When you configure Cisco SourceFire IDS integration to send log data to USM Anywhere, you can use the Cisco SourceFire IDS plugin to translate the raw log data into normalized events for analysis.
|Device type||Intrusion detection system (IDS)|
Before configuring the log collection, you must have the IP address of the USM Anywhere Sensor.
Sending Intrusion Alerts
To configure Cisco SourceFire to send intrusion alerts to USM Anywhere
- Log in to the web interface of the SourceFire IDS.
- Go to Policies > Intrusion > Intrusion Policy.
- Locate the policy you want to apply and select Edit.
- Click Advanced Settings.
- In the list, locate Syslog Alerting and set it to Enabled.
- In the Logging Hosts field, type the IP address of your USM Anywhere Sensor.
Choose an appropriate Facility and Severity from the listbox.
Note: You may leave these at their default values unless a syslog server is configured to accept alerts for a certain facility or severity.
- Near the top-left of the page, click Policy Information.
- Click Commit Changes.
- Reapply your intrusion policy.
Sending Health Alerts
To send health alerts
- Log in to the web user interface.
- Navigate to Policies > Actions > Alerts.
Create a new syslog alert by clicking Create Syslog Alert.
- In the Name field, provide a name for the alert.
In the Host field, type the IP address of your USM Anywhere Sensor.
Note: The default syslog port is 514, so you needn't edit the Port field.
- Select an appropriate Facility and Severity.
This returns you to the Alerts page.
- Under Create Alert, select Enabled.
For plugin enablement information, see Manual Integration Management.
Available Plugin Fields
The following plugin fields are important attributes extracted from the syslog message. The USM Anywhere reports use these fields, and you can also reference them when creating custom reports. In addition to reporting, the USM Anywhere correlation rules make use of these fields.
For troubleshooting, refer to the vendor documentation: