Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook allows blocking/unblocking of IPs in Cisco ASA, using Access Rules which will be created on an interface.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | CiscoASA |
| Source | View on GitHub |
📄 Source: CiscoASA-CreateInboundAccessRuleOnInterface/readme.md
This playbook allows blocking/unblocking of IPs in Cisco ASA, using Access Rules which will be created on an interface.
When a new Sentinel incident is created, this playbook gets triggered and performs below actions
1. For the IPs we check if they are already directly blocked by an access rule on the interface
2. An adaptive card is sent to a Teams channel with information about the incident and giving the option to ignore an IP, or depdening on it's current status block it by adding an access rule or unblock it by removing an access rule
3. Comment is added to Microsoft Sentinel incident.

Inbound access rule is added in Cisco ASA:

Playbook overview:

Once deployment is complete, you will need to authorize each connection. 1. Click the Microsoft Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save 6. Repeat steps for other connections such as Teams and Cisco ASA (For authorizing the Cisco ASA API connection, the username and password needs to be provided)
The Teams channel to which the adaptive card will be posted will need to be configured. 1. Click the Azure Logic app resource 2. Edit the Logic App 3. Find the 'PostToTeams' action 4. Select a Team and Channel 5. Save the Logic App
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