application firewall, identity based firewall, threat detection, command interface, security events, OSPF routing, RIP routing, resource manager, VPN failover, and intrusion protection system logs.
Metrics
The Cisco Secure Firewall integration does not include any metrics.
Events
The Cisco Secure Firewall integration does not include any events.
Service Checks
The Cisco Secure Firewall integration does not include any service checks.
Troubleshooting
Cisco Secure Firewall
Permission denied while port binding:
If you see a Permission denied error while port binding in the Agent logs, see the following instructions:
Binding to a port number under 1024 requires elevated permissions. Grant access to the port using the setcap
command:
Grant access to the port using the setcap
command:
sudo setcap CAP_NET_BIND_SERVICE=+ep /opt/datadog-agent/bin/agent/agent
Verify the setup is correct by running the getcap
command:
sudo getcap /opt/datadog-agent/bin/agent/agent
With the expected output:
/opt/datadog-agent/bin/agent/agent = cap_net_bind_service+ep
Note: Re-run this setcap
command every time you upgrade the Agent.
Restart the Agent.
Data is not being collected:
Make sure that traffic is bypassed from the configured port if the firewall is enabled.
Port already in use:
If you see the Port <PORT-NO> Already in Use error, see the following instructions. The example below is for PORT-NO = 514:
On systems using Syslog, if the Agent listens for Cisco Secure Firewall logs on port 514, the following error can appear in the Agent logs: Can't start UDP forwarder on port 514: listen udp :514: bind: address already in use
.
This error occurs because by default, Syslog listens on port 514. To resolve this error, take one of the following steps:
- Disable Syslog.
- Configure the Agent to listen on a different, available port.
For any further assistance, contact Datadog support.