I have installed the latest CSPM 3.0 for PIX firewall management, however, the Detailed Network Traffic Report gives the report as follows:
PIX: Detailed audit event records for network service events are not available for the selected device. Verify that the event disposition settings are set to log, or log and notify, for events under the Service Statistics category in the Configure Logging and Notifications panel and that the device-specific log settings for this device are not set to generate debug-level syslog messages.
PIX: Audit event records do not exist for the specified time range. Either no audit events occurred within this time range, you have specified an invalid time range, or Cisco Secure Policy Manager was not operational during this time range. Verify the Start Time and/or End Time values specified for this report and contact your system administrator to determine whether Cisco Secure Policy Manager was operational during this time range.
This report is shown daily inspite of the log and notify options are set correctly.
I'm experiencing the same problem as Banno. I've followed the link that you provided. Though I'm able to receive the syslog from my PIX, somehow the CSPM is not able to capture anything into the audit event records. CSPM by default will have all event disposition set to log, so I can't figure why the CSPM is not able to log down anything in audit events.
Where is the directory that stored the PIX syslog and is there a setting that will direct the CSPM to point to that directory for audit events capturing?
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...
This document presents the ISE data limiting best practices that can dramatically improve the system performance on ISE.
Your deployment may be impacted if the alarms tab on ISE shows High load average, high CPU or high memoy usage alarm...