IoT Security
Set up Cisco Prime to Accept Connections from IoT Security
Table of Contents
Expand All
|
Collapse All
IoT Security Docs
-
-
- Firewall Deployment Options for IoT Security
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use SNMP Network Discovery to Learn about Devices from Switches
- Use Network Discovery Polling to Discover Devices
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
-
Set up Cisco Prime to Accept Connections from IoT Security
Set up Cisco Prime Infrastructure for integration with
IoT Security through Cortex XSOAR.
Where Can I Use This? | What Do I Need? |
---|---|
|
One of the following Cortex XSOAR setups:
|
Because an XSOAR engine only retrieves data
from Cisco Prime Infrastructure—it doesn’t send any data to Cisco
Prime—it requires a simple read-only user account. An XSOAR engine
will use this account to log in to Cisco Prime and begin retrieving
data.
The following instructions are based on Cisco
Prime v3.2.0.
To create a new read-only user account:
- From the Cisco Prime Infrastructure interface, navigate to AdministrationUsersUsers, Roles & AAAUsers.
- From the Select a command drop-down list, choose Add User and then click Go.
- On the General tab, enter the following to create a read-only user account for an XSOAR engine to use when authenticating itself to Cisco Prime and then click Save:Username: Enter a name for the read-only user.New Password and Confirm Password: Enter the password associated with the username.NBI Read: (select)
- Either create additional read-only user accounts for other XSOAR engines to use when authenticating to Cisco Prime or configure them to use the same account.