Isapre Cruz Blanca
Isapre Cruz Blanca
Isapre Cruz Blanca
Defense (FTD)
Configuration and Troubleshooting Best
Practices for the Next-Generation Firewall
(NGFW), Next-Generation Intrusion
Prevention System (NGIPS), and Advanced
Malware Protection (AMP)
Nazmul Rajib
Cisco Press
800 East 96th Street
Published by:
Cisco Press
800 East 96th Street
Indianapolis, IN 46240 USA
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any
means, electronic or mechanical, including photocopying, recording, or by any information storage
and retrieval system, without written permission from the publisher, except for the inclusion of brief
quotations in a review.
1 17
ISBN-13: 978-1-58714-480-6
ISBN-10: 1-58714-480-8
The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc.
shall have neither liability nor responsibility to any person or entity with respect to any loss or damages
arising from the information contained in this book or from the use of the discs or programs that may
accompany it.
The opinions expressed in this book belong to the author and are not necessarily those of Cisco
Systems, Inc.
iii
Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been
appropriately capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this
information. Use of a term in this book should not be regarded as affecting the validity of any trademark
or service mark.
Special Sales
For information about buying this title in bulk quantities, or for special sales opportunities
(which may include electronic versions; custom cover designs; and content particular to your business,
training goals, marketing focus, or branding interests), please contact our corporate sales department at
corpsales@pearsoned.com or (800) 382-3419.
For questions about sales outside the U.S., please contact intlcs@pearson.com.
Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book
is crafted with care and precision, undergoing rigorous development that involves the unique expertise of
members from the professional technical community.
Readers' feedback is a natural continuation of this process. If you have any comments regarding how we
could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us
through email at feedback@ciscopress.com. Please make sure to include the book title and ISBN in your
message.
Alliances Manager, Cisco Press: Ron Fligge Technical Editors: John Groetzinger, Foster Lipkey
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks,
go to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does
not imply a partnership relationship between Cisco and any other company. (1110R)
iv Cisco Firepower Threat Defense (FTD)
Foster Lipkey is a member of the Global TAC Security Technical Leadership team.
He has been supporting Firepower technologies since 2012. He is responsible for
many automated tools leveraged by the Global Technical Assistance Center (TAC).
Prior to working for Sourcefire and Cisco, he was an application solution specialist for
the National Cancer Institute (NCI), supporting Java Enterprise applications for the
NCI Center for Biomedical Informatics and Information Technology (CBIIT). Foster’s
primary areas of interest are enterprise security and security automation. He was a
technical editor of Cisco Next-Generation Security Solutions: All-in-One Cisco ASA
FirePOWER Services, NGIPS, and AMP.
vi Cisco Firepower Threat Defense (FTD)
Dedication
I am me, because of…
My grandparent’s blessings
My mom’s inspiration
My dad’s support
My wife’s devotion
My children’s love
My teacher’s advice
Acknowledgments
Thank you, God, for giving me the ability to write this book.
I am grateful to two technical support managers of the Cisco Global Technical Services
team, Andrew Firman and Maurice Spencer, for their encouragement and support
throughout the process of authoring this book.
I appreciate the time Principal Engineer Gonzalo Salgueiro took to review the draft
proposal for this book. Many thanks to Senior Vice President Tom Berghoff and
Senior Director Marc Holloman for sending me their words of appreciation for writing
this book.
Finally, I recognize all of the editors at Pearson Education and Cisco Press for working
with me diligently and keeping me on track to get this book published.
viii Cisco Firepower Threat Defense (FTD)
Contents at a Glance
Introduction xxv
Chapter 20 Controlling File Transfer and Blocking the Spread of Malware 577
Appendixes
Appendix A Answers to the Review Questions 707
Appendix B Generating and Collecting Troubleshooting Files Using the GUI 713
Appendix C Generating and Collecting Troubleshooting Files Using the CLI 717
Index 721
x Cisco Firepower Threat Defense (FTD)
Contents
Introduction xxv
FTD Software 60
Firmware 60
Web User Interfaces 61
Best Practices for FTD Installation on Firepower Hardware 62
Installing and Configuring FTD 64
Fulfilling Prerequisites 64
Deleting Any Existing Logical Devices 64
Upgrading the FXOS Software 65
Enabling Interfaces 67
Installing FTD 71
Uploading the FTD Software Image 72
Adding a Logical Device for FTD 73
Completing the Initialization of FTD 77
Verification and Troubleshooting Tools 79
Navigating to the FTD CLI 79
Verifying the FXOS Software 81
Verifying the Status of a Security Application 82
Verifying the Security Modules, Adapters, and Switch Fabric 84
Verifying the Hardware Chassis 87
Verifying the Power Supply Unit (PSU) Modules 90
Verifying the Fan Modules 92
Summary 94
Quiz 94
Chapter 20 Controlling File Transfer and Blocking the Spread of Malware 577
File Policy Essentials 577
File Type Detection Technology 579
Malware Analysis Technology 579
Licensing Capability 582
Best Practices for File Policy Deployment 583
Fulfilling Prerequisites 584
Configuring a File Policy 586
Creating a File Policy 586
Applying a File Policy 592
Contents xxi
Appendix B Generating and Collecting Troubleshooting Files Using the GUI 713
Generating Troubleshooting Files with the GUI 713
Appendix C Generating and Collecting Troubleshooting Files Using the CLI 717
Generating Troubleshooting Files at the FTD CLI 717
Downloading a File by Using the GUI 718
Copying a File by Using the CLI 719
Generating Troubleshooting Files at the FMC CLI 719
Index 721
xxiii
Reader Services
Register your copy at www.ciscopress.com/title/9781587144806 for convenient access
to downloads, updates, and corrections as they become available. To start the registra-
tion process, go to www.ciscopress.com/register and log in or create an account*. Enter
the product ISBN 9781587144806 and click Submit. When the process is complete, you
will find any available bonus content under Registered Products.
*Be sure to check the box that you would like to hear from us to receive exclusive
discounts on future editions of this product.
xxiv Cisco Firepower Threat Defense (FTD)
■ Boldface indicates commands and keywords that are entered literally as shown. In
actual configuration examples and output (not general command syntax), boldface
indicates commands that are manually input by the user (such as a show command).
■ Braces within brackets ([{ }]) indicate a required choice within an optional element.
xxv
Introduction
Cisco introduces next-generation security technologies in the unified Firepower
Threat Defense (FTD) software. It offers the Next-Generation Firewall (NGFW), Next-
Generation Intrusion Prevention System (NGIPS), Advanced Malware Protection (AMP),
and many more features—all in a single software image.
This book provides best practices, demonstrates configurations, analyzes debugs, and
illustrates GUI screenshots from real-world deployment scenarios. It empowers you to
configure your own Firepower system with confidence. The book summarizes complex
operations in a simple flowchart, and presents many diagnostic tools that allow you to
investigate any potential technical issues by yourself. In other words, it could serve you
as a “personal technical support engineer.”
This book is an important resource to channel partners and managed security service
providers (MSSPs) who want to provide technical support to their own customers.
Any students or candidates who want to take a Cisco security certification exam will
find valuable information in this book. This book covers Firepower next-generation
security-related topics that are included in the CCNA Security, CCNP Security, and CCIE
Security exam curricula.
This book is not a replacement for an official Cisco Firepower publication, such as a user
guide or an installation guide. It is, rather, a supplement to the official publications.
■ Chapter 6, “The Firepower Management Network”: This chapter describes the best
practices for designing and configuring a management network for the Firepower
System. It also discusses the tools you can use to verify any communication issues
between the management interfaces of the FMC and FTD. Before you begin the
registration process, which is described in Chapter 7, you must ensure that the FMC
and FTD are successfully connected through your network.
■ Chapter 10, “Capturing Traffic for Advanced Analysis”: This chapter describes the
processes involved in capturing live traffic on an FTD device by using the system-
provided capturing tool. To demonstrate the benefit of the tool, this chapter shows
how to use various tcpdump options and BPF syntaxes to filter and manage packet
capture.
■ Chapter 11, “Blocking Traffic Using Inline Interface Mode”: This chapter demon-
strates how to configure an FTD device in Inline Mode, how to enable fault tolerance
features on an inline set, and how to trace a packet in order to analyze the root cause
of a drop. This chapter also describes various command-line tools that you can use
to verify the status of an interface, an inline pair, and an inline set.
■ Chapter 12, “Inspecting Traffic Without Blocking It”: This chapter explains the
configuration and operation of various detection-only modes of an FTD device,
such as Passive Mode, Inline Tap Mode, and Inline Mode with the Drop When Inline
option disabled. It also provides various command-line tools that you can use to
determine the status of interfaces and traffic.
■ Chapter 13, “Handling Encapsulated Traffic”: This chapter shows you how to ana-
lyze and block traffic that is encapsulated with the GRE protocol. This chapter also
demonstrates the steps to bypass an inspection when the traffic is transferred over a
tunnel. Besides showing configurations, this chapter also shows various tools to ana-
lyze an action applied by the Prefilter and Access Control policy of an FTD device.
■ Chapter 14, “Bypassing Inspection and Trusting Traffic”: This chapter discusses
the techniques to bypass an inspection. It provides the steps to configure different
methods. The chapter also analyzes the flows of bypassed packets to demonstrate
how an FTD device acts during different bypassing options. You will learn how to
use various debugging tools to determine whether the bypass process is working as
designed.
■ Chapter 15, “Rate Limiting Traffic”: This chapter goes through the steps to config-
ure QoS policy on an FTD device. It also provides an overview to the common rate-
limiting mechanisms and the QoS implementation on an FTD device. This chapter
also provides the command-line tools to verify the operation of QoS policy in an
FTD device.
■ Chapter 17, “Blocking a Domain Name System (DNS) Query”: This chapter demon-
strates various techniques to administer DNS queries using a Firepower DNS policy.
Besides using traditional access control rules, an FTD device can incorporate the
Cisco Intelligence Feed and dynamically blacklist suspicious domains. This chapter
xxviii Cisco Firepower Threat Defense (FTD)
shows various ways to configure and deploy a DNS policy. This chapter also demon-
strates several command-line tools you can run to verify, analyze, and troubleshoot
issues with DNS policy.
■ Chapter 18, “Filtering URLs Based on Category, Risk, and Reputation”: This chap-
ter describes techniques to filter traffic based on the category and reputation of a
URL. It illustrates how a Firepower system performs a URL lookup and how an FTD
device takes action based on the query result. This chapter explains the connection
to a URL through debugging messages, which is critical for troubleshooting.
■ Chapter 20, “Controlling File Transfer and Blocking the Spread of Malware”:
Cisco integrates the Advanced Malware Protection (AMP) technology with the
Firepower technology. This chapter explains how the technologies work together
to help you detect and block the spread of infected files across your network. In
this chapter, you will learn the configurations and operations of a file policy on a
Firepower system. This chapter also demonstrates various logs and debugging mes-
sages, which are useful for determining issues with cloud lookup and file disposition.
History of Sourcefire
Cisco acquired Sourcefire in 2013. At that time, Sourcefire was one of the top leaders in
the cybersecurity industry for its intrusion detection system (IDS), intrusion prevention
system (IPS), and next-generation firewall (NGFW) solutions. The Sourcefire IPS was
based on Snort, an open source network intrusion detection and prevention system. In
fact, Martin Roesch, the creator of Snort, founded Sourcefire in 2001.
Since acquiring Sourcefire, Cisco has leveraged its technologies on various existing Cisco
appliances, such as ASA 5500-X Series and Integrated Services Router (ISR) devices.
Cisco has also released new hardware platforms, such as the Firepower 2100 Series, 4100
Series, and 9300 Series, which also implement the Sourcefire technologies. Integration
of the Sourcefire technologies has made Cisco one of the leaders in the Gartner Magic
Quadrant for IDS and IPS. Gartner is an advisory company that performs research on
various branches of information technology and publishes numerous research papers
every year.
Figure 1-1 shows the Cisco leadership position in the IDS and IPS spaces since the
Sourcefire acquisition. This graphic was published by Gartner, Inc. as part of a larger
research document and should be evaluated in the context of the entire document. The
Gartner document is available upon request from Cisco. Go to cisco.com/go/ngips.
2 Chapter 1: Introduction to the Cisco Firepower Technology
Figure 1-1 Gartner’s Magic Quadrant for IDS and IPS as of January 2017
Note Gartner does not endorse any vendor, product, or service depicted in its research
publications, and does not advise technology users to select only those vendors with
the highest ratings or other designation. Gartner research publications consist of the
opinions of Gartner’s research organization and should not be construed as statements of
fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
Evolution of Firepower
A Firepower System deployment primarily consists of two types of appliances: a manage-
ment appliance and a sensor. Basically, a sensor inspects network traffic and sends any
events to its management appliance. A management appliance, as the name implies, man-
ages all kinds of security policies for a sensor.
Sourcefire originally had two different software trains—Version 4.x (primarily for IPS)
and Version 5.x (with NGFW functionalities). Depending on the software train, the man-
agement appliance had two different names. In Version 4.x, it was known as Sourcefire
Defense Center. In Version 5.x, it was known as FireSIGHT System or FireSIGHT
Management Center (FMC). Similarly, a sensor was known as a 3D sensor in Version 4.x
and a FirePOWER appliance in Version 5.x. Therefore, it would be correct to say that, in
Version 4.x, the Sourcefire Defense Center manages the 3D sensors, whereas in Version
5.x, the FireSIGHT Management Center manages the FirePOWER appliances.
Security Engineer
Analyzes Event Report
Management
Appliance
Applies Management Sensors Send
Policies to Appliance Events to the
the Sensors Management
Appliance
Endpoints
Some examples of new Firepower products are the Cisco Firepower 9300 appliance hard-
ware and the Cisco FTD software. Similarly, Cisco FirePOWER 8000 Series appliances
have been available since the pre-acquisition period.
4 Chapter 1: Introduction to the Cisco Firepower Technology
2013
2014
Classic FirePOWER 2015
7000 Series and
FirePOWER Services 2016
8000 Series Firepower Threat
on ASA 5500-X
Appliances, VMware Defense on ASA 2017
5500-X (Excludes Firepower Threat
5585-X), Firepower Defense on
9300, VMware, Firepower Threat
Firepower 4100
Amazon Web Defense on
Series
Services (AWS) Firepower 2100
Series
Table 1-1 shows various names of management appliances in different software versions.
Figure 1-4 shows the login page for a management appliance running Version 5.x.
This page displays the legacy name FireSIGHT and the Sourcefire Support contact
information.
Figure 1-5 shows the login page of a management appliance running Version 6.x. As
you can see, this version displays the name Firepower and does not provide the legacy
Sourcefire Support contact information.
Despite the differences already mentioned, the login pages for Version 5.x and 6.x look
almost identical. As you can see in Figure 1-6, the Defense Center login page for Version
4.x is totally different from the login pages for Version 5.x or 6.x.
History of Sourcefire 5
Figure 1-4 The Login Page for FireSIGHT Management Center Running Version 5.x
Figure 1-5 The Login Page for Firepower Management Center Running Version 6.x
6 Chapter 1: Introduction to the Cisco Firepower Technology
Figure 1-6 The Login Page for Defense Center Running Version 4.x
Figure 1-7 illustrates the convergence of Cisco ASA software with Sourcefire
FirePOWER software into the FTD code. Due to this convergence, FirePOWER Services
no longer runs as a separate service module, which reduces overhead and increases
efficiency.
Firepower Threat Defense (FTD) 7
Sourcefire
FirePOWER
Software
Firepower
Cisco ASA Threat New
Software Defense Features
(FTD)
Note This book is written based on Firepower Version 6.1 running on FTD. Although this
book uses the ASA 5500-X Series hardware, managed using the Firepower Management
Center (FMC), you can still apply this knowledge on other platforms running Firepower
technologies.
■ Firepower core software: The core part of the software includes the Snort
engine for intrusion detection and prevention, a web server for the graphical user
interface (GUI), a database to store events, firmware for the hardware, and so on.
The core software image for the Firepower System depends on the hardware
platform you are using.
■ Snort/Sourcefire rules: The Snort engine uses a special ruleset to detect and pre-
vent intrusion attempts. Each rule considers certain conditions. When a packet goes
through a sensor and matches a condition in a Snort rule, the Snort engine takes the
appropriate action.
System uses the fingerprints to discover the application, service, and OS running on
a network host, and then it correlates the application and network discovery data
with the vulnerability information on a VDB.
Figure 1-8 illustrates the various software components installed on the Firepower
System. All these software components are explained in later chapters of this book.
Geolocation Firepower
Database License
Firepower Cisco
Core Software Cloud
Security
Third Party ClamAV
Intelligence
Integration Signature
Feed
■ URL filtering database: The Firepower System can categorize websites based on
their targeted audiences or business purposes. To give you more granular control,
the system also enables you to control access to a certain type of website, based on
its reputation or known risk level. All this information is stored in the URL filtering
database. Unlike with Firepower software components, any updates for the URL
filtering database are provided directly through the Cisco cloud, so your FMC must
be connected to the Internet.
■ Security Intelligence Feed: Talos, the Cisco threat intelligence team, is continuously
researching the Internet to identify potential malicious IP addresses, domain names,
and URLs. For Firepower System users, Talos shares intelligence data through the
Security Intelligence Feed. The FMC can download the feed directly from the cloud.
Firepower Threat Defense (FTD) 9
■ Local malware detection: With a malware license, FTD can detect viruses in your
files. This allows you to block the spread of malware across your network. FTD uses
the ClamAV engine to analyze files locally. The FMC obtains the signatures of the
latest viruses through the local malware detection updates.
■ Integration: You can integrate the Firepower System with various products and tech-
nologies, such as Cisco Identity Services Engine (ISE), Microsoft Windows Active
Directory Server, Event Streamer (eStreamer), and Syslog Server. This empowers you
with unlimited opportunities to monitor and secure your network. (This book focus-
es on core Firepower technologies, and features related to integration are beyond the
scope of this book. Please read the official Firepower user guide to learn more about
integration.)
Table 1-2 summarizes the hardware platforms (available as of this writing) that support
FTD software. All of the following platforms support Version 6.1, except Firepower 2100
Series (Version 6.2.1 or greater) and Microsoft Azure (Version 6.2 or greater).
Figure 1-9 illustrates the placement of various ASA and Firepower platforms in different
types of networking environments. The throughput of appliances varies significantly
depending on the number of enabled features, such as firewall (FW) only, firewall
along with Cisco Application Visibility and Control (AVC), next-generation intrusion
prevention system (NGIPS), URL filtering, SSL decryption, and so on.
10 Chapter 1: Introduction to the Cisco Firepower Technology
Firepower
9000 Series
Firepower
4100 Series
Firepower
2100 Series
ASA 5500-X
Series
Branch Office to Internet Edge Internet Edge to Data Center Service Providers
Note To find out what hardware models support FTD and the throughput of each
hardware model, please check the Cisco Firepower NGFW data sheet at cisco.com or
contact your account representative.
Firepower Accessories
When you open a brand-new Firepower appliance box, you will find various accessories
along with the actual appliance. The accessories are necessary to configure the initial
setup and obtain a license. Figure 1-10 shows an example of the accessories that come
with a Cisco ASA 5506-X appliance:
1 3
2
4 5
Note The accessories in a box are subject to change, depending on various factors. In
your box, you may receive more or fewer items than are shown in this example.
Tip Read the Installation Guide for your appliance model (available at cisco.com) to learn
how to install it into a rack and power it up.
Summary
This chapter discusses the history and evolution of the Cisco Firepower technology. It
introduces various software components that may be installed on the Firepower System.
This chapter also provides a quick overview of the supported hardware for the Cisco
Firepower Threat Defense (FTD) technology.
The next few chapters demonstrate how to install the FTD software on various hardware
platforms. You also learn how to identify hardware-related issues before taking on a more
advanced configuration.
This page intentionally left blank
Chapter 2
If your ASA is currently running FirePOWER Services as a separate module and you
want to deploy Firepower Threat Defense (FTD), you must reimage your ASA with the
unified FTD image. This chapter discusses the steps required to reimage and troubleshoot
any Cisco ASA 5500-X Series hardware.
Figure 2-1 shows the subsets of a Firepower Threat Defense software image that you
install or upgrade on the Cisco ASA 5500-X Series hardware platforms during the FTD
reimaging process:
ROMMON
Boot
Software
Image
(Firmware)
FTD
System
Software
boot image from an external server. If you are reimaging one of the low-end ASA
hardware platforms, such as ASA 5506-X, 5506W-X, 5506H-X, 5508-X, or 5516-X,
you must update the firmware to Release 1.1.8 or greater. If you are running one of
the midrange ASA hardware platforms, such as 5512-X, 5515-X, 5525-X, 5545-X, or
5555-X, and want to reimage it to the FTD software, you do not need to update the
default firmware.
■ Boot image: The FTD boot image is a subset of the FTD system software. After
you load your ASA with an FTD boot image, you can use the CLI of the boot image
to prepare your ASA for downloading the FTD system software and beginning the
setup.
■ System software: All the features of FTD are packaged in a system software image.
You begin the FTD system software installation from the CLI prompt of the boot
image. This is the last step of a basic reimaging process.
Table 2-1 summarizes various types of software that you might have to install to
complete the FTD reimaging process.
■ If you have just received a new ASA 5500-X, it might already have the FTD software
preinstalled. In this case, you just need to update the FTD to the latest release and
complete the configurations. However, reimaging is necessary when the hardware
Best Practices for FTD Installation on ASA Hardware 15
■ You should perform reimaging during a maintenance window because the process
interrupts the network traffic.
■ Prior to the maintenance window when you plan to do the reimaging, make sure you are
able to access the software.cisco.com website and can download all the FTD software.
If needed, register for a Cisco account. If after the self-registration process you cannot
download any of the desired software, you might need to get further assistance from
your Cisco channel partner or the Cisco Technical Assistance Center (TAC).
■ The reimaging process may take about an hour, depending on the hardware model.
However, you should plan for additional time to fulfill any prerequisites.
■ After you download any software from software.cisco.com, always verify the MD5
or SHA512 checksum of the files you have downloaded to confirm that the file is
not corrupt and has not been modified during download. Figure 2-2 shows how the
MD5 and SHA512 checksum values are displayed at software.cisco.com when you
hover your mouse over a filename.
■ Reimaging an ASA with FTD software wipes out all the previous configurations, so
make a backup of the existing configurations before you start the reimaging.
■ Never power off, shut down, or reboot ASA hardware when reimaging is in progress.
A login prompt appears after all the reimaging processes are complete.
■ Read the release notes to determine any known issues and any special requirements
or instructions.
16 Chapter 2: FTD on ASA 5500-X Series Hardware
Figure 2-3 summarizes the steps involved in reimaging ASA 5500-X hardware to the FTD
system software.
• Upgrade the ROMMON software only if the ASA is a low-end hardware model
Step 1 (use the *.SPA file).
• Update the boot image (use the *.lfbff file for low-end hardware and *.cdisk file
Step 2 for midrange hardware).
• Install the system software (for any ASA model, use the *.pkg file).
Step 3
Fulfilling Prerequisites
You must fulfill storage and connectivity requirements before you begin reimaging.
The following are the storage prerequisites:
■ To install FTD software, an ASA requires at least 3 GB free space plus additional
space to store an FTD boot image (which is usually about 100 MB). See the
“Verification and Troubleshooting Tools” section, later in this chapter, to learn how
to determine how much free disk space an ASA has.
■ Make sure the ASA has a solid state drive (SSD) installed. See the “Verification
and Troubleshooting Tools” section, later in this chapter, to learn how to determine
whether an SSD is installed in an ASA.
Caution If you have installed an SSD for the first time or replaced an SSD in midrange
ASA hardware, you must reload your ASA and then reimage or reinstall any software.
Installing and Configuring FTD 17
■ Using a console cable, connect your computer to the console port of the ASA that
you want to reimage.
■ Ensure that you have access to TFTP and HTTP servers. You use the TFTP server to
copy the firmware and boot image files to the ASA during the reimaging process.
You copy the FTD system software from the HTTP server to the ASA. You can use
an FTP server in lieu of an HTTP server, but you might find that a basic HTTP server
is easier to set up.
Figure 2-4 shows a topology in which the management network is segregated from the
data traffic, according to security best practice. An administrator computer is directly
connected to an ASA through a console cable, and it also has access to the management
network.
10.1.1.4
File Server
10.1.1.100
Administrator 10.1.1.11
Firepower
Management Center
(FMC)
Mgmt.
Traffic
10.1.1.21
Firepower Threat
Console Cable Defense (FTD)
Figure 2-4 A Simple Topology in Which an ASA Inspects Data Traffic and Keeps
Management Traffic Isolated
Figure 2-5 shows the simplest topology that provides both console and IP connectivity
between an ASA and a computer and allows an administrator to perform reimaging and
basic configuration.
18 Chapter 2: FTD on ASA 5500-X Series Hardware
10.1.1.4
10.1.1.2
Console Port
Management Interface
Administrator Computer
Firepower Threat
(Also Works as a File Server)
Defense (FTD)
Figure 2-5 The Most Basic Connectivity Between an ASA and a Server for Performing
Reimaging and Basic Setup
Upgrading Firmware
If you plan to reimage a low-end ASA hardware model, such as 5506-X, 5508-X, or
5516-X, to the FTD software, you must make sure that the firmware version of the ASA
is 1.1.8 or greater. See the “Verification and Troubleshooting Tools” section, later in this
chapter, to learn how to determine the firmware version.
Note You do not need to upgrade the default firmware of any midrange ASA hardware
models, such as 5512-X, 5515-X, 5525-X, 5545-X, and 5555-X. Therefore, you can skip
this section if you are running a midrange ASA model.
Follow these steps to upgrade the firmware (ROMMON software) of a low-end ASA
model:
Step 2. Copy the file from your TFTP server to your ASA storage. To copy a file from
a TFTP server to an ASA, run the following command:
Accessing tftp://10.1.1.4/asa5500-firmware-1108.SPA...!!!!!!!!!!!
Done!
Computed Hash SHA2: d824bdeecee1308fc64427367fa559e9
eefe8f182491652ee4c05e6e751f7a4f
5cdea28540cf60acde3ab9b65ff55a9f
4e0cfb84b9e2317a856580576612f4af
Step 3. Once the file is copied successfully, begin the upgrade by running the
following command:
Example 2-2 shows the command to upgrade the firmware of ASA hardware.
After the ROMMON software file is verified, the ASA prompts for a
confirmation to reload.
Step 4. Press the Enter key to confirm. Example 2-3 shows the reloading of the ASA
hardware after the firmware upgrade starts.
***
*** --- START GRACEFUL SHUTDOWN ---
***
*** Message to all terminals:
***
*** Performing upgrade on rom-monitor.
Shutting down isakmp
Shutting down webvpn
Shutting down sw-module
Shutting down License Controller
Shutting down File system
***
*** --- SHUTDOWN NOW ---
***
*** Message to all terminals:
***
*** Performing upgrade on rom-monitor.
Process shutdown finished
Rebooting... (status 0x9)
..
INIT: Sending processes the TERM signal
Stopping OpenBSD Secure Shell server: sshdno /usr/sbin/sshd found; none killed
Deconfiguring network interfaces... done.
Sending all processes the TERM signal...
Sending all processes the KILL signal...
Deactivating swap...
Unmounting local filesystems...
Rebooting...
During the firmware upgrade process, the ASA reboots automatically a few
times. Example 2-4 shows the ASA completing the first two steps of the
ROMMON upgrade process. The system reloads every time it completes a step.
Note Do not reboot an ASA manually while the ROMMON or firmware upgrade is in
progress.
22 Chapter 2: FTD on ASA 5500-X Series Hardware
Step 5. After Step 1 and Step 2 of the upgrade process, when the ASA reloads, the
ROMMON version shows 1.1.8 (see Example 2-5). The process, however, is
still in progress. When the ASA prompts for a manual or automatic reboot,
just wait a few seconds and let the system reboot itself.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!! Please manually or auto boot ASAOS now to complete firmware upgrade !!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Example 2-6 shows the confirmation message you get for a successful
ROMMON upgrade, after the final reboot. At this stage, the ROMMON
software is fully upgraded, and you are ready to begin the next step of the
reimage process.
24 Chapter 2: FTD on ASA 5500-X Series Hardware
#
Attempt autoboot: "boot disk0:/asa961-50-lfbff-k8.spa"
Located 'asa961-50-lfbff-k8.spa' @ cluster 10.
####################################################################################
##################################################################################
##################################################################################
#############################################################
LFBFF signature verified.
INIT: version 2.88 booting
Starting udev
Configuring network interfaces... done.
Populating dev cache
dosfsck 2.11, 12 Mar 2005, FAT32, LFN
There are differences between boot sector and its backup.
Differences: (offset:original/backup)
65:01/00
Not automatically fixing this.
Starting check/repair pass.
Starting verification pass.
/dev/sdb1: 104 files, 811482/1918808 clusters
dosfsck(/dev/sdb1) returned 0
Mounting /dev/sdb1
Setting the offload CPU count to 0
IO Memory Nodes: 1
IO Memory Per Node: 205520896 bytes
When an ASA is running, you can also manually check its ROMMON
software version, as discussed in the “Verification and Troubleshooting Tools”
section, later in this chapter. Example 2-7 shows that the current firmware
version is upgraded to 1.1.8.
ciscoasa> enable
Password: *****
ciscoasa# show module
ciscoasa#
Step 1. Download the appropriate boot image for your ASA hardware:
Figure 2-7 shows the boot image file ftd-boot-9.6.2.0.lfbff that you use during
the reimaging of ASA 5506-X, 5508-X, or 5516-X hardware.
Figure 2-7 The *.lfbff Boot Image File for Low-End ASA 5500-X Series Hardware
Installing and Configuring FTD 27
Figure 2-8 shows the boot image file ftd-boot-9.6.2.0.cdisk that you use
during the reimaging of ASA 5512-X, 5515-X, 5525-X, 5545-X, or 5555-X
hardware.
Figure 2-8 The *.cdisk Boot Image File for Midrange ASA 5500-X Series Hardware
Step 2. Reload the ASA. As shown in Example 2-8, the ASA shuts down all its
processes before it gracefully reboots.
ciscoasa# reload
Proceed with reload? [confirm]
ciscoasa#
***
*** --- START GRACEFUL SHUTDOWN ---
Shutting down isakmp
Shutting down webvpn
Shutting down sw-module
Shutting down License Controller
Shutting down File system
***
*** --- SHUTDOWN NOW ---
Process shutdown finished
Rebooting... (status 0x9)
..
INIT: Sending processes the TERM signal
Stopping OpenBSD Secure Shell server: sshdno /usr/sbin/sshd found; none killed
28 Chapter 2: FTD on ASA 5500-X Series Hardware
Step 3. Interrupt the bootup process by pressing the Esc key. Example 2-9 shows that
the bootup process is interrupted and the ASA enters ROMMON mode.
Step 5. Configure the network by using the commands shown in Example 2-11. You
must configure these options to ensure successful network communication
between the ASA, FMC, and other servers.
Note The IP addresses in the configuration shown in Example 2-11 are based on the
topology shown in Figure 2-4. Here, the ASA, FMC, and all other servers are in the same
switching network, which means their IP addresses are in the same subnet. If the ASA,
FMC, and servers are in different subnets, the ingress interface of the router (where the
ASA is deployed) becomes the gateway for the ASA.
Step 6. Test the connectivity from the ASA to the TFTP server where the image files
are stored, as shown in Example 2-12. You get confirmation that the ASA can
communicate with the TFTP server.
30 Chapter 2: FTD on ASA 5500-X Series Hardware
Example 2-12 A Successful ping Test from the ASA to the TFTP Server
Step 7. Once connectivity is established, provide the name of the boot image
file you want to download from the TFTP server, save the changes, and begin
the download. Example 2-13 shows that the ASA 5506-X has successfully
downloaded the boot image file ftd-boot-9.6.2.0.lfbff from a TFTP server.
Caution If you are reimaging midrange ASA hardware, such as 5512-X, 5515-X, 5525-X,
5545-X, or 5555-X, you must use the ftd-boot-9.6.2.0.cdisk file instead of the ftd-boot-
9.6.2.0.lfbff file.
Example 2-13 Commands to Select and Download a File from a TFTP Server to ASA
Hardware
The ASA boots up automatically with the FTD boot CLI, as shown in
Example 2-14.
Example 2-14 Bootup Process of ASA Hardware with an FTD Boot Image
Step 8. Optionally press the ? key to see the list of the available commands on the
FTD boot CLI, as shown in Example 2-15. (In the next section of this chapter,
you will see the commands highlighted in this example used to install an FTD
software system image.)
ciscoasa-boot> ?
show => Display system information. Enter show ? for options
system => Control system operation
setup => System Setup Wizard
support => Support information for TAC
delete => Delete files
ping => Ping a host to check reachability
traceroute => Trace the route to a remote host
exit => Exit the session
help => Get help on command syntax
ciscoasa-boot>
Step 1. Download the FTD system software package file from software.cisco.com
and copy it to an HTTP or FTP server. Figure 2-9 shows the FTD system
software package ftd-6.1.0-330.pkg that you install on any low-end or
midrange ASA 5500-X Series hardware during the reimaging process.
Note This book uses an HTTP server in lieu of an FTP server. You can use either one,
though. You may find that the setup of an HTTP server is easier than the setup of an
FTP server.
Installing and Configuring FTD 33
Figure 2-9 The *.pkg File Installed on Any Low-End or Midrange ASA Hardware
Models
Step 2. As shown in Example 2-16, run the setup command to configure or update
the network settings so that the ASA can download the FTD system software
package from the HTTP server. During the installation of the boot image, you
configured the network settings. Now you either verify the existing configu-
ration or provide any missing information that was not entered before.
Tip When a default value (shown in square brackets, [ ]) is acceptable, press Enter to keep
the settings unchanged.
ciscoasa-boot> setup
DNS Configuration:
DNS Server: 10.1.1.8
CAUTION:
You have selected IPv6 stateless autoconfiguration, which assigns a global address
based on network prefix and a device identifier. Although this address is unlikely
to change, if it does change, the system will stop functioning correctly.
We suggest you use static addressing instead.
Apply the changes?(y,n) [Y]:
Configuration saved successfully!
Applying...
Restarting network services...
Done.
Press ENTER to continue...
ciscoasa-boot>
Step 3. Test the connectivity, as shown in Example 2-17. This example also shows that
the ASA can successfully ping from the FTD boot CLI to the HTTP server.
Installing and Configuring FTD 35
Example 2-17 ping Test Between the ASA and the HTTP Server
ciscoasa-boot>
Step 4. Download the FTD system software package from the HTTP server, as
shown in Example 2-18. After a successful download, the file is extracted
automatically.
Step 5. When prompted, press Y to start the upgrade process. Example 2-19 shows
the extraction of the FTD system software package ftd-6.1.0-330.pkg and the
beginning of the upgrade process.
Caution Extracting the FTD system software package can take approximately 10 min-
utes. In addition, the system takes 6 minutes to populate the system image. ASA hardware
does not show any progress status while it is extracting or populating a file. Be patient and
do not interrupt the process or reboot the ASA. Doing so might make your ASA unstable.
36 Chapter 2: FTD on ASA 5500-X Series Hardware
Extracting.....
Package Detail
Description: Cisco ASA-FTD 6.1.0-330 System Install
Requires reboot: Yes
Step 6. When the image is populated and the system prompts you to reboot the
system, press Enter to reboot. Example 2-20 shows the ASA hardware
rebooting after the image is populated.
Reboot is required to complete the upgrade. Press 'Enter' to reboot the system.
Broadcast mStopping OpenBSD Secure Shell server: sshdstopped /usr/sbin/sshd (pid 1723)
.
Stopping Advanced Configuration and Power Interface daemon: stopped /usr/sbin/acpid
(pid 1727)
acpid: exiting
acpid.
Stopping system message bus: dbus.
Stopping ntpd: stopped process in pidfile '/var/run/ntp.pid' (pid 1893)
done
Stopping crond: OKs
Deconfiguring network interfaces... done.
Sending all processes the TERM signal...
Sending all processes the KILL signal...
Deactivating swap...
Unmounting local filesystems...
Rebooting...
###################################################################################
#################################################################################
#################################################################################
#################################################################################
#################################################################################
#################################################################################
###########
LFBFF signature verified.
INIT: version 2.88 booting
Starting udev
Configuring network interfaces... done.
Populating dev cache
Detected PID ASA5506.
Found device serial number JAD191100HG.
