In this article, you will find out how to configure your Cisco Secure Access tenant to pull, transform, and inject the DNS and/or Web logs into Lumu to enhance the detection & response capabilities of your organization.
Ensure your script host can communicate with the following hosts. These are required for the operation of this integration.
Lumu’s Custom Data Collection integration with Cisco Secure Access uses the logs pushed by Cisco Secure Access on AWS S3, then collects their results, processes them as Lumu events, and sends them to Lumu Cloud.
To set up the integration, you must prepare your Cisco Secure Access instance to communicate with the Lumu integration. To do this, you need the following:
The following sections will guide you on how to perform these tasks
Perform the following steps to activate the Cisco-managed S3 log storage:
1. Navigate to the Admin using the menu on the left. Then, proceed to Management, and select Log Management.
2. In the Amazon S3 section, select Use Cisco-managed Amazon S3 storage. Then, select the appropriate region, and define the retention period that aligns with your organization's security policies. When finished, click Save.
3. Once you save the changes, a window with the credentials will pop-up. Save the Data path, Access Key, and Secret Key values. Keep them at hand for later use during the Set up the configuration files step. When finished, click CONTINUE.
The Data Path is an S3 URI that includes the Bucket Name and an identifier, which will serve as the Parent folder. Extract the Bucket name and Parent folder as follows:4. In the confirmation window, activate the Log Https Queries and Include Headers options.
Please note that there may be a delay in generating and exporting the logs to the S3 storage; allow some time for them to show up in the Cloud storage.
After enabling log storage, it is necessary to enable logging for the desired access policy rule.
1. Navigate to Secure in the left menu. Then, go to Policy > Access Policy to access the list of rules.
2. Open the configuration menu (1) for the rule for which the logging is to be enabled and click Edit.
It is highly recommended to enable logging for rules that match your outgoing network traffic.
To successfully log HTTPS traffic, please ensure your security profile is configured to permit traffic decryption.
3. Turn on the Log Request toggle. Then, click Save.
The integration set-up process needs you to collect this information from Lumu portal:
Log in to your Lumu portal and run the following procedures to collect this data.
To collect the Lumu Collector key, please refer to the Collector key document.
To collect the Lumu Custom Collector key, please refer to the Collector ID document.
To collect your Lumu company UUID, log in to your Lumu portal. Once you are in the main window, copy the string below your company name.
Before starting, ensure your integration environment can communicate with the hosts listed in the Contacted Hosts section.
The integration is deployed in a Docker environment; therefore, adhere to the subsequent guidance to prepare the hosting environment.
Whichever alternative you select, you must unpack the integration package shared by our Support team.
Unpack the deployment package provided by Lumu in your preferred path/folder. Keep in mind this location, as it will be required for further configurations. From now on, we will refer to this folder as <app_lumu_root>.
You must follow the Docker installation documentation that corresponds to your OS. Ensure you follow the Post-installation steps for Linux before deploying the integration.
For Windows users, follow the Install Docker Desktop for Windows documentation to install the Docker Engine.
You need to add and edit the integrations.toml configuration file to set up the integration.
You will find the integrations_template.toml sample file inside the integrations package. Use it to build your configuration file.
All the parameters in red should be replaced with the real data necessary for your integration deployment. For example, the parameter “COMPANY-UUID” should end up as something similar to “aa11bb22bb33-123a-456b-789c-11aa22bb33cc”. Follow these indications for all similar parameters.
The integrations.toml file contains the information required by the integration to collect the network activity data from your Cisco Secure Access console, transform it, and send it to the Lumu Cloud.
[[integration]]
[integration.lumu]
uuid = "COMPANY_UUID_HERE"
collector_id = "COLLECTOR_ID_HERE"
collector_key = "COLLECTOR_KEY_HERE"
[integration.app]
name = "UNIQUE_APP_NAME_HERE"
[integration.app.storage]name = "S3_BUCKET_NAME_HERE" # e.g., "cisco-managed-us-west-1"
parent_folder = "S3_CISCO_PARENT_FOLDER_ID_HERE" # if S3 Cisco managed put here the parent_folder ID
child_folder = "CISCO_LOG_TYPE_HERE" # e.g., "dnslogs", "proxylogs"
[integration.app.api]
aws_access_key_id = "AWS_ACCESS_KEY_ID_HERE"
aws_secret_access_key = "AWS_SECRET_ACCESS_KEY_HERE"
aws_region = "AWS_REGION_HERE" # e.g., "us-west-1"Replace the highlighted placeholders as follows:
You must fill in the configuration data carefully. If there are any mistakes or missing data, you’ll receive errors. Please refer to the Troubleshooting and known issues section at the end of this article for further reference.
To create additional dnslogs or proxylogs, you must configure them as separate instances within the configuration file, ensuring that the child_folder parameter is updated to reflect the desired CISCO_LOG_TYPE_HERE value. When done correctly, your integrations.toml file should look as followsLumu introduced the Makefile model to assist customers in deploying the integration as a Docker container. To deploy the integration, locate yourself in the <package-path> folder, and run the following command:
Please monitor the console output for any unexpected errors. Fix them based on the command output and run the command again.
If you have a Docker environment, you can select this option to run the integration as a Docker process. To deploy and run your integration as a Docker container, locate yourself in the <app_lumu_root> folder, and follow these instructions:
1. To build the container, run the following command. Change all the flags based on the reference given in the script section above.
Do not forget the dot "." at the end of the line.
2. To run the container, run the following command:
After you configure the integration, you will see the processed events in the custom collector created in Lumu portal. Lumu integration will process events starting from 10 minutes before the integration activation time.
The commands defined in this section will allow you to troubleshoot the operation of your integration. Keep in mind that you must locate yourself in the <app_lumu_root> folder before running any of them.
The following are the troubleshooting commands for this deployment option:
After running this command the host machine should be rebooted.
For troubleshooting purposes, you can run the following commands:
In this section, we collect all the potential issues you will find after you run the troubleshooting commands from the above section.
Most of the issues building the component are due to network issues like not having a proper Docker Network connection or temporarily unavailable repositories. Ensure your Docker has an active DNS resolution and a stable Internet connection.
You might receive errors like failed download, reset connection
If you got some error building the integration related to docker: permission denied while trying to connect to the Docker daemon socket, run the make docker-fix-sudo command to fix this issue.
If you receive errors like this:
It means you are using the wrong key parameters or values. Review the parameters entered during the Set up the configuration files step and run the integration again.
You will get the following log when the authentication fails. Ensure you are using the right credentials and try again.
You will get the following log when there are problems with the parameters of the integration. Make sure you are entering the correct parameters and try again.
You will get the following log when there are problems with the parameters of the integration. Make sure you are entering the correct parameters and try again.
You may encounter issues such as Reset, Read Timeout, and others associated with general network connection failures. Make sure you have a stable Internet connection and try again.
An error of this nature often indicates that while the credentials may be valid, the associated permissions are likely misconfigured and getting forbidden 403 error. Please verify the assigned role and permissions.
If you receive the following error. Ensure you stop the other instance a try again.