NewDevice type

The following table describes the elements in the NewDevice type object:

Element

Type

Description

BrandMandatory

String

Device brand. Values include:

  • fortigate. Fortinet FortiGate
  • ios. Cisco IOS routers
  • junos. SRX
  • nexus. Cisco Nexus routers
  • nsc. Juniper NetScreen
  • paloalto. Palo Alto
  • asa. Cisco firewalls
DisplayNameOptional

String

Display name of the device.

NameOptional

String

Tree name of the device.

HostNameMandatory

String

Host name of the device.

UserNameMandatory

String

Name of user.

PasswordMandatory

String

Password of user.

ConnectionType Mandatory

String

Type of connection. Possible values:

  • SSH
  • telnet
FW_TYPEMandatory

String

Device type. Possible values:

  • FW_GEN - Cisco Nexus routers, Juniper SRX, Fortinet FortiGate, and Palo Alto
  • FW_IOS - Cisco IOS routers
  • FW_NSC - Juniper Netscreen
  • FW_ASA - Cisco firewalls
RulesViewOptional

String

View of rules. Relevant only for Cisco firewalls.

Possible values:

  • ASDM
  • CLI
MonitoringOptional

String

Monitoring.

Possible values:

  • yes
  • no
CollectorOptional

String

If Geographical Distribution is not enabled, enter 'Central Manager'. If it is enabled, enter the name of the collector.

LogCollectionModeOptional

String

Mode of log collection.

Possible values:

  • none
  • standard
  • extensive

For Cisco firewalls, if only hit-counters are required (and no traffic logs), set to 'none'.

LogCollectionFrequencyOptional

String

Value in minutes. Default is 60.

CollectLogOptional

String

Enable log collection.

Possible values:

  • yes
  • no
CollectLogFromOptional

String

Log server type for traffic logs.

Possible values:

  • [blank] - No log collection
  • syslog - Syslog NG Server
  • nsm - Juniper NSM - Relevant only for NetScreen devices
CollectLogFromAdtOptional

String

Log server type for audit logs.

Possible values:

  • [blank] - No log collection
  • syslog - Syslog NG Server
  • nsm - Juniper NSM - Relevant only for NetScreen devices
LogHostNameOptional

String

Host name of the traffic log server.

LogUserNameOptional

String

Username to connect to the traffic log server.

LogHostNameAdtOptional

String

Host name of the audit log server.

LogUserNameAdtOptional

String

Username to connect to the audit log server.

LogPassword Optional String Password to connect to the traffic log server.
LogPasswordAdtOptional

String

Password to connect to the audit log server.

AdditionalFwIDsOptional

String

Additional device identifiers.

FirewallUsersOptional

String

Users to have permissions to this device.

SeparateVrfsOptional

String

Enable VRF separation. Relevant for Cisco routers only. Default and recommended value is 'yes'.

FullAnalysisOptional

String

Enable policy analysis. Relevant for Cisco routers only. Default and recommended value for routers with no ACLs is 'no'.

SshPort Optional String The port used to connect via SSH.
BaselineProfile Optional String The baseline profile you want the new device to use by default.
EnableUserName Optional String Username used for advanced mode. Relevant for Cisco routers only.
EnablePassword Optional String Password used for advanced mode. Relevant for Cisco routers only.

Note:

Support for the Forcepoint brands (Sidewinder, StoneGate) and Hillstone was deprecated in ASMS version A30.00. As of A32.20, AlgoSec no longer supports adding new Symantec Blue CoatClosed As of A32.20 AlgoSec will no longer support adding new Symantec Blue Coat devices. Existing deployed Blue Coat devices will still be functional. devices.

If you had defined these devices in an earlier version of ASMS, these devices are still available to you, with all the existing capabilities, but you cannot add new ones.

We recommend backing up device data before or after upgrading and then removing these devices from AFA. Make sure to download any report zip files for the device before deleting.

For more details, see View an earlier report for a specific device and the relevant AlgoPedia KB article.

 

â See also: