Connecting ESA or WSA to Secure Malware Analytics Appliance
Connections between the Secure Malware Analytics Appliance and Cisco Email Security Appliances (ESA) or Web Security Appliances (WSA) are enabled by the Cisco Sandbox API (CSA API) and are often referred to as CSA Integrations. The ESA/WSA must be registered with the Secure Malware Analytics Appliance before it can submit samples for analysis.
Before the ESA/WSA can be registered with the Secure Malware Analytics Appliance, the ESA/WSA administrator must first set up the SSL certificate connection as appropriate for their appliance and their network environment.
ESA/WSA Documentation
See the instructions for Enabling and Configuring File Reputation and Analysis Services in the ESA/WSA product documentation:
Note |
The Secure Malware Analytics Appliance is often referred to as an analysis service, or private cloud file analysis server in these guides. |
Inbound Connection Overview
When setting up an inbound connection, the following tasks must be performed:
Note |
Secure Malware Analytics can only communicate with one environment, which can be either a cluster or a standalone SMA appliance. If the environment is a cluster, all nodes in the cluster must be added. |
-
Set Up SSL Certificate - The Secure Malware Analytics Appliance SSL certificate SAN (Subject Alternative Name), or the CN (Common Name) needs to match the hostname and the ESA/WSA expectations; for a successful connection with an integrating ESA/WSA, this must be the same hostname by which the integrating ESA/WSA identifies the Secure Malware Analytics Appliance.
Depending on your requirements, you may need to regenerate the self-signed SSL certificate on the Secure Malware Analytics Appliance so it uses the current hostname in the SAN/CN field, then download it to your working environment and upload and install it onto the integrating ESA/WSA.
Alternatively, you may need to replace the current Secure Malware Analytics Appliance SSL certificate by uploading an enterprise or commercial SSL certificate (or a manually generated certificate). For detailed instructions, see Replacing SSL Certificates.
-
Verify Connectivity - Once the SSL certificate setup is complete, the next step is to verify that the ESA/WSA can communicate with the Secure Malware Analytics Appliance. The ESA/WSA must be able to connect to the Clean interface of the Secure Malware Analytics Appliance over your network. Follow the instructions in the product documentation to verify that the Secure Malware Analytics Appliance and ESA/WSA can communicate with each other (see ESA/WSA Documentation).
-
Complete the ESA/WSA File Analysis Configuration - Enable the File Analysis Security service and configure the advanced settings.
-
Register ESA/WSA with Secure Malware Analytics Appliance - An ESA/WSA that is configured according to the product documentation, registers itself automatically with the Secure Malware Analytics Appliance. Upon registration of the connecting device, a new Secure Malware Analytics user is automatically created with the Device ID as the login ID, and a new organization is created with a name based on the same ID. An administrator must activate the new Device user account.
-
Activate the New ESA/WSA Account on the Secure Malware Analytics Appliance - When the ESA/WSA or other integration connects and registers itself with the Secure Malware Analytics Appliance, a new Secure Malware Analytics user account is automatically created. The initial status of the user account is de-activated. A Secure Malware Analytics Appliance administrator must manually activate the device user account before it can be used for submitting malware samples for analysis.
Configuring Inbound Connection
The connection between the ESA/WSA is incoming from the perspective of the Secure Malware Analytics Appliance, and uses the CSA API.
Note |
Refer to the ESA and WSA product documentation for more information about the tasks that must be performed. |
Procedure
Step 1 |
Set up and configure the Secure Malware Analytics Appliance as normal (no integration yet). |
||
Step 2 |
Check for updates and install, if necessary. |
||
Step 3 |
Set up and configure the ESA/WSA as normal (no integration yet). |
||
Step 4 |
The Secure Malware Analytics Appliance SSL certificate SAN or CN must match its current Hostname and ESA/WSA Expectations. If you are deploying a self-signed SSL certificate, generate a new SSL certificate (on the Secure Malware Analytics Application Clean interface), to replace the default if needed, and download it to install on the ESA/WSA (see Replacing SSL Certificates).
|
||
Step 5 |
Verify that the ESA/WSA can connect to the Clean interface of the Secure Malware Analytics Appliance over your network. |
||
Step 6 |
Configure the ESA/WSA for Secure Malware Analytics Appliance integration. See the ESA/WSA product documentation for complete instructions. |
||
Step 7 |
Submit and commit your changes. Registration of your ESA/WSA with the Secure Malware Analytics Appliance occurs automatically when you submit the configuration for File Analysis. |
||
Step 8 |
Activate the new device user account on the Secure Malware Analytics Appliance:
The ESA/WSA can now initiate connections with the Secure Malware Analytics Appliance. |