User guide

ManageEngine Firewall Analyzer :: User Guide
217
Zoho Corp.
To find out the version of your PIX firewall, Telnet to the PIX firewall and enter the show
version command.
Cisco PIX does not create log files, but instead directs a log stream to the syslog
server, which writes the log information into a file. Make sure the syslog server on
Firewall Analyzer can access the PIX firewall on the configured syslog port. For this,
you may have to make a rule specific to this situation.
Getting logs from Virtual Firewall (Virtual Domain)
Configuring Cisco PIX using Command Line Interface
Configuring Cisco PIX from the User Interface
Configuring SNMP protocol for Cisco PIX using Command Line Interface
Configuring Cisco ASA using Command Line Interface
Configuring SSL WebVPN in Cisco ASA appliance
Configuring Cisco ASA NetFlow Logs
Configuring SNMP protocol for Cisco ASA using Command Line Interface
Configuring Cisco VPN 3000 Concentrator
Configuring Cisco IOS Switch
Configuring SNMP protocol for Cisco Firewalls using ASDM Web UI tool
Virtual Firewall (Virtual Domain) logs
Prerequisite for context/vdom in Cisco Firewalls
The Cisco Firewall IP address should be DNS resolvable from Firewall Analyzer.
There is no separate configuration required in Firewall Analyzer for receiving logs from
Virtual Firewalls of the Cisco physical device.
Configuration in Cisco device for Virtual Firewall
In order to support virtual firewalls for Cisco devices, you need to enable logging
based on the context-name. Otherwise it is not possible for Firewall Analyzer to
detect Virtual Firewalls (vdom) of Cisco devices.
Configuring Cisco PIX using Command Line Interface
1. Telnet to the PIX firewall and enter the enable mode
2. Type the following:
configure terminal
logging on
logging timestamp
logging trap informational
logging device-id {context-name | hostname | ipaddress interface_name
| string text}
logging host interface_name syslog_ip [17/<syslog_port>]