Connecting ESA or WSA to Threat Grid Appliance
Connections between the Threat Grid Appliance and Cisco Email Security Appliances (ESA) or Web Security Appliances (WSA) are enabled by the Cisco Sandbox API (CSA API) and are often referred to as CSA Integrations. The ESA/WSA must be registered with the Threat Grid Appliance before it can submit samples for analysis.
Before the ESA/WSA can be registered with the Threat Grid Appliance, the ESA/WSA administrator must first set up the SSL certificate connection as appropriate for their appliance and their network environment.
ESA/WSA Documentation
See the instructions for Enabling and Configuring File Reputation and Analysis Services in the ESA/WSA product documentation:
Note |
The Threat Grid Appliance is often referred to as an analysis service, or private cloud file analysis server in these guides. |
Inbound Connection Overview
When setting up an inbound connection, the following tasks must be performed:
-
Set Up SSL Certificate - The Threat Grid Appliance SSL certificate SAN (Subject Alternative Name), or the CN (Common Name) needs to match the hostname and the ESA/WSA expectations; for a successful connection with an integrating ESA/WSA, this must be the same hostname by which the integrating ESA/WSA identifies the Threat Grid Appliance.
Depending on your requirements, you may need to regenerate the self-signed SSL certificate on the Threat Grid Appliance so it uses the current hostname in the SAN/CN field, then download it to your working environment and upload and install it onto the integrating ESA/WSA.
Alternatively, you may need to replace the current Threat Grid Appliance SSL certificate by uploading an enterprise or commercial SSL certificate (or a manually generated certificate). For detailed instructions, see Configuring SSL Certificates for Inbound Connections.
-
Verify Connectivity - Once the SSL certificate setup is complete, the next step is to verify that the ESA/WSA can communicate with the Threat Grid Appliance. The ESA/WSA must be able to connect to the Clean interface of the Threat Grid Appliance over your network. Follow the instructions in the product documentation to verify that the Threat Grid Appliance and ESA/WSA can communicate with each other (see ESA/WSA Documentation).
-
Complete the ESA/WSA File Analysis Configuration - Enable the File Analysis Security service and configure the advanced settings.
-
Register ESA/WSA with Threat Grid Appliance - An ESA/WSA that is configured according to the product documentation, registers itself automatically with the Threat Grid Appliance. Upon registration of the connecting device, a new Threat Grid user is automatically created with the Device ID as the login ID, and a new organization is created with a name based on the same ID. An administrator must activate the new Device user account.
-
Activate the New ESA/WSA Account on the Threat Grid Appliance - When the ESA/WSA or other integration connects and registers itself with the Threat Grid Appliance, a new Threat Grid user account is automatically created. The initial status of the user account is de-activated. A Threat Grid Appliance administrator must manually activate the device user account before it can be used for submitting malware samples for analysis.
Configuring Inbound Connection
The connection between the ESA/WSA is incoming from the perspective of the Threat Grid Appliance, and uses the CSA API.
Note |
Refer to the ESA and WSA product documentation for more information about the tasks that must be performed. |
Procedure
Step 1 |
Set up and configure the Threat Grid Appliance as normal (no integration yet). |
||
Step 2 |
Check for updates and install, if necessary. |
||
Step 3 |
Set up and configure the ESA/WSA as normal (no integration yet). |
||
Step 4 |
The Threat Grid Appliance SSL certificate SAN or CN must match its current Hostname and ESA/WSA Expectations. If you are deploying a self-signed SSL certificate, generate a new SSL certificate (on the Threat Grid Application Clean interface), to replace the default if needed, and download it to install on the ESA/WSA (see Replacing SSL Certificates).
|
||
Step 5 |
Verify that the ESA/WSA can connect to the Clean interface of the Threat Grid Appliance over your network. |
||
Step 6 |
Configure the ESA/WSA for Threat Grid Appliance integration. See the ESA/WSA product documentation for complete instructions. |
||
Step 7 |
Submit and commit your changes. Registration of your ESA/WSA with the Threat Grid Appliance occurs automatically when you submit the configuration for File Analysis. |
||
Step 8 |
Activate the new device user account on the Threat Grid Appliance:
The ESA/WSA can now initiate connections with the Threat Grid Appliance. |