Found USB flash drive /dev/sdb
Found hard drive(s): /dev/sda
fsck from util-linux 2.23.2
dosfsck 2.11, 12 Mar 2005, FAT32, LFN
/dev/sdb1: 7 files, 24683/1919063 clusters
Caution Depending on the ASA hardware model, initialization may take about an hour
to complete. At a certain point, you might think the process is hung, but it is not. The
system does not display progress status, but be patient. Do not interrupt the process or
reboot the ASA. Doing so might make your ASA unstable. Once the FTD is completely
installed, a login prompt appears.
Executing S06addusers [ OK ]
Executing S07uuid-init [ OK ]
Executing S08configure_mysql [ OK ]
Executing S09database-init [ OK ]
Executing S11database-populate [ OK ]
Executing S12install_infodb [ OK ]
Executing S15set-locale.sh [ OK ]
Executing S16update-sensor.pl [ OK ]
Executing S19cert-tun-init [ OK ]
Executing S20cert-init [ OK ]
Executing S21disable_estreamer [ OK ]
Executing S25create_default_des.pl [ OK ]
Executing S30init_lights_out_mgmt.pl [ OK ]
Executing S40install_default_filters.pl [ OK ]
Executing S42install_default_dashboards.pl [ OK ]
Executing S43install_default_report_templates.pl [ OK ]
Executing S44install_default_app_filters.pl [ OK ]
Executing S45install_default_realms.pl [ OK ]
Executing S47install_default_sandbox_EO.pl [ OK ]
Executing S50install-remediation-modules [ OK ]
Executing S51install_health_policy.pl [ OK ]
Executing S52install_system_policy.pl [ OK ]
Executing S53change_reconciliation_baseline.pl [ OK ]
Executing S70remove_casuser.pl [ OK ]
Executing S70update_sensor_objects.sh [ OK ]
Executing S85patch_history-init [ OK ]
Executing S90banner-init [ OK ]
Executing S95copy-crontab [ OK ]
Executing S96grow_var.sh [ OK ]
Executing S96install_vmware_tools.pl [ OK ]
Starting sfifd... [ OK ]
Starting Cisco ASA5506-X Threat Defense, please wait...No PM running!
...started.
INIT: Starting system message bus: dbus.
Starting OpenBSD Secure Shell server: sshd
Installing and Configuring FTD 41
IO Memory Nodes: 1
IO Memory Per Node: 205520896 bytes
Step 7. At the Firepower login prompt, which indicates that the installation is com-
plete, enter the default login credentials (username admin and password
Admin123), as shown in Example 2-22.
Step 8. When prompted to accept the End User License Agreement (EULA), press
Enter to display the agreement and to accept it. Example 2-23 shows the sys-
tem prompts for the EULA. The detailed legal messages are omitted from this
example for brevity.
Step 9. As the system initialization process begins, change the password for the
admin user and set up the network by pressing Enter to accept the default
values in brackets ([ ]). Example 2-24 illustrates the configuration of the
password and network settings.
Installing and Configuring FTD 43
Example 2-24 Configuring the Network After the First Login to FTD
Step 10. When the question about local management (also known as on-box
management) appears, enter no.
Note The option for FTD local management enables a built-in Firepower Device Manager
(FDM) application, which can be used to manage only a single FTD system—itself. This
book uses a standalone version of a manager, known as Firepower Management Center
(FMC), which can manage multiple FTD systems that might be deployed in different
geographical locations.
Example 2-25 shows the configurations related to how to manage this FTD
and how to deploy it in the network. In this example, the system is config-
ured to be managed by a dedicated management appliance (the FMC) and is
deployed in routed mode.
You can register the sensor to a Firepower Management Center and use the
Firepower Management Center to manage it. Note that registering the sensor
to a Firepower Management Center disables on-sensor Firepower Services
management capabilities.
However, if the sensor and the Firepower Management Center are separated by a
NAT device, you must enter a unique NAT ID, along with the unique registration
key.
'configure manager add DONTRESOLVE [registration key ] [ NAT ID ]'
Later, using the web interface on the Firepower Management Center, you must
use the same registration key and, if necessary, the same NAT ID when you add
this sensor to the Firepower Management Center.
>
The > prompt at the end of Example 2-25 confirms that the initial network
configuration is complete. The next step is to verify network connectivity on
the management interface and then begin the registration process. (Chapter 6:
“The Firepower Management Network,” explains the management connection,
and Chapter 7, “Firepower Licensing and Registration,” describes the
registration process.)
■ FTD default shell: You can configure most of the necessary items and view their
status by using this shell.
Verification and Troubleshooting Tools 45
■ ASA console: This console allows you to perform advanced commands for
diagnostic purposes.
■ Firepower Linux shell: This shell lets you enter the back end of the operating system
and is used by Cisco for advanced troubleshooting.
Figure 2-10 shows different types of consoles and command prompts of an ASA running
the FTD software.
>
First, press the Ctrl+A Type the exit command,
keys, and then press D. and then press Enter.
Firepower
ASA Console Advanced Console
Mode
Example 2-26 shows the commands that allow you to navigate various modes of an
FTD CLI.
Example 2-26 Commands to Connect to the Various Shells of the FTD CLI
>
! The > prompt confirms that you are on the FTD default shell. Run the following
command to connect to the ASA console:
firepower>
! Now you have entered the ASA console. Run the enable command to enter the privi-
lege exec mode.
firepower> enable
Password:
firepower# exit
Logoff
Type help or '?' for a list of available commands.
firepower>
! If you want to quit from the ASA console, the exit command logs you off from the
ASA console, but does not let you return to the FTD default shell. To disconnect
from the ASA console, press the Ctrl+a keys together, then press d separately.
firepower>
! To connect to the Firepower Linux shell, run the expert command. To return to the
FTD default shell, run the exit command.
> expert
admin@firepower:~$ exit
logout
>
Example 2-27 shows ASA 5506-X hardware running FTD Version 6.1.0.
Verification and Troubleshooting Tools 47
Example 2-27 Finding the Software Version Running on an ASA After a Fresh FTD
Installation
>
Tip The Model field for the show version command output must show “Cisco
ASA55XX-X Threat Defense Version 6.1.0”. If the Model field shows “ASA55XX Version
6.1.0”—without the “Threat Defense” keyword—it means the ASA is running Firepower
Version 6.1 as a separate service, not in a unified image.
ciscoasa# dir
ciscoasa# show flash:
Example 2-28 shows the amount of free space on the same ASA hardware from two dif-
ferent command outputs. The shaded portion of the example shows that the ASA hard-
ware has free space of 4544851968 bytes, which is equal to 4438332 KB, or 4334.3 MB,
or 4.23 GB. The first command output uses disk0: to indicate internal flash memory. If
there were external flash memory, it would be denoted by disk1:.
ciscoasa# dir
Directory of disk0:/
ciscoasa#
ciscoasa#
Example 2-30 Viewing the Storage Device Information on ASA 5500-X Series
Hardware
ciscoasa#
Example 2-31 shows ASA 5545-X hardware with two storage devices.
Example 2-31 Determining the List of Storage Devices on ASA 5500-X Series
Hardware
ciscoasa#
Table 2-2 summarizes the default availability of SSDs in various ASA 5500-X Series
hardware. It also shows whether an SSD is hot-swappable on a particular model in case
of a failure.
50 Chapter 2: FTD on ASA 5500-X Series Hardware
Table 2-2 Availability and Replacement of SSD on ASA 5500-X Series Hardware
ASA 5500-X Series Availability of SSD Hot-Swappable?
Models
5506-X, 5506W-X, Comes with an SSD. No.
5506H-X
5508-X, 5516-X Comes with an SSD. Yes, requires a
screwdriver.
5512-X, 5515-X, Might not come with an SSD, if not Yes, easy to hot-swap.
5525-X ordered separately. You can install A button is available
one Cisco SSD. to push and release
the locking lever.
5545-X, 5555-X Might not come with an SSD, if not
ordered separately. You can install
up to two Cisco SSDs with RAID 1.
##################################################################################
##################################################################################
##################################################################################
#######################################
If ASA hardware is running in a production environment, and you do not want to reboot
it, you can still determine the version of the ROMMON software by running the show
module command. Example 2-33 shows that the ROMMON version of the ASA 5506-X
hardware is 1.1.01.
Example 2-33 Command That Displays the ROMMON Software Version of an ASA
ciscoasa#
52 Chapter 2: FTD on ASA 5500-X Series Hardware
Summary
This chapter describes the differences between various images that may be installed on
ASA 5500-X hardware. It demonstrates the detailed process of reimaging ASA 5500-X
Series hardware to the FTD software. In addition, this chapter shows the command-line
tools you can use to verify the status of the hardware and software.
After installation, the next step in deploying FTD in a network is to register it with an
FMC. Part II of this book describes that.
Quiz
1. What would be the correct workflow for reimaging ASA 5506-X hardware to FTD?
i. Upgrade the ROMMON software.
ii. Reload the ASA hardware with a boot image.
iii. Install the FTD system software.
iv. Copy the image files to a server.
2. What would be the correct workflow for reimaging ASA 5545-X hardware to FTD?
i. Upgrade the ROMMON software.
ii. Reload the ASA hardware with a boot image.
iii. Install the FTD system software.
iv. Copy the image files to a server.
3. When reimaging ASA 5516-X hardware to FTD, which type of file is not necessary?
a. *.spa
b. *.lfbff
c. *.cdisk
d. *.pkg
4. What kind of server should you use to transfer a boot image file to ASA hardware?
a. TFTP server
b. FTP server
c. Web server
d. Secure copy server
Quiz 53
5. Which protocol is used in this chapter to transfer the system software image to
ASA hardware?
a. HTTP
b. TFTP
c. FTP
d. SCP
8. Which of the following is the default command prompt in the FTD software?
a. ciscoasa#
b. ciscoasa-boot>
c. firepower>
d. >
This page intentionally left blank
Chapter 3
Within the ASA 5500-X Series models, the ASA 5585-X hardware is designed for a
data center network. However, an ASA 5585-X device does not support the Firepower
Threat Defense (FTD) software. To meet the needs of a service provider network, Cisco
introduced a new career-class Firepower hardware platform that runs FTD on top of a
supervisor. The supervisor runs on an independent operating system called the Firepower
eXtensible Operating System (FXOS). This chapter discusses the deployment of the
FTD software on FXOS.
Note This book uses FTD Version 6.1 as the baseline; however, the Firepower 2100
Series hardware supports FTD Version 6.2.1 or greater. Therefore, the configuration
examples in this chapter focus on the Firepower 9300 and 4100 Series models, which
support Version 6.1. However, the command-line tools described in this chapter are useful
for any Firepower hardware series running FTD software on FXOS.
56 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Table 3-1 shows the hardware specifications of the Firepower 4100 Series and the
Firepower 9300 Series platforms.
Figure 3-1 shows various modules on a Cisco Firepower 9300 Series chassis.
Security
Module 1 Security
Module 3
Security
Module 2
Figure 3-2 shows the console, management, and other network ports on a Cisco
Firepower 4100 Series chassis.
Management Port
Console 8 x Ethernet Ports (Embedded)
Port
2 x Network Modules
Architecture
The Cisco Firepower 9300 Series and 4100 Series chassis use modular hardware
components. You can leverage the modular architecture to upgrade, troubleshoot,
or replace any particular modules without replacing an entire Firepower chassis.
A Firepower security appliance has various modules (for example, network module,
security module, power supply module, fan module). All these modules interact with
two major components—the supervisor and the security module:
■ Security module: A security module runs the security application, such as the FTD
software. The adapters on a security module receive traffic from the external net-
work modules through a switch fabric and send them to the FTD for any necessary
actions.
Note For ease of understanding, you can compare a security module with a blade
server. The Firepower Chassis Manager of the 9300 Series and of the 4100 Series use two
different terms to refer to this blade server: security module (9300 Series) and security
engine (4100 Series).
Figure 3-3 shows the architecture of a Firepower 9300 Series appliance and demonstrates
the connections between the supervisor and a security module. In Firepower 4100 Series
hardware, the number of security engines is one.
58 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Secur ty Modu e
Firepower Threat Firepower Threat Firepower Threat
Defense (FTD) Defense (FTD) Defense (FTD)
Superv sor
Switch Fabric
Note The Firepower 2100 Series hardware introduces an additional processor, called the
network processing unit (NPU). The NPU is designed to process any traffic that is not
intended for advanced inspection. The other x86 CPU processes traffic that matches an
advanced next-generation security policy.
Software Images
At software.cisco.com, you can find a variety of software for a Firepower security
appliance. For a core FTD deployment on a Firepower appliance, you need only two
types of software:
■ FXOS
■ FTD software
Figure 3-4 highlights the software images that are necessary to install FTD on FXOS. The
screenshot displays the software that you can download from the Cisco support site for a
Firepower 9300 Series appliance. A 4100 Series appliance supports all of them except the
third-party software Radware Virtual Defense Pro (as of this writing).
Firepower 9300 and 4100 Series Essentials 59
Figure 3-5 shows the fxos-k9.2.0.1.86.SPA file, which is a platform bundle for a Firepower
security appliance. It installs FXOS Release 2.0.1.
FTD Software
The FTD software, also called the application package, is one of the security
applications that you can install on a security module of a Firepower appliance. Once the
FTD software is installed and registered with the Firepower Management Center (FMC),
you can manage the security policies of an FTD through the FMC.
Firmware
Cisco also occasionally releases firmware images for Firepower appliances. Upgrading
the firmware is not a mandatory requirement for FTD software installation. It is, however,
necessary when you want to enable any enhanced or new hardware features. For example,
to enable the Firepower two-port 100 GB network module double-wide, you need to
upgrade the firmware to Version 1.0.10 or greater.
Note Read the official FXOS guides, published at cisco.com, to learn when and how to
install firmware on a Firepower security appliance.
Firepower 9300 and 4100 Series Essentials 61
To access the web interface, enter the management IP address of the Firepower security
appliance in a supported browser, like this:
https://IP_Address_of_Management_Interface
Figure 3-7 shows the login page that appears when you enter the Firepower Chassis
Manager management IP address in a browser.
Note If you are running Firepower 2100 Series hardware with FTD Version 6.2.1 or
higher, you can choose one of the two web user interfaces to configure and manage FTD:
You can register it with a standalone Firepower Management Center (FMC) and manage
it through the FMC, or you can enable local management capability and manage the FTD
directly via an on-box manager called Firepower Device Manager (FDM).
62 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
■ Perform the installation tasks during a maintenance window so that any network
interruption does not impact your business. You should also plan for additional time
to complete any post-installation setup.
■ Prior to the maintenance window when you plan to do the installation, make sure
you are able to access the cisco.com website and can download all the necessary
FXOS and FTD images. If needed, register for a Cisco account. If after the
self-registration process you cannot download any of the desired software, you
might need to get further assistance from your Cisco channel partner or the Cisco
Technical Assistance Center (TAC).
■ After you download any software from cisco.com, always verify the MD5 or
SHA512 checksum of the files you have downloaded to confirm that the file is not
corrupt and has not been modified during download. Figure 3-8 shows how the
MD5 and SHA512 checksum values are displayed at cisco.com when you hover your
mouse over a filename.
Caution The export of a configuration is stored in XML file format. Do not alter the
contents of an XML file, or it may fail an import attempt.
■ During an import, the software version of FXOS must match with the version when
a configuration (XML file) was exported. Similarly, any detail of the hardware, such
as platform model and network module installed (including the slot number), must be
the same during export and import.
Caution A configuration export using Firepower Chassis Manager includes the configu-
ration settings of FXOS. It does not include any configurations from the FTD software.
■ Do not power off, shut down, reboot, or reinitialize a Firepower chassis or a security
module when the FTD installation is in progress.
■ If you need to power down a Firepower chassis that has FTD software already
installed, you must gracefully shut down the FTD application beforehand.
An ungraceful power-down of a Firepower chassis can corrupt the FTD data and
file system.
■ Some of the modules on a Firepower appliance support the Online Insertion and
Removal (OIR) feature (for example, the security module, power supply module, and
fan module). However, to replace a network module that does not support OIR (as of
this writing), you must gracefully shut down the FTD software and then power down
the Firepower chassis.
■ Before you deploy FTD on a Firepower chassis, read the hardware installation guide
to learn the latest information about any hardware features.
64 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Fulfilling Prerequisites
Before you install the FTD application, you must fulfill any prerequisites. For example,
be sure to delete any existing logical devices from FXOS, upgrade the FXOS software
version, and enable necessary interfaces. The following sections elaborate on these
prerequisites.
Step 1. Go to the Logical Devices tab in Firepower Chassis Manager. Figure 3-10
shows that the ASA security application is running as a logical device on a
Firepower 9300 appliance.
Step 2. Click the recycle bin icon next to a logical device to delete it.
Step 3. In the confirmation window that appears, click Yes to delete the logical
device.
Step 4. Click Yes once again when the system asks whether you want to delete its
application configuration (see Figure 3-11).
Installing and Configuring FTD 65
When all the logical devices are deleted, Firepower Chassis Manager displays the
message “No logical devices available. Click on Add Device to add a new logical device.”
(See Figure 3-12.) You see this message in a brand-new system or when you delete all the
existing logical devices.
Step 1. Download an appropriate FXOS platform bundle from the Cisco support site.
Step 3. Click the Upload Image button, and then click Browse to find the FXOS
platform bundle image. Select an image and click the Upload button to begin
the upload process (see Figure 3-13).
66 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Step 4. In the confirmation window that appears after a successful upload, click OK
to close the window (see Figure 3-14).
Step 5. In the System > Updates page, click the Upgrade icon next to the image you
have just uploaded (see Figure 3-15).
Upgrade Icon
Step 6. Click Yes when a confirmation window appears, asking if you want to
proceed (see Figure 3-16).
After the upgrade begins, the web interface does not show any progress status, and the
connection to the GUI is lost for some time. When it comes back, the status of the new
software is Installed (see Figure 3-17).
Figure 3-17 The System Updates Page with a List of Available Update Files
Tip During an upgrade, you can access the console terminal to determine the upgrade
status. See the “Verification and Troubleshooting Tools” section, later in this chapter, to
learn the CLI commands for it.
Enabling Interfaces
Before installing FTD software, you must enable the network interfaces on your
Firepower appliance (the physical chassis) that will be used by the FTD (a logical device)
to transfer traffic. The options to configure interfaces can be categorized into two
types—mandatory and optional:
The interfaces on a Firepower appliance carry only one type of traffic at a time.
A Firepower appliance does not share the same data interface between two logical
devices, but it can share a management interface between multiple logical devices.
■ Optional configurations: You can, optionally, use the built-in FTD features to
segregate or aggregate traffic. For example, you can enable an interface with the
Firepower-eventing option to segregate events from the management traffic, which
means you can use an interface exclusively to transfer events.
You can also bundle multiple physical interfaces and aggregate their traffic into a
single logical port, known as a port channel or an EtherChannel. The FXOS software
uses Link Aggregation Control Protocol (LACP) to bundle up to 16 interfaces.
If, however, you want to modify any existing settings, such as changing the type from
data traffic to management traffic or vice versa, follow these steps:
Step 2. On the All Interfaces tab, click the pencil icon for the interface you want to
modify. The Edit Interface dialog appears. Figure 3-19 shows the Ethernet1/1
interface enabled and configured with the management (mgmt) type traffic.
Step 3. From the Type drop-down, select the type of traffic you want the interface to
carry. Optionally, you can also modify the speed.
Step 4. Select the Enable check box if you want to enable this interface immediately
with the updated settings.
Step 5. Click the OK button to save the changes. The Interfaces page reflects the
changes you have just made.
Figure 3-20 shows that the Operation State is Up and the Admin State is Enabled after
the Ethernet1/1 interface is configured and enabled. The first port on Network Module 1
also becomes green.
Cable Is Connected
Interface Is
Interface Is Up Enabled
Step 1. On the Interfaces page, click the Add Port Channel button. The Add Port
Channel configuration window appears.
Step 2. Assign a number in the Port Channel ID box. The valid values range from
1 to 47.
Step 3. Select the Enable check box if you want to activate the port channel as soon
as the configuration is saved.
Step 4. Define the purpose of the channel by selecting an appropriate option from
the Type dropdown: Data, Mgmt, Cluster, or Firepower-eventing.
Installing and Configuring FTD 71
Note The Cluster type is used exclusively by clustered devices as a cluster control link.
You can cluster multiple security modules of a Firepower 9300 appliance to gain higher
throughput and redundancy.
Step 5. Select the interfaces that you want to bundle together in a channel and click
the Add Interface button after each one. The selected interfaces move to the
Member ID box. You can bundle up to 16 interfaces in one port channel.
Step 6. Click the OK button to save your configuration. On the Interfaces page, you
can view the status of the port channel you have just created, along with its
member interfaces. For example, Figure 3-22 shows port channel 20 with two
member interfaces, Ethernet2/1 and Ethernet2/2.
Figure 3-22 Checking the Status of a Port Channel on the Interfaces Page
Note This section describes the process of creating a port channel for demonstration
purposes only. The examples in the remainder of this chapter do not use any port channels.
To learn more about port channels and additional Firepower hardware-specific features,
please read the “Cisco FXOS Firepower Chassis Manager Configuration Guide.”
Installing FTD
Once your Firepower appliance runs FXOS Version 2.0.1 or later and the necessary
interfaces are enabled, you are ready to install FTD Version 6.1. The following sections
describe the FTD installation process:
72 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Step 1. Download FTD Version 6.1 from the Cisco support site.
Step 3. Click the Upload Image button, and then click Browse and find the FTD soft-
ware image. Select an image and click the Upload button to begin the upload
process (see Figure 3-23).
Step 4. Accept the End User License Agreement (EULA) window that appears after a
successful upload and click Ok (see Figure 3-24). The FTD software image is
now stored on the appliance but is not yet installed.
Installing and Configuring FTD 73
Figure 3-24 The Appearance of the EULA Message Indicates a Successful Upload
Step 1. In Firepower Chassis Manager, navigate to the Logical Devices page and click
the Add Device button. The Add Device window appears.
Step 2. Provide a name for the logical device you are going to deploy on FXOS and
select the FTD template and the image version 6.1.x. Figure 3-25 shows a new
FTD logical device called FTD_610 being added.
74 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
1 2
Step 3. Choose the Standalone device mode and click OK. A configuration page
appears, where you provision the standalone FTD logical device.
Note Standalone mode enables you to create a unique logical device on each security
module, whereas Cluster mode enables you to bundle multiple security modules into one
logical device.
Figure 3-26 shows the three major steps to provision an FTD logical device.
Step 4. On the right-hand side, click the FTD icon. A configuration window appears.
Finally, Save
Config
3
Tip This example skips the configurable items in the Settings and Agreement sections for
now; they reappear on the CLI of the FTD, during the initialization process. You can con-
figure them at that time through the CLI.
76 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Step 6. On the provisioning page, as shown in Figure 3-28, select the interfaces or port
channels that will be transferring data traffic to and from FTD. In Figure 3-28,
the Ethernet2/3 and Ethernet2/4 interfaces of the Firepower chassis are
selected as the data interfaces, and the Ethernet1/1 interface is configured as a
management interface.
Step 7. When you are finished with the provisioning settings, click the Save button.
The Logical Devices page returns, and the FTD installation process begins.
As shown in Figure 3-29, the installing status indicates that the FTD
installation is in progress.
Figure 3-30 shows the FTD software installation complete and online. From
the time the FTD installation begins, the system takes about 5 to 10 minutes
to get to the online state.
To access the CLI of the FTD, first you have to access the CLI via Secure Shell (SSH)
or the console terminal. Then you can connect to the security module where FTD is
installed and then complete any necessary steps.
Example 3-1 shows an example of the process of accessing the CLI of the FTD software
from the CLI of the FXOS and completing the system initialization.
Example 3-1 Accessing the FTD CLI for the First Time
! Now, run the following command to connect to the CLI of the FTD:
! The following network settings should auto-populate, if you configured them in the
FTD provisioning page. In such case, no action necessary. Please be patient.
You can register the sensor to a Firepower Management Center and use the
Firepower Management Center to manage it. Note that registering the sensor
to a Firepower Management Center disables on-sensor Firepower Services
management capabilities.
However, if the sensor and the Firepower Management Center are separated by a
NAT device, you must enter a unique NAT ID, along with the unique registration
key.
'configure manager add DONTRESOLVE [registration key ] [ NAT ID ]'
Later, using the web interface on the Firepower Management Center, you must
use the same registration key and, if necessary, the same NAT ID when you add
this sensor to the Firepower Management Center.
>
Verification and Troubleshooting Tools 79
The > prompt at the end of Example 3-1 confirms that the installation is complete. The
next step is to verify the network connectivity on the management interface, and then
you can begin the registration process.
Exit Path
telnet> quit
FXOS#
You are on Service
Module 1 where Firepower Module1> connect ftd
FTD is installed. > exit
Exit Path
Firepower Module1>
You are on the CLI
of the FTD software. >
Example 3-2 demonstrates the use of the commands to connect to the FTD software and
then return to the FXOS software.
80 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Example 3-2 Entering and Exiting the CLI of FTD and FXOS
! Assuming you are on the CLI of FXOS, first run the following command to connect to
the Security Module (SM 1) where FTD software is installed.
Firepower-module1>
! Now, you are on the CLI of the Security Module 1 (SM 1). Run the following command
to connect to the CLI of the FTD:
>
! Now, you are on the CLI of the FTD software where you perform most of the FTD
related tasks. If you want to ASA console, run the following command on the CLI of
the FTD:
firepower>
! Now, you are on the CLI of the ASA software. Run the following command to access
the privileged mode. Press the enter key when you are prompted for a password.
firepower> enable
Password:
firepower#
! To exit from the ASA console, press 'Ctrl+a then d' to detach.
firepower#
Console connection detached.
>
Verification and Troubleshooting Tools 81
! You are now back to the CLI of FTD. To exit from the FTD CLI, run the following
command:
> exit
Firepower-module1>
! You have now returned to the Service Module CLI. To exit, press the escape
character '~', run the 'quit' command.
Firepower-module1> ~
telnet> quit
Connection closed.
Firepower-9300#
Example 3-3 shows that the Firepower security appliance is running Version 1.0.10 of the
firmware.
Firepower-9300 /chassis #
82 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Example 3-4 shows Firepower Chassis Manager running FXOS Release 2.0.1. However,
the FXOS software on Security Module 3 is currently being upgraded from Release 1.1.4
to Release 2.0.1.
Fabric Interconnect A:
Package-Vers: 2.0(1.86)
Upgrade-Status: Ready
Chassis 1:
Server 1:
Package-Vers: 2.0(1.86)
Upgrade-Status: Ready
Server 3:
Package-Vers: 2.0(1.86),1.1(4.95)
Upgrade-Status: Upgrading
Firepower-9300 /system #
Example 3-5 shows the status of the FTD_610 logical device. As you can see, the device is
operational and running on Security Module 1 (slot ID 1) on a Firepower 9300 appliance.
Logical Device:
Name Description Slot ID Mode Operational State Template Name
---------- ----------- ---------- ---------- -------------------- -------------
FTD_610 1 Standalone Ok ftd
Firepower-9300 /ssa #
Verification and Troubleshooting Tools 83
Example 3-6 shows the status of an FTD application. The output first confirms that the
application is being installed. The output then shows when the FTD installation is com-
plete and the application comes online.
Firepower-9300 /ssa #
! The following output proves that the FTD application is up and running.
Firepower-9300 /ssa #
84 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Note As noted earlier in this chapter, the terms security module and security engine
refer to the same hardware component but are used on two different platforms—Firepower
9300 and 4100, respectively.
You can verify the status of a security module from the Firepower Chassis Manager as
follows:
Figure 3-32 shows three security modules on a Firepower 9300 appliance. If you run a
Firepower 4100 Series appliance, you see only one security engine. For demonstration
purposes, the icons for the security modules are highlighted in this figure.
Status Icons
To Acknowledge a To Reinitialize a
Security Module Security Module
(Second Icon) (Fourth Icon)
Figure 3-32 Different Hardware and Service States of the Service Modules
Verification and Troubleshooting Tools 85
Tip Read the “Cisco FXOS Firepower Chassis Manager Configuration Guide” to learn
more about the possible hardware and service states.
To determine the status of a service module from the CLI, you can run the show server
command.
Example 3-7 shows that Service Modules 1 and 2 are equipped, but only Service
Module 1 is up and Service Module 2 is faulty. Service Module 3 is mismatched, which
means this module is decommissioned, unacknowledged, or newly installed.
Table 3-2 describes various scenarios for a security module and the action you should
take to bring the module into an operational state.
Example 3-8 shows that Security Modules 1 and 3 are operable, which means they are in
good health. Security Module 1 is running, and Security Module 3 is booting up (config
state). However, Security Module 2 is inoperable.
86 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Server 1/2:
Overall Status: Degraded
Operability: Inoperable
Oper Power: On
Server 1/3:
Overall Status: Config
Operability: Operable
Oper Power: On
Firepower-9300#
In the architectural diagram of a Firepower appliance (refer to Figure 3-3), you can see
that each security module is connected to two adapters, which are connected to a switch
fabric. When you are troubleshooting, it is also important to determine whether the
adapter and the switch fabric are operational.
Example 3-9 shows two adapters on each security module. All the adapters are in good
health.
Server 1/3:
Adapter PID Vendor Serial Overall Status
------- ---------- ----------------- ------------ --------------
1 FPR-C9300-MP Cisco Systems Inc XXXXXXXXXXX Operable
2 FPR-C9300-MP-MEZZ Cisco Systems Inc XXXXXXXXXXX Operable
Firepower-9300#
Fabric Card 1:
Threshold Status: N/A
Overall Status: Operable
Operability: Operable
Power State: Online
Thermal Status: N/A
Voltage Status: N/A
.
.
<Output_Omitted>
Firepower-9300#
Example 3-11 shows the detailed hardware information of a Firepower 4110 appliance. It
also shows an operable condition of the appliance.
Chassis:
Chassis: 1
User Label:
Overall Status: Operable
Oper qualifier: N/A
Operability: Operable
Conf State: Ok
Admin State: Acknowledged
Conn Path: A
Conn Status: A
Managing Instance: A
Product Name: Cisco Firepower 4110 Security Appliance
PID: FPR-4110-K9
VID: V00
Part Number: XX-XXXXXX-XX
88 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Firepower-4110#
You can view a summary of the hardware operations on the Overview page of Firepower
Chassis Manager. This page displays any hardware errors, along with severity level,
description, cause, occurrence, and time of each incident.
Figure 3-33 shows the Overview page for a Firepower 9300 appliance. While the top of the
page shows an overall operational state, below this you can see more detailed information.
Similarly, if you choose to use the CLI, you can run multiple commands to determine
whether there has been a failure of any major hardware components on a Firepower
appliance.
Example 3-12 shows the same errors you just saw in the web interface in Figure 3-33.
Firepower-9300#
You can also view the system event log (SEL) of a Firepower appliance from the CLI.
The show sel command on FXOS provides output similar to what you can see with the
ipmitool command on a Linux system.
Example 3-13 shows events from the Cisco Integrated Management Controller (CIMC)
and basic input/output system (BIOS). The 1/1 parameter with the show sel command
represents chassis1/module1.
Firepower-9300#
Example 3-14 uses the show fault command to confirm that one of the PSUs is not
turned on.
Firepower-9300#
Example 3-15 uses the show chassis environment command to show whether there is a
power problem. In this case, there is a power problem: The Firepower 9300 appliance has
a power redundancy failure.
Firepower-9300#
Verification and Troubleshooting Tools 91
Example 3-16 shows filtered output of the show sel command. It shows events with the
power keyword only. The events in this example were generated when the main power
was disconnected and then reconnected.
Firepower-9300#
Example 3-17 confirms that the Firepower appliance is equipped with two power supply
units, but PSU 1 has no power.
PSU:
PSU: 1
Overall Status: N/A
Operability: N/A
Threshold Status: N/A
Power State: Off
Presence: Equipped
Thermal Status: OK
Voltage Status: N/A
Product Name: Cisco Firepower 9000 Series AC Power Supply
PID: FPR9K-PS-AC
VID: V01
Part Number: 341-0723-01
Vendor: Cisco Systems Inc
Serial (SN): ART1918F298
HW Revision: 0
Firmware Version: N/A
Type: Unknown
Wattage (W): 0
Input Source: Unknown
PSU: 2
Overall Status: Operable
Operability: Operable
Threshold Status: OK
92 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Power State: On
Presence: Equipped
Thermal Status: OK
Voltage Status: OK
Product Name: Cisco Firepower 9000 Series AC Power Supply
PID: FPR9K-PS-AC
VID: V01
Part Number: 341-0723-01
Vendor: Cisco Systems Inc
Serial (SN): ART1918F28X
HW Revision: 0
Firmware Version: N/A
Type: Unknown
Wattage (W): 2500
Input Source: Unknown
Firepower-9300#
■ You can look at the LED on a fan module. If the color of the LED is amber, you
know there has been a failure.
■ In Firepower Chassis Manager, you can go to the Overview page to identify the
status of the fans.
■ You can run several commands at the CLI to investigate any fan-related issues.
Example 3-18 shows a warning for a missing fan module. One of the fan modules was
removed to demonstrate this alert.
Firepower-9300 /chassis #
Verification and Troubleshooting Tools 93
Example 3-19 shows the overall status of the fan modules on a Firepower 9300 appliance.
If you were to run the same command on a 4100 Series appliance, you would find six
modules in the output.
Example 3-19 Determining the Overall Health Status of the Fan Modules on a
Firepower 9300 Appliance
Fan Module:
Tray Module Overall Status
---------- ---------- --------------
1 1 Operable
1 2 Removed
1 3 Operable
1 4 Operable
Firepower-9300 /chassis #
Example 3-20 shows detailed information about the fan modules on a Firepower 9300
appliance. The first module is equipped and operational, and the second module is
missing.
Fan Module:
Tray: 1
Module: 1
Overall Status: Operable
Operability: Operable
Threshold Status: OK
Power State: On
Presence: Equipped
Thermal Status: OK
Product Name: Cisco Firepower 9000 Series Fan
PID: FPR9K-FAN
VID: 01
Part Number: XX-XXXXX-XX
Vendor: Cisco Systems Inc
Serial (SN): XXXXXXXXXXX
HW Revision: 0
Mfg Date: 2015-05-28T00:00:00.000
94 Chapter 3: FTD on the Firepower eXtensible Operating System (FXOS)
Tray: 1
Module: 2
Overall Status: Removed
Operability: N/A
Threshold Status: N/A
Power State: Off
Presence: Missing
Thermal Status: N/A
Product Name:
PID:
VID: 01
Part Number: XX-XXXXX-XX
Vendor:
Serial (SN):
HW Revision: 0
Mfg Date: 2015-05-28T00:00:00.000
.
.
<Output_Omitted>
Firepower-9300 /chassis #
Summary
This chapter describes the architecture, implementation, and installation of FTD on a
Firepower security appliance running FXOS. It demonstrates several command-line tools
you can use to determine the status of various components of the appliance.
After installation, the next step in deploying an FTD in a network is to register it with a
Firepower Management Center. Part II of this book describes that.
Quiz
1. A Firepower 4100 Series security appliance has various hardware components. In
which component is FTD software installed?
a. Switch fabric
b. Security engine
c. Supervisor
d. Adapter
Quiz 95
3. Which command can you run at the CLI to see any hardware errors that you could
also view on the Overview page of Firepower Chassis Manager?
a. show environment
b. show fault
c. show status
d. show chassis
4. Which command is necessary to access the ASA console if you are currently on the
FXOS CLI?
a. connect module 1 console
b. connect ftd
c. system support diagnostic-cli
d. All of the above
5. A Firepower 9300 appliance is currently running FXOS Release 1.1.4. If you want to
install FTD Version 6.1 on it, what is the correct order of action?
a. Install firmware Version 1.1.10 and then install FTD Version 6.1.
b. Install FXOS Release 2.0.1 and then install FTD Version 6.1.
c. Install FTD Version 6.0 and then upgrade to Version 6.1.
d. Install FTD Version 6.1 only.
This page intentionally left blank
Chapter 4
In the previous chapters, you have learned how to install Firepower Threat Defense (FTD)
on various hardware platforms. You cannot, however, define and apply any security poli-
cies for your network without assistance from a manager. This chapter discusses different
options for deploying managers for FTD. It describes the process of reimaging a manager
with the FTD software and describes various tools used for troubleshooting hardware.
Table 4-1 Major Differences Between an On-Box Manager and an Off-Box Manager
On-Box Off-Box
GUI software Firepower Device Firepower Management
Manager (FDM) Center (FMC)
Management capability 1 FTD system Depending on the model,
can manage hundreds of
FTD systems
Supported FTD Low-end and midrange Any platforms that support
platform ASA 5500-X Series FTD software
hardware
Deployment Small to medium Large enterprise network
business (SMB)
98 Chapter 4: Firepower Management Center (FMC) Hardware
On-Box Off-Box
Cost Free; no additional Need to purchase additional
hardware necessary hardware or a license for a
virtual appliance
Policy configuration Limited functionality Full functionality
Number of stored events Can store only few Can store millions of events
hundred events
API integration Does not support Fully supports integration
third-party integration with various APIs
Note This book uses the user interface of an off-box manager to demonstrate advanced
configurations. The user interface of an on-box manager, which is different from the
interface of an off-box manager, is beyond the scope of this book.
