Cisco Firepower Threat Defense
Infinity XDR Extended Detection & Response/XPR
Extended Prevention & Response supports integration with Cisco Firepower Threat Defense (FTD) firewall by using syslog-ng (Log Management Solution) to collect its syslogs. Infinity XDR/XPR analyzes the syslogs for malicious activity and suggests preventive actions, which you must manually enforce on the firewall.
Integrating Cisco Firepower
-
Log in to the Infinity XDR/XPR Administrator Portal:
-
Go to Settings > Integrations.
-
In the Cisco widget, click Integrate.
The Cisco Firepower Integration window appears.
-
Click Download all to download the zip file that includes these certificates:
-
checkpoint-syslogs-cert.pem
-
checkpoint-syslogs-key.pem
-
checkpoint-syslogs-ca.pem
-
-
Click Close.
The Cisco Firepower widget status changes to Active.
-
-
To install syslog-ng on your internal machine:
-
Depending on the Operating System, use the appropriate package manager to install syslog-ng. For Ubuntu or Debian systems:
-
To update the list of available packages, run:
sudo apt-get update
-
To install syslog-ng and any of its subpackage, run:
sudo apt-get install syslog-ng
-
-
To create a directory to store your TLS certificates, run:
sudo mkdir -p /etc/syslog-ng/cer
-
Unzip the zip file downloaded in step 1.c and copy the .pem files to
/etc/syslog-ng/cer
in your internal machine.Note - You can use Secure Copy Protocol (SCP) or any secure method to transfer these files.
-
To set permissions for certificate files to ensure that they are secure and accessible only by syslog-ng, run:
sudo chmod 600 /etc/syslog-ng/cer/*
-
Navigate to
/etc/syslog-ng/syslog-ng.conf
, open the syslog-ng.conf file in a text editor and paste this configuration:Copy@version:XXX
source s_cisco {
network(
transport("tcp")
port(514)
);
};
log {
source(s_cisco);
destination(d_remote_syslog);
};
destination d_remote_syslog {
syslog(
"20.4.164.135" transport("tls")
port(6514)
tls(
key-file("/etc/syslog-ng/cer/checkpoint-syslogs-key.pem")
cert-file("/etc/syslog-ng/cer/checkpoint-syslogs-cert.pem")
ca-file("/etc/syslog-ng/cer/checkpoint-syslogs-ca.pem")
peer-verify("required-trusted")
)
);
}; -
Replace the IP address 20.4.164.135 with the appropriate IP address for your region:
-
For EU region, enter 20.76.50.141
-
For US region, enter 20.22.126.247
-
For India region, enter 4.187.145.23
-
For UAE region, enter 20.174.45.149
-
-
Save the changes and exit the text editor.
-
Restart the syslog-ng service to apply the changes:
sudo systemctl restart syslog-ng
-
To check the syslog-ng service status, run this:
sudo systemctl status syslog-ng
To find the current version, run
syslog-ng --version
and search for the current version installed on your machine. Note that this is tested and working on v4.3. -
-
Log in to your Cisco Firepower Management Center (FMC) portal:
-
Go to Devices > Platform Settings.
-
To create a new Firepower Threat Defense (FTD) policy, click New Policy and select the Threat Defense Settings device type. If you already have a policy, in the policy table, scroll to the end of the row and click
to edit the policy.
The New Policy window appears.
-
Enter Name and Description.
-
In the Targeted Devices section, in the Available Devices search field, search for the FTD appliance to which you want to apply this policy.
-
Click Add to Policy.
-
Click Save.
The system creates the policy.
-
Click
.
-
Go to Syslog and click the Syslog Servers tab.
-
To add remote syslog servers, click Add.
The Add Syslog Server window appears.
-
From the IP Address list, select the network object that has the syslog-ng server installed in step 2.a. If you have not created a network object, click
to create a new object.
-
In the Protocol field, select UDP.
-
In the Port field, enter 514.
-
Make sure that the Enable secure syslog checkbox is not selected.
-
In the Available Zones/Interfaces search field, search for the security zones over which the syslog server is reachable.
-
Click Add and then click OK.
-
Click the Syslog Settings tab.
-
Select the Enable syslog device ID checkbox.
-
From the list, select User Defined ID and enter cp_cisco_syslog.
-
Click Save to save the configuration.
-
Click Save and then click Deploy to start deployment of the platform setting.
-
Go to Policies > Access Control > Access Control.
Note - Make sure that you have logged in under Global configurations.
-
In the policy table, scroll to the end of the row and click
.
-
Click the Logging tab.
-
Select the Use the syslog settings configured in the FTD Platform Settings policy deployed on the device Syslog Severity checkbox.
-
From the list, select ALERT.
-
Click Save and then click Deploy.
-
-
To check if the integration is successful, in the Infinity XDR/XPR Administrator Portal:
-
Go to Settings > Integrations.
In the Integrated products section, verify if Cisco is listed as Active.
Note - The widget will display Inactive status until Infinity XDR/XPR begins receiving logs from Cisco Firepower.
-
Go to the Overview page and in the Connectivity widget, verify if Cisco is listed as connected.
-
Regenerating the Certificate
If you revoke a certificate, you must regenerate and upload the certificate to the Cisco Firepower Management Center portal within two days.
-
Log in to the Infinity XDR/XPR Administrator Portal:
-
Go to Settings > Integrations.
-
In the Cisco Firepower widget, click
.
-
Click Regenerate Certificate.
The Regenerate Cisco Firepower Integration window appears.
-
Perform steps from 1.c until the end in Integrating the Cisco Firepower.
-
Configuring IoCs
You can use the Public Blend URL in the Infinity IoC to enforce IoCs on the Cisco Firepower Management Center.
To configure IoCs:
-
Log in to the Infinity XDR/XPR Administrator Portal:
-
Go to New IOC Management > Output (Blends) > Feeds & Configuration.
-
Turn on the Show public blend link toggle button.
-
Go to Settings > Integrations.
-
In the Cisco Firepower widget, click
and select Configure IoC.
The Configure IoC window appears. It lists three indicator links generated automatically using the All Indicators link from the Public Blend URL in the Infinity IoC.
-
Click
to copy the indicators link.
-
Click Close.
-
-
Log in to the Firepower Management Center (FMC) portal:
-
Go to Objects > Object Management > Security Intelligence.
-
Select Network Lists and Feeds.
The Network Lists and Feeds window appears.
-
Click Add Network Lists and Feeds.
The Security Intelligence for Network List / Feed window appears.
-
In the Name field, enter a name for the feed
-
In the Feed URL field, paste the IP indicators link copied in the step 1.e
-
From the Update Frequency list, select 2 hours.
-
Click Save.
-
Click Save and then click Deploy.
-
Repeat steps 2.b through 2.e with this detail:
Security Intelligence
Feed URL
URL Lists and Feeds URL indicators link (Configure IoC link from step 1.e) -
Once the feed is configured and validated, deploy it on your FTD devices:
-