Set up IoT Security and Cortex XSOAR for SNMP Discovery
Table of Contents
Expand all | Collapse all
-
- Integrate IoT Security with AIMS
- Set up AIMS for Integration
- Set up IoT Security and XSOAR for AIMS Integration
- Send Work Orders to AIMS
- Integrate IoT Security with Microsoft SCCM
- Set up Microsoft SCCM for Integration
- Set up IoT Security and XSOAR for SCCM Integration
- Integrate IoT Security with Nuvolo
- Set up Nuvolo for Integration
- Set up IoT Security and XSOAR for Nuvolo Integration
- Send Security Alerts to Nuvolo
- Send Vulnerabilities to Nuvolo
- Integrate IoT Security with ServiceNow
- Set up ServiceNow for Integration
- Set up IoT Security and XSOAR for ServiceNow Integration
- Send Security Alerts to ServiceNow
- Send Vulnerabilities to ServiceNow
-
- Integrate IoT Security with Cortex XDR
- Set up Cortex XDR for Integration
- Set up IoT Security and XSOAR for XDR Integration
- Integrate IoT Security with CrowdStrike
- Set up CrowdStrike for Integration
- Set up IoT Security and XSOAR for CrowdStrike Integration
- Integrate IoT Security with Tanium
- Set up Tanium for Integration
- Set up IoT Security and XSOAR for Tanium Integration
-
- Integrate IoT Security with Aruba Central
- Set up Aruba Central for Integration
- Set up IoT Security and XSOAR for Aruba Central Integration
- Integrate IoT Security with Cisco DNA Center
- Set up Cisco DNA Center to Connect with XSOAR Engines
- Set up IoT Security and XSOAR for DNA Center Integration
- Integrate IoT Security with Cisco Meraki Cloud
- Set up Cisco Meraki Cloud for Integration
- Set up IoT Security and XSOAR for Cisco Meraki Cloud
- Integrate IoT Security with Cisco Prime
- Set up Cisco Prime to Accept Connections from IoT Security
- Set up IoT Security and XSOAR for Cisco Prime Integration
- Integrate IoT Security with Network Switches for SNMP Discovery
- Set up IoT Security and Cortex XSOAR for SNMP Discovery
- Integrate IoT Security with Switches for Network Discovery
- Set up IoT Security and Cortex XSOAR for Network Discovery
-
- Integrate IoT Security with Aruba WLAN Controllers
- Set up Aruba WLAN Controllers for Integration
- Set up IoT Security and XSOAR for Aruba WLAN Controllers
- Integrate IoT Security with Cisco WLAN Controllers
- Set up Cisco WLAN Controllers for Integration
- Set up IoT Security and XSOAR for Cisco WLAN Controllers
-
- Integrate IoT Security with Aruba ClearPass
- Set up Aruba ClearPass for Integration
- Set up IoT Security and XSOAR for ClearPass Integration
- Put a Device in Quarantine Using Aruba ClearPass
- Release a Device from Quarantine Using Aruba ClearPass
- Integrate IoT Security with Cisco ISE
- Set up Cisco ISE to Identify IoT Devices
- Set up Cisco ISE to Identify and Quarantine IoT Devices
- Configure ISE Servers as an HA Pair
- Set up IoT Security and XSOAR for Cisco ISE Integration
- Put a Device in Quarantine Using Cisco ISE
- Release a Device from Quarantine Using Cisco ISE
- Apply Access Control Lists through Cisco ISE
- Integrate IoT Security with Cisco ISE pxGrid
- Set up Integration with Cisco ISE pxGrid
- Put a Device in Quarantine Using Cisco ISE pxGrid
- Release a Device from Quarantine Using Cisco ISE pxGrid
- Integrate IoT Security with Forescout
- Set up Forescout for Integration
- Set up IoT Security and XSOAR for Forescout Integration
- Put a Device in Quarantine Using Forescout
- Release a Device from Quarantine Using Forescout
-
- Integrate IoT Security with Qualys
- Set up QualysGuard Express for Integration
- Set up IoT Security and XSOAR for Qualys Integration
- Perform a Vulnerability Scan Using Qualys
- Get Vulnerability Scan Reports from Qualys
- Integrate IoT Security with Rapid7
- Set up Rapid7 InsightVM for Integration
- Set up IoT Security and XSOAR for Rapid7 Integration
- Perform a Vulnerability Scan Using Rapid7
- Get Vulnerability Scan Reports from Rapid7
- Integrate IoT Security with Tenable
- Set up Tenable for Integration
- Set up IoT Security and XSOAR for Tenable Integration
- Perform a Vulnerability Scan Using Tenable
- Get Vulnerability Scan Reports from Tenable
Set up IoT Security and Cortex XSOAR for SNMP Discovery
Set up IoT Security and Cortex XSOAR to integrate with
network switches for SNMP discovery.