In addition, in this section, you will learn about some of the key hardware components of
a Firepower manager, such as the Cisco Integrated Management Controller (CIMC) and
internal storage for system restoration. This section also introduces you to the different
types of user interfaces in Firepower manager hardware.
On-Box Managers
The FTD software introduces a new user interface, called the Firepower Device Manager
(FDM), that you can run from a web browser, without any requirement for a third-party
client. As of this writing, the FDM supports the ASA 5500-X Series (low-end and mid-
range platforms), Firepower 2100 Series hardware, and FTD Virtual (on VMware plat-
form). However, it does not support the Firepower 4100 Series, or the 9300 Series.
Tip To determine whether a new Firepower feature is supported on your Cisco hardware,
you can read the “Cisco Firepower Compatibility Guide.”
The FDM can manage one FTD at a time. If you have more than one FTD system, you
cannot use the FDM to manage all the FTD systems. Therefore, using the FDM is a good
solution for small to medium business (SMB) networks but is not a scalable solution for
large enterprise networks. The FDM is designed to be simple and intuitive, and its use is
targeted to users who are not experts on the Firepower System.
Figure 4-1 shows a simple topology in which FTD could be managed by an on-box
manager such as the FDM.
FMC Component Essentials 99
Firepower Threat
Defense (FTD)
Data Data
Traffic Inside Outside Traffic
End Users Interface Interface
Internet Service
Provider
Management/Server Traffic
Data Traffic
Off-Box Managers
An off-box manager, as the name implies, is located outside an FTD appliance. It is
designed to configure, monitor, and administer multiple FTD systems using just a single
user interface. The Firepower Management Center (FMC) is an off-box manager, a dedi-
cated standalone appliance.
The FMC is available as physical hardware or as a virtual appliance. You may find that
a virtual FMC is easier and cheaper to deploy because it allows you to use your existing
virtual machine’s infrastructure. On the other hand, although a physical FMC requires
you to purchase and deploy additional hardware for your network, it is able to man-
age more FTD systems, process additional hosts and users in a network, and store
more events.
Figure 4-2 shows a typical topology in which multiple FTD appliances from different
geographical locations are managed by one off-box manager—the FMC.
Table 4-2 shows the specifications for various FMC hardware. It compares the two latest
FMC models that are based on the Cisco UCS C220 M3 chassis, with an FMC virtual
appliance.
100 Chapter 4: Firepower Management Center (FMC) Hardware
Firepower
Management
Center (FMC)
Administrator
Mgmt. Network
Mgmt.
Traffic FTD at
Data Location A
Traffic Inside Outside Data
End Users Interface Interface Traffic
Network A
FTD at Data
Data Location B Traffic Internet
Traffic Inside Outside Service
Interface Interface Provider
End Users
Network B
FTD at Data
Data Location n Traffic
Traffic Inside Outside
End Users Interface Interface
Network n
Management/Server Traffic
Data Traffic
Table 4-3 shows the differences in performance for various FMC appliances. The differ-
ences are based on the hardware resources available in each appliance.
Note As of this writing, Cisco supports additional FMC models. For example, prior to
FMC 2000 and FMC 4000 models, the FMC 750, FMC 1500, and FMC 3500 models were
released, supporting any trains of Version 6.x. After the FMC 2000 and FMC 4000 mod-
els, Cisco introduced the FMC 1000, FMC 2500, and FMC 4500 models, which support
Version 6.2 or later. While new hardware models and software versions are continuously
being developed, you can apply the knowledge you learn from this book to any FMC hard-
ware models running Firepower Version 6.1 or later.
Figure 4-3 shows an architectural overview of the CIMC. It shows how the hardware-
related information is exchanged with the IPMI and is viewed through the syslog, SNMP,
or XML API.
You can access the CIMC Configuration Utility by pressing F8 during the power-on
self-test (POST) operation. Using the Configuration Utility, you can assign an IP address
for the CIMC interface. You can either use a web browser to access the CIMC GUI or a
Secure Shell (SSH) client to connect to the CIMC CLI.
102 Chapter 4: Firepower Management Center (FMC) Hardware
XML
API
Syslog
SNMP
Fault Engine
MC
CIM
CI
C
Storage Intelligent Platform
Daemon Management Interface
Figure 4-4 shows the IP address 10.1.1.12 assigned to the CIMC interface. In the
Additional Settings page (which you access by pressing F1), you can change the default
login password of the CIMC interface.
One of the useful features of the CIMC is the keyboard, video, and mouse (KVM) con-
sole. Using the KVM console, you can directly connect to the console of the FMC, with-
out the need for dedicated KVM-based hardware.
Figure 4-5 shows the KVM Console option in the CIMC GUI. To access this GUI, use
the default username/password (admin/password), or reset these default credentials from
the CIMC Configuration Utility.
FMC Component Essentials 103
Figure 4-5 Launching the KVM Console Option in the CIMC GUI
104 Chapter 4: Firepower Management Center (FMC) Hardware
Note Linux Loader (LILO) is one of the most popular default boot loaders for Linux.
A boot loader is a small program that loads an operating system when you turn on a
computer system.
Figure 4-6 shows the System_Restore image in the LILO boot menu.
Figure 4-6 Selecting the System_Restore Image in the LILO Boot Menu
User Interfaces
After you power on any computer system, you need an interface that allows you to interact
with the system. This is the case with the FMC. In fact, the FMC has many different types
of user interfaces, depending on what you want to do. For example, you can use the GUI to
apply security policy and monitor events, you can use the CLI for advanced troubleshooting,
and you can use the text-based user interface (TUI) to configure any specific components
when the actual operating system is not loaded or installed. Figure 4-7 illustrates different
types of user interfaces for the FMC. Each dark box represents a unique type of interface.
Best Practices for FMC Reimage 105
POST
Turn On an FMC
Operation
BIOS setup? CIMC setup? RAID setup? Setup Complete LILO Boot
Press <F2> Press <F8> Press Ctrl+H Menu
Figure 4-8 Checksum Values of an ISO Image File Displayed in a Popup Box
■ You can use the Import/Export tool to copy any policies running on your FMC.
During an import, the versions of a restored system must match with the FMC from
where any policies are originally exported. Therefore, when you export, you must
remember the software and rule update version information of the original FMC.
Figure 4-10 shows the Import/Export page, which is located at System > Tools >
Import/Export.
■ If the FMC was previously licensed through the Cisco Smart Software Manager,
deregister the FMC gracefully from the user interface of the FMC. Otherwise,
periodic communication attempts from the Cisco License Authority may trigger
alerts for the Out-of-Compliance state. Figure 4-11 shows a red octagonal icon in the
Smart License Status page, which is located at System > Licenses > Smart Licenses.
This icon deregisters an FMC from the Smart License cloud.
108 Chapter 4: Firepower Management Center (FMC) Hardware
Button to de-register
FMC from the Cisco
Smart Software Manager
■ Never power off, shut down, or reboot the FMC when reimaging is in progress.
A login prompt appears after all the reimaging processes are complete.
■ Read the release notes to determine any known issues and any special requirements
or instructions before you begin reimaging or performing system restoration.
■ Access the GUI. You must use a supported browser. The list of supported browsers
for a particular version is available in the release notes.
Performing these tests will help you determine whether there are any hardware issues
before you deploy the FMC in a production environment and hence will help you avoid
any potential downtime.
Tip To learn the commands and tools that allow you to perform these tests, see the
“Verification and Troubleshooting Tools” section, later in this chapter.
Installing and Configuring the FMC 109
Fulfilling Prerequisites
You must fulfill the following requirements before you begin a new installation:
■ Upload the necessary software image to an HTTP server from where the FMC down-
loads it during reimaging. You can use an SCP or FTP server in lieu of an HTTP
server. However, you might find that an HTTP server is easier to set up and use to
host files.
■ If you choose to use an IP-based KVM console to connect to the FMC you want to
reimage, do not use any KVM with USB storage because the FMC may assume that
the USB storage is a boot device. Please read the official Hardware Installation Guide
to find out about any hardware-specific limitations.
Tip Although you can, you do not need to obtain a dedicated KVM switch for the FMC
because the CIMC of an FMC provides built-in KVM console functionality. See the sec-
tion “Cisco Integrated Management Controller (CIMC),” earlier in this chapter, to learn
more.
■ For reimaging purposes, if you want to connect your computer directly to the man-
agement interface (eth0) of the FMC with an RJ-45 cable, make sure the computer is
disconnected from the Internet (after you have downloaded any necessary software
from cisco.com) and has the following network settings:
■ IP address: 192.168.45.2
■ Subnet/netmask: 255.255.255.0
■ You need to be able to access the System_Restore image of the FMC to perform
reimaging. If the image is missing in the LILO boot menu or the LILO boot menu
itself does not appear, you will not be able to begin reimaging. Follow these steps to
access the System_Restore image:
Step 2. During the POST operation, press the F6 key to enter the boot menu.
Step 3. When the boot selection window appears, select HV. The hypervisor
(HV) partition stores the System_Restore image. If you are running an
older FMC model, you may see a different option, such as USB DISK
MODULE.
Figure 4-12 shows HV as an option in the boot menu of the FMC. You can
enter this boot menu by pressing the F6 key during the POST operation.
110 Chapter 4: Firepower Management Center (FMC) Hardware
Figure 4-12 Hypervisor (HV)—The Internal Storage Option in the Boot Menu
Step 4. Press Enter to boot the FMC with HV. The FMC should now load the
System_Restore image.
Configuration Steps
To reimage or restore the FMC with a Firepower software image, you must complete the
following key steps:
Figure 4-13 shows the steps to restore or reimage the FMC with a Firepower software
release. The following sections provide more details about these steps.
Installing and Configuring the FMC 111
6. Reboot the
system to initialize 4. Download and
when it prompts. mount the ISO.
Step 1. Download an appropriate ISO image for your FMC hardware model and store
it in a server from where the FMC will download the image. The example in
this chapter uses an HTTP server.
Step 2. Turn on the FMC. If the FMC is already running, reboot it. Example 4-1
shows that if you enter the reboot command with sudo (with root privilege),
you are prompted for the root password.
We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:
Password:
Step 3. During the initial bootup, BIOS displays several options, such as setup,
boot menu, and diagnostic. Unless you want to configure a hardware compo-
nent, do not press any key. The system displays the LILO boot menu in red.
Figure 4-14 shows the System_Restore image selected as the boot option. If
you do not select the System_Restore image within three seconds, the system,
by default, loads the pre-installed software image 6.1.0.
Figure 4-14 The LILO Boot Menu with the System_Restore Image Selection
Step 4. When the LILO boot menu appears, select the System_Restore option by
using an arrow key, then press the Enter key.
Step 5. Choose an appropriate display mode to boot. Example 4-2 shows the wel-
come message for the Sourcefire Linux operating system. This is what you see
after the System_Restore image is loaded. The example in this chapter uses
option 0—Load with standard console—as the display mode. Select option 0
for a keyboard and monitor connection. Option 1 is used for serial, Serial over
LAN (SOL), or Lights Out Management (LOM) connections.
Installing and Configuring the FMC 113
boot: System_Restore
Loading System_Restore
boot: 0
Step 6. A text-based user interface (TUI) starts and shows a copyright notice. Select
OK and press the Enter key to continue. The Cisco Firepower Appliance
Configuration Menu appears. Figure 4-15 shows a TUI for the Cisco
Firepower Appliance configuration menu.
Step 1. Select IP Configuration and press the Enter key. The Pick Device window
appears.
Figure 4-16 shows the eth0 interface selected as the management interface.
Step 2. Use the Spacebar to select eth0 as the management interface and press Enter.
The IP Configuration window appears.
Step 3. Select IP information, such as IPv4 or IPv6, Static or DHCP, and so on. (The
example in this chapter uses the IPv4 and Static options.)
Step 4. Enter an IP address, a netmask, and a default gateway for the FMC. At the end
of the IP configurations, when a verification window appears, press the Enter
key to return to the main configuration menu.
Step 1. Enter the Choose the Transport Protocol option from the main configuration
menu (see Figure 4-17) to define a file transfer method.
Step 2. Select HTTP as the transport protocol (see Figure 4-18). You could select FTP
or SCP instead, but you may find that an HTTP server is easier to build.
Step 3. Input the IP address of the HTTP server and press the Enter key.
Step 4. Enter the path on the HTTP server and press the Enter key. Keep it blank if
you stored the ISO file in the default directory of your web server.
Step 5. Use the Spacebar to select an ISO that you want to download and load into
your FMC. Figure 4-19 shows two ISO images. Both images are downloaded
from the cisco.com to the HTTP server. Select the Sourcefire_Defense_
Center_S3-6.1.0-330-Restore.iso image for FMC hardware.
Installing and Configuring the FMC 115
Step 7. In the window that prompts to confirm the HTTP configuration, select Yes
if everything looks good, and you will be returned to the main configuration
menu.
Step 1. In the main configuration menu, select the Download and Mount ISO option
(see Figure 4-20).
Step 2. Select Yes in the message that warns you that all existing data will be
destroyed (see Figure 4-21).
Step 3. Press the Enter key to continue. The ISO file is downloaded from the HTTP
server, and the main configuration menu reappears.
Installing and Configuring the FMC 117
Step 1. Select the Run the Install option from the main configuration menu
(see Figure 4-22). The FMC begins the installation process.
Depending on the state of the internal USB storage (that is, the System_
Restore image), output at this stage could be one of the following:
If the system does not ask for a confirmation to restore but instead prompts
you to press the Enter key to reboot the FMC from the internal USB, this
indicates that you have imaged just the internal storage, not the hard drive,
with the latest version of the System_Restore software.
Example 4-3 shows a confirmation message indicating that the USB device,
not the hard drive, is imaged. It also instructs you to reboot the FMC from
the USB device to continue installation.
Example 4-3 Confirmation Message for a Successful Image of the Internal USB
Checking Hardware
The USB device was successfully imaged. Reboot from the USB device to continue
installation...
##################################
######
The system will restart after you press enter.
This happens when the FMC has been running an older version than the ver-
sion you are trying to reimage to. If the internal storage of the FMC does not
have a System_Restore image from the same software version you are trying
to reimage to, the FMC reimages the internal storage, and then it reloads the
FMC with the upgraded System_Restore image.
Step 2. Select System_Restore and repeat all the steps one more time. That is,
redownload and remount the ISO file from your server, rerun the installation
on the FMC, and so on.
Step 3. If the system prompts for your confirmation to restore, type yes and press the
Enter key to continue.
Step 4. After you press the Enter key, let the system know if you want to preserve
the existing license and network settings. If you want to redeploy the FMC in
exactly the same network and want to reuse the previously used license and
network settings, enter no. If you plan to deploy the FMC in a completely
new environment and want to wipe out the previous settings, enter yes.
Step 5. Enter yes when the final confirmation message appears. The software installa-
tion begins.
Caution If you choose to delete the previous license and network settings, make sure you
have a copy of the licenses or that you are able to regenerate the licenses from cisco.com.
Installing and Configuring the FMC 119
Example 4-4 shows the questionnaire before the installation begins. The sys-
tem warns you about the permanent data loss and provides an option to keep
the already configured license and network.
Checking Hardware
####
This CD will restore your Defense Center S3
to its original factory state. All data will be destroyed
on the appliance.
Caution Do not reboot or power off a system while the installation is in progress.
###############
####
120 Chapter 4: Firepower Management Center (FMC) Hardware
Step 6. When the system confirms that the installation is complete and prompts you
to reboot, press the Enter key to reboot the system.
Step 1. After the reboot, the FMC should display the LILO boot menu and should
load the 6.1.0 image automatically. Figure 4-23 shows that Firepower Version
6.1.0, which has just been installed, is loaded automatically after a three-
second timeout.
Tip If the LILO boot menu does not show an option for Version 6.1.0 and only shows an
entry for System_Restore, reload the FMC with the upgraded System_Restore image and
repeat all the earlier steps one more time.
Step 2. The system automatically begins the initialization process, which takes some
time. Be patient.
Caution Do not reboot or power off a system while the initialization is in progress.
Example 4-6 shows many scripts executing during the initialization process.
The process may take more than 30 minutes to complete.
Installing and Configuring the FMC 121
<command output>
.
.
.
********** Attention **********
Executing S09database-init [ OK ]
Executing S10_001_install_symmetric.pl [ OK ]
Executing S11database-populate [ OK ]
<command output>
.
.
.
<command output>
Executing S50install-remediation-modules [ OK ]
Executing S51install_health_policy.pl [ OK ]
Executing S52install_system_policy.pl [ OK ]
Executing S53change_reconciliation_baseline.pl [ OK ]
Executing S53createcsds.pl [ OK ]
Executing S85patch_history-init [ OK ]
Executing S90banner-init [ OK ]
Executing S95copy-crontab [ OK ]
Executing S96grow_var.sh [ OK ]
Executing S96install_sf_whitelist [ OK ]
Executing S96install_vmware_tools.pl [ OK ]
Step 3. When the initialization is complete, the Firepower login prompt appears.
Enter the default username (admin) and password (Admin123) to log in to the
CLI (see Example 4-7).
Example 4-7 Logging In to the CLI of the FMC After the Initialization Is Complete
admin@FMC4000:~$
The command prompt at the end of Example 4-7 confirms that the installation is com-
plete. The next step is to verify the network connectivity on the management interface
and begin the registration process.
Step 1. Log in to the CIMC of your FMC through Secure Shell (SSH). Example 4-8
shows a successful login attempt from a Linux host to the CIMC of the FMC.
Verification and Troubleshooting Tools 123
Tip If you are unable to remember the IP address or the password, you can change it
from the CIMC configuration utility (by pressing F8 during the POST operation).
Step 2. When you are in the CIMC shell, enter the chassis command mode:
Step 3. Run the set locator-led command to enable or disable the LED:
Example 4-9 shows the whole process of managing the locator LED on
the FMC.
admin@FMC4000:~$
However, you can also run the sfcli command on demand to get all types of software ver-
sions and hardware model information as output. Example 4-11 confirms the hardware
model as well as the software, rule update, and VDB versions of the FMC.
admin@FMC4000:~$
Example 4-12 The RAID Battery Status Displayed in the MegaCLI Command Output
admin@FMC4000:~$
Table 4-4 explains the meaning of the power supply fault LED that is located at the rear
of an FMC (FMC 2000 or FMC 4000 chassis).
Apart from checking the LED status, you can also investigate an issue with a PSU from
the CLI or the GUI (assuming that the FMC is turned on and receives power from at least
one of the PSUs). Example 4-13 shows that Power Supply 1 (PS1) has lost power, and
Power Supply 2 is working.
admin@FMC4000:~$
126 Chapter 4: Firepower Management Center (FMC) Hardware
You can also confirm a failure event by using the IPMI tool. Example 4-14 demonstrates
redundancy as soon as one PSU loses power. The FMC in this example receives power
from the second PSU.
2cf | 10/12/2016 | 18:42:33 | Power Supply #0x26 | Power Supply AC lost | Asserted
2d0 | 10/12/2016 | 18:42:33 | Power Supply #0x3a | Redundancy Degraded | Asserted
2da | 10/12/2016 | 18:43:58 | Power Supply #0x3a | Non-Redundant: Sufficient from
Redundant | Asserted
admin@FMC4000:~$
Example 4-15 shows many different components (such as voltage, temperature, and so
on) related to FMC power supplies, their values, and their current statuses.
When an alert appears, click on the health status icon. A red exclamation point indicates
a critical alert, and a yellow triangle indicates a warning.
Figure 4-25 shows a critical health status icon when an FMC detects a PSU failure. After
you click on the icon, a small window appears on top of the regular GUI. Select the
Health tab to find the cause for an alert.
Figure 4-26 shows an alternative way to find descriptions for any health alerts—by
navigating to the Health Monitor page at System > Health > Monitor.
128 Chapter 4: Firepower Management Center (FMC) Hardware
Caution Pulling a power cord without a graceful shutdown can corrupt the database and
file system of the FMC. You may have to reimage the whole system to recover from any
database issues.
Caution The waiting period is necessary to discharge any internal electrical charges.
PSU Checklist
You have learned various techniques to investigate issues with PSUs. The following is a
list of the items that need to be verified:
■ Check to see whether the fan on the faulty power supply unit is running.
You can also confirm the status of a fan from the CLI. There are two ways to determine
the status of the fans: by reading a log file and by running a command. Example 4-16
shows the information that is logged into the fans.status file.
Example 4-16 Output of a Log File That Shows the Status of Various Fans on the FMC
If the output is too long, you can use the grep command, which is a regular expression
tool that allows you to view concise output with desired keywords.
Example 4-17 shows the alert levels (green or amber) of the fans in the FMC. This is a
concise view of the fans.status log file.
Example 4-17 Determining the Fan Status LED from the CLI
You can also see the current status of the fans by running the ipmitool command with
specific parameters. Example 4-18 shows the alert levels (green or amber) of the fans in
the FMC. This is a concise view of the fans.status log file.
132 Chapter 4: Firepower Management Center (FMC) Hardware
Summary
This chapter discusses and compares various hardware platforms for the FMC. It illustrates
the complete reimaging (also known as system restore) process and describes best practices
for reimaging. This chapter also shows many different commands and tools that can help
you determine whether you have any issues with FMC hardware.
Quiz
1. Which step is unique when reimaging the FMC from an older 5.x version to 6.1
directly?
a. FMC supports reimaging from 5.x to 6.1 with zero downtime.
b. You need to go through the System_Restore reimage process twice.
c. Reimaging an FMC from 5.x to 6.1 is not supported.
d. There is no need to reimage; just download the single Version 6.1 upgrade file and
install it directly.
2. Which command shows the status of the RAID battery on the FMC?
a. sudo megacli -AdpBbuCmd -aAll | grep -i battery
b. megacli -AdpBbuCmd -aAll | egrep -i battery
c. MegaCLI -AdpBbuCmd -aAll | grep battery
d. sudo MegaCLI -AdpBbuCmd -aAll | grep -i battery
7. Which command shows the Firepower software version and hardware platform
detail?
a. show version
b. sfcli version
c. show sfr version
d. sfcli.pl show version
This page intentionally left blank
Chapter 5
In the previous chapters, you have learned how to install the Firepower System software
on Cisco hardware. If you choose not to purchase any additional hardware, you can still
deploy the Firepower System in your existing virtual infrastructure. You can choose to
virtualize both or one of the Firepower appliances—either the Firepower Management
Center (FMC) or Firepower Threat Defense (FTD). This chapter discusses the
implementation of FMC Virtual and FTD Virtual in VMware—one of the most popular
virtual environments.
Table 5-1 provides a list of virtual environments that are compatible with Firepower
Version 6.1.
136 Chapter 5: Firepower System Virtual on VMware
Note The Firepower software Version 6.1 does not support Microsoft virtualization
platforms. The support of Azure begins from the Firepower software Version 6.2 or greater.
To manage a virtual appliance on a VMware ESXi server, you can use vCloud Director,
vCenter, or vSphere Client. vSphere Client has two different variations—web and
desktop—both of which are supported by the Firepower virtual appliances.
To host a Firepower virtual appliance, you can use VMware ESXi 5.5 and 6.0, but the
following solutions are unsupported:
■ VMware Workstation
■ VMware Server
■ VMware Player
■ VMware Fusion
ESXi Versus VI
The tarball (.tar.gz file) of a Firepower virtual appliance includes templates for ESXi or the
virtual infrastructure (VI). The key difference between them is the initial setup process,
which includes configuring the network, setting up a password for the admin account,
and so on.
The examples in this chapter use the ESXi OVF template to deploy a Firepower virtual
appliance on VMware.
■ Open Virtual Format (.ovf) file: An XML file that stores references to many
elements of a Firepower System installation package
FMC and FTD Virtual Essentials 137
■ Virtual Machine Disk (.vmdk) file: A compressed virtual disk that stores the
Firepower System software
■ Manifest (.mf) file: A clear-text file that stores the SHA1 digests of any OVF and
VMDK files in a package
Figure 5-1 shows the files that are packaged in a tarball for a Firepower virtual appliance
Version 6.1.
■ Thick Provision Lazy Zeroed: Space for a virtual disk is allocated during its creation
but zeroed out later.
■ Thick Provision Eager Zeroed: The space allocation and zeroing out of the data are
performed at the time of virtual disk creation. Therefore, this method might take
more time.
■ Thin Provision: Disk space is allocated on an on-demand basis. The size of a virtual
disk grows whenever there is a need, up to the maximum allocated limit.
Figure 5-2 shows these three options for provisioning a virtual disk on an ESXi host
using the vSphere Client software. The examples in this book use the Thick Provision
Lazy Zeroed option.
138 Chapter 5: Firepower System Virtual on VMware
file and a .qcow2 file that are packaged for VMware and KVM, respectively. You can
download them from the Cisco Software Download page.
■ After you download an appropriate file for a Firepower virtual appliance from
cisco.com, always verify the MD5 or SHA512 checksum of the files you have
downloaded to confirm that the file is not corrupt and has not been modified during
download. Figure 5-4 shows how the MD5 and SHA512 checksum values for the
FTD Virtual installation package are displayed at cisco.com when you hover your
mouse over a filename.
Figure 5-4 Checksum Values of the FTD Installation Package Displayed in a Popup Box
140 Chapter 5: Firepower System Virtual on VMware
Tip Inside a tarball, you will find a manifest file (*.mf) that stores the individual SHA1
checksum values of the *.vmdk and *.ovf files in a tarball.
■ Read the release notes to determine any known issues, any special requirements, and
any instructions before you begin reimaging or performing a system restoration.
■ If your ESXi server has unused resources, you can allocate them to your Firepower
virtual appliance. Allocating additional resources can enhance system performance.
However, reducing any resources from the minimum requirement is unsupported.
You can find the minimum requirements in the “Fulfilling Prerequisites” section, later
in this chapter.
■ You can replace the E1000 network adapters with the VMXNET3 adapters for
higher throughput.
Tip The steps to upgrade a default E1000 adapter with a VMXNET3 adapter are
described in the “Verification and Troubleshooting Tools” section, later in this chapter.
■ As a part of the disaster recovery plan, you should periodically make a backup of
the existing events and configurations. Do not use any VMware-provided built-in
features to make a backup of a Firepower virtual appliance. Instead, use the FMC’s
Backup/Restore tool. Figure 5-5 shows the FMC Backup Management page. It is
located at System > Tools > Backup/Restore.
Table 5-2 shows some of the backup tools provided by VMware. The Firepower
virtual appliances do not support these tools.
Table 5-2 VMware Backup and Migration Tools (Not Supported by Firepower)
Feature VMware Purpose
vMotion Migration of a running virtual machine from one physical server to
another, without any downtime
Cloning Duplication of a virtual machine with the same configurations and
applications
Snapshot Saving of any particular state of a virtual machine
■ You can also use the Import/Export tool in the FMC to copy a policy. During an
import, the versions of a restored system must match with the FMC from which
any policies were originally exported. Therefore, when you export, you must
remember the software and Rule Update version information of the original FMC.
Figure 5-6 shows the Import/Export page, which is located at System > Tools >
Import/Export.
Step 3. Deploy the OVF file for the desired Firepower appliance.
Figure 5-7 shows the key steps in deploying a Firepower virtual appliance on a VMware
ESXi host.
Fulfilling Prerequisites
You must fulfill the following requirements before you install a Firepower virtual
appliance:
■ To deploy any Firepower software, your server must have a 64-bit CPU that supports
the virtualization technology.
■ You must enable the virtualization functionality from the BIOS setup utility.
Figure 5-8 shows Intel Virtualization Technology enabled in the BIOS setup utility.
Depending on the hardware vendor of an ESXi server, a setup utility may look
different from this.
■ After you build an ESXi host, connect to the host by using vSphere Client. You can
use either a web client or a desktop client.
Figure 5-9 shows the default home page of an ESXi host. To view this page, enter the
IP address of your ESXi server into a browser. This page provides you with a link to
download the vSphere Client software.
Download
Link
Click to Save
the File
Figure 5-9 Download Link for vSphere Client on an ESXi Home Page
■ Whether your ESXi host runs Version 5.5 or Version 6.0, ensure that your Firepower
virtual appliance is allocated the minimum amount of resources. Do not reduce the
settings from the minimum requirements. Table 5-3 shows the minimum requirements
for a Firepower virtual appliance.
Tip Read the “Verification and Troubleshooting Tools” section, later in this chapter, to
learn how to add an additional resource.
Figure 5-10 shows a topology created inside a virtual network. An ESXi host, FMC, and
FTD are connected to a management network, and data from inside the network can
traverse to the Internet. All the servers are placed in a DMZ network.
End Users
192.168.1.10
Outside
Inside Network
Network vmnic1 vSwitch1 vSwitch2 vmnic2
Internet
Service
vSwitch3 Provider
vmnic3
DMZ Network
Server Farm
The number of steps to create a virtual topology could be different, depending on the
number of required interfaces on a particular appliance you want to deploy. For example,
by default, FMC Virtual requires only one interface for management communication,
whereas FTD Virtual requires four interfaces—one interface for management
communication and three interfaces for traffic inspection.
In the next few pages, you will learn how to create the virtual network shown in
Figure 5-10 on a VMware ESXi host, using vSphere Client software.
Figure 5-11 shows a default virtual switch vSwitch0 that is created by the ESXi host.
A physical adapter vmnic0 is connected with two default virtual ports: Management
Network and VM Network.
The Management Network port is automatically mapped with the management interface
of the ESXi host. The VM Network port is available for use. You can use it as the
146 Chapter 5: Firepower System Virtual on VMware
management interface for your FMC virtual appliance. To make it clear and meaningful,
you could optionally rename the default labels by following these steps:
Step 1. Click the Properties option next to Standard Switch: vSwitch0. The vSwitch0
Properties window appears. Figure 5-12 shows two virtual ports created by
the ESXi host during installation.
Ports with
Default Label
Step 2. Select the VM Network port and click the Edit button. The VM Network
Properties windows appears, as shown in Figure 5-13. This is where you can
edit the default port VM Network.
Step 4. Optionally, select the Management Network port, click the Edit button,
and then change Network Label from Management Network to VMware
Management and click OK.
Figure 5-14 shows the vSwitch0 Properties window with both of the ports
renamed. From the new labels, it is now easy to see the purpose of each port.
Step 5. Click Close to return to the Networking view, where you can find the newly
labeled virtual ports connected to the same physical adapter.
If you plan to deploy FTD Virtual, read the next section. Otherwise, proceed to the
section “Deploying an OVF Template.”
148 Chapter 5: Firepower System Virtual on VMware
Ports with
Custom Label
Step 2. Select the Add Networking option, as shown in Figure 5-15. (In this window,
you can also see the new labels of the default virtual ports that you renamed
in the previous section. Both of them are connected to the vmnic0 physical
adapter.) The Add Network Wizard window appears.
Installing and Configuring a Firepower Virtual Appliance 149
Figure 5-15 The Default Virtual Switch vSwitch0 After the Label Change
Step 3. Select Virtual Machine as the connection type, as shown in Figure 5-16.
Figure 5-16 Different Types of Connection Types in the Add Network Wizard
Step 4. Select an existing virtual switch (vSwitch) or create a new one that can map
a physical adapter with a virtual port. You can configure each vSwitch to
represent a segregated virtual network. Figure 5-17 shows that vmnic0 is
mapped with vSwitch0, which connects the FTD Virtual management port.
150 Chapter 5: Firepower System Virtual on VMware
Figure 5-17 Virtual Switch Mapping a Virtual Port with a Physical Adapter
Step 5. Replace the default Network Label setting with a meaningful name
(see Figure 5-18). Note that this window allows you to preview the mapping
of a virtual port with a physical adapter.
Step 6. Click Next to view a summary. Click Finish to complete the configuration of
the vSwitch port group for the FTD Management network.
Step 7. Repeat Steps 1–6 at least three more times to create the remaining three
vSwitches that are mandatory on an FTD virtual appliance.
Installing and Configuring a Firepower Virtual Appliance 151
Figure 5-18 Connection Settings and Port Group Properties for the Network Adapters
Table 5-4 shows the mapping between the virtual ports and physical adapters that is used
in the configuration example of this chapter.
Table 5-4 Mapping Between the Virtual Ports and Physical Adapters
Virtual Port Physical Adapter Purpose
FTD Management vmnic0 For management traffic
Inside Network vmnic1 For internal network
Outside Network vmnic2 Toward the outside world
DMZ Network vmnic3 Network for the server farm
Figure 5-19 shows the final view of the networking configuration page after you create
four virtual ports and map them with four individual physical adapters. Each vSwitch can
be configured separately by using the Properties option.
152 Chapter 5: Firepower System Virtual on VMware
Figure 5-19 Four Virtual Ports Mapped with Four Separate Physical Adapters
The following steps describe how to enable promiscuous mode on the management
interface of an FTD virtual appliance. You can also use these steps to enable promiscuous
mode on any data interfaces:
Step 1. Select the Properties option next to vSwitch0. The vSwitch0 Properties
window appears, as shown in Figure 5-20. (In this window, you can select any
virtual port to find the Promiscuous Mode status, which is Reject, by default.)
Step 2. Select the port on which you want to enable promiscuous mode and click
Edit. The Properties window appears.
Step 3. Select the Security tab. All the options, including the Promiscuous Mode
option, are unchecked by default.
Installing and Configuring a Firepower Virtual Appliance 153
Figure 5-20 The Properties Option That Allows You Edit a vSwitch
Step 4. Check all the boxes and select Accept from each dropdown, as shown in
Figure 5-21.
Step 5. When you are done, click OK to return to the vSwitch Properties window.
Click the Close button to complete the configuration.
Step 6. Repeat Steps 1–5 for all the interfaces on an FTD virtual appliance.
Caution Enabling all the above options on all the FTD interfaces is a requirement.
Failure to enable any single option on a single FTD interface can lead to an unexpected
technical issue.
154 Chapter 5: Firepower System Virtual on VMware
Step 1. In vSphere Client, from the File menu, select the Deploy OVF Template
option (see Figure 5-22). The Deploy OVF Template window appears.
Step 2. Click Browse and choose an appropriate OVF file for your virtual appliance.
(Figure 5-23 shows the Cisco_Firepower_Threat_Defense_Virtual-
ESXi-6.1.0-330.ovf file selected for deployment.) Click Next to continue.
Note If you want to deploy FMC Version 6.1 on an ESXi host, select the Cisco_Firepower_
Management_Center_Virtual_VMware-ESXi-6.1.0-330.ovf file. Similarly, to deploy FTD
Version 6.1, select the Cisco_Firepower_Threat_Defense_Virtual-ESXi-6.1.0-330.ovf file.
Installing and Configuring a Firepower Virtual Appliance 155
Figure 5-22 Navigating to the Deploy OVF Template Option in vSphere Client
Step 3. Verify that all the information in the OVF Template Details window is correct
(see Figure 5-24). If everything looks good, click Next to continue.
Step 4. Specify a unique name for your virtual appliance. Figure 5-25 shows the
custom name FTD for the virtual appliance. Keep in mind that this name must
be unique within the inventory. Click Next.
Step 5. Select a disk format type for the virtual disk, such as the Thick Provisioned
Lazy Zeroed (as shown in Figure 5-26), and click Next.
Tip Refer to the section “Disk Provisioning Options,” earlier in this chapter, to learn
about different types of disk formats.
Step 6. In the Network Mapping window, shown in Figure 5-27, map the destination
networks (virtual ports) with the source networks (interfaces on a virtual
appliance). Use the dropdown to find an appropriate interface. Figure 5-27
shows the selection of the FTD Management virtual port for the management
interface of an FTD virtual appliance.
Note The number of networks you need to map depends on the type of virtual appli-
ance. Remember that an FMC virtual appliance must have at least one interface, and an
FTD virtual appliance must have at least four interfaces.
Installing and Configuring a Firepower Virtual Appliance 157
Figure 5-28 shows all the interfaces on an FTD virtual appliance after they are
mapped with separate virtual ports.
Step 7. When you finish mapping the network, click Next. A summary of all the
settings is displayed, as shown in Figure 5-29. If everything looks good, click
Finish to complete the configuration.
Figure 5-29 Final Prompt to Confirm the Settings of an FTD Virtual Deployment
Initializing an Appliance
Use the following process to begin the initialization of any Firepower virtual appliances
(either FMC or FTD):
Step 1. Select the desired virtual appliance from the inventory, as shown in
Figure 5-32.
Installing and Configuring a Firepower Virtual Appliance 161
1 4
Figure 5-32 Beginning an Initialization Process and Watching the Status on the
Console Tab
Step 4. When the initialization begins, view the status in the Console tab.
Example 5-1 shows the completion of the Firepower software initialization on VMware.
As you can see, you can enter the CLI by using the default credentials—username admin
and password Admin123.
Example 5-1 Login Prompt for an FMC Virtual Appliance After Initialization
Completion
admin@firepower:~$
Example 5-2 Accepting the EULA and Configuring the Network to Get to the CLI
Prompt of an FTD Virtual
You can register the sensor to a Firepower Management Center and use the
Firepower Management Center to manage it. Note that registering the sensor
to a Firepower Management Center disables on-sensor Firepower Services
management capabilities.
However, if the sensor and the Firepower Management Center are separated by a
NAT device, you must enter a unique NAT ID, along with the unique registration
key.
'configure manager add DONTRESOLVE [registration key ] [ NAT ID ]'
Later, using the web interface on the Firepower Management Center, you must
use the same registration key and, if necessary, the same NAT ID when you add
this sensor to the Firepower Management Center.
>
The > prompt at the end of Example 5-2 confirms that the installation is totally complete.
The next step is to verify the network connectivity on the management interface and
then begin the registration process. (Chapter 6, “The Firepower Management Network,”
explains the management connection, and Chapter 7, “Firepower Licensing and
Registration,” describes the registration process.)
Network Port/Interface
■ Virtual machine settings editor: This editor allows you to view, add, or remove
resources allocated to a virtual machine. There are two ways to navigate to the
virtual machine settings editor (see Figure 5-34):
■ Option 1: Right-click the name of a virtual appliance from the inventory list and
select the Edit Settings option. The Virtual Machine Properties window appears.
Verification and Troubleshooting Tools 165
■ Option 2: Go to the Getting Started page and click on the Edit Virtual Machine
Settings option under Basic Tasks. The Virtual Machine Properties window
appears.
Option 1
Option 2
Step 1. From the inventory list, select the virtual appliance that does not display an
interface properly.
Step 2. Open the Virtual Machine Properties window for a virtual machine, using one
of the two options described in the previous section.
Step 3. From the Hardware list, select the network adapter that is not functioning
properly, as shown in Figure 5-35.
Step 4. Under Device Status on the right side of the window, make sure both
options—Connected and Connect at Power On—are checked. Figure 5-35
shows the status of the FTD management interface. It is currently connected,
and it is configured to be connected when the FTD virtual appliance is
powered on.
166 Chapter 5: Firepower System Virtual on VMware
Figure 5-35 The Connected and Connect at Power On Options of a Network Adapter
Tip If you are still experiencing an issue with a network adapter, did you complete
all the steps when you enabled promiscuous mode? Go back to the windows shown in
Figure 5-20 and Figure 5-21 and verify whether your vSwitch properties match the settings
shown in those images.
On any given virtual appliance, all the adapters have to be the same type. In other words,
if you want to upgrade the type of an adapter, you must upgrade it for all the interfaces
on any single virtual interface. It is, however, not a requirement to have the same type
Verification and Troubleshooting Tools 167
of network adapters on all the virtual appliances in any network. For example, if the
management interface of an FMC virtual appliance is an E1000 adapter, it should be
able to communicate with an FTD virtual appliance that has VMXNET3 type network
adapters.
To upgrade a network adapter from the default type E1000 to VMXNET3, follow
these steps:
Step 1. Gracefully shut down the virtual appliance on which the new adapter will be
added by running the shutdown command on the VMware console:
admin@FMCv:~$ sudo shutdown -h now
Caution Do not power off a virtual appliance manually. Doing so could corrupt the
Firepower System database. Instead, issue the shutdown command from the VMware
console.
Step 2. Edit the virtual machine settings and open the Virtual Machine Properties
window. Figure 5-36 shows all the hardware resources that are allocated to an
FTD virtual appliance in the FTD – Virtual Machine Properties window.
Step 3. Click the Remove button and delete the network adapter that you want to
upgrade from E1000 to VMXNET3.
Step 4. Add a new VMXNET3 interface by clicking the Add button in the Virtual
Machine Properties window. Then, in the Add Hardware window that appears
(see Figure 5-37), select Ethernet Adapter from the device list.
Step 5. Select VMXNET3 from the Adapter Type drop-down. Figure 5-38 shows
three types of network adapters: E1000, VMXNET2 (Enhanced), and
VMXNET3. As of this writing, Firepower software does not support the
VMXNET2 (Enhanced) adapter.
Step 6. Make sure the Network Label setting (that is, the association of a network
with an adapter) is accurate and ensure that Connect at Power On is checked.
Click Next when you are done.
Step 7. In the Ready to Complete window, shown in Figure 5-39, check all the adapter
settings and click Finish if everything looks good.
Step 8. If your virtual appliance has more than one network adapter (for example, an
FTD virtual appliance must have at least four interfaces), repeat Steps 1–7 as
many times as needed to upgrade all the other adapters to the same type.
Figure 5-40 shows the Virtual Machine Properties window after the manage-
ment interface is replaced with a VMXNET3 adapter.
Verification and Troubleshooting Tools 169
Step 9. Click OK in the Virtual Machine Properties window to save the changes and
power on the virtual appliance.
Summary
This chapter describes various aspects of Firepower virtual appliances. You have learned
how to deploy a virtual appliance, how to tune the resources for optimal performance,
and how to investigate issues with a new deployment.
Quiz
1. Which file can be deployed directly into an ESXi host?
a. tar.gz
b. VMDK
c. OVF
d. MF
Quiz 171
3. Which of the following options should not contribute to any connectivity issues
between two Firepower virtual appliances?
a. The network adapter is configured as connected.
b. The Connected at Power On option is checked.
c. Promiscuous mode is enabled.
d. The network adapter types of two appliances are different.
After you install the Firepower software, you might wonder how to manage a Firepower
Threat Defense (FTD) system. For a smaller network, you can use the browser-based
on-box application—the Firepower Device Manager (FDM)—which can manage one
FTD device with limited functionalities. However, for a medium- to large-scale network,
you must use the Firepower Management Center (FMC). Regardless of how you manage
FTD, it is important that you properly design and configure the management network to
secure the control traffic.
Management Interface
FTD uses the logical management interface to complete the registration process with
the FMC and to establish a secure tunnel with the FMC. The tunnel, thereafter, is used
to set up the FTD, apply policies to the FTD, and transfer events from FTD to the
FMC. During the FTD installation process, when you provide an IP address for the
FTD management interface, it is actually assigned to the logical management interface.
Figure 6-2 illustrates the relationships between different logical interfaces with
different software codes and how they are displayed on the CLI.
Inside Interface
(Physical)
Outside Interface
(Physical)
Connected to
Mgmt. Interface
Logical Management
Firepower code.
(Phys ca )
Interface
CLI shows as br1.
Connected to ASA
Logical Diagnostic
code. CLI shows
Interface
as Management x/x.
The diagnostic interface, on the other hand, is an optional logical interface. Cisco
recommends that you not configure the diagnostic interface with an IP address if
there is no router between the management network and the inside network. This
also simplifies your network design and reduces configuration overhead.
Note Each of the FTD data interfaces is required to be on a different network. When
a diagnostic interface is configured with an IP address, FTD considers it to be a data
interface. Therefore, the diagnostic interface (which must be on the same subnet as the
logical management interface, br1) and the inside interface must be on two different
subnets. To transfer traffic between two different subnetworks, a router is necessary.
Figure 6-3 shows the location of the management interface on the Firepower security
appliances.
FXOS Management Interface
Firepower 9300
Firepower 4100
Figure 6-4 categorizes the possible scenarios for deploying FTD with the FMC:
Firepower
Management Network
■ Management interfaces are on the same subnet: You can configure the management
interfaces of the FMC and FTD on the same subnetwork and connect them through
a Layer 2 switch. The Layer 2 switch for a management network could be completely
out-of-band or placed in a network where other servers are currently deployed.
Figure 6-5 shows a deployment in which the management interfaces of the FMC and
FTD are configured out-of-band.
■ Management interfaces are on different subnets: The FMC and FTD can be
deployed in two different subnets or branch offices of your company, or even in two
different countries. In such a case, you need a router to route the management traffic
between Firepower systems.
Firepower System Management Network Essentials 177
Management Communication
Server Farm
from FTD to FMC
DMZ Network
Mgmt.
Interface
Management Network
Gateway
Layer 2 Device
Router
Same Subnet
FMC Internet
Administrator
Mgmt.
Interface
Inside Network
Inside Outside
Interface Interface
FTD
Figure 6-6 shows a design where the management interface of the FMC is connected
to two FTD systems that are located at two different networks—one FTD system
is in the same DMZ network as the FMC, and the other FTD system is in a separate
inside network.
If you do not assign an IP address to the logical diagnostic interface, you can con-
figure the logical management interface and inside interface within the same Layer 2
network and use the inside interface as the gateway for the logical management inter-
face. This allows the FTD to communicate with the FMC over the Internet. However,
if you configure the logical diagnostic interface with an IP address anyway (which is
not recommended), you end up adding a router between your management network
and inside network.
178 Chapter 6: The Firepower Management Network
Management Communication
Server Farm Layer 2 Device from FTD to FMC
Same Subnet FTD Combination of Same and
Inside Outside
Different Subnets
DMZ Network
Interface Interface
Mgmt.
FMC Interface
Gateway
Router
Internet
Layer 3 Device
Administrator Different Subnet
Mgmt.
Interface
Inside Network
Inside Outside
Interface Interface
FTD
Figure 6-6 FMC Connected with FTDs Simultaneously at Different and Same Subnets
Caution Be mindful when you consider sending Firepower management traffic through
the FTD inside interface. If the inside interface flaps, FTD and the FMC can experience
intermittent communication failures. If the inside interface goes down, FTD loses its
connection to the FMC completely. In this circumstance, a console connection to FTD is
critical for investigating the connectivity issue. If console access is not provisioned,
you cannot troubleshoot further until physical access to the FTD is possible.
Note When a Firepower appliance uses a private IP address for its management interface
and needs to communicate with another Firepower appliance over the Internet, the private
IP address has to be translated to a publicly routable IP address. It is usually performed
by a router or firewall using Network Address Translation (NAT). When an intermediate
device translates the management IP address of a Firepower appliance, the FMC and FTD
must use a unique NAT ID during the registration process.
Figure 6-7 shows FTD systems positioned in various locations in a company and
connected through the Internet.
Firepower System Management Network Essentials 179
Management Communication
Server Farm from FTD to FMC
FTD Through the Internet
Inside Outside
Data Center
Interface Interface
Gateway
Mgmt. Router
Interface
Internet
Gateway
Mgmt. Router
Corporate Office
Interface
Gateway
Branch Office
Router
Inside Outside
Interface FTD Interface
Until an FTD system is registered with the FMC, the web interface does not let you con-
figure the inside and outside interfaces. Hence, you are unable to select the inside inter-
face as a gateway for the management interface until the inside interface is configured and
enabled. To address this challenge, follow these steps:
Step 1. Register FTD with the FMC without sending the management traffic through
an inside interface. At this point, you can connect the management interfaces
of FTD and the FMC directly through a Layer 2 or Layer 3 device. (Refer to
Figure 6-5.)
Step 2. After the registration is complete, configure the inside and outside interfaces.
Step 3. When the inside and outside networks are able to communicate with each
other, gracefully delete the existing registration between the FMC and FTD.
Step 5. Reregister the FTD with the FMC. This time, the management traffic should
go through the inside network to the FMC in the outside network.
180 Chapter 6: The Firepower Management Network
■ You should segregate the management traffic from the data traffic. Keeping the
management network out-of-band secures the control-plane traffic in the event that
the data network is attacked.
■ Although the Firepower System allows you to change the default port for
management communication, Cisco strongly recommends that you use the default
port TCP 8305.
Note When you reimage a previously configured FMC, the FMC prompts you to con-
firm whether you want to keep the prior network settings during the reimaging process.
Chapter 4, “Firepower Management Center (FMC) Hardware,” describes the reimaging
process in detail.
Configuration Options
You have several options for configuring or modifying the management IP address of the
FMC. You can change the IP address during your first login to the FMC web interface or,
later, you can use the GUI or CLI to modify the management IP address. These options
are detailed in the following sections.
Note The default username and password for the FMC are admin and Admin123,
respectively.
Figure 6-8 shows the initial landing page of the FMC. This page appears when you enter
the management IP address on a browser for the first time.
Management IP Address
After updating the default settings, you need to accept the end user license agreement
(EULA) and click the Apply button.
Caution As soon as you apply a new management IP address, any SSH or HTTPS session
to the FMC is disconnected. You have to reconnect to the FMC by using the updated IP
address.
Figure 6-9 shows the check box that you must select to accept the EULA and complete
the system initialization.
182 Chapter 6: The Firepower Management Network
Figure 6-9 Accepting the FMC End User License Agreement (EULA)
Caution If the FMC is currently managing any FTDs, deregister them from the FMC
before you change the management IP address. After you apply the new IP address,
reregister them with FMC. Doing this helps you avoid any potential registration or
communication issues.
Step 3. Select the Management Interfaces option in the left panel, as shown in
Figure 6-10.
Step 4. In the Configuration page, use the pencil icon to modify the IP addresses.
In the Interfaces section, you can enter an IP address for the management
interface. Similarly, in the Routes section, you can provide the gateway
IP address.
Step 5. When all the necessary network settings are entered, click the Save button
at the bottom of the page to save your changes. You are done, and now you
should be able to access the FMC by using the new IP address.
Example 6-1 shows the network configuration of a management interface on the FMC. It
manually assigns 10.1.1.16/24 for the interface address and 10.1.1.1 for the gateway.
184 Chapter 6: The Firepower Management Network
We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:
Password:
First, run the ping test from the CLI of the FMC to the management interface of your
FTD device.
Example 6-2 shows a successful ping test from the FMC to 10.1.1.2—the IP address of
the management interface. The ping command on the FMC requires root privilege, so you
need to run sudo with the ping command.
Configuring a Management Network on FMC Hardware 185
Example 6-2 Successful Ping Test Between the FMC and FTD
If the ping test from the FMC to FTD is unsuccessful, check whether the FMC can
ping the gateway. Example 6-3 confirms the IP address of the gateway, 10.1.1.1,
for eth0—the management interface of the FMC.
admin@FMC:~$ route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 10.1.1.1 0.0.0.0 UG 0 0 0 eth0
10.1.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
admin@FMC:~$
If the FMC can successfully ping the gateway but fails to ping FTD, there must be a
routing issue between the FMC and FTD. You can run the traceroute tool on the
Firepower System to investigate this issue further, or you can check the configuration
on any intermediate routers. The syntax to run the traceroute command on an FMC is as
follows:
If the connectivity between the FMC and the gateway fails, there is no reason for the
FMC to connect to FTD successfully. You should see if the interface is up and connected
with a cable. Also, you should make sure the IP address and subnet mask are configured
properly. Run the ifconfig command to verify the settings and status.
Example 6-4 shows the assignment of IP address 10.1.1.16 and subnet mask
255.255.255.0. The status of the management interface, eth0, is up. This output also
confirms whether the packets are dropped or have errors.
186 Chapter 6: The Firepower Management Network
admin@FMC:~$ ifconfig
eth0 Link encap:Ethernet HWaddr 00:0C:29:ED:37:B1
inet addr:10.1.1.16 Bcast:10.1.1.255 Mask:255.255.255.0
inet6 addr: fe80::20c:29ff:feed:37b1/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:2190 errors:0 dropped:0 overruns:0 frame:0
TX packets:197 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:150210 (146.6 Kb) TX bytes:25196 (24.6 Kb)
admin@FMC:~$
Configuration
Once you access the CLI, you can run the configure network command to configure all
kinds of basic network settings, such as DHCP, manual, IPv4, IPv6, and so on.
To obtain an IP address from the DHCP server, run the following command:
Note The configure network ipv4 command changes the IP address of the logical
management interface, br1. It does not assign or make any changes on the logical diagnostic
interface.
Configuring a Management Network on ASA Hardware 187
Example 6-5 shows the command to configure a static IP address 10.1.1.2/24 and a gate-
way IP address 10.1.1.1 for the FTD management interface br1.
Example 6-6 shows the network settings and the status of the logical management inter-
face br1. The output proves the assignment of port 8305 for transferring management
traffic and events. The IP address and MAC address of the logical management interface
(br1) are 10.1.1.2 and A4:6C:2A:E4:6B:BE, respectively.
Example 6-6 Verifying the Status of the Logical Management Interface br1
Configuration : Disabled
>
Did you notice that the command output shown in Example 6-6 does not show the status
of the logical diagnostic interface, Management x/x? To determine the status of the
diagnostic interface and any other interfaces, run the show interface ip brief command at
the FTD CLI.
Example 6-7 shows an overview of all the interfaces. The output confirms that there is no
IP address assigned to the logical diagnostic interface Management1/1.
In your output, if you do not see 1/1 with the management interface name, it is okay. The
numbering scheme of a management interface depends on the hardware platform you
are running. Table 6-1 shows the management interface numbering for different hardware
platforms.
Example 6-8 shows that FTD is running a successful ping test to its manager, using the IP
address of the FMC management interface, 10.1.1.16.
Example 6-9 shows that FTD fails to ping the management IP address of the FMC
when the ping request is sent from the diagnostic CLI instead of the default CLI. This
happens because the diagnostic interface has no IP address. (Use the command as shown
in Example 6-8 when you want to run a proper ping test from FTD.)
Example 6-9 Ping Test Showing No Success Although the Connection Is Established
firepower> enable
Password:
firepower# ping 10.1.1.16
190 Chapter 6: The Firepower Management Network
! The above command does not take an effect until you run the following command and
commit the changes.
! If you misconfigured or do not want to apply a recent change, you could discard it
from the buffer as well. To discard, run the following command.
Example 6-11 shows the command to connect to the local-mgmt module and how to
run a ping test from there.
Example 6-11 Successful Ping Test from FXOS to the FMC Management Interface
Example 6-12 shows the command to verify the network settings and the status of the
FXOS management interface.
Example 6-13 shows the command to determine the IP address of the gateway for the
FXOS management interface.
192 Chapter 6: The Firepower Management Network
Fabric Interconnect:
ID OOB IP Addr OOB Gateway OOB Netmask OOB IPv6 Address OOB IPv6 Gateway
Prefix Operability
-- ----------- ----------- ----------- ---------------- ----------------
------ -----------
A 10.1.1.28 10.1.1.1 255.255.255.0 :: :: 64
Operable
Firepower-9300#
Step 1. Go to the Interfaces page of the Firepower Chassis Manager. By default, you
should be at the All Interfaces tab.
Step 2. Click the pencil icon (at the right-hand side) for the interface you want to
modify. The Edit Interface window appears.
Step 3. Using the Type dropdown, select the type of traffic that you want the
interface to carry. For example, if you want to select an interface for
management communication between an FTD and FMC, select mgmt from
the dropdown. Figure 6-11 shows that the Ethernet1/1 interface is enabled and
configured for the mgmt (management) type of traffic.
Step 4. Select the Enable check box if you want to enable this interface immediately
with the updated settings.
Configuring a Management Network on a Firepower Security Appliance 193
Step 5. Click the OK button to save the changes. The Interfaces page returns, and it
now reflects the changes you have made.
Figure 6-12 shows the status of each of the two types of management
interfaces—one for FXOS and the other for FTD—after they are configured,
administratively enabled, and physically connected.
FXOS FTD
FXOS
FTD
Figure 6-12 Visual Changes in the GUI for Both Types of Management Interfaces
Step 1. On the Firepower Chassis Manager, go to the Logical Devices page. The FTD
logical device, if configured, should appear.
Step 2. Click the pencil icon (at the right-hand side) for the FTD logical device you
want to modify. An FTD Provisioning page appears.
Step 4. When you are done with any modification, click OK, and then click the Save
button to apply the changes.
194 Chapter 6: The Firepower Management Network
Save settings
when
3
complete.
1
Click this box
to configure
interface.
2
Change settings as needed.
Caution After you change the FTD management IP address and commit changes using
the Firepower Chassis Manager, the FTD logical device reinitializes and resets all bootstrap
settings.
Firepower-9300 /ssa #
Example 6-15 shows the administrative and operational status of each of the interfaces
on a Firepower security appliance (except the member interfaces of a port channel). The
output shows that the FTD management interface (Ethernet1/1) and both data interfaces
(Ethernet2/3 and Ethernet2/4) are enabled and up.
Example 6-15 Status of Each Fixed and Modular Interface from the FXOS CLI
Interface:
Port Name Port Type Admin State Oper State State Reason
--------------- ------------------ ----------- ---------------- ------------
Ethernet1/1 Mgmt Enabled Up
Ethernet1/2 Data Disabled Sfp Not Present Unknown
196 Chapter 6: The Firepower Management Network
Example 6-16 shows how to connect to the FTD logical device from the FXOS CLI and
then verify the network settings on the FTD logical device.
Example 6-16 Verifying Network Settings That Are Specific to the FTD Application
Summary
In this chapter, you have learned the best practices for designing and configuring a
management network for the Firepower System. This chapter discusses the tools you can
use to verify any communication issues between the management interfaces of the FMC
and FTD. Before you begin the registration process, which is described in Chapter 7,
you must ensure that the FMC and FTD are successfully connected through your
network.
Quiz
1. To run a ping test from FTD to the FMC, which command syntax would be correct?
a. ping IP_Address
b. sudo ping IP_Address
c. ping system IP_Address
d. ping host IP_Address
198 Chapter 6: The Firepower Management Network
2. Which port does the Firepower System use for management communication
by default?
a. 22
b. 443
c. 8080
d. 8305
4. Per Cisco recommendation, one of the interfaces on an ASA device should have no
IP address configured. Which interface is this?
a. Management0/0
b. Management1/1
c. br1
d. Both a and b
5. To investigate a communication issue between the FMC and FTD, which of the
following tools could be used?
a. ifconfig
b. ping
c. traceroute
d. All of the above
At this point, you have the Firepower software running and the management interface
configured. You are ready to begin the next steps: installing the licenses, enabling
the Firepower features, and registering FTD with the FMC. The registration process
takes place through an encrypted tunnel that is established between the management
interfaces of the FMC and FTD. You cannot, however, register FTD with the FMC
unless the FMC is licensed. This chapter shows you all the necessary steps for an initial
deployment.
Licensing Essentials
The FMC accepts two types of licenses: Classic License and Smart License. To manage
FTD, you must use a Smart License. A Classic License is used for earlier implementations
of the Sourcefire technology, such as FirePOWER Services on ASA and legacy Sourcefire
products. Because this book focuses on FTD, this section covers the Smart Licensing
architecture.
Cisco offers two options to connect a Firepower manager to the Cisco License Authority.
Depending on the security and connectivity policies of your organization, you can either
choose to connect to the Cisco License Authority directly over the Internet or via a
satellite server.
If you have administrative access to your account, the CSSM allows you to create
additional virtual accounts within your company’s master account. Doing this helps you
organize Firepower licenses based on departments or locations. When necessary, you can
also transfer licenses and devices between the virtual accounts.
Tip To get access to the CSSM, contact the Cisco channel partner, sales representative, or
Global Licensing Operations (GLO) team.
Figure 7-1 shows that the Smart Agent process of an FMC connects to the Cisco License
Authority through the Internet, and an administrator can manage the licenses through the
Internet by connecting to the CSSM application.
Cisco License
Connection to the License Authority Through the Authority
Cisco Smart Software Manager
FMC
Administrator
Internet
FTD 1 FTD 2
Figure 7-1 Network Connectivity Between an FMC and the Cisco License Authority
Licensing Essentials 201
CSSM Satellite
Because the Cisco License Authority is hosted at cisco.com, you need Internet con-
nectivity from the FMC to obtain a Smart License. For security or other reasons, if you
cannot connect the management interface of the FMC to the Internet, you can use the
CSSM satellite—a virtual version of the CSSM deployed from an OVA image. In a CSSM
satellite deployment, the FMC is connected to a CSSM satellite server, and the CSSM
satellite server is registered to the Cisco License Authority through the Internet.
Note The CSSM application or a satellite server is designed to integrate a wide range of
Cisco products. Describing the configuration of the CSSM satellite is beyond the scope
of this book. Cisco publishes various documents on Smart Licensing, which you can
download free from cisco.com. Please read them to learn more.
Figure 7-2 illustrates the connection of an FMC with the Cisco License Authority
through the CSSM satellite server and Internet.
Cisco License
Authority
FMC
Connection
Smart to the Authority
Agent
Through the Satellite
Administrator Satellite
Internet
Server
FTD 1 FTD 2
Figure 7-2 Connection of an FMC with the Cisco License Authority via CSSM Satellite
202 Chapter 7: Firepower Licensing and Registration
Firepower Licenses
The Cisco Firepower technology, an evolution from the Sourcefire technology, offers
various features to protect your network from malicious activities. Firepower, by default,
comes with a base license. A base license, however, does not enable all the security
features. To enable all the functionalities, separate feature licenses are necessary.
Tip If you turn on the Evaluation Mode on the Firepower System, it enables all the
security features on the FMC. You can apply these features on FTD for a 90-day period.
Before the evaluation period expires, you must purchase a valid license and register the
FMC with the Cisco License Authority for continuous operation.
Table 7-1 describes the functionalities of each Firepower license. Keep in mind that a
Threat license is a prerequisite for a Malware license or a URL Filtering license.
Table 7-2 describes the license subscription codes—T, TM, TMC, AMP, and URL—that
you might notice during a purchase order. The Malware and URL Filtering licenses are
available in two formats: as an add-on or in a bundle with a Threat license.
■ If you are in the middle of procuring a Firepower Smart License, you can avoid any
delay by turning on the Evaluation Mode on the FMC. It enables all the security
features on the FMC for 90 days and allows you to register FTD with the FMC
immediately.
■ Before you begin the registration process, make sure the network settings on
Firepower appliances are correct. FMC and FTD should be able to communicate
with each other using IP addresses. If you choose to perform a registration using
host names or domain names, verify the name resolution before you attempt
to register. You can run a simple ping test between the FMC and FTD by using
their fully qualified domain names (FQDNs). If the ping test fails due to name
resolution failure, check to ensure that the Firepower appliances are configured
with an appropriate DNS server and also make sure the DNS server is responding to
the queries.
Figure 7-3 summarizes the steps to obtain and apply a Smart License on the Firepower
System.
Register FTD devices with the FMC. Apply the Smart License
on an FTD during registration.
Licensing Configuration
You cannot register FTD with the FMC until you register the FMC with a Smart
Licensing Server or enable the evaluation mode.
Figure 7-4 shows a notification in the Add Device window. This message appears when
you attempt to register an FTD without registering the FMC with a Smart Licensing
Server or without enabling Evaluation Mode.
If you are in the middle of procuring a Firepower Smart License, you can avoid any
delay by turning on the Evaluation Mode on the FMC. It enables all the security features
on the FMC for 90 days and allows you to register FTD with the FMC immediately.
The following section describes how to enable Evaluation Mode on the FMC.
Licensing a Firepower System 205
Figure 7-4 Notification for Registering an FMC with the Smart Licensing Server
Evaluation Mode
To enable Evaluation Mode, follow these steps:
Step 1. Go to the System > Licenses > Smart Licenses page. Figure 7-5 shows the
Evaluation Mode button that appears on the Smart Licenses page.
Note The Evaluation Mode button does not appear after the 90-day period expires;
however, you can retrieve the button by reimaging the FMC.
Step 2. Click the Evaluation Mode button. A confirmation message appears, remind-
ing you that Evaluation Mode is a one-time option and available for a 90-day
period (see Figure 7-6).
Step 1. Log in to the cisco.com support portal and navigate to the CSSM.
Licensing a Firepower System 207
Step 2. Access the virtual account created for your organization and click New Token
to generate a new token (see Figure 7-7). A long string is randomly generated,
and you can copy it by selecting the Actions option.
Step 3. Copy the token from the CSSM and paste it in the Smart Licensing Product
Registration form on the FMC (see Figure 7-8). To access the form, click the
Register button on the Smart Licenses page.
Step 4. Click the Apply Changes button to begin the registration process with the
Cisco License Authority. A confirmation message appears when registration
is successful. Figure 7-9 confirms that the FMC is successfully registered with
the Cisco License Authority. The Smart License Status shows healthy states
(green checkmarks) and the name of the virtual account of your organization.
208 Chapter 7: Firepower Licensing and Registration
Note You can apply your desired license on an FTD device during the registration
process. Later, you can click the Edit License button on the Smart Licenses page to
manage the associations of licenses with any managed devices.
Licensing a Firepower System 209
Figure 7-9 Confirmation of Registering the FMC with the Smart License Authority
Figure 7-10 shows two options to connect the FMC. By default, Connect Directly to
Cisco Smart Software Manager is selected.
Figure 7-10 Options to Connect an FMC with Different Types of License Servers
210 Chapter 7: Firepower Licensing and Registration
The web interface of an FMC displays notifications when it successfully registers, or fails
to register, with a License Server. To investigate any communication error, you can debug
any related processes from the FMC CLI. Example 7-1 shows that the FMC can success-
fully connect and register with the Cisco License Authority.
Example 7-1 Syslog Messages That Confirm a Successful Connection Between the FMC
and a License Server
Example 7-2 demonstrates a scenario where the FMC can connect to the Smart Licensing
Server successfully but fails to register with the server due to a token being invalid.
Example 7-2 Debugging a Registration Failure Between the FMC and a License Server
Registration Configuration
To register FTD with the FMC, you need to have access to the FTD CLI and also to the
web interface of the FMC. This section describes the entire process of completing a
registration.
Setting Up FTD
After you install FTD software successfully, you should be able to connect to the FTD
CLI through Secure Shell (SSH) or a console terminal. When you can successfully access
the FTD software, you see the default CLI prompt, >.
Example 7-3 confirms that a fresh installation of FTD has no connection with a manage-
ment appliance.
To add the FMC to FTD, run the configure manager add command along with the
management IP address of the FMC. You also have to provide a one-time registration
key that is used only during the registration process. A unique NAT ID is necessary
only if there is an intermediate networking device that translates the IP addresses of the
Firepower System. The command syntax is as follows:
Example 7-4 demonstrates a successful addition of the FMC with management IP address
10.1.1.16. The configuration uses RegKey as the one-time temporary registration key and
NatId as a NAT ID. The use of a NAT ID is optional when the management IP addresses
are not translated by any intermediate devices.
The configuration on your FTD is complete. The next step is to add FTD on the FMC.
Before you go to the next step, you can optionally check the current status of the
registration. Example 7-5 shows the pending registration status after you add the FMC
to FTD. The registration status changes to completed after you perform the next step
successfully.
Step 1. Log in to the web interface of the FMC and go to Devices > Device
Management > Add Device (see Figure 7-11). The Add Device window
appears. You must add the FMC on FTD before you attempt to add the FTD
details on this window.
Registering a Firepower System 213
Step 2. In the Host field, enter the IP address of the FTD management interface.
Step 3. In the Display Name field, provide a name that will be displayed on the FMC
web interface to indicate this FTD.
Step 4. In the Registration Key field, enter RegKey—the same key you used when
you added the FMC on FTD earlier.
Step 5. Use the Access Control Policy dropdown to select an access control policy
that you want to initially apply to FTD. If this is a new deployment, the FMC
may not have any preconfigured access control policy. You can, however, create
a policy on the fly by choosing the Create New Policy option from the Access
Control Policy dropdown. The New Policy window appears (see Figure 7-12).
Figure 7-12 A Simple Access Control Policy Created On the Fly During Registration
214 Chapter 7: Firepower Licensing and Registration
Caution The registration process can fail if you select an access control policy that was
created for a different device model or configured with a component that is unsupported
in FTD. Therefore, if you are not sure about the configuration of an old access control
policy, you should create a new policy on the fly and select it to ensure that the
registration will not fail due to an incompatible access control policy.
Figure 7-12 shows the creation of a new access control policy called AC Policy.
This figure shows a very basic configuration that is good for a successful
registration. You can edit and enhance this policy later. For now, click Save.
Step 6. In the Smart Licensing section of the Add Device dialog, select the features
that you want to apply, such as Malware, Threat, and URL Filtering.
Step 7. In the Advanced section of the Add Device dialog, provide a unique NAT ID
if there is an intermediate device that translates the management IP addresses
of your Firepower systems. This is an optional step if there is no NAT device
between the FMC and FTD. Figure 7-13 shows that the Add Device window
is populated with the details of the FTD. Note that the same registration key
(RegKey) and NAT ID (NatId) are used on the FMC and FTD.
Step 8. Ensure that the Transfer Packets option is selected to allow FTD to send the
associated packets to the FMC when any security events are generated.
Step 9. Click the Register button. The registration process begins, through an
encrypted tunnel. Figure 7-14 demonstrates the in-progress registration
process on the web interface.
Figure 7-15 shows the confirmation you get after a successful registration.
The FTD device model, software version, and applied feature licenses are
displayed after a successful registration.
Figure 7-15 Registration Process Complete (Spinning Icon Turns to Solid Icon)
Figure 7-16 shows an error message that can appear when a registration attempt fails
due to a communication issue, an incompatible software version, or a mismatched
registration key.
Example 7-6 Displaying the Registration Status from the FTD CLI
! Registration status: After you complete the first step (Add an FMC on FTD CLI)
! Registration status: After you complete the second and final step (Add an FTD on
FMC GUI)
As soon as you enter the FMC information in FTD, the FTD TCP port 8305 starts listen-
ing for incoming connections; it expects packets from the FMC. Similarly, as soon as you
enter the FTD information on the FMC, the FMC begins listening on TCP port 8305.
Example 7-7 shows the transition of TCP port 8305 on FTD and the FMC during the
registration process.
! First, on the CLI of an FTD, when you enter the FMC detail, it opens the TCP port
8305 on FTD.
! Then, on the GUI of an FMC, when you enter the FTD detail, the FMC begins
listening on TCP port 8305. FMC responses the FTD's registration request from a
random port 49707.
If the port status does not change from the listening state to the established state, the
FMC may not have received any registration requests from FTD, or FTD may have not
received any acknowledgements from the FMC. Let’s take a look at what happens at the
packet level during the registration process.
218 Chapter 7: Firepower Licensing and Registration
Caution The following two examples use the built-in packet capture tools in FTD and
the FMC to display the transactions of packets. Capturing packets in a product system can
impact system performance. Therefore, if necessary, you should run this tool only during a
maintenance window or in a lab environment.
Example 7-8 shows the exchange of packets right after you begin the registration pro-
cess, which is after adding the FMC in the FTD CLI. Because at this stage you have not
yet entered the details of FTD on the FMC, the FMC (IP address 10.1.1.6) keeps sending
the RESET packets in response to the SYN packets from the FTD (IP address 10.1.1.2).
Example 7-8 Packet Transaction After Adding an FMC on the FTD CLI
> capture-traffic
Selection? 0
HS_PACKET_BUFFER_SIZE is set to 4.
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on br1, link-type EN10MB (Ethernet), capture size 96 bytes
[timestamp] IP FTD.46373 > 10.1.1.16.8305: Flags [S], seq 1709676008, win 14600,
options [mss 1460,sackOK,TS val 87180 ecr 0,nop,wscale 7], length 0
[timestamp] IP 10.1.1.16.8305 > FTD.46373: Flags [R.], seq 0, ack 1709676009, win 0,
length 0
[timestamp] IP FTD.58441 > 10.1.1.16.8305: Flags [S], seq 3021847438, win 14600,
options [mss 1460,sackOK,TS val 87380 ecr 0,nop,wscale 7], length 0
[timestamp] IP 10.1.1.16.8305 > FTD.58441: Flags [R.], seq 0, ack 3021847439, win 0,
length 0
[timestamp] IP FTD.46814 > 10.1.1.16.8305: Flags [S], seq 1334198689, win 14600,
options [mss 1460,sackOK,TS val 88317 ecr 0,nop,wscale 7], length 0
[timestamp] IP 10.1.1.16.8305 > FTD.46814: Flags [R.], seq 0, ack 1334198690, win 0,
length 0
[timestamp] IP FTD.45854 > 10.1.1.16.8305: Flags [S], seq 1274367969, win 14600,
options [mss 1460,sackOK,TS val 88517 ecr 0,nop,wscale 7], length 0
[timestamp] IP 10.1.1.16.8305 > FTD.45854: Flags [R.], seq 0, ack 1274367970, win 0,
length 0
Registering a Firepower System 219
.
.
<Output Omitted>
HS_PACKET_BUFFER_SIZE is set to 4.
