Cisco Security Appliances
To integrate JSA Risk Manager with your network devices, ensure that you review the requirements for the Cisco Security Appliances adapter.
The following features are available with the Cisco Security Appliances adapter:
Neighbor data support
EIGRP and OSPF dynamic routing
Telnet and SSH connection protocols
The Cisco Security Appliances adapter collects device configurations by backing up Cisco family devices. The Cisco Security Appliances adapter supports the following firewalls:
Cisco Adaptive Security Appliances (ASA) 5500 series
Firewall Service Module (FWSM)
Module in a Catalyst chassis
Established Private Internet Exchange (PIX) device.
Cisco ASA transparent contexts cannot be placed in the JSA Risk Manager topology, and you cannot do path searches across these transparent contexts.
The following table describes the integration requirements for the Cisco Security Appliances adapter.
Table 1: Integration Requirements for the Cisco Security Appliances Adapter
8.2, 8.4 to 9.1.7
Minimum User Access Level
privilege level 5
You can back up devices with privilege level 5 access level. For example, you can configure a level 5 user that uses local database authentication by running the following commands:
Matches PIX or Adaptive Security Appliance or Firewall Service Module in SNMP sysDescr.
Required credential parameters
To add credentials in JSA log in as an administrator and use Configuration Source Management on the Admin tab.
Supported connection protocols
To add protocols in JSA, log in as an administrator and use Configuration Source Management on the Admin tab.
Use any one of the following supported connection protocols:
Required commands that the adapter requires to log in and collect data