Skip to content

Latest commit

 

History

History
84 lines (43 loc) · 5.14 KB

README.md

File metadata and controls

84 lines (43 loc) · 5.14 KB

Cisco Security Tools

This is a simple repository for scripts that I've written over the years to automate or simplify operations with Cisco Security products.

Most scripts were written to handle specific use cases, but hopefully they can be used as sample/example code.

I'm in the process of documenting the scripts and updating them for Python 3.x. The scripts referenced in this document have been updated.

This is a simple PHP script to look up the UUID of an AMP for Endpoints client based on a given IP address. The script then redirects to the device trajectory of that client.

This was built to provide a pivot into the AMP console for other solutions that were only capable of providing an IP address.

This is a script to take in various threat intelligence feeds from Anomali (formerly ThreatStream) and import the pertinent IP address data into Stealthwatch.

Stealtwatch could then have Custom Security Events to monitor and alarm for traffic to those IPs.

This script has been moved to its own repository in the CiscoSE Organization

This is a script to import MaxMind ASN data into Tags (Host Groups) within Stealthwatch Enterprise, allowing for more granular tuning and identification of network flows.

This set of scripts was created to migrate Checkpoint objects to a Firepower Management Console. These were built to aid customers in migrating from Checkpoint to Firepower.

The CP-to-FMC-Network-Object-Import file will migrate network objects from the Checkpoint SmartConsole

The CP-to-FMC-Service-Object-Import file will migrate service/port objects from the Checkpoint SmartConsole

TODO: Nested objects (Objects of Objects) need some work. Currenty the scripts only import one level.

PLEASE BE CAREFUL WITH THIS ONE
The NetworkObjectDelete file will remove all objects from the FMC which have a specified prefix. Please make sure you specify a prefix, or you WILL delete all objects. "BOGUS_PREFIX" is now the default to prevent accidents.

This is a set of custom HTTP pages for Active Authentication, Block Pages, etc., that use a modern UI and Cisco branding/colors.

This script will go through all of the rules in a Firepower 6.3 Access Control policy and enable logging. You'll first want to make a copy of the target policy in the FMC UI, then select that policy when prompted by the script.

Currently, I haven't found a way to update the "Default Action" log settings, so that's still manual, but this should handle all other rules.

Bulk update capabilities have been added to Firepower in recent releases, so the script now supports this. This massively improves the time it takes for the script to run, so it is enabled by default. However, if you find that your FMC errors out on the API calls, you can disable the option.

These scripts are meant to be very basic examples of how to import Hosts / URLs from a CSV, into an object in the Firepower Management Center.

This is a simple Logstash configuration for the Firepower Syslog format. This config should work with 6.2.3 and prior, and it should also now support the new syslog format for FTD 6.3

This script will export an Access Control Policy from the FMC into a CSV file. Just run the script, and you'll get prompted for the FMC IP/Username/Password. The script will connect to the FMC, then list all of the Access Control policies and allow you to pick which one you want to export.

This is a collection of files that can be used to augment the behavior of portals within ISE.

This script has been moved to its own repository in the CiscoSE Organization

This is a script to import Microsoft Office 365 address space into Tags (Host Groups) within Stealthwatch Enterprise, allowing for more granular tuning and identification of network flows.

This is a collection of scripts that can be used to manipulate exporters in Stealthwatch. The getExporters script will grab all exporter IPs from Stealthwatch, and export them to a CSV file. The bulkDeleteExporters script is meant to be used when cleaning up decomissioned routers/firewalls/switches - it will remove all exporters (sans FlowSensors) that are not explicitly defined in a whitelist.

These are decent examples of how to leverage the REST API code within Stealthwatch.

This script has been moved to its own repository in the CiscoSE Organization

This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Custom Security Event (CSE) to alert on traffic to the blacklisted IPs.