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
[timestamp] IP 10.1.1.2.46373 > FMC.8305: Flags [S], seq 1709676008, win 14600,
options [mss 1460,sackOK,TS val 87180 ecr 0,nop,wscale 7], length 0
[timestamp] IP FMC.8305 > 10.1.1.2.46373: Flags [R.], seq 0, ack 1709676009, win 0,
length 0
[timestamp] IP 10.1.1.2.58441 > FMC.8305: Flags [S], seq 3021847438, win 14600,
options [mss 1460,sackOK,TS val 87380 ecr 0,nop,wscale 7], length 0
[timestamp] IP FMC.8305 > 10.1.1.2.58441: Flags [R.], seq 0, ack 3021847439, win 0,
length 0
[timestamp] IP 10.1.1.2.46814 > FMC.8305: Flags [S], seq 1334198689, win 14600,
options [mss 1460,sackOK,TS val 88317 ecr 0,nop,wscale 7], length 0
[timestamp] IP FMC.8305 > 10.1.1.2.46814: Flags [R.], seq 0, ack 1334198690, win 0,
length 0
[timestamp] IP 10.1.1.2.45854 > FMC.8305: Flags [S], seq 1274367969, win 14600,
options [mss 1460,sackOK,TS val 88517 ecr 0,nop,wscale 7], length 0
[timestamp] IP FMC.8305 > 10.1.1.2.45854: Flags [R.], seq 0, ack 1274367970, win 0,
length 0
.
.
<Output Omitted>
Example 7-9 shows the next phase of the registration process. As soon as you enter the
FTD details on the web interface of the FMC, the FMC stops sending RESET packets.
Example 7-9 Packet Transaction After Adding the FTD on the FMC GUI
.
<Output Omitted>
.
220 Chapter 7: Firepower Licensing and Registration
[timestamp] IP FMC.51509 > 10.1.1.2.8305: Flags [S], seq 1804119299, win 14600,
options [mss 1460,sackOK,TS val 258976 ecr 0,nop,wscale 7], length 0
[timestamp] IP 10.1.1.2.8305 > FMC.51509: Flags [S.], seq 4103916511, ack
1804119300, win 14480, options [mss 1460,sackOK,TS val 93418 ecr 258976,nop,
wscale 7], length 0
[timestamp] IP FMC.51509 > 10.1.1.2.8305: Flags [.], ack 1, win 115, options
[nop,nop,TS val 258976 ecr 93418], length 0
[timestamp] IP FMC.51509 > 10.1.1.2.8305: Flags [P.], ack 1, win 115, options
[nop,nop,TS val 258985 ecr 93418], length 247
[timestamp] IP 10.1.1.2.8305 > FMC.51509: Flags [.], ack 248, win 122, options
[nop,nop,TS val 93422 ecr 258985], length 0
[timestamp] IP 10.1.1.2.8305 > FMC.51509: Flags [.], ack 248, win 122, options
[nop,nop,TS val 93423 ecr 258985], length 1448
[timestamp] IP 10.1.1.2.8305 > FMC.51509: Flags [P.], ack 248, win 122, options
[nop,nop,TS val 93423 ecr 258985], length 774
.
<Output Omitted>
.
.
<Output Omitted>
.
[timestamp] IP 10.1.1.16.51509 > FTD.8305: Flags [S], seq 1804119299, win 14600,
options [mss 1460,sackOK,TS val 258976 ecr 0,nop,wscale 7], length 0
[timestamp] IP FTD.8305 > 10.1.1.16.51509: Flags [S.], seq 4103916511, ack
1804119300, win 14480, options [mss 1460,sackOK,TS val 93418 ecr 258976,nop,
wscale 7], length 0
[timestamp] IP 10.1.1.16.51509 > FTD.8305: Flags [.], ack 1, win 115, options
[nop,nop,TS val 258976 ecr 93418], length 0
[timestamp] IP 10.1.1.16.51509 > FTD.8305: Flags [P.], ack 1, win 115, options
[nop,nop,TS val 258985 ecr 93418], length 247
[timestamp] IP FTD.8305 > 10.1.1.16.51509: Flags [.], ack 248, win 122, options
[nop,nop,TS val 93422 ecr 258985], length 0
[timestamp] IP FTD.8305 > 10.1.1.16.51509: Flags [.], ack 248, win 122, options
[nop,nop,TS val 93423 ecr 258985], length 1448
[timestamp] IP FTD.8305 > 10.1.1.16.51509: Flags [P.], ack 248, win 122, options
[nop,nop,TS val 93423 ecr 258985], length 774
.
<Output Omitted>
.
If you do not notice any activity on the management interfaces, check whether the TCP
port 8305 is bidirectionally allowed on any intermediate network devices between the
FMC and FTD. You can test this by connecting to the TCP port 8305 of FTD from the
FMC directly.
Example 7-10 shows a successful telnet connection from the FMC to FTD port 8305. It
confirms that FTD port 8305 (IP address 10.1.1.2) is allowed by any intermediate router
or firewall.
Example 7-10 Successful Telnet Connection from the FMC to FTD Port 8305
The netstat or tcpdump command that you ran earlier confirms the establishment of a
tunnel between the FMC and FTD. However, it does not display what happens inside an
encrypted tunnel at the application level. The Firepower System provides a command-line
tool, sftunnel-status, that shows the status of each of the services running through an
encrypted secure tunnel.
Example 7-11 shows output of the sftunnel-status command on FTD. From the
output, you can conclude that the logical management interface of FTD (name br1,
IP address 10.1.1.2) is connected to the management interface of the FMC (name eth0,
IP address 10.1.1.16). Two channels, A and B, are connected for control packets and event
traffic, respectively. The tunnel is encrypted using the AES256-GCM-SHA384 cipher.
222 Chapter 7: Firepower Licensing and Registration
> sftunnel-status
***********************
**RUN STATUS****10.1.1.16*************
Cipher used = AES256-GCM-SHA384 (strength:256 bits)
ChannelA Connected: Yes, Interface br1
Cipher used = AES256-GCM-SHA384 (strength:256 bits)
ChannelB Connected: Yes, Interface br1
Registration: Completed.
IPv4 Connection to peer '10.1.1.16' Start Time: Mon Dec 12 00:13:44 2016
PEER INFO:
sw_version 6.1.0
sw_build 330
Management Interfaces: 1
eth0 (control events) 10.1.1.16,
Peer channel Channel-A is valid type (CONTROL), using 'br1', connected
to '10.1.1.16' via '10.1.1.2'
Peer channel Channel-B is valid type (EVENT), using 'br1', connected to
'10.1.1.16' via '10.1.1.2'
***********************
**RPC STATUS****10.1.1.16*************
'ip' => '10.1.1.16',
'uuid' => '7d3aa42c-95c7-11e6-a825-2c6c588f5f38',
'ipv6' => 'IPv6 is not configured for management',
'name' => '10.1.1.16',
'active' => '1',
'uuid_gw' => '',
'last_changed' => 'Wed Oct 19 17:56:43 2016'
Check routes:
>
You can view similar statistics on an FMC by running the sftunnel_status.pl tool.
By comparing the data on both devices, FMC and FTD, you can determine any potential
issues with the SFTunnel. This is the command syntax on the FMC:
Example 7-12 shows output of the sftunnel_status.pl tool in the FMC. It confirms
that the FMC (IP address 10.1.1.16) is registered with FTD (IP address 10.1.1.2) and is
communicating actively.
***********************
Registering a Firepower System 225
**RUN STATUS****10.1.1.2*************
Cipher used = AES256-GCM-SHA384 (strength:256 bits)
ChannelA Connected: Yes, Interface eth0
Cipher used = AES256-GCM-SHA384 (strength:256 bits)
ChannelB Connected: Yes, Interface eth0
Registration: Completed.
IPv4 Connection to peer '10.1.1.2' Start Time: Mon Dec 12 02:58:54 2016
PEER INFO:
sw_version 6.1.0
sw_build 330
Management Interfaces: 1
br1 (control events) 10.1.1.2,
Peer channel Channel-A is valid type (CONTROL), using 'eth0', connected to
'10.1.1.2' via '10.1.1.16'
Peer channel Channel-B is valid type (EVENT), using 'eth0', connected to
'10.1.1.2' via '10.1.1.16'
After comparing the SFTunnel statistics on the FMC and FTD, if you notice any anomaly,
you can use the manage_procs.pl tool in FTD to restart the channels between the FMC
and FTD.
226 Chapter 7: Firepower Licensing and Registration
Caution If you run the manage_procs.pl tool on the FMC, and the FMC is currently
managing many FTD devices, it restarts the communication channel between the FMC
and all the FTD devices at the same time. If you need to restart the channel between the
FMC and one particular FTD device only, you should run the manage_procs.pl tool on the
Expert Mode of the desired FTD.
Example 7-13 shows the operation of the manage_procs.pl tool on the Expert Mode of
FTD. Select option 3 to restart the communication channel.
> expert
admin@FTD:~$ sudo manage_procs.pl
Password:
**************** Configuration Utility **************
1 Reconfigure Correlator
2 Reconfigure and flush Correlator
3 Restart Comm. channel
4 Update routes
5 Reset all routes
6 Validate Network
0 Exit
**************************************************************
Enter choice: 3
1 Reconfigure Correlator
2 Reconfigure and flush Correlator
3 Restart Comm. channel
4 Update routes
5 Reset all routes
6 Validate Network
0 Exit
**************************************************************
Enter choice: 0
Thank you
admin@FTD:~$
Registering a Firepower System 227
While the channel restarts, the system generates debug logs for stopping and starting
various services. These logs provide detailed insight about the Firepower System’s
communication at the application level and allow you to determine any complex
communication issues.
Example 7-14 shows the debugging of a restart process from the FMC CLI. As soon as
you begin the process in FTD, the FMC fails to connect to FTD. After the connection to
FTD (IP address 10.1.1.2) is closed, the FMC (IP address 10.1.1.16) automatically begins
the connection reestablishment process with the FTD.
! The following message appears on an FMC as soon as you begin the process on the
FTD. It confirms that the FMC is unable to connect to the FTD.
! Shortly after the FMC closes connection with the FTD, it automatically starts
accepting connections from the FTD, and reestablishes connections with the FTD.
Summary
This chapter describes licensing and registration—two important initial tasks in
Firepower deployment. In this chapter, you have learned the capabilities of different
Firepower licenses and the steps to register the FMC with a Smart Licensing Server. This
chapter also discusses the registration process and the tools you can use to investigate
communication issues.
230 Chapter 7: Firepower Licensing and Registration
Quiz
1. Which tool is used in FTD to view the statistics of events inside the encrypted
tunnel between FTD and the FMC?
a. > sftunnel
b. > sftunnel-status
c. > sftunnel_status
d. > sftunnel status
4. Which command shows the logs between the FMC and a Smart Licensing Server?
a. sudo tail -f /var/log/messages
b. sudo tail -f /var/log/messages.log
c. sudo tail -f /var/log/cssm.log
d. sudo tail -f /var/log/sam.log
5. Which tool allows you to restart the communication channel between the
FMC and FTD?
a. sftunnel_status.pl
b. sftunnel_restart.pl
c. manage_procs.pl
d. manage_channel.pl
Firepower Deployment in
Routed Mode
You can deploy a Firepower Threat Defense (FTD) device as a default gateway for your
network so that the hosts can communicate with the FTD device in order to connect to
any different subnet or the Internet. You can also deploy an FTD device transparently, so
that it becomes invisible to the hosts in your network. In short, you can deploy an FTD
device in two ways—Routed Mode and Transparent Mode. This chapter describes the
processes involved in deploying an FTD device in routed mode. Chapter 9, “Firepower
Deployment in Transparent Mode,” covers Transparent Mode.
Figure 8-1 shows how a host interacts with an FTD device as its next Layer 3 hop. In
Routed Mode, each FTD interface connects to a unique subnet.
Figure 8-2 shows the default gateways on each segment when an FTD device is deployed
in a typical real-world network. The end users on a LAN use the FTD physical interface
as their gateway. An FTD device can also use its inside interface as the default gateway
for its management communication.
232 Chapter 8: Firepower Deployment in Routed Mode
Next Hop
Host FTD
Router
192.168.1.2 192.168.1.1 172.16.1.1 172.16.1.2
Inside Interface Outside Interface
10.1.1.1
Mgmt.
Network
10.1.1.2
FMC
End Users
(LAN)
Both the management traffic and the The gateway router uses the
inside users’ traffic use the inside Internet service provider (ISP) FMC is
interface as their default gateway. as its default gateway. deployed
in a remote
location.
FMC
■ Cisco recommends that you not configure the diagnostic interface with an IP
address. This simplifies the network design and reduces configuration overhead.
When a diagnostic interface is configured with an IP address, FTD considers it a data
interface. Each data interface on an FTD device is required to be on a different net-
work. Therefore, the diagnostic interface (which must be on the same subnet as the
logical management interface, br1) and the inside interface must be on two different
subnets. To transfer traffic between two different subnetworks, a router is required.
■ Changing the firewall mode wipes out any existing FTD configurations. Therefore,
before you change the firewall mode from Transparent to Routed or vice versa, take
note of your FTD configuration settings for future reference, in case you want to
revert the FTD to the initial state. To view the current FTD configuration, run the
show running-config command in the CLI.
If you just want to change the firewall mode on an FTD device, performing a backup
of your security policy configuration is not necessary because the next-generation
security policies are defined and stored on the FMC. After you configure the
policies, FMC allows you to deploy the same policies to one or more FTD devices.
<Output Omitted>
.
.
Manage the device locally? (yes/no) [yes]: no
Configure firewall mode? (routed/transparent) [routed]:
Configuring firewall mode ...
Update policy deployment information
- add device configuration
- add network discovery
- add system policy
.
.
<Output Omitted>
If you selected Routed Mode during the system initialization, you can skip the next
two sections and read the section “Configuring the Routed Interfaces.” If you selected
Transparent Mode, read on.
234 Chapter 8: Firepower Deployment in Routed Mode
Fulfilling Prerequisites
If you selected Transparent Mode during the system initialization and now you want to
reconfigure FTD to Routed Mode, you must unregister FTD from the FMC. You cannot
change the firewall mode when a manager is configured. To verify whether FTD is cur-
rently registered with the FMC, run the show managers command at the FTD CLI.
Example 8-2 shows that FTD is currently registered with the FMC with IP address
10.1.1.16.
If you find that FTD is currently registered with the FMC, you can unregister it from
the FMC web interface. To delete registration, go to the Devices > Device Management
page and click the delete icon next to FTD (see Figure 8-3).
Example 8-3 shows confirmation that FTD is currently not registered with the FMC.
This will destroy the current interface configurations, are you sure that you want
to proceed? [y/N] y
The firewall mode was changed successfully.
After configuring FTD with the desired mode, you can determine the status from the
CLI. Example 8-5 shows confirmation that FTD is configured to Routed Mode.
Alternatively, upon a successful registration, the web interface of the FMC also dis-
plays the current firewall deployment mode. You can view it at the Devices > Device
Management page. Figure 8-4 indicates that FTD is configured in Routed Mode.
Step 1. Navigate to the Devices > Device Management page. A list of the managed
devices appears.
236 Chapter 8: Firepower Deployment in Routed Mode
Step 2. Click the pencil icon that is next to the FTD device you want to configure.
The device editor page appears, showing all the physical interfaces of an
FTD device on the Interfaces tab (see Figure 8-5).
Step 3. On the Interfaces tab, click the pencil icons next to GigabitEthernet1/1 and
GigabitEthernet1/2 to configure these interfaces for the inside and outside
networks. Use the settings shown in Table 8-1 to configure these two
interfaces.
Figure 8-6 shows these interfaces, which are each connected to two different
subnets.
FTD
Step 4. After you configure both interfaces, click the Save button to save the configu-
rations.
Step 5. Click the Deploy button to apply the configurations to FTD (see Figure 8-9).
DHCP Services
FTD can function as a DHCP server as well as a DHCP client. For example, if you deploy
an FTD device between your inside and outside networks, the device can obtain an IP
address dynamically for its outside interface from an ISP router. Simultaneously, FTD can
act as a DHCP server and provide IPv4 addresses dynamically to the hosts it inspects.
Note Configuring FTD as a DHCP server is an optional choice; it does not influence the
deep packet inspection capability. The DHCP implementation on the Firepower software
has limitations. It depends on various factors, such as the Internet Protocol version (IPv4
versus IPv6), FTD firewall mode (Routed versus Transparent), and the type of services
(DHCP server versus DHCP relay). Read the official Cisco Firepower publications to find
any version-specific limitations and enhancements.
Configuring Routed Mode 239
2 1
Figure 8-9 Saving the Configuration and Clicking the Deploy Button to Apply Changes
Figure 8-10 illustrates two scenarios: The inside network obtains an IP address from the
DHCP service running on FTD, while the outside interface of the FTD device gets an
IP address from a service provider.
Host Router
Step 1. Go to the Devices > Device Management page and click the pencil icon to
edit the FTD configuration.
Step 3. In the device editor page, go to the DHCP tab. By default, the DHCP Server
page appears.
Step 4. Click the Add button in the Server tab (located in the bottom part of the
DHCP Server page). The Add Server window appears.
Step 5. In the Add Server window, select the inside interface from the dropdown list
as it will be offering IP addresses to the inside network.
Step 6. Create an address pool for the DHCP server. Remember that the addresses
in the pool must be within the same subnet as the connected interface. For
example, if you assign 192.168.1.1/24 to the inside interface, the DHCP
address pool should be between 192.168.1.2 and 192.168.1.254.
Configuring Routed Mode 241
Figure 8-12 shows that a DHCP server is enabled on the FTD inside interface
with the address pool 192.168.1.2 to 192.168.1.10.
Step 7. Select the Enable DHCP Server check box to enable the service and click
OK. You are returned to the device editor page.
Step 8. Optionally, through the DHCP service, transfer any DNS-related information
to your DHCP clients. The DHCP Server page allows you to enter domain
name and DNS addresses manually. Alternatively, you can select the
Auto-Configuration check box to let FTD obtain any DNS information
automatically from a DHCP client connected to a predefined interface.
Step 9. Click the Save button to save the configuration, and then click the Deploy
button to apply the changes.
Step 1. Go to the Devices > Device Management page and click the pencil icon next
to the FTD device that you want to configure.
242 Chapter 8: Firepower Deployment in Routed Mode
Step 2. Edit the interface that is connected to an external DHCP server—in this
example, the outside interface GigabitEthernet1/2.
Step 3. In the Edit Physical Interface window, select the check box to enable
the interface. Specify a name and a security zone for this interface.
(Skip this step if you configured these items previously during the static
IP address configuration.)
Figure 8-13 shows the configurations on the outside interface that will be
able to obtain an IP address from a DHCP server.
Step 4. On the IPv4 tab, choose Use DHCP from the dropdown list and select the
Obtain Default Route Using DHCP check box.
Step 6. Click the Save button to save the configuration, and then click the Deploy
button to apply the changes.
The outside interface now should see an offer from an external DHCP server.
Verification and Troubleshooting Tools 243
Example 8-6 shows ICMP requests and replies exchanged between two computers
located in inside and outside networks.
If the ping test fails, you need to determine the status of the interfaces. You can run a
couple commands in FTD to verify the configurations you applied from the FMC to the
FTD. As shown in the following sections, command outputs are slightly different depend-
ing on the configuration method (static versus dynamic).
■ show ip
Example 8-7 shows output of the show ip command. You can view the mapping between
the interface, logical name, and IP address in this output. You cannot, however, view the
current status in the output.
> show ip
System IP Addresses:
Interface Name IP address Subnet mask Method
GigabitEthernet1/1 INSIDE_INTERFACE 192.168.1.1 255.255.255.0 manual
GigabitEthernet1/2 OUTSIDE_INTERFACE 172.16.1.1 255.255.255.0 manual
Current IP Addresses:
Interface Name IP address Subnet mask Method
GigabitEthernet1/1 INSIDE_INTERFACE 192.168.1.1 255.255.255.0 manual
GigabitEthernet1/2 OUTSIDE_INTERFACE 172.16.1.1 255.255.255.0 manual
>
Example 8-8 confirms that both the GigabitEthernet1/1 and GigabitEthernet1/2 interfaces
are up and configured manually (using static IP addresses). The show interface ip brief
command provides an overview, including the current status, of each of the interfaces.
Example 8-9 shows detailed statistics of the GigabitEthernet1/1 interface. By using the
show interface interface_ID command, you can determine any errors and drops that
may have occurred on an interface.
Example 8-10 displays the interface configurations from the CLI. You can find all the set-
tings you configured on the FMC and applied to FTD. The system, however, adds some
commands automatically when you apply the final configurations.
246 Chapter 8: Firepower Deployment in Routed Mode
Example 8-11 confirms that GigabitEthernet1/2, connected to the outside network, can
obtain the IP address 172.16.1.104 from a DHCP server.
Example 8-12 shows the differences between the configurations of two interfaces: The
inside interface GigabitEthernet1/1 is configured with the static IP address 192.168.1.1/24,
whereas the outside interface GigabitEthernet1/2 is configured to obtain an address from
a DHCP server.
Example 8-12 The Difference Between Static and DHCP Configurations in the CLI
Example 8-13 proves that FTD has dynamically assigned the IP address 192.168.1.2 to a
host with MAC address C4:2C:03:3C:98:A8. This IP address is the first address from the
DHCP address pool 192.168.1.2 to 192.168.1.10.
248 Chapter 8: Firepower Deployment in Routed Mode
Example 8-13 Verifying the IP Address Assignment from a DHCP Address Pool
If you do not see any DHCP binding, you can debug the DHCP packets on the FTD
device.
Example 8-14 demonstrates the process of a DHCP server assigning an IP address. In the
debug output, you can analyze the four major stages of the DHCP protocol—Discovery,
Offer, Request, and Acknowledgement (DORA).
Example 8-14 Exchanging DHCP Packets Between FTD and a DHCP Server
>
Summary
In this chapter, you have learned about the widely deployed firewall mode Routed Mode.
This chapter describes the steps involved in configuring routed interfaces with static IP
addresses as well as dynamic IP addresses. In addition, this chapter discusses various
command-line tools you can use to determine any potential interface-related issues.
Quiz
1. Which of the following commands is used to debug and analyze ping requests?
a. debug icmp
b. debug ip icmp
c. debug icmp trace
d. debug icmp reply
2. Which of the following commands is used to configure FTD from Transparent Mode
to Routed Mode?
a. configure routed
b. configure firewall routed
c. configure firepower routed
d. configure transparent disable
Firepower Deployment in
Transparent Mode
FTD Transparent Mode allows you to control your network traffic like a firewall,
while the FTD device stays invisible to the hosts in your network. This chapter discusses
the configuration of FTD Transparent Mode.
Figure 9-1 shows how a host finds a router, not an FTD device, as its next hop when
you configure FTD in Transparent Mode.
Next Hop
Host
Router
192.168.1.10 192.168.1.30
Inside Interface Outside Interface
FTD BVI Interface
192.168.1.1
Figure 9-1 Host Communicating with Its Next Hop When FTD Is Transparent
Inside Outside
Interface Interface Internet
FMC
IP: 192.168.1.3/24
■ Changing the firewall mode wipes out any existing FTD configurations. Therefore,
before you change the firewall mode from Routed to Transparent or vice versa, take
note of your FTD configuration settings for future reference, in case you want to
revert the FTD to the initial state. To view the current FTD configuration, run the
show running-config command in the CLI.
Configuring Transparent Mode 253
If you just want to change the firewall mode on an FTD device, performing a backup
of your security policy configuration is not necessary because the next-generation
security policies are defined and stored on the FMC. Once configured, FMC can
deploy the same policies to one or more FTD devices.
■ Do not use the BVI IP address as the default gateway for the connected hosts.
Instead, use any connected router as the default gateway for the hosts in the bridged
network.
■ Do not forget to add access rules to allow any necessary network management traf-
fic. By default, FTD in Transparent Mode blocks the DHCP traffic, multicast traffic,
and dynamic routing protocol traffic (such as RIP, OSPF, EIGRP, BGP, and so on).
If you select Access Control: Block All Traffic as the default action, make sure
you have added access rules explicitly to allow any essential traffic. If you are not
sure, you can use Intrusion Prevention: Balanced Security and Connectivity as the
default action; it allows any unmatched traffic, as long as there are no malicious
activities found.
■ If your ultimate goal is to perform transparent inspection, you can choose the Inline
IPS mode instead of the Transparent firewall mode. While both modes allow you to
deploy FTD as a bump in the wire, Inline Mode has less configuration overhead than
Transparent Mode. In addition, a dedicated IP address for each BVI is not necessary.
To learn more, read Chapter 11, “Blocking Traffic Using Inline Interface Mode.”
<Output Omitted>
.
.
Manage the device locally? (yes/no) [yes]: no
Configure firewall mode? (routed/transparent) [routed]: transparent
Configuring firewall mode ...
.
.
<Output Omitted>
If you selected Transparent Mode during the system initialization, you can skip the next
two sections and read the section “Deploying Transparent Mode in a Layer 2 Network.”
If you selected Routed Mode, read on.
254 Chapter 9: Firepower Deployment in Transparent Mode
Fulfilling Prerequisites
You cannot change the firewall mode if FTD is currently registered with the FMC.
If you initially configured FTD to Routed Mode and now you want to reconfigure it to
Transparent Mode, you must unregister FTD from the FMC. To verify the registration
status, run the show managers command at the FTD CLI.
Example 9-2 shows that FTD is currently registered with the FMC with IP address
10.1.1.16.
If you find that FTD is currently registered with the FMC, unregister it by using the FMC
web interface. To delete the registration, go to the Devices > Device Management page
and click the delete icon next to the appropriate FTD device (see Figure 9-3).
Example 9-3 shows confirmation that FTD is currently not registered with the FMC.
This will destroy the current interface configurations, are you sure that you want
to proceed? [y/N] y
The firewall mode was changed successfully.
After configuring FTD with the desired mode, you can determine the status from the
CLI, as shown in Example 9-5.
Alternatively, upon a successful registration, the web interface of the FMC also displays
the current firewall deployment mode. You can view it on the Devices > Device
management page (see Figure 9-4).
■ You can deploy it in a single Layer 2 network, where all the hosts reside in the
same subnet and can communicate without a dynamic routing protocol. This type
of deployment works when you configure the physical and virtual interfaces in a
bridge group.
■ You can also deploy an FTD device between the Layer 3 networks, where hosts
from different subnets communicate using a routing protocol. By default, when you
256 Chapter 9: Firepower Deployment in Transparent Mode
Step 1. Navigate to the Devices > Device Management page. A list of the managed
devices appears.
Step 2. Click the pencil icon that is next to the FTD device you want to configure.
The device editor page appears, showing all the physical interfaces of an FTD
device on the Interfaces tab (see Figure 9-5).
Step 3. On the Interfaces tab, click the pencil icons next to GigabitEthernet1/1 and
GigabitEthernet1/2 to configure these interfaces for the inside and outside
networks. Use the settings shown in Table 9-1 to configure these two
interfaces.
Configuring Transparent Mode 257
Step 4. After you configure both interfaces, click the Save button to save the changes
you have made so far (see Figure 9-8). The configuration is now saved on the
FMC for future use. The FMC applies the configuration to an FTD device
only when you click the Deploy button, which you will do soon.
Step 5. To configure a BVI, on the right side of the Interfaces tab, click the Add
Interfaces button. A list of different types of interfaces appears.
Step 6. Select Bridge Group Interface from the list of interfaces (see Figure 9-9). The
Add Bridge Group Interface window appears.
Select Bridge
Group Interface.
Step 7. On the Interfaces tab of the Add Bridge Group Interface window, provide a
bridge group ID between 1 and 250 and select the interfaces that are part of
the bridged network—in this case GigabitEthernet1/1 and GigabitEthernet1/2,
as shown in Figure 9-10.
260 Chapter 9: Firepower Deployment in Transparent Mode
Step 8. On the IPv4 subtab, configure the address 192.168.1.1 for the BVI
(see Figure 9-11). The IP address must be on the same subnet as the hosts
and default gateway router, and in this case it is within the same /24 subnet as
its hosts.
Step 9. Click OK to exit the Add Bridge Group Interface window. Figure 9-12
confirms the setup of a bridge group BVI1.
Then, Deploy
2 1 First, Save
Step 10. Click the Save button to save the changes, and then click the Deploy button
to apply the changes to the FTD device.
Example 9-6 shows the interface configuration of FTD in Transparent Mode. Both of the
member interfaces are in bridge group 1 and have no IP addresses. Only BVI1 has an IP
address (192.168.1.1/24).
262 Chapter 9: Firepower Deployment in Transparent Mode
Example 9-7 highlights the status of the interfaces on a Transparent Mode FTD device.
Although you do not configure IP addresses for the member interfaces of a bridge
group, they use the same IP address as the BVI when you communicate with any
connected hosts.
Configuring Transparent Mode 263
Example 9-8 shows the status of the logical management interface br1, which is not
displayed in the previous example. FTD uses the IP address of br1 to communicate with
the FMC.
Netmask : 255.255.255.0
Broadcast : 10.1.1.255
----------------------[ IPv6 ]----------------------
Configuration : Disabled
>
Before testing the functionality, let’s determine the MAC and IP addresses of all the
participating interfaces. Figure 9-13 details the Layer 1, Layer 2, and Layer 3 addresses
of the network devices in the OSPF area 1 network. Instead of seeing the FTD inside
interface, the inside router sees the outside router as its next hop.
Inside Router Sees That Its Next Hop Has Default Gateway in
MAC: 000c.2965.d399 and IP: 192.168.1.30 Transparent Mode
FTD
BVI1 IP:
GigabitEthernet2 192.168.1.1/24 GigabitEthernet3
IP: 192.168.1.20/24 IP: 192.168.1.30/24
Mac: 000c.2943.7b76 Mac: 000c.2965.d399
Internet
GigabitEthernet1/1 GigabitEthernet1/2
Inside a46c.2ae4.6bc0 a46c.2ae4.6bc1
End Outside
IP Is Not Required IP Is Not Required
Users Router Router
OSPF Area 1
Figure 9-13 Traffic Flow Between an Inside Router and a Default Gateway
Configuring Transparent Mode 265
Example 9-9 shows the commands that allow you to find the MAC and IP addresses of
an interface on an FTD device and a router.
! On FTD:
! On Router:
If you configured the interfaces according to the instructions in the previous section, you
should be able to successfully ping from the inside router to the outside router.
Example 9-10 shows a successful ping test from the inside router to the outside router
through the FTD. The dropping of the first packet is an expected behavior. It happens
because the ARP table is empty at the beginning.
The ping test by the inside router (shown in Example 9-10) does not prove whether the
ping replies come from the outside router or from the BVI of the FTD. You can determine
this by enabling debugging on FTD for ICMP traffic, like this:
Once again, you can send the ping requests to the IP address of the outside router
192.168.1.30 from the inside router. The requests go through the FTD device as in the
previous example. However, this time, the FTD device shows a log for the through
traffic. There are two lines for each ping request—one for sending a request and one for
receiving a reply:
Now check the ARP table on the inside router to view the mapping of IP addresses with
the inside interface. Compare the entries in the table with the MAC addresses that you
found in the command output shown in Example 9-9.
Example 9-11 displays the mapping of the MAC addresses with the IP addresses. Besides
the MAC address of its own interface (000c.2943.7b76), the ARP table of the inside
router shows the MAC address of its next hop—the outside router (000c.2965.d399), not
the FTD (a46c.2ae4.6bc0), which is transparent in the network.
Example 9-11 Inside Router ARP Table—After Pinging from the Inside Router to the
Outside Router
If you send a ping request from the FTD device, FTD uses its BVI IP address to send that
request. In that case, the ARP table on the router shows the MAC address of the FTD
interface that communicates with the router.
Example 9-12 demonstrates that when you ping from FTD to the inside router, it uses the
BVI address 192.168.1.1 as its IP address. Remember that in Transparent Mode, you do
not configure any IPv4 address on the FTD physical interface.
Configuring Transparent Mode 267
Example 9-12 BVI IP Address Used When Traffic Originates from the FTD Itself
Example 9-13 shows a new entry in the ARP table after you send the ping requests
to the inside router from the FTD device. It now displays the MAC address of the
GigabitEthernet1/1 interface (a46c.2ae4.6bc0) in FTD.
Example 9-13 Inside Router ARP Table—After Pinging from FTD to the Inside Router
When you configure a dynamic routing protocol across the network, FTD blocks the
underlying routing traffic until you allow it in an access control policy. You can choose
one of following options:
Figure 9-14 shows an FTD device deployed between an inside router and an outside
router. Both routers use loopback interfaces to simulate a host and the Internet. The
loopback and routing interfaces are on different subnets, and all of them are included in
OSPF area 1.
FTD
BVI1: 192.168.1.1/24
2.2.2.2/24 GigabitEthernet2 GigabitEthernet3 3.3.3.3/24
192.168.1.20/24 192.168.1.30/24
Host Host
GigabitEthernet1/1 GigabitEthernet1/2
Loopback0 Loopback0
Inside Outside
Router IP Address Is Not Necessary for
Router
the Interfaces on Transparent FTD
OSPF Area 1
Figure 9-15 Options to Create a New Access Control Policy and to Modify an
Existing One
When you are on the policy editor page, select the desired policy from the Default
Action dropdown. You can select one of the system-provided policies that does not
Configuring Transparent Mode 269
block traffic or a policy that you have created (if any). If you are not sure about selecting
a policy, you can select the Intrusion Prevention: Balanced Security and Connectivity
policy, which allows any unmatched traffic to go through an FTD device after being
inspected for malicious activities.
Figure 9-16 shows a list of system-provided policies that you can select for default action.
Once you select a policy, save the changes and deploy it on your FTD.
Figure 9-16 System-Provided Policies That Are Available for Default Action
If you create an access rule to allow a particular routing protocol, such as OSPF, and
select the Access Control: Block All Traffic policy as the default action, the FTD device
allows only OSPF management traffic. Any other data traffic, however, is dropped due
to the default blocking action. In this scenario, two routers can build an OSPF neighbor
relationship through an FTD device, but you are unable to ping the inside router from
the outside router and vice versa. Similarly, you cannot use Secure Shell (SSH) to access
a router from the other router even though the neighbor relation is established. To allow
270 Chapter 9: Firepower Deployment in Transparent Mode
any additional traffic, you need to add the related protocols in the access rule and select
the Allow action.
In the following configuration example, you will see how to create two access rules—one
for the routing traffic (OSPF) and one for the data traffic (SSH).
Step 1. Go to the Policies > Access Control page. Click the New Policy button to
create a new policy, or click on the pencil icon to edit an existing policy. The
policy editor page appears.
Step 2. To create a new access rule, on the policy editor page, click the Add Rule
button (see Figure 9-17). The Add Rule window appears.
Step 3. Give a name to this particular access rule, select the Enabled check box, and
set the action to Allow. Figure 9-18 shows how to enable a new access rule
called Routing Access with the rule action set to Allow.
Figure 9-18 The Add Rule Window, Where You Define a Rule for Access Control
Configuring Transparent Mode 271
Tip The Firepower System offers two unique rule actions—Trust and Fastpath—that can
expedite the traverse of management traffic. In an access rule, you can set the action to
Trust to let the OSPF traffic go through the FTD device without any further inspection.
However, the more optimal method for bypassing an inspection is to add a prefilter rule for
the OSPF protocol and set the action for it to Fastpath. To learn about the details of both
options, see Chapter 14, “Bypassing Inspection and Trusting Traffic.”
Step 4. Go to the Ports tab and navigate to the Protocol dropdown that is under the
Selected Destination Ports field.
Step 5. Select the OSPF/OSPFIGP protocol and click the Add button next to the
protocol dropdown. The selected protocol should be listed under the Selected
Destination Ports box. Figure 9-19 shows the sequence for adding an access
rule called Routing Access to allow the OSPF protocol.
1 2
Step 6. Click the Add button to return to the policy editor page, where you can see
the rule you just created.
272 Chapter 9: Firepower Deployment in Transparent Mode
Step 1. Click the Add Rule button once again. In the Add Rule window, provide a
name for the rule, select the Enabled check box, and set the Allow action.
Step 2. In the Available Ports section, select SSH and click the Add to Destination
button. The SSH protocol appears under the Selected Destination Ports box.
Figure 9-20 shows the steps to create an access rule named Shell Access to
allow the SSH traffic via port 22.
Note Step 2 allows SSH traffic that is destined for port 22, which is also the default
port for the SSH protocol. If you want to allow any SSH application traffic, regardless
of its destination port, you need to create a rule by using the Applications tab. To learn
more about the Firepower application control, read Chapter 19, “Discovering Network
Applications and Controlling Application Traffic.”
