Skip to main content

 

 

Cisco Defense Orchestrator

Onboard an ASA Device

Prerequisites

Device Prerequisites

Device Certificate Prerequisite

If your ASA device does not have a compatible certificate, onboarding the device may fail. Ensure the following requirements are met:

  • The device uses a TLS version equal to or greater than 1.0.
  • The certificate presented by the device is not expired, and its issuance date is in the past (i.e. it is already valid, not scheduled to become valid at a later date). 
  • The certificate must be a SHA256 certificate. SHA1 certificates are not accepted.
  • One of these conditions is true:
    • The device uses a self-signed certificate, and it is the same as the most recent one trusted by an authorized user.
    • The device uses a certificate signed by a trusted Certificate Authority (CA), and provides a certificate chain linking the presented leaf certificate to the relevant CA.

Open SSL Cipher Prerequisite

If the device does not have a compatible SSL cipher suite, the device cannot successfully communicate to the Secure Device Connector (SDC). Use any of the following cipher suites:

  • ECDHE-RSA-AES128-GCM-SHA256
  • ECDHE-ECDSA-AES128-GCM-SHA256
  • ECDHE-RSA-AES256-GCM-SHA384
  • ECDHE-ECDSA-AES256-GCM-SHA384
  • DHE-RSA-AES128-GCM-SHA256
  • ECDHE-RSA-AES128-SHA256
  • DHE-RSA-AES128-SHA256
  • ECDHE-RSA-AES256-SHA384
  • DHE-RSA-AES256-SHA384
  • ECDHE-RSA-AES256-SHA256
  • DHE-RSA-AES256-SHA256

If the cipher suite you use on your ASA is not in this list, the SDC does not support it and you will need to update the cipher suite on your ASA.

Procedure

Use this procedure to onboard a live ASA device, not an ASA model, to CDO:

  1. Navigate to the Devices & Services page.
  2. Click Onboard.
  3. Click Add an ASA device.
  4. Give the device a name.
  5. Enter the location (IP address or URL) of the device or service. The default port is 443.
  6. Once the location of the device or service is verified, enter the username and password of the ASA administrator, or similar highest-privilege ASA user, that CDO will use to connect to the device. 
  7. (Optional) Enter a label for the device. You will be able to filter your list of devices by this label. See Labels and Label Groups for more information.
  8. After labeling your device or service, you can view it in the Devices & Services list.

Note: Depending on the size of the configuration and the number of other devices or services, it may take some time for the configuration to be analyzed.

About Onboarding an ASA that is Part of a High Availability Pair

When onboarding an ASA that is part of a high-availability pair, you only need to onboard the primary device of the pair.

Troubleshooting

Cannot onboard ASA due to certificate error

Environment: ASA is configured with client-side certificate authentication.

Solution: Disable client-side certificate authentication.

Details: ASAs support credential-based authentication as well as client-side certificate authentication. CDO cannot connect to ASAs that use client-side certificate authentication. Before onboarding your ASA to CDO, make sure it does not have client-certificate authentication enabled by using this procedure:

  1. Open a terminal window and connect to the ASA using SSH.
  2. Enter global configuration mode.
  3. At the hostname (config)# prompt, enter this command: 

no ssl certificate-authentication interface interface-name port 443

The interface name is the name of the interface CDO connects to.

  • Was this article helpful?