Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Table of Contents

Overview

We are providing you with the steps to integrate your Akamai with Seceon SIEM so One can have Comprehensive visibility and Proactive Threat Detection in your Environment. There will be a log transfer between your firewall to APE(Analytics and Policy Engine) via CCE (Collection and Control Engine ).

Steps Of Configuration

Step 1. Navigate to Provisioning by clicking on the Provisioning tab located in the top menu bar of the application.

...

Step 2. Drop down Add on devices by clicking on the downward-facing arrow next to the 'Add on devices' option in the menu.

...

Pre-requisite

Akamai SIEM setting Configuration: https://techdocs.akamai.com/siem-integration/docs/akamai-siem-integration-for-splunk-and-cef-syslog

Create Authorization Creds: https://techdocs.akamai.com/developer/docs/set-up-authentication-credentials

...

To add the Akamai support, follow the steps that are mentioned below.

...

{"host": "<host>", "access_token": "<access_token>" ,"config_id": "<config _id>"}

  • Click on the Save button.

Varification

STEP 1:Log in to UI >> SYSTEM

...

STEP 2: >> Logs and flows collection status

...

STEP 3: >>To verify the source device IP from the UI:

  • Log in to the user interface

  • Navigate to the "SYSTEM" section

  • Look for the "SOURCE DEVICE IP"

  • Check the IP address that is displayed

  • Compare the IP address displayed against the expected source device IP

This will allow you to ensure that the system is properly identifying the source device IP and that it matches the expected IP address..

...