Step 3. Click the Add button to return to the policy editor page and select the
Access Control: Block All Traffic policy as the Default Action. Figure 9-21
shows that two rules—Routing Access and Shell Access—are added. As the
default action, Access Control: Block All Traffic is added.
Step 4. Add more access rules as necessary. For now, in this configuration example,
just create the above two access rules, save the policy, and deploy the new
configuration on the FTD. Figure 9-22 shows that the new access control
policy is being deployed. It may take several minutes to complete the
deployment.
Configuring Transparent Mode 273
Example 9-14 shows the system-generated access rules when an access control policy
with no custom rule is applied. The last rule on line 10, permit ip any any, is applied
implicitly when you select a nonblocking default action. The following example uses the
Balanced Security and Connectivity policy as the default action.
Example 9-14 No Custom Rule with the Balanced Security and Connectivity
Default Policy
Example 9-15 shows two custom access rules on lines 10 and 13, along with other sys-
tem-generated rules, that are created on the FMC and applied to FTD. These rules allow
FTD to permit OSPF and SSH traffic. The last rule on line 16, deny ip any any, is applied
implicitly when you select Access Control: Block All Traffic as the default action.
Configuring Transparent Mode 275
Example 9-15 Two Custom Rules with Block All Traffic as the Default Policy
If you set the default action to block all traffic and do not permit the OSPF traffic
through an access list, the neighbor relationship breaks. When a neighbor goes down,
FTD triggers an alert on the CLI similar to the following:
Summary
This chapter discusses the Transparent firewall mode and how to configure the physical
and virtual interfaces. Furthermore, you have learned about various command-line tools
that enable you to investigate any potential configuration issues.
Quiz
1. Which of the following statements is true about deployment?
a. You can replace a Layer 2 switch with a transparent FTD device; there is no
difference between them.
b. Switching between Transparent Mode and Routed Mode requires a restart.
c. You can use the FMC to configure an FTD device from Routed Mode to
Transparent Mode.
d. Changing the firewall deployment mode erases any existing configuration.
3. Which of the following statements is true when you select the Access Control: Block
All Traffic policy as the default action?
a. It overrides any “allow” access rules deployed on an FTD device.
b. It blocks the traffic when the intrusion prevention system of an FTD device finds
no malicious activities.
c. This policy is equivalent to the deny tcp any any access rule.
d. It blocks any traffic that does not match an existing access rule.
After deploying an FTD device, if your network exhibits any connectivity issues,
one of the first steps is to verify the configurations. If, however, you cannot find any
configuration errors, you might want to capture live traffic and analyze it. This chapter
discusses the processes of capturing traffic using the built-in FTD tools.
When FTD blocks the traverse of a packet from ingress to egress interface, this is
actually performed by either the Firewall engine, or the Firepower engine. Therefore,
if two hosts experience any connectivity issues while sending traffic through an FTD
device, it is essential to analyze packets from both engines to determine the root cause
of the problem. For example, to investigate any registration or communications issues
between FTD and the FMC, capturing traffic from the Firepower management interfaces
is one of the key troubleshooting steps.
Figure 10-1 provides a high-level overview of the flow of traffic through an FTD device.
The Firewall Engine receives a packet from the ingress interface and redirects to the
Firepower engine.
You can utilize any third-party packet sniffer to capture traffic from the Firepower
interfaces. However, both Firepower systems—FMC and FTD—offer a native
packet-capturing tool within the operating system.
278 Chapter 10: Capturing Traffic for Advanced Analysis
Firepower Engine
Firewall Engine
Inbound Ingress Interface Egress Interface Outbound
Packet Packet
Figure 10-1 Flow of Traffic Between Ingress and Egress Interfaces of FTD
■ The primary objective of a Firepower system is not to capture live traffic all the
time. Besides controlling and inspecting traffic, a Firepower system supports capture
of live traffic only for troubleshooting purposes. If you need to capture traffic for a
long period, you should find a dedicated system designed for this purpose.
■ Instead of displaying the packets on the console, redirect them into a file, copy the
file from the Firepower system to your computer, and open it by using any packet
analyzer. If you decide not to store the packet in a file anyway, you should limit the
number of packets that you capture.
■ The FMC
Figure 10-2 shows the lab topology that is used in this chapter to capture traffic with
various options.
Configuring Firepower System for Traffic Analysis 279
10.1.1.2
Mgmt.
Network
10.1.1.6
FMC
Step 3. When the system prompts you to choose a domain, select the Router domain
to capture traffic from the data interfaces. (The br1 domain captures traffic
from the management interface.) Enter your selection to continue.
Example 10-1 Running the capture-traffic Command for the Data Interfaces
> capture-traffic
Selection? 1
Step 4. When FTD prompts you to specify the tcpdump options, use the tables
shown in the following section to determine the options you need. If you do
not provide any options, you capture traffic without any filter by default.
Step 5. After you add options, press Enter to begin the capture. To terminate a
capture at any time, press Ctrl+C.
tcpdump Options
tcpdump offers a wide variety of options you can use to manage captured packets.
It also supports Berkeley Packet Filter (BPF), which allows you to control and enhance
the display of packet data.
Table 10-1 provides a list of some useful options that you can use during packet capture.
Some of these options allow you to collect additional information from each packet, such
as -e, -n, -v, and -X. The other options, such as -c, -s, and -w, enable you to manage the
capturing process.
Table 10-2 lists some of the useful BPF syntax that you can apply to filter traffic that
you capture.
Table 10-2 BPF Syntax to Filter Live Traffic During a Traffic Capture
Options Usage
host, net Filters traffic to and from a single host or the entire network,
respectively.
port, portrange Filters traffic to and from a single or range of ports, respectively.
src, dst Selects a direction for traffic flow—source or destination. Used in
conjunction with the host and port options.
and, or, not Combines or isolates traffic with a precise condition.
vlan Captures traffic related to a particular VLAN. To capture VLAN tagged
traffic, you must enter the vlan option followed by the desired vlan_id.
Configuring Firepower System for Traffic Analysis 281
Tip Whenever you capture traffic, you should view the actual IP address and port
number (using the -n option) in the packet. You should also either save the capture
(-w option) into a file or limit the number of packets you want to capture (-c option).
Example 10-2 shows the traffic capture using various tcpdump options. The packets in
this example are captured by running the capture-traffic command separately. Remember
that you can press Ctrl+C to exit a capture process.
! To capture the 5 HTTP transactions between a web server and a host with IP address
192.168.1.2:
Example 10-3 shows the options to print additional data while you capture traffic.
Example 10-3 Displaying Additional Packet Data by Using the tcpdump Tool
! The -vv option prints additional data including the checksum of a packet.
04:36:44.729957 IP (tos 0x0, ttl 64, id 27818, offset 0, flags [DF], proto TCP (6),
length 60)
192.168.1.2.58720 > 172.16.1.2.80: Flags [S], cksum 0x730b (correct), seq
2112778772, win 29200, options [mss 1380,sackOK,TS val 401086 ecr 0,nop,
wscale 7], length 0
04:36:44.729957 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6),
length 60)
Configuring Firepower System for Traffic Analysis 283
! The -X option prints the hex and ASCII values of each packet. For example, the
fourth packet in the following example shows the GET request to a HTTP server.
0x0000: 4500 003c ac1c 4000 4006 1fe3 c0a8 0102 E..<..@.@.......
0x0010: ac10 0102 e564 0050 b834 a24b 0000 0000 .....d.P.4.K....
0x0020: a002 7210 18f0 0000 0204 0564 0402 080a ..r........d....
0x0030: 0007 0e57 0000 0000 0103 0307 ...W........
04:40:50.069988 IP 172.16.1.2.80 > 192.168.1.2.58724: Flags [S.], seq 1195208673,
ack 3090457164, win 28960, options [mss 1380,sackOK,TS val 2147276 ecr
462423,nop,wscale 7], length 0
0x0000: 4500 003c 0000 4000 4006 cbff ac10 0102 E..<..@.@.......
0x0010: c0a8 0102 0050 e564 473d 6fe1 b834 a24c .....P.dG=o..4.L
0x0020: a012 7120 9ec3 0000 0204 0564 0402 080a ..q........d....
0x0030: 0020 c3cc 0007 0e57 0103 0307 .......W....
04:40:50.069988 IP 192.168.1.2.58724 > 172.16.1.2.80: Flags [.], ack 1, win 229,
options [nop,nop,TS val 462423 ecr 2147276], length 0
0x0000: 4500 0034 ac1d 4000 4006 1fea c0a8 0102 E..4..@.@.......
0x0010: ac10 0102 e564 0050 b834 a24c 473d 6fe2 .....d.P.4.LG=o.
0x0020: 8010 00e5 3d7b 0000 0101 080a 0007 0e57 ....={.........W
0x0030: 0020 c3cc ....
04:40:50.069988 IP 192.168.1.2.58724 > 172.16.1.2.80: Flags [P.], ack 1, win 229,
options [nop,nop,TS val 462423 ecr 2147276], length 436
0x0000: 4500 01e8 ac1e 4000 4006 1e35 c0a8 0102 E.....@.@..5....
0x0010: ac10 0102 e564 0050 b834 a24c 473d 6fe2 .....d.P.4.LG=o.
0x0020: 8018 00e5 9098 0000 0101 080a 0007 0e57 ...............W
0x0030: 0020 c3cc 4745 5420 2f20 4854 5450 2f31 ....GET./.HTTP/1
0x0040: 2e31 0d0a 486f 7374 3a20 3137 322e 3136 .1..Host:.172.16
0x0050: 2e31 2e32 0d0a 5573 6572 2d41 6765 6e74 .1.2..User-Agent
0x0060: 3a20 4d6f 7a69 6c6c 612f 352e 3020 2858 :.Mozilla/5.0.(X
0x0070: 3131 3b20 5562 756e 7475 3b20 4c69 6e75 11;.Ubuntu;.Linu
0x0080: 7820 7838 365f 3634 3b20 7276 3a34 382e x.x86_64;.rv:48.
0x0090: 3029 2047 6563 6b6f 2f32 3031 3030 3130 0).Gecko/2010010
0x00a0: 3120 4669 7265 666f 782f 3438 2e30 0d0a 1.Firefox/48.0..
0x00b0: 4163 6365 7074 3a20 7465 7874 2f68 746d Accept:.text/htm
0x00c0: 6c2c 6170 706c 6963 6174 696f 6e2f 7868 l,application/xh
0x00d0: 746d 6c2b 786d 6c2c 6170 706c 6963 6174 tml+xml,applicat
0x00e0: 696f 6e2f 786d 6c3b 713d 302e 392c 2a2f ion/xml;q=0.9,*/
0x00f0: 2a3b 713d 302e 380d 0a41 6363 6570 742d *;q=0.8..Accept-
0x0100: 4c61 6e67 7561 6765 3a20 656e 2d55 532c Language:.en-US,
0x0110: 656e 3b71 3d30 2e35 0d0a 4163 6365 7074 en;q=0.5..Accept
0x0120: 2d45 6e63 6f64 696e 673a 2067 7a69 702c -Encoding:.gzip,
0x0130: 2064 6566 6c61 7465 0d0a 436f 6e6e 6563 .deflate..Connec
0x0140: 7469 6f6e 3a20 6b65 6570 2d61 6c69 7665 tion:.keep-alive
0x0150: 0d0a 5570 6772 6164 652d 496e 7365 6375 ..Upgrade-Insecu
0x0160: 7265 2d52 6571 7565 7374 733a 2031 0d0a re-Requests:.1..
0x0170: 4966 2d4d 6f64 6966 6965 642d 5369 6e63 If-Modified-Sinc
0x0180: 653a 2054 7565 2c20 3134 2046 6562 2032 e:.Tue,.14.Feb.2
0x0190: 3031 3720 3136 3a32 343a 3339 2047 4d54 017.16:24:39.GMT
Configuring Firepower System for Traffic Analysis 285
0x01a0: 0d0a 4966 2d4e 6f6e 652d 4d61 7463 683a ..If-None-Match:
0x01b0: 2022 3263 3339 2d35 3438 3830 3030 3333 ."2c39-548800033
0x01c0: 3730 6463 2d67 7a69 7022 0d0a 4361 6368 70dc-gzip"..Cach
0x01d0: 652d 436f 6e74 726f 6c3a 206d 6178 2d61 e-Control:.max-a
0x01e0: 6765 3d30 0d0a 0d0a ge=0....
04:40:50.069988 IP 172.16.1.2.80 > 192.168.1.2.58724: Flags [.], ack 437, win 235,
options [nop,nop,TS val 2147276 ecr 462423], length 0
0x0000: 4500 0034 1e39 4000 4006 adce ac10 0102 E..4.9@.@.......
0x0010: c0a8 0102 0050 e564 473d 6fe2 b834 a400 .....P.dG=o..4..
0x0020: 8010 00eb 3bc1 0000 0101 080a 0020 c3cc ....;...........
0x0030: 0007 0e57 ...W
>
Example 10-4 shows the options to capture traffic to and from host 192.168.1.2. While
the packets are being captured, the system stores them in the traffic.pcap file.
>
! The following command confirms that the pcap file is created and stored on the
disk.
Once the traffic is captured and a .pcap file is created, you can download the file by
using either the GUI or the CLI.
Step 1. Log in to the FMC GUI and navigate to the System > Health > Monitor page.
The Appliance Status Summary chart appears.
Step 2. Find the FTD device where you captured traffic. If you do not see your appli-
ance, expand the arrow icon next to the health status. Figure 10-3 shows this
icon next to the Normal status. You can expand this arrow icon to see all the
appliances that have normal health status.
Step 3. When you find the FTD device on this page, click on the appliance name, and
the Health Monitor page for the FTD appears.
Step 4. Click the Advanced Troubleshooting button (see Figure 10-4). The File
Download page appears.
Step 5. On the File Download page, in the field where you can enter the name of a
.pcap file, enter the filename with .pcap file extension (for example, traffic.
pcap, as shown in Figure 10-5).
1
Enter the
filename.
2
Click the
Download button.
3
Save the file.
Figure 10-5 The File Download Page Appears in the Advanced Troubleshooting Page
288 Chapter 10: Capturing Traffic for Advanced Analysis
Example 10-5 show the traffic.pcap file being copied from FTD to an external computer.
>
Note You can also run the file copy command to transfer files over FTP.
When the .pcap file is transferred to the desired location, you can delete the original
.pcap file in FTD to maintain free disk space. Use the file delete command from the CLI,
as shown here, to delete a .pcap file:
Step 1. Determine the name of the interface from which you want to capture traf-
fic. Example 10-6 shows one of the ways to identify the name of an FTD
interface. In this example, you will run the capture on the GigabitEthernet1/1
interface that is named INSIDE_INTERFACE.
Configuring Firepower System for Traffic Analysis 289
Example 10-6 Using the nameif Command to See the Interfaces with Names
Step 2. Run the capture command along with the interface name, using the following
syntax:
Figure 10-6 clarifies the difference between the capture and capture-traffic
commands. To capture traffic from the Firewall Engine, you use the cap-
ture command. The capture-traffic command captures the traffic from the
Firepower engine.
Firewall Engine
Inbound Ingress Interface Egress Interface Outbound
Packet Packet
To capture traffic
from the Firewall engine,
use the command capture.
Figure 10-6 The Difference Between the capture and capture-traffic Tools
Step 3. After you enter the capture command, run some ping tests through FTD.
When the test traffic goes through, you can view it by running the show
capture command in FTD.
290 Chapter 10: Capturing Traffic for Advanced Analysis
Example 10-7 confirms that the condition in the icmp_traffic capture process
is matching and capturing traffic. You can view the captured traffic on an on-
demand basis.
! Run the following command to view the condition within a capture process.
6 packets captured
Step 4. The icmp_traffic capture process keeps growing as it matches more ICMP
traffic. You can remove any previous captures and start capturing similar
traffic by using the clear command. When you want to stop capturing com-
pletely, use the no capture command, as shown in Example 10-8. As you can
see, this command clears the packets from an existing capture process and
also stops the traffic capture.
! The following command confirms that all of the previously captured packets are
cleared.
Configuring Firepower System for Traffic Analysis 291
0 packet captured
0 packet shown
>
! To stop capturing any traffic that might match the icmp_traffic capturing condi-
tion, run the following command:
! To confirm that a capture instance no longer runs on an interface, run the com-
mand below. Note that an interface name is no longer associated the icmp_traffic
capture.
! Now, if you try again, it ends with an error as the capture itself is deleted.
Step 1. Create a capture for INSIDE_INTERFACE that will match any HTTP traffic
(TCP port 80):
Step 2. Go to a website in your browser. If the host computer is unable to access the
website, check whether the host can communicate with INSIDE_INTERFACE.
Step 3. After you access a website successfully, check the status of the capture in
FTD. Example 10-9 confirms that the FTD is currently capturing HTTP traf-
fic on INSIDE_INTERFACE.
Example 10-10 shows that an FTD device captures 15 packets by using the
http_traffic matching condition. The capture demonstrates a complete TCP
handshake process. Note the SYN, SYN-ACK, and ACK at the beginning of
the session.
15 packets captured
Step 4. Download the packets shown in Example 10-10 by using a web browser. Use
the following URL syntax in your browser to access FTD:
https://<IP_Address_of_FTD>/capture/<capture_name>/pcap/<capture_name>.
pcap
For example, if the IP address of the inside interface is 192.168.1.1, and the
name of the capture is http_traffic, enter the following URL in your browser:
https://192.168.1.1/capture/http_traffic/pcap/http_traffic.pcap
If the browser is unable to connect to FTD, run the following command to check whether
the HTTP service is running:
If this command shows no output, the HTTP service is disabled. You need to enable it to
access FTD through a bowser and download a capture in .pcap file format.
By deploying a new platform setting policy from the FMC, you can enable the HTTP
service on an FTD device. Here are the steps:
Step 1. Go to the Devices > Platform Settings page, click the New Policy button,
and select the Threat Defense Settings option. Figure 10-7 confirms that
there is no current Platform Settings policy available.
294 Chapter 10: Capturing Traffic for Advanced Analysis
Figure 10-7 Platform Settings Page Showing the Threat Defense Settings Option
Step 2. When the New Policy window appears, name the policy FTD Platform
Settings, select an FTD device where you want to apply this new policy, and
save the settings (see Figure 10-8).
Step 3. In the FTD Platform Settings policy editor page, select HTTP from the left
panel, and then select the check box for Enable HTTP Server. Figure 10-9
shows the HTTP service being enabled through port 443.
Step 4. Click the Add button. The Add HTTP Configuration window appears.
Configuring Firepower System for Traffic Analysis 295
Step 5. Select the zones (INSIDE_ZONE) and IP addresses (192.168.0.0/16) that are
allowed to access the HTTP service on FTD, as shown in Figure 10-10.
Step 6. Click OK to return to the policy editor page. You should now see the zone
and IP address you just selected.
Step 7. Click the Save button to save the changes, and then click the Deploy button
to commit the changes to the FTD device (see Figure 10-11).
Figure 10-11 Deploying the Platform Settings with the HTTP Service
You can now use the CLI to verify the deployment status. When the HTTP service starts
in FTD, it generates a debug message (if you enabled debug http already) and changes the
running configurations.
Example 10-11 confirms that the HTTP server has been enabled. Per this configuration,
users who are connected to INSIDE_INTERFACE are able to access FTD by using a
browser if the requests originate from the 192.168.0.0/16 network.
! As soon as the HTTP service starts, FTD generates the following debug message:
After the deployment is verified, run the undebug all command to disable debugging. Now,
in a browser, enter the IP address of the inside interface as a URL with the following syntax:
https://<IP_Address_of_FTD>/capture/<capture_name>/pcap/<capture_name>.pcap
For example, if the IP address of the FTD inside interface is 192.168.1.1/24, and the name
of the capture is http_traffic, then enter the following URL in your browser:
https://192.168.1.1/capture/http_traffic/pcap/http_traffic.pcap
A browser, upon successful connection to the FTD, should prompt you to save the
traffic.pcap file. After you save the file on your computer, you can use a third-party
packet analyzer to view the packets.
Figure 10-12 shows the same HTTP traffic that you viewed earlier in this section.
Previously, you viewed this traffic on the FTD console. Now, you are viewing the traffic
using the third-party packet analyzer Wireshark.
When you finish working with a packet capture, delete the rule to prevent the FTD
device from capturing any further traffic. This ensures that the system will not be wasting
any resources by capturing unwanted traffic in the future.
First, you need to determine the name of the FMC management interface. Example 10-12
indicates two interfaces on the FMC. The first one, eth0 with 10.1.1.16, is the manage-
ment interface. The second one, lo with 127.0.0.1, is a loopback interface.
admin@FMC:~$ ifconfig
eth0 Link encap:Ethernet HWaddr 00:0 C:29:ED:37:B1
inet addr:10.1.1.16 Bcast:10.1.1.255 Mask:255.255.255.0
inet6 addr: fe80::20c:29ff:feed:37b1/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:99519 errors:0 dropped:0 overruns:0 frame:0
TX packets:591461 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:21356354 (20.3 Mb) TX bytes:145518227 (138.7 Mb)
admin@FMC:~$
Then you need to run the tcpdump command on the management interface to capture
traffic. You can apply BPF syntax and filtering options similar to the ones you used on a
Firepower engine earlier in this chapter.
Example 10-13 shows a capture of ICMP traffic between FTD and the FMC. The host
option, in this example, limits the capture of traffic only from a particular host, 10.1.1.2,
which is an FTD device. The -i eth0 option allows the tcpdump tool to listen to only the
eth0 management interface.
Configuring Firepower System for Traffic Analysis 299
11:11:52.121238 IP 10.1.1.2 > FMC: ICMP echo request, id 16625, seq 1, length 64
11:11:52.121293 IP FMC > 10.1.1.2: ICMP echo reply, id 16625, seq 1, length 64
11:11:53.121786 IP 10.1.1.2 > FMC: ICMP echo request, id 16625, seq 2, length 64
11:11:53.121856 IP FMC > 10.1.1.2: ICMP echo reply, id 16625, seq 2, length 64
^C
4 packets captured
4 packets received by filter
0 packets dropped by kernel
admin@FMC:~$
Example 10-14 shows 10 packets captured into the traffic.pcap file. When you redirect
packets into a .pcap file, it is no longer displayed in a console and thus reduces resource
utilization.
Note To store any user-generated file, use the /var/common directory on the FMC. If you
save a file on this directory, the FMC allows you to download it directly using the GUI.
300 Chapter 10: Capturing Traffic for Advanced Analysis
You can use either the GUI or CLI to download a packet capture. If you want to use the
GUI to download a .pcap file, the file should be located in the /var/common directory of
the FMC.
To download a file from the FMC by using its GUI, use the following steps:
Step 1. Go to the Health > Monitor page and find the FMC in the appliance health
status list.
Step 2. Click on the FMC name. A detail view of the FMC health status appears.
Step 3. Click the Advanced Troubleshooting button (see Figure 10-13). The File
Download tab appears.
Figure 10-13 Health Module Status and Details of Alerts on the FMC
Step 4. Enter the name of the .pcap file (including the file extension) in the File field.
Step 5. Click the Download button. (Figure 10-14 shows the sequence to download
the fmc_traffic.pcap file by using the Advanced Troubleshooting page.) The
browser prompts you to save the file on your computer.
Alternatively, you can use the CLI to copy a file to an external system if the system runs
SSH daemon. To transfer files, the FMC uses the Secure Copy (SCP) protocol, which is
based on the Secure Shell (SSH) protocol.
Configuring Firepower System for Traffic Analysis 301
1
Enter the
filename.
2
Click the
Download button.
3
Save the file.
Example 10-15 shows the command to copy a file from the FMC to an external computer
by using SCP.
Example 10-15 Transferring a .pcap File from the FMC to an External Computer
Once the .pcap file is transferred to the desired location, you can delete the original
.pcap file on the FMC to maintain free disk space.
302 Chapter 10: Capturing Traffic for Advanced Analysis
Step 1. Navigate to Policy > Access Control > Access Control. A list of available
access control policies appears.
Step 2. Click the pencil icon next to the policy called AC Policy that you created in
Chapter 9, “Firepower Deployment in Transparent Mode.” The policy editor
page opens.
Step 3. On the Rules tab, click the Add Rule button. The Add Rule window appears,
and in it you can define the conditions for a rule.
Step 4. Assign a name for the rule that suits its purpose (for example, Ping Access).
Select the Enabled check box, and select Block from the Action dropdown
(see Figure 10-15).
Step 5. On the Ports tab, select the ICMP (1) protocol as the destination port.
Step 6. In the Logging tab, select the Log at Beginning of Connection check box.
Send the connection events to the Event Viewer to view them in the FMC GUI.
Verification and Troubleshooting Tools 303
Figure 10-16 shows the options to enable logging. This optional step gener-
ates events and displays them in the FMC when the Ping Access access rule
blocks any ICMP traffic.
2
1
Step 7. Click the Add button to create the Ping Access rule. You return to the policy
editor page.
Step 8. Click the Save button to save the changes, and then click the Deploy button
to apply the new access control policy on the FTD device.
Figure 10-17 shows the final view of the access control policy editor page.
Because Default Action is set to Balanced Security and Connectivity, any
nonmalicious traffic except the ICMP traffic is permitted by this access
control policy.
Example 10-16 shows what happens after a new access control policy with an ICMP
block rule is deployed. The Firewall Engine stops seeing any ICMP replies because the
requests cannot even reach the outside network.
304 Chapter 10: Capturing Traffic for Advanced Analysis
Figure 10-17 Access Control Policy to Block Only ICMP Traffic and Permit
Other Traffic
20 packets captured
Example 10-17 confirms that as soon as the new ICMP block rule is activated, the
Firepower engine stops seeing any ICMP traffic.
> capture-traffic
Selection? 1
16:39:59.259965 IP 172.16.1.2 > 192.168.1.2: ICMP echo reply, id 12845, seq 150,
length 64
16:40:00.259965 IP 192.168.1.2 > 172.16.1.2: ICMP echo request, id 12845, seq 151,
length 64
16:40:00.259965 IP 172.16.1.2 > 192.168.1.2: ICMP echo reply, id 12845, seq 151,
length 64
.
.
^C
Caught interrupt signal
Exiting.
>
You see this behavior because of the Ping Access rule you deployed earlier. You can con-
firm this by navigating to the Analysis > Connection Events page, where you should find
an event generated by the Ping Access rule. Figure 10-18 shows a connection event that is
generated when the Firewall Engine blocks the ICMP traffic by using the Ping Access rule.
Figure 10-18 An Event with the Block Action—Triggered by the Ping Access Rule
Figure 10-19 shows the behavior of the traffic flow before and after an ICMP block rule
is deployed. The Firepower engine does not see Packet 12 in the capture because this
packet matches an access rule condition, and the ASA firewall engine blocks it.
Packet 11 goes
through both the ASA
and Firepower engines.
Firepower Engine
Packet 11 Packet 11
Block Rule Is Applied Firewall Engine
Packet 12
Packet 12
Figure 10-19 Traffic Flow Before and After a Block Rule Is Activated
Example 10-18 shows confirmation that the FTD ingress interface is not dropping traffic
due to the filling of the FIFO queue (no buffer) or the memory (overrun).
While traffic is being received, if an FTD device is not fast enough in pulling the packets
from its ingress interface, the interface that uses the FIFO queuing algorithm becomes
full. Therefore, any further incoming packets get dropped. When this occurs, you can
find the number of these dropped packets in the overrun counter.
Similarly, when an FTD device has to process more traffic than a particular model
is designed to handle, FTD can run out of memory, and any incoming packets are
dropped as a consequence. The no buffer counter in the interface statistics provides the
number of dropped packets.
Figure 10-20 illustrates the processing of incoming packets by an FTD device. In this
example, Packet 16 is dropped due to lack of space in the FIFO queue, and Packet 10 is
dropped due to lack of memory or buffer.
Pa
cke
Pa
ck
t
Pac
et
12
11
ket
13 0 1 Packet 9 Packet 8 Packet 7
Packet Packet RX
Packet 14 Packet 6 Packet 5 Packet 4
16 15 Ring
Packet 3 Packet 2 Packet 1
Summary
This chapter describes the processes of capturing live traffic on an FTD device using
the system-provided capturing tool. To demonstrate the benefit of the tool, this chapter
shows various tcpdump options and BPF syntax to filter and manage packet capture.
Quiz
1. In terms of system performance, which of the following statements about capturing
traffic is true?
a. When capturing traffic, always display the packets on the console to avoid system
overload.
b. Capturing traffic on a production system has no impact on system performance.
c. Redirecting traffic into a file can increase the utilization of resources.
d. None of the above.
2. Which of the following filters captures HTTP client traffic only from the client host
192.168.1.2?
a. src 192.168.1.2 and src port 80
b. host 192.168.1.2 or src port 80
c. src 192.168.1.2 and dst port 80
d. host 192.168.1.2 or dst port 80
3. Which option would prevent tcpdump from oversubscribing an FTD for a long
time?
a. -c 10
b. -e
c. -vv
d. -X
4. To copy a .pcap file from the FMC to your local computer using the GUI, which of
the following conditions must be fulfilled?
a. You must enable the HTTP service through the Platform Settings policy.
b. The FMC must be registered with an FTD device.
c. The .pcap file must be stored in the /var/common directory.
d. All of the above
This page intentionally left blank
Chapter 11
An FTD device in Inline interface mode can block unintended traffic while it remains
invisible to the network hosts. However, in Chapter 9, “Firepower Deployment in Transparent
Mode,” you learned about Transparent Mode, which can also block traffic and keeps itself
transparent in the network. So, why would someone choose Inline Mode? This chapter
explores the advantages of Inline Mode and demonstrates its action and configuration.
Figure 11-1 shows a list of the actions that you can apply to an access rule. Note the
different types of block actions FTD supports.
FTD enables you to choose any interface mode, regardless of the underlying deployment
mode—Routed or Transparent. However, ultimately, the capability of an interface mode
defines whether FTD is able to block any suspicious traffic it sees.
Table 11-1 lists various FTD modes and describes their abilities to block traffic. The
deployment mode in this table defines how FTD functions as a firewall. The interface
mode defines how FTD acts on the traffic in case of any suspicious activities.
An FTD device in Passive Mode, on the contrary, can only detect intrusion attempts.
A switch or tap mirrors all the packets it receives and sends a copy of each packet to the
FTD device using port mirroring. Because the original traffic does not go through
an FTD device, FTD is unable to take any action on a packet. In other words, an FTD
device in Passive Mode cannot block any intrusion attempt; it can only detect an attempt
based on the traffic it sees.
Figure 11-3 provides an example of a typical FTD deployment. The topology shows two
FTD devices deployed in two different modes—Inline (IPS) and Passive (IDS).
Inline Mode Essentials 313
FTD
GigabitEthernet1/1 GigabitEthernet1/3
Inline Pair 1
Inline Pair 2
GigabitEthernet1/2 GigabitEthernet1/4
Inline Set 1
Figure 11-2 Understanding an Inline Interface, Interface Pair, and Inline Set
Difference Between a
Typical Inline and
Passive Deployment
FTD as an IDS
Deployed in FTD
Passive Mode Traffic Is
Mirrored
to FTD
End Users
Management
Network
Internet
FMC
Inside Outside
Interface Interface
FTD as an IPS
Deployed in
Inline Mode FTD
Inline Pair
End Users
Now, to capture tracing data for each packet, you can add the trace parameter, as shown
here:
> capture http_traffic trace interface INSIDE_INTERFACE match tcp any any eq 80
To view the additional tracing data for a specific packet, add the number of that packet
with the trace keyword, as shown here:
> show capture http_traffic packet-number 1 trace
Moreover, FTD provides a tool called packet-tracer, which can generate simulated
packets using the information of five tuples: source IP address, destination IP address,
source port number, destination port number, and protocol. By considering the deployed
rule conditions, this tool simulates traffic flow from the ingress interface to the egress
interface, as if a client and server were communicating using a network protocol through
the FTD. Here is an example:
> packet-tracer input INSIDE_INTERFACE tcp 192.168.1.2 10000 192.168.1.200 80
Fastpath Rule Match wh
i c h Ap P
Ingress Ta plie refil
Interface ke s a ter
sP F P
lac ast olic
wh Acc e B pa y
Blocking of Traffic by the Prefilter Policy
ct Po na
(IP Address) to l lys
Passed Identity Check Ide icy A is
Security nti pp
nd t R
Ra ule
Rate Limited te ,
Lim
Access Control it
ACL: L7
Application Control
ntrusion Attempt
Rate Limit
Next Hop Lookup
L3 L2
Routing
315
316 Chapter 11: Blocking Traffic Using Inline Interface Mode
This command generates a virtual packet flow from the INSIDE_INTERFACE with the
following header information:
Later in this chapter you will use both capture trace and packet-trace tools to determine
where a packet gets dropped. For now, just keep this concept in mind.
■ If your network uses asynchronous routing, and the inbound and outbound traffic
go through two different interface pairs, you should include both interface pairs
in the same interface set. Doing so ensures that FTD does not see just half of the
traffic; it can see the flows from both directions and recognize them when they are
part of a single connection.
■ If the interfaces of an inline pair are connected to switches that run Spanning Tree
Protocol (STP), you should enable PortFast on the associated switch ports. It allows
those switch ports to transition to the forwarding state immediately and reduces
hardware bypass time.
■ You should enable the FailSafe feature on the inline interface set. In case of a
software failure, this feature allows FTD to continue its traffic flow through the
device by bypassing the detection.
■ You should allow the inline set to propagate its link state. This reduces the routing
convergence time when one of the interfaces in an inline set goes down.
The configuration examples in this chapter discuss the steps to enable FailSafe and the
Propagate Link State feature on an inline set.
■ You will create a simple inline set and verify traffic flow.
■ You will enable the fault tolerance features on an inline set to avoid downtime in
case of a failure.
■ You will learn how to block a particular service or port through an inline interface.
Configuring Inline Mode 317
Figure 11-5 provides an overview of the lab topology that is used in this chapter.
The configuration examples and the command outputs in this chapter are based on this
topology.
FMC
10.1.1.16
Figure 11-5 Lab Topology Used in the Configuration Examples in This Chapter
Fulfilling Prerequisites
If you previously configured an FTD device as a firewall in routed mode, you need to
remove any platform settings, the IP address, and DHCP server configurations from the
FTD data interfaces, as they are not necessary in Inline Mode.
Step 1. Navigate to the Devices > Device Management page. A list of all the devices
that are registered with FMC appears.
Step 2. Click the pencil icon next to the FTD device (see Figure 11-6).
Step 3. Select the Interfaces tab. A list of the available interfaces appears, and you
can set up or modify interface settings by using this page.
318 Chapter 11: Blocking Traffic Using Inline Interface Mode
Step 4. Select the pencil icon next to each interface that will be part of an inline
pair—in this case, the GigabitEthernet1/1 and GigabitEthernet1/2 interfaces
(see Figure 11-7).
Step 5. In the Edit Physical Interface window, the default value of the Mode drop-
down is None. Keep it unchanged, as this represents Inline Mode. Then assign
a name to the interface and click the Enabled check box to enable it. An IP
address is not necessary.
Configuring Inline Mode 319
Step 6. Click OK to return to the Interfaces tab and repeat Steps 4 and 5 for the other
interface of the pair.
Step 7. After both interfaces are named and enabled, click the Save button to save the
changes.
Figure 11-9 shows an overview of each interface configuration. Note that the
IP address or security zone is not configured. Only the logical interface is
necessary for an inline interface.
320 Chapter 11: Blocking Traffic Using Inline Interface Mode
Now, begin the second part of the configuration—adding the interface pair to an inline
set—by following these steps:
Step 1. On the Devices > Device Management page, go to the Inline Sets tab and
click the Add Inline Set button. The Add Inline Set window appears.
Step 2. In the Add Inline Set window, give a name to the inline set, select an interface
pair, and add it to the inline set (see Figure 11-10).
Note Do not configure any additional settings at this moment. You will come back here
when you learn the fault tolerance configuration later in this chapter.
Step 4. Click Save to save the configuration, and click Deploy to deploy it to FTD
(see Figure 11-11).
Configuring Inline Mode 321
3
2
Figure 11-12 shows the table view of a connection event. The event confirms that host
192.168.1.2 is able to send ICMP echo requests to 192.168.1.200.
322 Chapter 11: Blocking Traffic Using Inline Interface Mode
If a ping test fails but the FMC does not show any reason for a failure, you can
troubleshoot by checking the interface status.
Example 11-1 shows the output of the show inline-set command on the FTD CLI. This
command provides various components of an inline set configuration, such as member
interfaces of an inline pair, the status of each interface, and advanced settings.
