Setting up ATR for Cisco Adaptive Security Appliance
What ATR does
ATR determines whether an alert is malicious.
If the alert is identified as malicious, the IP Address is automatically added to the firewall or network security solution block list, depending on how malicious ATR determines it to be.
For more information about Automated Threat Response (ATR), see Setting up ATR.
Setting up ATR
To set up ATR for Cisco ASA, do the following:
Enable the API configuration on the firewall
Add an Administrator User
Allow API access
Create a Network Object Group for BARRACUDA_XDR_BLOCK
Enable ATR in XDR Dashboard
To enable the API configuration on the firewall
The Cisco ASA REST API is not installed by default. You must install and enable it, then allow access to specific IP addresses.
Reference Cisco ASA REST API Quick Start Guide
In Cisco ASA, navigate to the Command Line Interface (CLI).
Run the following command to check whether the API Server is enabled:
show api-server
The following IP addresses for ATR must be allowed, as well as any other local IPs/networks required to use the API configuration.
44.239.173.232
35.155.74.247
Allow access for the specific IPs:
Example Command:
api-server manage <Interface> 44.239.173.232 255.255.255.255
Enable HTTPS for the IPs:
Example Command:
http 44.239.173.232 255.255.255.255 <Interface>
Create a dedicated API user account
Create an admin user account to allow the API access to create and modify network groups and network objects. You must use the following account username: asa_api. Create the account using the Cisco ASDM-IDM Launcher or the following CLI command:
username asa_api password <STRONG_PASSWORD> privilege 15
Create a Network Object Group for BARRACUDA_XDR_BLOCK
Barracuda XDR uses this object group track the IPs and domains that are automatically blocked on the firewall. Add this group to any pre-existing security rules/policies created to block traffic to/from anomalous IP addresses. Otherwise, follow the To create a Firewall Rule to ensure the traffic is blocked procedure, below.
The following steps use the Cisco ASDM-IDM Launcher, CLI commands can also be used and are provided here in the reference.
To create a Network Object Group for BARRACUDA_XDR_BLOCK to block traffic
In Cisco ASDM, navigate to Configuration > Firewall > Objects > Network Objects/Groups
Click Add Network Object Group.
In Group Name, type
BARRACUDA_XDR_BLOCK.
The group must be named BARRACUDA_XDR_BLOCK.
We recommend using a non-routable placeholder to avoid accidentally blocking traffic.
Add at least one Network Object to the Network Object Group by doing the following:
In Cisco ASDM, in Existing Network Objects/Groups, click a Network Object.
Select a Network Object.
Click Add.
Click OK.
Repeat step 3 until all the Network Objects you want to add have been added.
Click Save.
Do one of the following:
Add the
BARRACUDA_XDR_BLOCKNetwork Object group to the your existing traffic blocking security rules/policies. This is the most common method.Create a Firewall rule to block traffic by following the procedure below. This method is far less common.
(If required) Create a Firewall rule to block traffic
If you add the BARRACUDA_XDR_BLOCK Network Object group to your existing traffic blocking security rules/policies, you donβt need to create a firewall rule to block traffic and this procedure is not required.
To create a Firewall Rule to ensure the traffic is blocked
In Cisco ASDM, navigate to Configuration > Firewall > Access Rules.
Click Add > Add Access Rule.
Select the traffic handling interface.
In the below areas, select the following:
Action: Deny
Source or Destination: BARRACUDA_XDR_BLOCK
Service: IP
Move the rule above any Allow rules.
Click Apply.
FQDN objects only work with destination matching due to ASA needing to resolve the domain to an IP.
Enable ATR in XDR Dashboard
In Barracuda Managed XDR Dashboard, navigate to ATR Settings > Firewalls.
In the Firewall table, click the Cisco ASA row.
Click Edit Config.
Upload the following data:
External IP (Where the API can be reached)
Admin Username
Admin Password
Click Save.
Contact Us
Barracuda Campus
Barracuda Support