To set up IoT Security to integrate through
Cortex XSOAR with network switches, you must add a Cortex XSOAR
engine to your network.
You must also configure one or more
SNMP integration instances in XSOAR. To do this, you need the IP
address of the entry switch and the SNMP community string for read-only
access.
Cortex XSOAR Engine Installation
The Cortex XSOAR engine initiates connections
to switches and to the Cortex cloud and provides the means through which
they communicate with each other. Although it's possible to install
an XSOAR engine on machines running Windows, macOS, and Linux operating
systems, only an engine on a Linux machine supports IoT Security
integrations. For more information about operating system and hardware
requirements, see the Cortex XSOAR Administrator’s
Guide.
We recommend downloading the XSOAR engine
using the shell installer script and installing it on a Linux machine.
This simplifies the deployment by automatically installing all required
dependencies and also enables remote engine upgrades.
When
placing the XSOAR engine on your network, make sure it can form
SNMP connections to your switches on UDP port 161.
The firewall
must also allow the engine to form HTTPS connections on TCP port
443 to the Cortex cloud at https://<your-domain>.iot.demisto.live/.
You can see the URL of your XSOAR instance when you log in to the
IoT Security portal and click . It’s visible
in the address bar of the web page displaying the XSOAR interface.
Integrations
Launch Cortex XSOAR
To create an XSOAR engine, access the Cortex XSOAR interface (from the IoT Security portal, click ). Click . Choose
Integrations
Launch Cortex XSOAR
Settings
Engines
Create New Engine
Shell
as the type. For installation instructions, see Install Cortex XSOAR Engines.
For
help troubleshooting Cortex XSOAR engines, including installations,
upgrades, connectivity, and permissions, see Troubleshoot Cortex XSOAR Engines and Troubleshoot Integrations Running
on Engines.
Configure IoT Security and Cortex XSOAR
- Log in to IoT Security and from there access SNMP settings in Cortex XSOAR.
- Log in to IoT Security and then clickIntegrations.
- IoT Security uses Cortex XSOAR to get device information from network switches using SNMP, and the settings you must configure to integrate with it are in the XSOAR interface. To access these settings, clickLaunch Cortex XSOAR.The Cortex XSOAR interface opens in a new browser window.
- ClickSettingsin the left navigation menu, search forsnmpto locate it among other instances.
- Configure the SNMP instance.
- ClickAdd instanceto open the settings panel.
- Enter the following settings and leave the other settings at their default values:Name: Use the default name of the instance (SNMP_instance_1) or enter a new one.Entry switch IP: Enter the IP address of the entry switch with which to begin the SNMP discovery process.SNMP Version: Choose the SNMP version that your switches support, either2c(SNMPv2c) or3(SNMPv3). If you choose2c, configure the Community String and Use a single engine settings. If you choose3, configure the Username, Security Level, Authentication Protocol and Password, and Privacy Protocol and Password settings.Community String(for SNMPv2c): Enter the SNMP community string configured on the switches to permit read-only access.Username(for SNMPv3): Enter a username for an SNMP user account with read-only access. This is the account XSOAR uses when accessing an SNMP server running on a switch. The security level and authentication password defined below are also associated with this user account.Security Level(for SNMPv3): Choose the security level for accessing an SNMP server on a switch.