Inline-set INSIDE_OUTSIDE_PAIR
Mtu is 1500 bytes
Failsafe mode is off
Failsecure mode is off
Tap mode is off
Propagate-link-state option is off
hardware-bypass mode is disabled
Interface-Pair[1]:
Interface: GigabitEthernet1/1 "INSIDE_INTERFACE"
Current-Status: UP
Interface: GigabitEthernet1/2 "OUTSIDE_INTERFACE"
Current-Status: UP
Bridge Group ID: 500
>
Example 11-2 shows the overall status of the available interfaces on an FTD device. It
confirms that the GigabitEthernet1/1 and GigabitEthernet1/2 interfaces are up and config-
ured with no IP address. However, it does not confirm if they are part of an inline pair.
Configuring Inline Mode 323
Example 11-3 confirms that the GigabitEthernet1/1 interface is in Inline Mode, and
it is included in an inline pair called INSIDE_OUTSIDE_PAIR. It also provides detailed
statistics about the traffic.
Note The packet-tracer command syntax is different for a TCP packet. You will learn
how to use it near the end of this chapter, when the blocking of a TCP service/port is
simulated.
In an ICMP header, the type and code fields contain the control messages. There
are many different types of ICMP control messages available. In the following exercise,
however, you are going to use two types of messages—echo request and echo reply.
Figure 11-13 shows the format of an ICMP packet. The 8-bit type and 8-bit code fields
carry the ICMP control messages.
ICMP Header
Table 11-2 shows the values of the type and code fields. Using these values, you can
generate a particular ICMP control message.
Table 11-2 Values for the Echo Request and Echo Reply Messages
Control Message Type Code
Echo request 8 0
Echo reply 0 0
Example 11-4 demonstrates the simulation of ICMP traffic, sent from the inside inter-
face. The host 192.168.1.2 from the inside network sends an ICMP echo request to an
outside system, 192.168.1.200. The ingress and egress interfaces of this simulated packet
are determined by the inline set configuration of the FTD device.
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 2
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 3
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268434432
access-list CSM_FW_ACL_ remark rule-id 268434432: ACCESS POLICY: AC Policy - Default/1
326 Chapter 11: Blocking Traffic Using Inline Interface Mode
Phase: 4
Type: NGIPS-EGRESS-INTERFACE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Ingress interface INSIDE_INTERFACE is in NGIPS inline mode.
Egress interface OUTSIDE_INTERFACE is determined by inline-set configuration
Phase: 5
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 269, packet dispatched to next module
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: allow
>
Example 11-5 concludes that an ICMP echo reply packet, originated by the host
192.168.1.200, should be able to reach its destination, 192.168.1.2.
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Configuring Inline Mode 327
Phase: 2
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 3
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268434432
access-list CSM_FW_ACL_ remark rule-id 268434432: ACCESS POLICY: AC Policy - Default/1
access-list CSM_FW_ACL_ remark rule-id 268434432: L4 RULE: DEFAULT ACTION RULE
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be
reached
Phase: 4
Type: NGIPS-EGRESS-INTERFACE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Ingress interface OUTSIDE_INTERFACE is in NGIPS inline mode.
Egress interface INSIDE_INTERFACE is determined by inline-set configuration
Phase: 5
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 271, packet dispatched to next module
Result:
input-interface: OUTSIDE_INTERFACE
input-status: up
input-line-status: up
Action: allow
>
328 Chapter 11: Blocking Traffic Using Inline Interface Mode
Step 1. Enter two capture rules with tracing capability, as shown in Example 11-6.
They begin capturing ICMP traffic. To trace packets from both directions,
you need to capture traffic from both of the interfaces of an inline pair.
Example 11-6 demonstrates the use of the trace keyword with the capture
command. The example uses the capture command twice, to capture traffic
from the ingress and egress interfaces separately. The Capturing - 0 bytes
message on the show capture command confirms that the process is running
but has not seen any packets yet.
Example 11-6 Creating and Verifying Matching Conditions for Packet Captures
> capture inside_icmp trace interface INSIDE_INTERFACE match icmp any any
> capture outside_icmp trace interface OUTSIDE_INTERFACE match icmp any any
Step 2. Send a few ping requests from your inside host to the outside system. After
sending and receiving two to four ICMP packets, stop the ping request. You
should now be able to see the capture between the inside and outside sys-
tems. Example 11-7 shows the captures of ICMP traffic from both directions
on both interfaces.
4 packets captured
4 packets shown
>
4 packets captured
Step 3. From Example 11-7, select a packet you want to trace, using its associated
number on the left. In this lab scenario, the host 192.168.1.2 sends the echo
request packet from the inside interface. That’s why you use the inside_icmp
capture to view the tracing data. Similarly, when you want to trace the echo
reply packet from the host 192.168.1.200, you need to use the outside_icmp
capture.
Example 11-8 shows the flow of packet number 1 from Example 11-7. You
must use the trace keyword to view the tracing data.
4 packets captured
Phase: 2
Type: ACCESS-LIST
Subtype:
330 Chapter 11: Blocking Traffic Using Inline Interface Mode
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268434432
access-list CSM_FW_ACL_ remark rule-id 268434432: ACCESS POLICY: AC Policy - Default/1
access-list CSM_FW_ACL_ remark rule-id 268434432: L4 RULE: DEFAULT ACTION RULE
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be
reached
Phase: 5
Type: NGIPS-EGRESS-INTERFACE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Ingress interface INSIDE_INTERFACE is in NGIPS inline mode.
Egress interface OUTSIDE_INTERFACE is determined by inline-set configuration
Phase: 6
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Configuring Inline Mode 331
Config:
Additional Information:
New flow created with id 279, packet dispatched to next module
Phase: 7
Type: EXTERNAL-INSPECT
Subtype:
Result: ALLOW
Config:
Additional Information:
Application: 'SNORT Inspect'
Phase: 8
Type: SNORT
Subtype:
Result: ALLOW
Config:
Additional Information:
Snort Verdict: (pass-packet) allow this packet
Phase: 9
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
MAC Access list
Result:
input-interface: OUTSIDE_INTERFACE
input-status: up
input-line-status: up
Action: allow
1 packet shown
>
Example 11-9 shows two different outputs for tracing the same packet. Only the second
command shows the desired detail because the outside interface receives the echo reply
packet.
332 Chapter 11: Blocking Traffic Using Inline Interface Mode
Example 11-9 Tracing an Echo Reply Packet Originated by the Host 192.168.1.200
4 packets captured
4 packets captured
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found flow with id 279, using existing flow
Phase: 4
Type: EXTERNAL-INSPECT
Subtype:
Configuring Inline Mode 333
Result: ALLOW
Config:
Additional Information:
Application: 'SNORT Inspect'
Phase: 5
Type: SNORT
Subtype:
Result: ALLOW
Config:
Additional Information:
Snort Verdict: (pass-packet) allow this packet
Phase: 6
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
MAC Access list
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: allow
1 packet shown
>
■ FailSafe: In the event of any software failure, if FTD stops processing traffic, and the
buffer becomes full, FTD drops traffic. The FailSafe feature watches the use of the
buffer. When the buffer is full, FailSafe allows the traffic to go through FTD without
any inspection. Hence, users do not experience any permanent network outage.
■ Propagate Link State: If one of the links of an inline pair goes down, the second
link can stay up and able to receive traffic. However, FTD cannot transfer traffic
through an interface that has no link. The Propagate Link State feature automatically
brings the remaining interface down if one of the interfaces in an inline pair goes
down. This feature improves routing convergence time by not sending traffic through
a failed link.
Step 1. Navigate to the Devices > Device Management page. Click the pencil icon
next to the FTD device where you created the inline set.
Step 2. In the device editor page, go to the Inline Sets tab. Click the pencil icon next
to the inline set that you want to modify. The Add Inline Set window appears.
Step 3. Go to the General tab and select the FailSafe check box (see Figure 11-14).
Step 4. Go to the Advanced tab and select the Propagate Link State check box
(see Figure 11-15).
Configuring Inline Mode 335
Figure 11-15 The Propagate Link State Feature on the Advanced Tab
Step 6. Click Save to save the changes, and click Deploy to deploy the settings to FTD.
Example 11-10 Viewing the Inline Set Configuration from the CLI
Inline-set INLINE_OUTSIDE_PAIR
Mtu is 1500 bytes
Failsafe mode is on/activated
Failsecure mode is off
Tap mode is off
Propagate-link-state option is on
hardware-bypass mode is disabled
Interface-Pair[1]:
Interface: GigabitEthernet1/1 "INSIDE_INTERFACE"
Current-Status: Down(Propagate-Link-State-Activated)
Interface: GigabitEthernet1/2 "OUTSIDE_INTERFACE"
Current-Status: Down(Down-By-Propagate-Link-State)
Bridge Group ID: 500
>
336 Chapter 11: Blocking Traffic Using Inline Interface Mode
To verify that the Propagate Link State feature works as expected, you can unplug the
cable from one of the interfaces and run the show interface command to determine
the status. Example 11-11 shows the output of the show interface command. After
unplugging the cable from the GigabitEthernet1/1 interface, the second interface,
GigabitEthernet1/2, has also gone down.
Example 11-11 Viewing the Status of the Propagate Link State Feature
Step 1. Navigate to the Policies > Access Control > Access Control page.
Step 2. Click the pencil icon next to an access control policy that you want to deploy
to an FTD device.
Step 3. When the policy editor page appears, click the Add Rule button to create a
new rule. The Add Rule window appears. Figure 11-16 shows the addition of
an access rule that blocks traffic destined for port 23 (the Telnet service port).
Step 4. Give the access rule a name, enable the rule, and select the Block action.
Step 5. In the Ports tab, find the Telnet service in the Available Ports list and add the
Telnet port to the destination.
Step 7. Click the Add button to return to the policy editor page.
338 Chapter 11: Blocking Traffic Using Inline Interface Mode
Step 8. To define a default action, select Balanced Security and Connectivity from
the dropdown. This allows any nonmalicious traffic other than the Telnet
traffic to go through.
Figure 11-18 shows the policy editor page after you add the rule to block
Telnet traffic.
Step 9. Click Save to save the configuration, and click Deploy to deploy the Access
Control Policy to FTD.
Configuring Inline Mode 339
Example 11-12 displays the Shell Access rule that you created to block Telnet traffic. In
the line following this rule, you can find the default action to permit any other traffic.
The hitcnt value increases as more Telnet traffic is blocked by FTD.
Example 11-12 Viewing the Access Control Rules from the CLI
access-list CSM_FW_ACL_ line 6 advanced permit udp any eq 3544 any range 1025 65535
rule-id 9998 (hitcnt=0) 0x46d7839e
access-list CSM_FW_ACL_ line 7 advanced permit udp any range 1025 65535 any eq 3544
rule-id 9998 (hitcnt=0) 0xaf1d5aa5
access-list CSM_FW_ACL_ line 8 remark rule-id 268440576: ACCESS POLICY: AC Policy -
Mandatory/1
access-list CSM_FW_ACL_ line 9 remark rule-id 268440576: L4 RULE: Shell Access
access-list CSM_FW_ACL_ line 10 advanced deny tcp any any object-group TELNET
rule-id 268440576 event-log flow-start (hitcnt=2) 0xae7f8544
access-list CSM_FW_ACL_ line 10 advanced deny tcp any any eq telnet rule-id
268440576 event-log flow-start (hitcnt=2) 0x2bcbaf06
access-list CSM_FW_ACL_ line 11 remark rule-id 268434432: ACCESS POLICY: AC Policy -
Default/1
access-list CSM_FW_ACL_ line 12 remark rule-id 268434432: L4 RULE: DEFAULT ACTION RULE
access-list CSM_FW_ACL_ line 13 advanced permit ip any any rule-id 268434432
(hitcnt=134) 0xa1d3780e
>
Example 11-13 simulates the requests for Telnet traffic access from both networks—
inside and outside—in two packet-tracer outputs. Both requests are blocked by the Shell
Access rule that you created earlier. This example uses port 23 as the destination port
and assumes port number 10000 as a randomly generated source port.
! Packet originates from the inside network, Telnet server is located at the outside
network
Phase: 1
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Configuring Inline Mode 341
Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: DROP
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced deny tcp any any object-group TELNET rule-id
268440576 event-log flow-start
access-list CSM_FW_ACL_ remark rule-id 268440576: ACCESS POLICY: AC Policy -
Mandatory/1
access-list CSM_FW_ACL_ remark rule-id 268440576: L4 RULE: Shell Access
object-group service TELNET tcp
port-object eq telnet
Additional Information:
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
>
! Packet originates from the outside network, Telnet server is located at the inside
network
Phase: 1
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: DROP
Config:
342 Chapter 11: Blocking Traffic Using Inline Interface Mode
Result:
input-interface: OUTSIDE_INTERFACE
input-status: up
input-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
>
Step 1. Create a rule that can capture any traffic destined for port 23. You must apply
the rule on the interface that sees the incoming requests.
Example 11-14 shows a command that is able to capture any traffic with
destination port 23. You must use the trace keyword to capture additional
tracing data. After you enter the command, you can view the status of a
capture by using the show capture command.
> capture inside_telnet trace interface INSIDE_INTERFACE match tcp any any eq 23
>
> show capture
capture inside_telnet type raw-data trace interface INSIDE_INTERFACE [Capturing - 0
bytes]
match tcp any any eq telnet
>
Step 2. Try to access the Telnet server. Although it fails due to the Shell Access
rule, your failure attempt generates Telnet traffic that you will analyze next.
Configuring Inline Mode 343
Example 11-15 displays four packets with destination port 23. They are
captured using the command provided in Example 11-14.
4 packets captured
Step 3. Select a packet by using its number and view the packet by using the show
capture command. Add the trace parameter with the command in order to
view additional tracing data. Example 11-16 shows the dropping of a TCP
packet through an FTD device. The tracing data confirms that the packet was
dropped due to an access rule.
4 packets captured
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: DROP
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced deny tcp any any object-group TELNET rule-id
268440576 event-log flow-start
access-list CSM_FW_ACL_ remark rule-id 268440576: ACCESS POLICY: AC Policy -
Mandatory/1
access-list CSM_FW_ACL_ remark rule-id 268440576: L4 RULE: Shell Access
object-group service TELNET tcp
port-object eq telnet
Additional Information:
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
1 packet shown
>
Summary
In this chapter, you have learned how to configure an FTD device in Inline Mode, how
to enable fault tolerance features on an inline set, and how to trace a packet in order to
analyze the root cause of a drop. This chapter also describes various command-line tools
that you can use to verify the status of an interface, an inline pair, and an inline set.
Quiz 345
Quiz
1. Which of the following statements is true?
a. The configuration steps for Inline Mode and Transparent Mode are the same.
b. An inline pair uses a loopback IP address for communication.
c. The FailSafe feature is enabled on an inline set by default.
d. The Propagate Link State feature is not enabled by default on an inline set.
An FTD device can block packets when you deploy it in Inline Mode. However, there
are some scenarios where you may not want to block a packet right away but instead
want to watch the traffic pattern, determine the effectiveness of your access rules or
intrusion rules on live traffic, and then tune the overall access control policy accordingly.
Sometimes, you want to analyze any suspicious activities on your honeypot and detect
any potential attacks. Occasionally, the business continuity policy of your organization
may demand passive detection rather than inline protection. In this chapter, you will
learn how to deploy FTD to inspect traffic and detect any suspicious activities without
dropping the traffic in real time.
Figure 12-1 introduces Promiscuous Mode and SPAN port, which are technologies
used in a passive FTD deployment.
End User
Switch Router
Internet
Traffic Is
Mirrored
to FTD
Management
Network
FTD FMC
SPAN Port
on a Switch
FTD Interface in
Promiscuous Mode
■ SPAN port: Some switch models can replicate traffic from multiple switch ports
and send the copies to a specific switch port. An FTD device can monitor a
network without being an active part of the network flow; this feature is called port
mirroring. A switch port enabled with the port mirroring feature is known as the
switch port analyzer (SPAN) port.
A SPAN port can receive mirrored traffic from the same Layer 2 switch. However,
if you want to send the replicated traffic to multiple switches, you can use the
Encapsulated Remote Switched Port Analyzer (ERSPAN) technology. ERSPAN
transports mirrored traffic over a Layer 3 network by encapsulating it using
the Generic Routing Encapsulation (GRE) tunneling protocol.
FTD supports inspection of both SPAN and ERSPAN traffic. However, the
configuration examples in this chapter use only SPAN port.
Figure 12-2 illustrates the differences between two types of passive deployments—
using SPAN and ERSPAN ports.
Traffic Inspection Essentials 349
Network Is
Monitored
Through
SPAN Port
End Users
FTD
ERSPAN
Traffic from SPAN Port GRE
Destination
to Promiscuous Port Tunnel
Port
Management
Network Internet
ERSPAN
Source
Port
FMC
Network Is
Monitored
Through
ERSPAN
End Users
■ TAP: A TAP is a network device that copies and transfers traffic to another system.
Unlike a SPAN port on a switch, which is configured at the software level, a network
TAP is dedicated hardware that is designed to replicate and transfer traffic. For an
additional cost, a TAP offers numerous advantages over a SPAN port. One of the
most important benefits is that a TAP is able to capture and copy all the traffic
(including any errors) from a highly utilized network and transfer it to a monitoring
device, such as FTD, without any packet drop.
A SPAN port, in contrast, drops packets if the utilization of a SPAN link exceeds its
capacity. In a highly utilized network, if a SPAN port fails to transfer all the traffic
from all the switch ports, an FTD device loses the complete visibility of a network
and may miss detecting any suspicious activities.
Figure 12-3 shows two types of cabling that an FTD device supports. Both deployments
are operational in detection-only mode.
350 Chapter 12: Inspecting Traffic Without Blocking It
FTD Is
Deployed in FTD
Passive Mode
End Users
Traffic from SPAN Port
to Promiscuous Port
Management
Network Internet
FMC
Inside Outside
Interface Interface
FTD Is
Deployed in
Inline Tap Mode FTD
Inline Tap
End Users
Figure 12-3 Cabling of Interfaces in Passive Mode and Inline Tap Mode
In contrast, if you apply a rule to block packets with certain conditions, an FTD device
does not actually block the original traffic when you configure it in Inline Tap Mode or
Passive Mode. It only generates an event and lets the packet go through the FTD.
ct Po na
(IP Address) to l lys
Passed Identity Check Ide icy A is
Security nti pp
nd t R
Ra ule
Rate Limited te ,
Lim
Access Control it
ACL: L7
Application Control
ntrusion Attempt
Rate Limit
Next Hop Lookup
L3 L2
Figure 12-4 Overview of the FTD Components That Can Trigger a Block Action
351
352 Chapter 12: Inspecting Traffic Without Blocking It
From a user standpoint, a block or drop action on both modes—Passive and Inline
Tap—has the same effect. For example, if a packet matches an access rule with a Block
action, it triggers a connection event displaying the Block action, while the original
packet goes through. Likewise, if a packet matches an intrusion rule with the Drop and
Generate Event rule state, FTD displays the matching packets with the Would Have
Dropped action and lets the traffic go through the FTD.
Although the outcomes are the same, the big advantage of Inline Tap Mode over
Passive Mode is the ease of transition to the inline mode, when necessary. The physical
cabling of Inline Mode and Inline Tap Mode is exactly same. If your FTD is currently
deployed in Inline Tap mode, and you decide to switch to Inline Mode to block traffic in
real time, you can do it simply by changing a setting in the GUI.
■ If your plan is to deploy an FTD device in Detection-Only Mode, so that you could
observe any network activities and tune the security policies accordingly, you may
choose Inline Tap Mode over the traditional Passive Mode. This allows you to switch
to Inline Mode faster, without touching any physical cables.
■ If the utilization of a network is medium to high, use a TAP instead of a SPAN port.
■ Although an FTD device in Passive Mode cannot block traffic, you should still select
an FTD model based on the throughput specification to ensure that the FTD device
inspects all the traffic without dropping it.
Fulfilling Prerequisites
If you previously configured an FTD device as a firewall in Routed Mode, you
need to remove any platform settings, IP addresses, and DHCP server configurations
from the FTD data interfaces, as they are not necessary in Inline, Inline Tap, and
Passive Modes.
■ Part 1: Configuration
■ Part 2: Verification
Note Except for Step 4 in Part 1—enabling Inline Tap Mode—all of the above steps are
described and configured in Chapter 11. If you skipped that chapter, please read it now.
This section discusses only the additional step—enabling Inline Tap Mode.
If your FTD is currently running in Inline Mode, follow these steps to enable Inline
Tap Mode:
Step 2. Navigate to the Devices > Device Management page. A list of managed
devices appears.
Step 3. Click the pencil icon next to the FTD device where you want to enable Inline
Tap Mode. The device editor page appears.
Step 4. Select the Inline Sets tab. If you configured an inline set earlier, it appears
here (see Figure 12-5).
Step 5. Click the pencil icon next to the inline set to modify the existing settings. The
Edit Inline Set window appears.
Step 7. Enable the Tap Mode check box (see Figure 12-6).
Step 9. Click Save to save the settings, and click Deploy to deploy them.
354 Chapter 12: Inspecting Traffic Without Blocking It
Note This section assumes that the FTD device is running the same access control
policy that you created in Chapter 11, which blocks any traffic destined for port 23
(Telnet). If you revoked that policy or skipped Chapter 11, please read it now to learn
how to block Telnet traffic in Inline Mode.
Inline Tap Mode 355
After you deploy an access control policy to block traffic with destination port 23, try to
Telnet into the outside system 192.168.1.200 from the inside host 192.168.1.2. You should
be able to access the system successfully. You should also be able to view an event for the
corresponding connections.
FTD generates only one event—for its Block action—when it is in Inline Mode because
it logs an event at the beginning of a connection and is unable to see the rest of the
connection. However, when an FTD device is in Detection-Only Mode, it generates
multiple events—for Block and Allow actions—because it can see the entire connection
without interrupting the flow.
Figure 12-7 shows two Block events that are generated in Inline Tap Mode and Inline
Mode at the beginning of a Telnet connection.
Figure 12-7 Connection Events for a Block Action in Inline Tap Mode and Inline Mode
If a communication attempt fails and the FMC does not indicate an error for it, you can
begin troubleshooting by using the FTD CLI.
Example 12-1 confirms that the interface set is in Inline Tap Mode. The command output
displays various components of an inline set configuration, such as member interfaces of
an inline pair, their statuses, and advanced settings.
356 Chapter 12: Inspecting Traffic Without Blocking It
Inline-set INSIDE_OUTSIDE_PAIR
Mtu is 1500 bytes
Failsafe mode is on/activated
Failsecure mode is off
Tap mode is on
Propagate-link-state option is on
hardware-bypass mode is disabled
Interface-Pair[1]:
Interface: GigabitEthernet1/1 "INSIDE_INTERFACE"
Current-Status: UP
Interface: GigabitEthernet1/2 "OUTSIDE_INTERFACE"
Current-Status: UP
Bridge Group ID: 0
>
The following section details the steps to connect an FTD passive interface with a SPAN
port on a switch—one of the most common port mirroring options.
Step 2. Navigate to the Devices > Device Management page. A list of managed
devices appears.
Step 3. Click the pencil icon next to the device name where you want to enable the
passive interface mode. The device editor page appears.
Step 4. On the Interfaces tab, select an interface that will function in Promiscuous
Mode. The interface connects to a SPAN port on a switch. The Edit
Physical Interface window appears. Figure 12-8 shows the configuration of
GigabitEthernet1/1 interface as a passive interface.
Step 5. From the Mode dropdown, select Passive.
Step 6. Give the interface a name and select the Enabled check box.
Step 8. Click Save to save the configuration, and click Deploy to deploy it.
Figure 12-9 shows an overview of the FTD interfaces. Note that you do not need to copy
an IP address and security zone for a passive interface.
358 Chapter 12: Inspecting Traffic Without Blocking It
2 1
Example 12-3 shows the setup of a SPAN port on a Cisco switch. According to the
following configuration, this switch receives traffic on the GigabitEthernet0/1 and
GigabitEthernet0/2 interfaces, duplicates them, and retransmits the duplicated traffic
through the GigabitEthernet0/8 interface.
Figure 12-10 shows three Block actions that are generated in three different interface
modes during three Telnet connection attempts.
If a passive interface on an FTD device does not see traffic, you need to check both
devices—FTD and switch. The following examples demonstrate some commands that
you run during investigation.
Example 12-4 offers two useful commands that you can run on an FTD device. First,
enter the show nameif command to determine the active interfaces. Then you can run the
show interface command with the interface to identify the interface status, mode, traffic
statistics, and so on
360 Chapter 12: Inspecting Traffic Without Blocking It
Example 12-5 provides two useful commands that can confirm the SPAN port status on
a switch.
Switch#
362 Chapter 12: Inspecting Traffic Without Blocking It
Step 1. Enter a capture rule with the trace keyword. Example 12-6 shows the use of
the trace keyword with the capture command. It probes the inside interface
and matches any packets with destination port 23. The Capturing - 0 Bytes
message on the show capture command confirms that the process is running
but has not seen a packet yet.
> capture telnet_inside trace interface INSIDE_INTERFACE match tcp any any eq 23
>
Step 2. Initiate a Telnet request from the inside host to the outside server. Although
you enabled an access rule to block Telnet traffic, the traffic is able to go
through because the interface is in Inline Tap Mode.
13 packets captured
Step 3. From the show capture output shown in Example 12-6, select a packet you
want to trace by using its associated number on the left. Example 12-8 shows
the tracing data for a Telnet packet. Note the final action of the flow: Access-
list would have dropped, but packet forwarded due to inline-tap.
13 packets captured
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
364 Chapter 12: Inspecting Traffic Without Blocking It
Phase: 3
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: WOULD HAVE DROPPED
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced deny tcp any any object-group TELNET rule-id
268441600 event-log flow-start
access-list CSM_FW_ACL_ remark rule-id 268441600: ACCESS POLICY: AC Policy -
Mandatory/1
access-list CSM_FW_ACL_ remark rule-id 268441600: L4 RULE: Shell Access
object-group service TELNET tcp
port-object eq telnet
Additional Information:
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: Access-list would have dropped, but packet forwarded due to inline-tap
1 packet shown
>
Example 12-9 simulates a Telnet packet that would have dropped, but FTD forwards it
due to the Inline Tap Mode setting.
Analyzing Traffic Inspection Operation 365
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 2
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 3
Type: ACCESS-LIST
Subtype: log
Result: WOULD HAVE DROPPED
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced deny tcp any any object-group TELNET rule-id
268441600 event-log flow-start
access-list CSM_FW_ACL_ remark rule-id 268441600: ACCESS POLICY: AC Policy -
Mandatory/1
access-list CSM_FW_ACL_ remark rule-id 268441600: L4 RULE: Shell Access
object-group service TELNET tcp
port-object eq telnet
Additional Information:
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: Access-list would have dropped, but packet forwarded due to inline-tap
>
366 Chapter 12: Inspecting Traffic Without Blocking It
Note Because this chapter is about inspecting traffic without blocking it, this section
takes an opportunity to demonstrate the behavior of an FTD device when you deploy an
intrusion policy in Detection-Only Mode. It will help you understand and compare dif-
ferent actions in different interface modes. However, to learn about the configuration and
troubleshooting of an intrusion policy, read Chapter 21, “Preventing Cyber Attacks by
Blocking Intrusion Attempts.”
To understand various actions on connections and the reasons for their logging, this section
shows how to deploy and analyze an FTD device in various interface modes with different
intrusion policy settings. You will notice different behaviors on FTD when host 192.168.1.2
attempts to connect to a Telnet server 192.168.1.200 in different deployment scenarios.
Table 12-1 highlights the deployment scenarios (1, 2, and 6) when the FTD device would
have dropped a packet. A gray down arrow in the Inline Result column confirms it (refer to
Figure 12-12, which appears after the table). However, an FTD device blocks a connection
when it meets all three conditions together—Interface Mode is inline, the intrusion rule state
is set to Drop and Generate Events, and the intrusion policy is configured with the Drop
When Inline option enabled. In this case (Scenario 5), the down arrow turns black.
Figure 12-11 shows different types of connection events in different deployment sce-
narios. Although the reasons for logging show Intrusion Block, FTD “allows” all these
connections (in Scenarios 1, 2, and 6) due to its interface modes and intrusion policies.
Figure 12-12 shows three types of inline results—blank, gray arrow, and black arrow.
Inline results appear blank when FTD does not drop the original packet but generates an
event only. The gray down arrow (Scenarios 1, 2 and 6) indicates that the packet would
have dropped, and the black arrow (Scenario 5) denotes a drop of the original packet.
Modes that can trigger “Would Have Dropped” events are Passive Mode, Inline Tap
Mode, and Inline Mode with the “Drop When Inline” option disabled. All the events in
this example (and in the previous example) are created using the same client host, the
same server host, and the same application protocol.
8
7
6
5
4
3
2
1
Example 12-10 confirms that the intrusion policy (Snort rule) of an FTD device would
have dropped a Telnet packet, but FTD forwards it due to the Inline Tap Mode setting.
36 packets captured
Phase: 1
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
MAC Access list
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268434432
access-list CSM_FW_ACL_ remark rule-id 268434432: ACCESS POLICY: AC Policy -
Default/1
access-list CSM_FW_ACL_ remark rule-id 268434432: L4 RULE: DEFAULT ACTION RULE
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be
reached
Phase: 5
Type: NGIPS-EGRESS-INTERFACE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
370 Chapter 12: Inspecting Traffic Without Blocking It
Additional Information:
Ingress interface INSIDE_INTERFACE is in NGIPS inline mode.
Egress interface OUTSIDE_INTERFACE is determined by inline-set configuration
Phase: 6
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 257, packet dispatched to next module
Phase: 7
Type: EXTERNAL-INSPECT
Subtype:
Result: ALLOW
Config:
Additional Information:
Application: 'SNORT Inspect'
Phase: 8
Type: SNORT
Subtype:
Result: DROP
Config:
Additional Information:
Snort Verdict: (block-packet) drop this packet
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: Access-list would have dropped, but packet forwarded due to inline-tap
1 packet shown
>
Summary
This chapter explains the configuration and operation of various detection-only modes
of an FTD device, such as Passive Mode, Inline Tap Mode, and Inline Mode with drop
when the inline option is disabled. It also shows various command-line tools you can use
to determine the status of interfaces and traffic.
Quiz 371
Quiz
1. Which of the following interface modes does not block a packet?
a. Transparent Mode
b. Routed Mode
c. Inline Tap Mode
d. All of the above
2. Which of the following actions ensures the analysis of maximum traffic when it goes
through an FTD device?
a. Using a SPAN port on a switch
b. Deploying a TAP to replicate traffic
c. Configuring Inline Tap Mode instead of Passive Mode
d. Any FTD model can handle all of the traffic and ensures 100% detection.
4. Which of the following commands shows whether an interface is set to Inline Tap
Mode?
a. show inline-tap
b. show inline-set
c. show interface ip brief
d. show interface inline-tap
This page intentionally left blank
Chapter 13
FTD can analyze encapsulated traffic. It can take an action based on the outermost and
innermost headers of an encapsulated packet. As of this writing, FTD supports the Generic
Routing Encapsulation (GRE), IP-in-IP, IPv6-in-IP, and Teredo encapsulation protocols. This
chapter demonstrates how an FTD device handles an encapsulated packet over a tunnel.
Figure 13-1 shows how a GRE header and an IP header (outer) encapsulate a TCP header
and its original IP header (inner).
Outer Inner
Ethernet Inner IP Header GRE Ethernet Inner IP Header TCP/UDP Application Payload
Header Protocol No: 47 Header Header Protocol No: 6 Header Telnet, HTTP, etc.
(IP Address) ct Po na
to l lys
Security
Passed Identity Check Ide icy A is
nti pp
nd t R
Ra ule
Rate Limited te ,
Lim
Access Control it
ACL: L7
Application Control
ntrusion Attempt
Rate Limit
Next Hop Lookup
L3 L2
Routing
Dropped Due to the Firepower Engine
Egress
Interface
Blocked by the Firewall Engine
You can deploy a prefilter policy in FTD to analyze the encapsulated packets based
on their outermost headers. When a packet matches with a rule on a prefilter policy,
FTD takes an appropriate action before the packet hits any other security policies.
Figure 13-2 illustrates how a prefilter policy can act as a gatekeeper to the rest of the
security policies.
FTD, by default, enables a default prefilter policy. You can change the settings of
the default policy. However, you cannot delete this system-provided policy, nor
can you add a new rule to this policy. The only configurable option is the default
action against the traffic. There are two choices for the default action—Analyze All
Tunnel Traffic and Block All Tunnel Traffic. These default actions are illustrated later
in the "Prefilter Policy Settings” section of this chapter (see Figure 13-5).
A custom prefilter policy allows you to add a tunnel rule, which can offer granular
control over the tunnel traffic. By using a custom tunnel rule, you can bypass the
encapsulated pass-through traffic from any further inspection.
This chapter uses both the default policy and a custom policy to demonstrate the flow of
an encapsulated packet in various conditions.
Fulfilling Prerequisites
This chapter assumes that you have prior experience with GRE protocol implementation.
In addition, to prepare a lab to implement the examples in this chapter, you need to
complete the following tasks:
■ Deploy an FTD device between two routers and configure a simple GRE tunnel
between them. FTD must be able to see all the traffic between the routers.
■ Build two pairs of subnetworks, where one subnet pair transfers traffic over
an encapsulated tunnel, and the other pair uses a regular non-encapsulated
network. You can use either physical hosts or loopback interfaces to represent the
endpoints.
Figure 13-3 shows two subnets in each location—a branch office and a data center.
Network 2 in the branch office and Network 200 in the data center are connected
over a GRE tunnel. The remaining subnets (Network 1 and Network 100) use the
non-encapsulated route.
376
Chapter 13: Handling Encapsulated Traffic
interface GigabitEthernet1 interface GigabitEthernet1
ip address 203.0.113.1 255.255.255.0 ip address 203.0.113.100 255.255.255.0
Internet
ip route 192.168.100.0 255.255.255.0 GE 1 ip route 192.168.1.0 255.255.255.0 GE 1
ip route 192.168.200.0 255.255.255.0 Tunnel 1 GRE Tunnel ip route 192.168.2.0 255.255.255.0 Tunnel 1
Traffic between Network 2
and 200 goes via the GRE
FTD 1 tunnel and bypasses any FTD 2
Network 1 further inspection by Network 100
GE1 enabling a fastpath rule. GE1
GE2 GE2
192.168.1.0/24 Traffic between Network 1
192.168.100.0/24
Branch and 100 does not go through Data
Office the tunnel, and is subject to Center
Network 2 Router further inspection. Router Network 200
192.168.2.0/24
192.168.200.0/24
Figure 13-3 Lab Topology and Router Configuration Used in This Chapter
Fulfilling Prerequisites 377
Table 13-1 provides a summary of the addressing scheme used in this chapter. The
lab exercises in this chapter demonstrate that when Network 2 and Network 200
communicate, the traffic uses the GRE tunnel and is subject to the action in a prefil-
ter policy. The packet flow between Network 1 and Network 100 always remains the
same, regardless of any action you define for tunnel traffic.
> capture gre_traffic trace interface INSIDE_INTERFACE match gre any any
> capture telnet_traffic trace interface INSIDE_INTERFACE match tcp any any eq 23
>
Make sure the capture is running but not capturing any data until you manually send
traffic. Example 13-1 shows confirmation that the capture process is running. The
“0 bytes” output indicates that the FTD device has not received any packets.
Example 13-1 The Capture Process Is Running but FTD Has Not Received Any
Packets to Capture
To transfer and capture traffic on the firewall engine, follow these steps:
Note The method to initiate a Telnet connection varies, depending on the Telnet client
you use. You can use any tool or an operating system to establish a Telnet connection.
Example 13-3 FTD Capturing GRE Packets After Sending Traffic over the Tunnel
Note Hosts in this lab use two different paths to transfer encapsulated and
non-encapsulated traffic. The “Fulfilling Prerequisites” section of this chapter describes
the router configurations in Figure 13-3.
To clear the previously captured packets from memory and to begin the capture again,
run the clear capture command:
Step 1. Configure prefilter and access control policies on the FMC and deploy
them in FTD.
Step 2. Transfer traffic through the encapsulated tunnel and the non-encapsulated path.
Tip If your goal is to simply analyze or block all tunnel traffic, select a default action in
the default prefilter policy to keep the configuration simple. However, if you need separate
tunnel rules for different types of encapsulated traffic, create a custom prefilter policy.
A default prefilter policy does not allow you to add custom rules.
To analyze encapsulated traffic, select the Analyze All Tunnel Traffic option. This allows
an FTD device to forward an encapsulated packet to the next level of inspection.
380 Chapter 13: Handling Encapsulated Traffic
Figure 13-4 The Prefilter Policy Page Shows the System-Provided Default Policy
Figure 13-5 shows the configurable options in the default prefilter policy. You cannot
add rules to the default prefilter policy; you can only select a default action from the
dropdown.
