You can integrate Cisco Pix security appliances with JSA.
The Cisco Pix DSM for JSA accepts Cisco Pix events by using syslog. JSA records all relevant Cisco Pix events.
Configuring Cisco Pix to Forward Events
You can configure Cisco Pix to forward events.
- Log in to your Cisco PIX appliance by using a console connection, telnet, or SSH.
- Type the following command to access Privileged mode:
- Type the following command to access Configuration mode:
- Enable logging and time stamp the logs:
- Set the log level:
logging trap warning
- Configure logging to JSA:
logging host <interface> <IP address>
<interface> is the name of the interface, for example, DMZ, LAN, ethernet0, or ethernet1.
<IP address> is the IP address of the JSA host.
The configuration is complete. The log source is added to JSA as Cisco Pix Firewall events are automatically discovered. Events that are forwarded to JSA by Cisco Pix Firewalls are displayed on the Log Activity tab of JSA.
Configuring a Log Source
JSA automatically discovers and creates a log source for syslog events from Cisco Pix Firewalls.
The following configuration steps are optional.
To manually configure a log source for Cisco Pix, take the following steps:
- Log in to JSA.
- Click the Admin tab.
- On the navigation menu, click Data Sources.
The Data Sources pane is displayed.
- Click the Log Sources icon.
The Log Sources window is displayed.
- Click Add.
The Add a log source window is displayed.
- In the Log Source Name field, type a name for your log source.
- In the Log Source Description field, type a description for the log source.
- From the Log Source Type list, select Cisco PIX Firewall.
- Using the Protocol Configuration list, select Syslog.
The syslog protocol configuration is displayed.
- Configure the following values:
Table 1: Syslog Parameters
Log Source Identifier
Type the IP address or host name for the log source as an identifier for events from your Cisco Pix Firewall.
- Click Save.
- On the Admin tab, click Deploy Changes.
The configuration is complete.