IoT Security
Set up IoT Security and XSOAR for Cisco WLAN Controllers
Table of Contents
Expand All
|
Collapse All
IoT Security Docs
-
-
- Firewall Deployment Options for IoT Security
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use SNMP Network Discovery to Learn about Devices from Switches
- Use Network Discovery Polling to Discover Devices
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
-
Set up IoT Security and XSOAR for Cisco WLAN Controllers
Set up IoT Security and Cortex XSOAR to integrate with
Cisco WLAN controllers.
Where Can I Use This? | What Do I Need? |
---|---|
|
One of the following Cortex XSOAR setups:
|
To set up IoT Security to integrate through
Cortex XSOAR with a Cisco WLAN controller, you must add an XSOAR
engine to your network.
You must also configure Cortex XSOAR
with a Cisco WLAN controller integration instance and a job to periodically
collect device data from the controller. To do this, you need the
IP address or hostname of your Cisco WLAN controller and the username
and password of the read/write user account that the XSOAR engine
will use when forming a secure connection with it.
Cortex XSOAR Engine Installation
An on-premises XSOAR engine facilitates communications
between the Cortex XSOAR cloud and Cisco WLAN controllers. Although
it's possible to install an XSOAR engine on machines running Windows,
macOS, and Linux operating systems, only an engine on a Linux machine
supports IoT Security integrations. For more information about operating
system and hardware requirements, see the Cortex Administrator’s Guide.
We recommend downloading the Cortex XSOAR engine using the shell
installer script and installing it on a Linux machine. This simplifies the
deployment by automatically installing all required dependencies and also
enables remote engine upgrades.
When placing
the XSOAR engine on your network, make sure it can form SSH connections
to your Cisco WLAN controllers. By default, SSH uses TCP port 22.
The on-premises firewall must allow the Cortex XSOAR engine to form
HTTPS connections on TCP port 443 to the Cortex cloud at
https://<your-domain>.iot.demisto.live/. You can see the URL of your Cortex XSOAR instance when you log in to the IoT Security portal
and click Integrations and then click Launch
Cortex XSOAR. It’s visible in the address bar
of the web page displaying the Cortex XSOAR interface.
To create an Cortex XSOAR engine, access the Cortex XSOAR
interface (from the IoT Security portal, click
Integrations and then click Launch
Cortex XSOAR). In the Cortex XSOAR UI,
click SettingsEngines+ Create New Engine. Choose
Shell as the type.
For Cortex XSOAR engine installation instructions, see Engine Installation.
For help troubleshooting Cortex XSOAR engines, including installations,
upgrades, connectivity, and permissions, see Troubleshoot Engines and Troubleshoot Integrations Running on
Engines.
Configure IoT Security and Cortex XSOAR
- Log in to IoT Security and from there access Cisco WLAN controller settings in Cortex XSOAR.
- Log in to IoT Security and then click Integrations.
- IoT Security uses Cortex XSOAR to integrate with Cisco WLAN controllers, and the settings you must configure to integrate with it are in the XSOAR interface. To access these settings, click Launch Cortex XSOAR.The Cortex XSOAR interface opens in a new browser window.
- Click Settings in the left navigation menu, search for cisco wlan to locate it among other instances.
- Configure the Cisco WLAN Controller (WLC) integration instance.
- Click Add instance to open the settings panel.
- Enter the following settings:Name: Use the default name of the instance or enter a new one.Remember the instance name because you are going to use it again when creating a job that Cortex XSOAR will run to gather device data from the controller in this instance.Cisco WLC IP or Hostname: Enter the IP address or hostname of the wireless controller.Username: Type the name of the user account that you previously created for the XSOAR engine to use when connecting to the WLAN controller.Password: Type the password associated with the user account.Run on Single engine: Choose the XSOAR engine that you want to communicate with this Cisco WLAN controller.
- When finished, click Run test or Test.If the test is successful, a Success message appears. If not, check that the settings were entered correctly and then test the configuration again.
- After the test succeeds, click Save & exit to save your changes and close the settings panel.
- Create a job for XSOAR to query the Cisco WLAN controller for details about currently active devices and send them to IoT Security.IoT Security only updates attributes for devices that are in its database and whose MAC address matches that returned by the controller. If your network has static IP devices without MAC addresses, they will not be updated.
- Copy the name of the instance you just created, navigate to Jobs, and then click New Job at the top of the page.
- In the New Job panel that appears, enter the following and leave the other settings at their default values:Recurring: Select this because you want to periodically poll the controller for device details.Every: Enter a number and set the interval value (Minutes, Hours, Days, or Weeks) and select the days on which to run the job. This determines how often XSOAR queries the controller for details about active devices. For example: 15 minutes.Name: Enter a name for the job.Playbook: Choose Import Cisco WLC devices to PANW IoT cloud.Integration Instance Name: Paste the instance name you copied a few moments ago.
- Click Create new job.The job appears in the Jobs list.
- Enable the job and run it.
- Check the Job Status for the job you created. If it’s Disabled, select its check box and then click Enable.
- After you enable it, keep the check box selected and click Run now. The Run Status changes from Idle to Running. In addition, running a job in XSOAR triggers the referenced integration instance to appear on the Integrations page in the IoT Security portal.At the defined interval, XSOAR begins querying the Cisco WLAN controller for client details, which it then forwards to the IoT Security cloud.
- If you created more integration instances for multiple Cisco WLAN controllers, add more jobs as necessary.Each Cisco WLAN controller instance requires a separate job.Run each job you create at least once to populate the Integrations page with all the integration instances you’re using in XSOAR.
- When done, return to the IoT Security portal and check the status of the Cisco WLAN Controller integration.An integration instance can be in one of the following four states, which IoT Security displays in the Status column on the Integrations page:
- Disabled means that either the integration was configured but intentionally disabled or it was never configured and a job that references it is enabled and running.
- Error means that the integration was configured and enabled but is not functioning properly, possibly due to a configuration error or network condition.
- Inactive means that the integration was configured and enabled but no job has run for at least the past 60 minutes.
- Active means that the integration was configured and enabled and is functioning properly.
When you see that the status of an integration instance is Active, its setup is complete.