Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook allows blocking/unblocking of IPs in Cisco ASA, using Access Control Entries which will be created in an access control list.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | CiscoASA |
| Source | View on GitHub |
📄 Source: CiscoASA-CreateACEInACL/readme.md
This playbook allows blocking/unblocking of IPs in Cisco ASA, using Access Control Entries which will be created in an access control list.
When a new Sentinel incident is created, this playbook gets triggered and performs below actions
1. For the IPs we check if they are already directly blocked by an access control entry in the access control list
2. An adaptive card is sent to a Teams channel with information about the incident and giving the option to ignore an IP, or depdening on it's current status block it by adding an access control entry or unblock it by removing an access control entry
3. Comment is added to Microsoft Sentinel incident.

ACE is added to an ACL in Cisco ASA:

Playbook overview:

Once deployment is complete, you will need to authorize each connection. 1. Click the Microsoft Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save 6. Repeat steps for other connections such as Teams and Cisco ASA (For authorizing the Cisco ASA API connection, the username and password needs to be provided)
The Teams channel to which the adaptive card will be posted will need to be configured. 1. Click the Azure Logic app resource 2. Edit the Logic App 3. Find the 'PostToTeams' action 4. Select a Team and Channel 5. Save the Logic App
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