- noAuthNoPriv: Choose this to not exchange passwords for user authentication and not encrypt communications between the SNMP agent on XSOAR and an SNMP server on a switch.
- authNoPriv: Choose this to require user authentication based on either MD5 or SHA hashes and not encrypt communications between XSOAR and the switches.
- authPriv: Choose this to require both user authentication and encryption.
Authentication Protocol(for SNMPv3): Choose the algorithm for authenticating communications between XSOAR and the switches:MD5(Message Digest Algorithm 5) orSHAfor SHA-1 (Secure Hash Algorithm 1).Authentication Password(for SNMPv3): Enter the password used during the authentication process.Privacy Protocol(for SNMPv3): Choose the algorithm for encrypting communications between XSOAR and the switches:DES(Data Encryption Standard) orAES(Advanced Encryption Standard).Privacy Password(for SNMPv3): Enter the password used during the encryption process. - Run on Single engine: Choose the XSOAR engine that you installed previously.
- When finished, clickRun testorTest.If the test is successful, a Success message appears. If not, check that the settings were entered correctly and then test the configuration again.
- After the test succeeds, clickSave & exitto save your changes and close the settings panel.
- To enable the SNMP integration instance, clickEnable.You can add multiple SNMP integration instances, each one with settings for the same or a different XSOAR engine to communicate with a different entry switch. To add another instance, clickAdd instance.
- Create a job that periodically queries switches for device attributes from network switches.This job periodically queries switches for device data and updates the IoT Security inventory.
- ClickJobsnear the bottom of the left navigation menu to open the Jobs page.
- ClickNew Jobat the top of the Jobs page.
- Enter the following and leave the other fields at their default values:Recurring: Select this because you want to periodically query switches for device information.Every: Enter a number and set the interval value (Minutes, Hours, Days, or Weeks) and select the days on which to run the job. This determines how often XSOAR queries switches for details about active devices. For example:24 HoursName: Type a name for the job such asSNMP Discovery 1.Playbook:Incremental SNMP data import to PANW IoT Cloud - PANW IoT 3rd party IntegrationIntegration Instance Name: Enter the name of the SNMP integration instance you defined earlier. For example:SNMP_instance_1
- ClickCreate new job.The job appears in the Jobs list.
- Enable the job and run it.
- Check the Job Status for the job you created. If it’s Disabled, select its check box and then clickEnable.
- After you enable it, keep the check box selected and clickRun now. The Run Status changes from Idle to Running.At the defined interval, XSOAR begins querying the network switches for device information, which it then forwards to the IoT Security cloud.The first time you run a job that references an integration instance triggers XSOAR to report the instance to IoT Security, which then displays the integration instance on the Integrations page.
- If you created more integration instances for multiple switches, add more instances as necessary.Each SNMP instance requires a separate job.
- When done, return to the IoT Security portal and check the status of the SNMP integration.An integration instance can be in one of the following four states, which IoT Security displays in the Status column on the Integrations page:
- Disabledmeans that either the integration was configured but intentionally disabled or it was never configured and a job that references it is enabled and running.
- Errormeans that the integration was configured and enabled but is not functioning properly, possibly due to a configuration error or network condition.
- Inactivemeans that the integration was configured and enabled but no job has run for at least the past 60 minutes.
- Activemeans that the integration was configured and enabled and is functioning properly.
When you see that the status of an integration instance isActive, its setup is complete. At the defined interval, XSOAR begins the job by first querying the entry switch for device information, which it forwards to the IoT Security cloud, and then querying neighbor switches.