Solved

IPS logging/reporting for Cisco ASA 55x0

Posted on 2012-03-26
5
1,087 Views
Last Modified: 2013-11-29
Hi!

My client has a Cisco ASA 5510 with ASA-SSM-10.  They used to pay a security company for the monitoring of this ASA-SSM-10 which gave them the ability to view historical summaries (graphs) and be alerted via E-mail of critical attacks.  What can I use to provide them these features?
0
Comment
Question by:dangel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 15

Expert Comment

by:Robert Sutton Jr
ID: 37766205
0
 
LVL 17

Expert Comment

by:TimotiSt
ID: 37770651
Cisco IPS Manager Express is a nice software, it can monitor a max of 10 IPS devices.

Tamas
0
 
LVL 4

Assisted Solution

by:senseifedon
senseifedon earned 150 total points
ID: 37841590
You can use manageengine firewall analyzer software. It's working via syslog. You can demo that product via this address: http://www.manageengine.com/products/firewall/download.html
0
 
LVL 1

Author Comment

by:dangel
ID: 37902877
Sorry for the late response.

Few questions about the proposed.  Thanks!

Does Cisco IPS Manager Express have alerting capability?  What I'm looking for must be able to send E-mail alerts of anomalies.

ManageEngine Firewall Analyzer seems to be an option.  How does it compare to the Cisco Security Manager?
0
 
LVL 17

Accepted Solution

by:
TimotiSt earned 350 total points
ID: 37902893
IPS Manager Express can send you an email on every alert, digests for a period (I get my high priority alerts every hour), and nice reports in PDF (I get a top attack/victim/attacker/etc report every day).
0

Featured Post

Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question