Figure 13-6 shows the selection of Intrusion Prevention: Balanced Security and
Connectivity as the default action. Select the logging icon located next to the Default
Action dropdown. The Logging window appears.
Figure 13-7 shows the Logging window. You can enable logging either at the beginning
or at the end of a connection, but not for both because doing so could affect the system
performance.
382 Chapter 13: Handling Encapsulated Traffic
After you make any changes to the prefilter or access control policies, you must save the
settings and redeploy the access control policy to activate the new changes.
Note The steps for capturing Telnet and GRE traffic are described earlier in this chapter,
in the section “Transferring and Capturing Traffic on the Firewall Engine.” To learn more
about the packet capture option, read Chapter 10, “Capturing Traffic for Advanced
Analysis.”
Once you enable the captures, use Telnet to connect to Network 100 from Network 1.
Similarly, connect to Network 200 from Network 2. Both connection attempts should be
successful. You can view the associated connection events in the FMC.
Figure 13-8 shows two connection events for two separate Telnet connections—
originated from Network 1 and Network 2. Because FTD can analyze the inner header of
an encapsulated packet, the FMC shows the original IP address—not the address on the
outermost header—in a connection event.
If you do not see the events as shown in Figure 13-8, make sure you have enabled logging
for the default action. You can verify the logging settings by running the show access-
control-config command (see Example 13-4). If you did not enable logging, read the
section “Configuring Policies to Analyze Encapsulated Traffic,” earlier in this chapter.
Scenario 1: Analyzing Encapsulated Traffic 383
The default action under the Tunnel/Prefilter Rule column confirms that a
prefilter policy allowed this traffic for further inspection.
Example 13-4 shows confirmation that the default action of the access control policy is
configured to generate a log at the beginning of a connection.
If you do not see an expected connection event, you can turn on the firewall-engine-
debug tool to determine if (and why) a packet goes through the engines. As an access
rule inspects a packet, the tool displays the internal ID for an active rule and its
associated action in real time.
Example 13-5 shows debug messages for both encapsulated and non-encapsulated Telnet
connections. If FTD generates debug messages during both connection attempts, it con-
firms that the Firepower inspection engines are able to see and inspect traffic inside and
outside a tunnel.
! The following messages appear when you connect to 192.162.100.1/24 from the host
192.168.1.1/24 over the non-encapsulated path. It triggers the default action
(rule id: 268434432) on the Access Control policy:
.
192.168.1.1-43286 > 192.168.100.1-23 6 AS 5 I 1 New session
192.168.1.1-43286 > 192.168.100.1-23 6 AS 5 I 1 using HW or preset rule order 2,
id 268434432 action Allow and prefilter rule 0
192.168.1.1-43286 > 192.168.100.1-23 6 AS 5 I 1 allow action
192.168.1.1-43286 > 192.168.100.1-23 6 AS 5 I 1 Deleting session
.
.
! The following output appears when you connect to 192.162.200.1/24 from the host
192.168.2.1/24 over the GRE tunnel. It triggers the prefilter rule id 9988:
.
192.168.2.1-23208 > 192.168.200.1-23 6 AS 5 I 0 New session
192.168.2.1-23208 > 192.168.200.1-23 6 AS 5 I 0 using prefilter rule 9998 with
tunnel zone -1
192.168.2.1-23208 > 192.168.200.1-23 6 AS 5 I 0 Starting with minimum 0, id 0 and
SrcZone first with zones -1 -> -1, geo 0(0) -> 0, vlan 0, sgt tag: untagged,
svc 0, payload 0, client 0, misc 0, user 9999997, url , xff
192.168.2.1-23208 > 192.168.200.1-23 6 AS 5 I 0 match rule order 2, id 268434432
action Allow
192.168.2.1-23208 > 192.168.200.1-23 6 AS 5 I 0 allow action
.
.
<Output Omitted for Brevity>
Scenario 1: Analyzing Encapsulated Traffic 385
If you want to know exactly which rule will trigger a message on the firewall-engine-
debug output, first take note of the rule ID from the debug output, and then find it in the
list of active access rules. Example 13-6 shows the list of active access rules on an FTD
device. You can find any tunnel, prefilter, and access rules with their associated internal
rule IDs in this list.
Example 13-7 shows the output of the show capture command, which enables you
to view the three-way handshake (SYN, SYN-ACK, and ACK) of a TCP connection.
Each packet is assigned a number (on the left side of each row) that you can use for
further analysis.
386 Chapter 13: Handling Encapsulated Traffic
49 packets captured
Example 13-8 shows the detailed flow of a captured packet. This example uses packet
number 1, which is a SYN packet from 192.168.1.1 to 192.168.100.1.
49 packets captured
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Scenario 1: Analyzing Encapsulated Traffic 387
Phase: 3
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268434432
access-list CSM_FW_ACL_ remark rule-id 268434432: ACCESS POLICY: AC Policy -
Default/1
access-list CSM_FW_ACL_ remark rule-id 268434432: L4 RULE: DEFAULT ACTION RULE
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be
reached
Phase: 5
Type: NGIPS-EGRESS-INTERFACE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Ingress interface INSIDE_INTERFACE is in NGIPS inline mode.
Egress interface OUTSIDE_INTERFACE is determined by inline-set configuration
Phase: 6
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 102, packet dispatched to next module
Phase: 7
Type: EXTERNAL-INSPECT
Subtype:
Result: ALLOW
Config:
388 Chapter 13: Handling Encapsulated Traffic
Additional Information:
Application: 'SNORT Inspect'
Phase: 8
Type: SNORT
Subtype:
Result: ALLOW
Config:
Additional Information:
Snort Verdict: (pass-packet) allow this packet
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: allow
1 packet shown
>
Example 13-9 shows the packets encapsulated with GRE headers (IP number 47). The
external IP address 203.0.113.1 represents the internal host 192.168.1.1. Each packet
has a reference number (on the left side of each row) that you can use later, during
flow analysis.
49 packets captured
Example 13-10 shows tracing data for a GRE-encapsulated packet. Because this is tunnel
traffic, the default prefilter policy forwards it to the inspection engine for further analysis.
49 packets captured
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit gre any any rule-id 9998
access-list CSM_FW_ACL_ remark rule-id 9998: PREFILTER POLICY: Default Tunnel and
Priority Policy
access-list CSM_FW_ACL_ remark rule-id 9998: RULE: DEFAULT TUNNEL ACTION RULE
390 Chapter 13: Handling Encapsulated Traffic
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be
reached
Phase: 5
Type: NGIPS-EGRESS-INTERFACE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Ingress interface INSIDE_INTERFACE is in NGIPS inline mode.
Egress interface OUTSIDE_INTERFACE is determined by inline-set configuration
Phase: 6
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 103, packet dispatched to next module
Phase: 7
Type: EXTERNAL-INSPECT
Subtype:
Result: ALLOW
Config:
Additional Information:
Application: 'SNORT Inspect'
Phase: 8
Type: SNORT
Subtype:
Result: ALLOW
Config:
Additional Information:
Snort Verdict: (pass-packet) allow this packet
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: allow
1 packet shown
>
Scenario 2: Blocking Encapsulated Traffic 391
Step 2. Click the pencil icon to edit the default prefilter policy.
Step 3. In the policy editor page, from the Default Action dropdown select Block All
Tunnel Traffic (see Figure 13-9).
Figure 13-9 Setting the Prefilter Policy to Block All Tunnel Traffic
Step 4. Optionally, use the logging icon, next to the dropdown, to enable logging
when the default prefilter policy blocks any tunnel traffic (see Figure 13-10).
392 Chapter 13: Handling Encapsulated Traffic
Figure 13-10 Logging for the Block Action on the Default Prefilter Policy
Step 5. Click Save to save the policy, and click Deploy to deploy it to the FTD device.
Note The steps for capturing Telnet and GRE traffic are described in the section
“Transferring and Capturing Traffic on the Firewall Engine,” earlier in this chapter. If you
want to learn more about packet capture option, read Chapter 10.
In addition, run the firewall-engine-debug tool at the FTD CLI. It allows you to analyze
any activities in real time as the traffic comes.
When you enable both the capture and the firewall-engine-debug tools, you can generate
live traffic through the FTD device by attempting to establish Telnet connections to
Network 100 and Network 200 from Network 1 and Network 2, respectively. In this scenario,
Scenario 2: Blocking Encapsulated Traffic 393
Network 1 and Network 100 should be able to establish a Telnet connection, but Network 2
should fail to connect to Network 200 due to the Block action on the prefilter policy.
Example 13-11 does not show any tunnel traffic in the firewall-engine-debug output.
Because the traffic is blocked before it hits an inspection engine, the firewall-engine-
debug tool cannot see and log the Block action.
! Traffic from 192.168.2.1 to 192.168.200.1 does not appear here; because they are
encapsulated and therefore, blocked by the Prefilter policy.
^C
Caught interrupt signal
Exiting.
>
The firewall-engine-debug output shows rule ID 268434432 with the Allow action, but
it does not display the condition that triggers this particular rule. To learn about a rule
condition, you can view the list of all active access rules and find the associated rule ID
for a specific rule.
Example 13-12 elaborates the default actions of both the prefilter and access control
policies. The tunnel traffic is denied by rule 9998, and any other traffic is permitted by
rule 268434432 and forwarded for Firepower deep packet inspection.
394 Chapter 13: Handling Encapsulated Traffic
Example 13-12 List of Access Rules by the Prefilter and Access Control
Default Actions
For the successful and unsuccessful Telnet attempts, the FMC should display connection
events. You can find them in the Analysis > Connections > Events page.
Table 13-2 summarizes the actions in a lab network when FTD is configured to block all
tunnel traffic.
Table 13-2 Expected Behavior in Lab Scenario 2 When the Tunnel Traffic Is Blocked
Network Policy Action Event Log
Non-encapsulated traffic The prefilter policy does not An Allow event is logged
between Network 1 and interrupt traffic because the by the default action of
Network 100 traffic is non-encapsulated. It the access control policy.
is allowed by the default action
of the access control policy.
Encapsulated traffic The prefilter policy blocks all A Blocked event is logged
between Network 2 and of the tunnel traffic, per by the default action of
Network 200 configuration, before it hits the prefilter policy.
any inspection engines.
Scenario 2: Blocking Encapsulated Traffic 395
Figure 13-11 shows that the default action of the default prefilter policy blocks a GRE
connection. Because the packet is blocked and not analyzed afterward, FTD does not
reveal the innermost IP header. As a result, the connection event shows the IP addresses
of the router interfaces.
If you do not see an event that you expect to see, make sure you enabled logging for the
default actions on both the prefilter and access control policies. In addition, you must
check to make sure the latest access control policy where you saved the recent changes is
active. You can verify it by checking the status of the access control policy, at Policies >
Access Control > Access Control.
Example 13-13 displays the Telnet traffic over a tunnel. First, it shows the encapsulation
of a packet with a GRE header (IP number 47). Then it analyzes the blocking of a GRE
packet due to the default tunnel action rule 9998.
396 Chapter 13: Handling Encapsulated Traffic
4 packets captured
4 packets captured
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Scenario 3: Bypassing Inspection 397
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: DROP
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced deny gre any any rule-id 9998 event-log flow-start
access-list CSM_FW_ACL_ remark rule-id 9998: PREFILTER POLICY: Default Tunnel and
Priority Policy
access-list CSM_FW_ACL_ remark rule-id 9998: RULE: DEFAULT TUNNEL ACTION RULE
Additional Information:
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
1 packet shown
>
Step 2. In the Prefilter Policy page that appears, click the New Policy button to create
a new prefilter policy. Figure 13-12 shows the name of a new policy—Custom
Tunnel and Prefilter Policy. In the background, you can see the New Policy
button as well.
398 Chapter 13: Handling Encapsulated Traffic
Step 3. When the New Policy window appears, name the policy and click the Save
button for the policy. The policy editor page appears.
Step 4. On the policy editor page, click the Add Tunnel Rule button. The Add Tunnel
Rule configuration window appears. Figure 13-13 shows the prefilter policy
editor page. A user-created policy offers two additional options—Add Tunnel
Rule and Add Prefilter Rule.
Step 5. Assign a name to your custom tunnel rule and select Fastpath from the
Action dropdown.
Step 6. Make sure the rule is enabled, and select the radio button Match Tunnels
from Source and Destination.
Step 7. Click the Encapsulation & Ports tab and enable GRE in the list of
encapsulation protocols. Optionally, you can go to the Tunnel Endpoints
tab and select the source and destination tunnel endpoints. These tunnel
endpoints are the IP addresses of both sides of the tunnels. You can configure
them the same way you would configure a network address within an access
rule or a prefilter rule.
Figure 13-14 shows the configuration of a tunnel rule named GRE Tunnel
Rule. The rule matches GRE tunnel traffic from source and destination, and it
uses Fastpath with them for any further inspection.
Step 8. Optionally, go to the Logging tab and enable logging at the beginning of a
connection (see Figure 13-15). This allows an FTD device to generate a log
when this particular rule triggers.
400 Chapter 13: Handling Encapsulated Traffic
Step 9. Click the Add button. The GUI returns to the policy editor page.
Step 10. Click the Save button to save the policy. To activate the new custom prefilter
policy, you must invoke it in the current access control policy.
Step 1. Go to Policies > Access Control. A list of available access control policies appears.
Step 2. Select the pencil icon to edit the desired policy. The access control policy
editor page appears.
Step 3. In the top-left corner, click the Default Prefilter Policy link.
Step 4. In the Prefilter Policy popup window that appears, select your desired policy
from the dropdown. Figure 13-17 shows the access control policy configura-
tions for Scenario 3. First, you must select a custom prefilter policy that has
the Fastpath rule. Then you need to enable logging for default action. Finally,
you can save and deploy the policy.
Step 5. Optionally, enable logging for the default action. This allows you to determine
whether a packet hits the default action of an access control policy or
bypasses the inspection before it hits the default action.
402 Chapter 13: Handling Encapsulated Traffic
Step 6. Finally, click Save to save the changes, and click Deploy to deploy the revised
access control policy to your FTD device. It should activate the revised
prefilter policy as well.
Now, connect to Network 200 from Network 2 via Telnet. Because these networks are
connected over the GRE tunnel, FTD allows the traffic between them to bypass any addi-
tional inspection. You can verify this by viewing the associated connection events on the
Analysis > Connection > Events page.
Figure 13-18 shows a Fastpath event that is triggered by the GRE tunnel rule. In this case,
because FTD does not analyze the inside of the encapsulated traffic, the connection
event shows the outermost headers (IP addresses of the router interfaces) instead of the
innermost headers.
If FTD still does not bypass the tunnel traffic and acts based on the previous prefilter
policy, try clearing the existing connections on the FTD. This forces the hosts to establish
new connections by using the new policy.
Note The steps for capturing Telnet and GRE traffic are described in the section
“Transferring and Capturing Traffic on the Firewall Engine,” earlier in this chapter. If you
want to learn more about packet capture option, read Chapter 10.
In addition, run the firewall-engine-debug tool on the CLI of your FTD device to analyze
any activities in real time as the traffic comes.
Once you enable both the capture and the firewall-engine-debug tools, you can gener-
ate live traffic through the FTD device by trying to establish Telnet connections between
Network 1 and Network 100 and between Network 2 and Network 200. In Scenario 3, both
connection attempts are successful; however, the debug engine does not see traffic from
Network 2 and Network 200 because it is encapsulated and bypasses further inspection.
^C
Caught interrupt signal
Exiting.
>
Example 13-15 confirms the deployment of the Fastpath rule named GRE Tunnel Rule.
An FTD device trusts the traffic when the rule uses the Fastpath action.
Example 13-15 A Fastpath Rule Shows a Trust Action in the CLI Access List
Example 13-16 shows the capture of encapsulated packets with GRE headers
(IP number 47). Due to the Fastpath rule trust gre any any, FTD bypasses them without
any further inspection.
49 packets captured
49 packets captured
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
406 Chapter 13: Handling Encapsulated Traffic
Phase: 3
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced trust gre any any rule-id 268438530 event-log both
access-list CSM_FW_ACL_ remark rule-id 268438530: PREFILTER POLICY: Custom Tunnel
and Prefilter Policy
access-list CSM_FW_ACL_ remark rule-id 268438530: RULE: GRE Tunnel Rule
Additional Information:
Phase: 5
Type: NGIPS-EGRESS-INTERFACE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Ingress interface INSIDE_INTERFACE is in NGIPS inline mode.
Egress interface OUTSIDE_INTERFACE is determined by inline-set configuration
Phase: 6
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 131, packet dispatched to next module
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: allow
1 packet shown
>
Quiz 407
Summary
In this chapter, you have learned how to analyze and block traffic that is encapsulated
with the GRE protocol, and how to bypass inspection when the traffic is transferred over
a tunnel. This chapter also presents various tools you can use to analyze the actions of
the prefilter and access control policies.
Quiz
1. Which of the following statements is true?
a. To analyze any tunnel traffic, you must create and apply a prefilter policy.
b. An access control policy overrides the rules in a prefilter policy.
c. The Fastpath action in a prefilter policy bypasses the rules in an access control
policy; however, traffic is still subject to intrusion policy inspection.
d. None of the above.
3. Which of the following commands confirms whether logging is enabled for the
default action in an access control policy?
a. show logging
b. show access-list
c. show default-action
d. show access-control-config
If you do not want FTD to inspect certain traffic, because, for example, it is completely
trusted, you can configure FTD to bypass inspection for that particular traffic while it
continues deep packet inspection for the rest of the network. Doing so offloads the FTD
hardware resources, reduces overall processing delay, and improves network performance. This
chapter describes the options for bypassing Firepower inspection of any particular traffic.
While their goals are identical—to bypass deep packet inspection—the architecture and
implementation of each tool is different, as described in the following sections.
■ Tunnel rule: A tunnel rule, as the name suggests, filters tunnel traffic that is encap-
sulated by an additional IP header. As of this writing, a tunnel rule supports GRE,
IP-in-IP, IPv6-in-IP, and Teredo encapsulation protocols, as discussed in Chapter 13,
“Handling Encapsulated Traffic.”
■ Prefilter rule: A prefilter rule is able to filter traffic based on basic networking
criteria. As of this writing, it supports a rule condition based on an IP address, a port
number, a VLAN tag, and an interface.
410 Chapter 14: Bypassing Inspection and Trusting Traffic
Rules in a prefilter policy support three types of actions—Fastpath, Analyze, and Block.
Whereas the Fastpath action bypasses traffic from further inspection, the Analyze action
forwards the traffic to the next level of inspection, and the Block action drops a packet
without any additional security check.
Figure 14-1 shows the position of a fastpath rule in an FTD workflow. When a packet
matches a fastpath rule, it bypasses the Firepower deep packet inspection completely.
ct Po na
(IP Address) to l lys
Passed Identity Check Ide icy A is
Security nti pp
nd t R
Ra ule
Rate Limited te ,
Lim
Access Control it
ACL: L7
Application Control
ntrusion Attempt
Rate Limit
Next Hop Lookup
L3 L2
Routing
Dropped Due to the Firepower Engine
Egress
Interface
Blocked by the Firewall Engine
Fulfilling Prerequisites
This chapter assumes that an FTD device is deployed between a client and a server.
The client can access the server by using Secure Shell (SSH) and Telnet services. The
configuration examples in this chapter use both of these services to verify the action of
the fastpath and trust rules.
Note The method to initiate a Telnet or SSH connection varies, depending on the client
software or operating system you use. This book does not recommend any particular client,
and therefore it does not display any Telnet or SSH client commands.
Figure 14-3 shows a simple topology that is used in this chapter to demonstrate bypass-
ing inspection.
FMC
10.1.1.16
FTD
10.1.1.2
Client Server
192.168.1.2 192.168.1.200
Inside Interface Outside Interface
A custom prefilter rule supports three types of actions: Analyze, Block, and Fastpath. As
an example, the following sections demonstrate how to create a custom prefilter policy,
add a custom prefilter rule to it, and fastpath any traffic over port 22—the default port
for the SSH protocol.
Figure 14-4 The Prefilter Policy Page Shows Available Policies and the New Policy Button
414 Chapter 14: Bypassing Inspection and Trusting Traffic
Step 3. In the prefilter policy editor page, click the Add Prefilter Rule button
(see Figure 14-5). A configuration window appears.
Step 4. Give a name to the rule and set the Action dropdown to Fastpath.
Step 5. Click the Port tab and select SSH from the Available Ports list.
Step 6. Click the Add to Destination button to select port 22 as the destination port.
Figure 14-6 shows the creation of a custom prefilter rule, named Shell
Prefilter. The rule uses Fastpath action, and selects the default port for the
SSH protocol (port 22) as the destination port.
Note You could save the rule right here, and it would enable any traffic that is transferred
over port 22 to bypass further inspection. However, if you want to enable traffic originated
from only a particular subnet to bypass inspection, proceed with the next steps.
Step 7. Select the Networks tab. By default, FTD has preconfigured objects for some
common networks, such as private IP addresses, multicast addresses, and so
on. If they match with your network-addressing scheme, you can select them
here. Alternatively, you can create a network object on the fly. Otherwise, you
can just add an IP address directly as a source or destination.
Figure 14-7 illustrates the options available for defining the source and
destination for a prefilter rule.
Implementing Fastpath Through a Prefilter Policy 415
Figure 14-6 Configuring a Prefilter Rule with Name, Action, and Destination Port
Button to Create a
New Network Object
Step 8. Click on the green plus icon. The New Network Objects popup
window appears.
Step 9. As shown in Figure 14-8, create a custom network object, Corporate-
Network, for the 192.168.1.0/24 subnet and click Save.
Step 10. Once you have saved a new network object, it is available for selection. You
may need to click the refresh icon for it to show up in the list. Click the Add
to Source button to select your custom network object as the source network.
This enables the FTD device to match traffic coming from your desired
subnet. Figure 14-9 shows a custom network object, Corporate-Network,
selected as the source network.
Step 11. Optionally, enable logging for every time a fastpath rule triggers. This helps
you to determine whether a policy is operational. To do this, go to the
Logging tab and select either Log at Beginning of Connection or Log at
End of Connection. (However, do not select both as doing so can affect the
system performance.)
Step 12. Click the Add button to complete the rule configuration, and you return to
the policy editor page. Click the Save button to save the changes.
Implementing Fastpath Through a Prefilter Policy 417
Caution Do not select the Deploy button at this stage because you have to make
sure this new prefilter policy is invoked by the required access control policy. The next
section, “Invoking a Prefilter Policy in an Access Control Policy,” describes how to do
that. For now, just click the Save button to store the changes.
Figure 14-10 shows a complete view of the Shell Prefilter rule. It also illustrates the
buttons that you should and should not click at this stage.
Figure 14-10 View of a Prefilter Rule That Can Bypass SSH Traffic from 192.168.1.0/24
418 Chapter 14: Bypassing Inspection and Trusting Traffic
Step 1. Navigate to Policies > Access Control > Access Control. The Access Control
Policy page appears.
Step 2. To edit the policy that you want to deploy on your FTD device, use the
pencil icon next to the name of a policy to open the access control policy
editor page.
Step 3. Look at the top-left side of the policy editor page. You should be able to find
a link to the currently selected prefilter policy. Click this link. By default, an
access control policy uses the default prefilter policy.
Figure 14-11 confirms that this access control policy invokes the prefilter
rules from the default prefilter policy. Click the name of the prefilter policy to
make a change.
Figure 14-11 By Default, An Access Control Policy Uses the Default Prefilter Policy
Step 4. After you click the link, the Prefilter Policy popup window appears.
It presents the available prefilter policies in a dropdown.
Step 5. Select Custom Tunnel and Prefilter Policy and click OK (see Figure 14-12).
Implementing Fastpath Through a Prefilter Policy 419
You could save and deploy the access control policy at this stage. However, to determine
whether an access control policy inspects a connection, you can enable the logging for the
default action. This helps in understanding the life cycle of a packet and troubleshooting
any potential issues. Here are the steps:
Step 1. Go to the Rules tab of the access control policy editor page.
Step 2. Select the logging icon that is next to the Default Action dropdown
(see Figure 14-13).
Step 5. Click Save to save the changes, and then click Deploy to deploy the changes
to your FTD device.
420 Chapter 14: Bypassing Inspection and Trusting Traffic
Step 1. Capture the SSH traffic from the ASA firewall engine:
> capture ssh_traffic trace interface INSIDE_INTERFACE match tcp any
any eq 22
You can run the show capture command to confirm that the capture process
is running. 0 bytes in the output indicates that the FTD has not received
any packets:
> show capture
capture ssh_traffic type raw-data trace interface INSIDE_INTERFACE
[Capturing - 0 bytes]
match tcp any any eq ssh
>
To clear any previously captured packets from the memory and to restart the
capture from the next matched packets, run the clear capture command.
> clear capture /all
Step 2. Begin the capture of TCP traffic from the Firepower Snort engine. This
helps you determine whether the Snort engine sees any bypassed traffic.
Example 14-2 shows the command to capture TCP traffic from an inline pair.
422 Chapter 14: Bypassing Inspection and Trusting Traffic
> capture-traffic
Selection? 1
Because the current CLI terminal has entered the Packet Capture Mode, you
need to access the FTD from a different terminal. You can connect through
SSH or a console connection. On the second terminal connection to the FTD,
perform the following steps.
Step 3. Reset the counters for Snort statistics, which helps you determine the exact
number of events for your test traffic:
> clear snort statistics
Step 4. Enable debugging for the firewall engine, which allows you to determine the
actions applied to any traffic. Example 14-3 shows the command that gener-
ates debugging data when FTD inspects TCP traffic.
Step 1. Connect to the server (192.168.1.200) from the host (192.168.1.2), using an
SSH client. The FTD should fastpath the SSH traffic.
Implementing Fastpath Through a Prefilter Policy 423
Step 2. Go to the Analysis > Connection > Events page; you should be able view a
connection event for the Fastpath action. Figure 14-14 shows a connection
event triggered by the shell prefilter—a custom prefilter rule.
Example 14-4 Bypassed Connection Generates Event Logs and Increases Counters
>
424 Chapter 14: Bypassing Inspection and Trusting Traffic
! The Snort statistics keeps a record of these events under the Miscellaneous
Counters section.
Packet Counters:
Passed Packets 0
Blocked Packets 0
Injected Packets 0
Flow Counters:
Fast-Forwarded Flows 0
Blacklisted Flows 0
Flows bypassed (Snort Down) 0
Flows bypassed (Snort Busy) 0
Miscellaneous Counters:
Start-of-Flow events 1
End-of-Flow events 1
Denied flow events 0
Frames forwarded to Snort before drop 0
Inject packets dropped 0
>
Step 4. Go to the terminal where the capture-traffic command is running, and ana-
lyze the captured packets. Example 14-5 demonstrates that the Firepower
Snort engine does not see any SSH traffic. However, the ASA Firewall engine
can see and capture that traffic.
> capture-traffic
Selection? 1
! If the Firepower Snort engine would see traffic, it would appear here.
! Press the Control+C keys to exit from the capture-traffic tool.
^C
Caught interrupt signal
Exiting.
61 packets captured
Example 14-6 analyzes the flow of a packet that bypasses the FTD inspection due to the
Fastpath action on the shell prefilter rule. Note the absence of the Snort inspection phase
in this trace data.
Example 14-6 Analyzing a Packet Flow That Follows the Fastpath Action
61 packets captured
Result: ALLOW
Config:
Additional Information:
MAC Access list
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced trust tcp object Corporate-Network any object-group
SSH rule-id 268440577 event-log both
access-list CSM_FW_ACL_ remark rule-id 268440577: PREFILTER POLICY: Custom Tunnel
and Prefilter Policy
access-list CSM_FW_ACL_ remark rule-id 268440577: RULE: Shell Prefilter
object-group service SSH tcp
port-object eq ssh
Additional Information:
Phase: 5
Type: NGIPS-EGRESS-INTERFACE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Ingress interface INSIDE_INTERFACE is in NGIPS inline mode.
Egress interface OUTSIDE_INTERFACE is determined by inline-set configuration
Establishing Trust Through an Access Policy 427
Phase: 6
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 81, packet dispatched to next module
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: allow
1 packet shown
>
Warning This chapter uses Telnet service to demonstrate the flow of a TCP packet.
However, you should not trust any connection unless you have a complete understanding
of the particular traffic and its source and destination.
Step 1. Navigate to Policies > Access Control > Access Control. The access control
policy page appears.
Step 2. To edit the policy that you want to deploy on your FTD device, use the pencil
icon next to the name of a policy to open the access control policy editor page.
Step 3. Click the Add Rule button to create a new access rule (see Figure 14-15). The
Add Rule window appears.
428 Chapter 14: Bypassing Inspection and Trusting Traffic
Figure 14-15 Access Control Policy Editor Showing the Status and the Add Rule Button
Step 4. Give a name to the access rule and select the Trust action.
Step 5. To define the condition of the access rule, go to the Networks tab and select
Corporate-Network as the source network. Figure 14-16 shows the configu-
ration of the Telnet access rule, which trusts any Telnet traffic coming from
192.168.1.0/24, the internal corporate network.
Figure 14-16 Access Rule to Trust Telnet Traffic—Configuration of the Source Network
Step 6. On the Ports tab, select Telnet as the destination ports (see Figure 14-17).
Establishing Trust Through an Access Policy 429
Figure 14-17 Access Rule to Trust Telnet Traffic—Configuration of the Destination Port
Step 7. Optionally, go to the Logging tab to enable logging so that you can determine
when FTD trusts a connection. Select either Log at Beginning of Connection
or Log at End of Connection. (However, do not select both as doing so can
affect the system performance.)
Step 8. Click the Add button to complete the trust rule configuration. You are
returned to the policy editor page.
Step 9. Click the Save button to save the changes, and then click the Deploy button
to activate the rule.
Step 1. Capture the Telnet traffic from the ASA firewall engine:
You can run the show capture command to confirm that the capture process
is running. 0 bytes in the output indicates that the FTD device has not
received any packets:
If the FTD device is running a capture for SSH traffic that you enabled earlier,
you can remove it by using the no keyword with the capture command, as it
not necessary for this example:
To clear any previously captured packets from memory and to restart the
capture from the next matched packets, run the clear capture command.
Step 2. Begin the capture of TCP traffic from the Firepower Snort engine.
This helps you to determine whether the Snort engine sees any bypassed
traffic. Example 14-8 shows the command to capture TCP traffic from an
inline pair.
> capture-traffic
Selection? 1
Because the current CLI terminal has entered the Packet Capture Mode,
you need to access the FTD from a new separate terminal. You can connect
through an SSH client or a console terminal. On the second terminal
connection to the FTD, perform the following steps.
Step 3. Reset the counters for Snort statistics, which helps you determine the exact
number of events for your test traffic:
Step 4. Enable debugging for the firewall engine. This helps you determine the
actions applied to any traffic. Example 14-9 shows the command that gener-
ates debugging data when FTD inspects TCP traffic.
432 Chapter 14: Bypassing Inspection and Trusting Traffic
In the next section, you will generate traffic to analyze the action of a trust rule. Both
tools that you have just enabled on two different terminals—capture-traffic and firewall-
engine-debug—will display data in real time when the traffic will go through the FTD.
Step 1. Connect to the server (192.168.1.200) from the host (192.168.1.2), using a
Telnet client. The FTD device should trust the Telnet traffic.
Step 2. Go to the Analysis > Connection > Events page; you should be able view a
connection event for the Trust action. Figure 14-18 shows a new connection
event triggered by the Telnet access rule—an access rule with a Trust action.
! The firewall-engine-debug tool shows that the "Telnet Access" rule applies Trust
action.
^C
Caught interrupt signal
Exiting.
>
! The Firepower Snort engine stops seeing traffic after the initial TCP three-way
handshake.
> capture-traffic
Selection? 1
! Nothing appears after the above packets, because they are trusted.
^C
Caught interrupt signal
Exiting.
>
! However, the ASA Firewall engine sees all of the traffic generated by the telnet
connection.
78 packets captured
When a packet matches a prefilter rule with the Fastpath action, the packet does not go
through the Snort inspection phase. You verified that earlier in this chapter by analyzing
the trace data of a captured packet.
Now, this section demonstrates that the Firepower Snort engine processes the initial TCP
handshake before it begins trusting the rest of a connection. Therefore, the initial packets
appear in the capture-traffic output. You can verify the cause of this behavior by look-
ing into the tracing data. You should see two different Snort verdicts: The first Telnet
packet is allowed, and the subsequent flows are fast-forwarded.
Example 14-12 shows an analysis of the first packet of a trusted TCP connection. The
Snort verdict is to allow this packet.
78 packets captured
Phase: 2
Type: ACCESS-LIST
Subtype:
436 Chapter 14: Bypassing Inspection and Trusting Traffic
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit tcp object Corporate-Network any
object-group TELNET rule-id 268440580
access-list CSM_FW_ACL_ remark rule-id 268440580: ACCESS POLICY: AC Policy -
Mandatory/1
access-list CSM_FW_ACL_ remark rule-id 268440580: L7 RULE: Telnet Access
object-group service TELNET tcp
port-object eq telnet
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be
reached
Phase: 5
Type: NGIPS-EGRESS-INTERFACE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Ingress interface INSIDE_INTERFACE is in NGIPS inline mode.
Egress interface OUTSIDE_INTERFACE is determined by inline-set configuration
Phase: 6
Type: FLOW-CREATION
Subtype:
Establishing Trust Through an Access Policy 437
Result: ALLOW
Config:
Additional Information:
New flow created with id 282, packet dispatched to next module
Phase: 7
Type: EXTERNAL-INSPECT
Subtype:
Result: ALLOW
Config:
Additional Information:
Application: 'SNORT Inspect'
Phase: 8
Type: SNORT
Subtype:
Result: ALLOW
Config:
Additional Information:
Snort Verdict: (pass-packet) allow this packet
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: allow
1 packet shown
>
Example 14-13 shows an analysis of the third and fourth packets of a trusted TCP
connection. The Snort verdicts for both packets are to fast-forward them.
! Packet Number 3:
78 packets captured
Phase: 1
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
MAC Access list
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found flow with id 282, using existing flow
Phase: 4
Type: EXTERNAL-INSPECT
Subtype:
Result: ALLOW
Config:
Additional Information:
Application: 'SNORT Inspect'
Phase: 5
Type: SNORT
Subtype:
Result: ALLOW
Config:
Additional Information:
Snort Verdict: (fast-forward) fast forward this flow
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: allow
Establishing Trust Through an Access Policy 439
1 packet shown
>
! Packet Number 4:
78 packets captured
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: allow
1 packet shown
>
440 Chapter 14: Bypassing Inspection and Trusting Traffic
Example 14-14 shows statistics of the passed packet and fast-forwarded flows. In this
example, an FTD device passes two Telnet packets before it fast-forwards (trusts) the rest
of the flows of a connection.
! The Snort statistics keep a record of these events using two types of counters.
Packet Counters:
Passed Packets 2
Blocked Packets 0
Injected Packets 0
Flow Counters:
Fast-Forwarded Flows 1
Blacklisted Flows 0
Flows bypassed (Snort Down) 0
Flows bypassed (Snort Busy) 0
Miscellaneous Counters:
Start-of-Flow events 0
End-of-Flow events 0
Denied flow events 0
Frames forwarded to Snort before drop 0
Inject packets dropped 0
>
Figure 14-19 shows an access rule with the Allow action. The rule allows Telnet traffic
when it originates from the corporate network 192.168.1.0/24.
After deploying the Telnet access rule, if you connect from host 192.168.1.2 to server
192.168.1.200, you should be able to access the server. This time, the FMC shows an
Allow action for it.
Figure 14-20 shows a connection event with the Allow action. FTD generates this event if
you enable logging for the Telnet access rule and the rule matches with a Telnet packet.
Establishing Trust Through an Access Policy 441
To verify the operation of the Allow action, you follow the same steps that you
performed earlier in this chapter for Fastpath and Trust actions. However, you can just
view the Snort statistics to determine whether the Allow action passed all the packets or
fast-forwarded them.
Example 14-15 proves that the Allow action inspects and passes all the packets. It does
not fast-forward any packets the way the Trust action does with traffic.
442 Chapter 14: Bypassing Inspection and Trusting Traffic
Packet Counters:
Passed Packets 78
Blocked Packets 0
Injected Packets 0
Flow Counters:
Fast-Forwarded Flows 0
Blacklisted Flows 0
Flows bypassed (Snort Down) 0
Flows bypassed (Snort Busy) 0
Miscellaneous Counters:
Start-of-Flow events 0
End-of-Flow events 0
Denied flow events 0
Frames forwarded to Snort before drop 0
Inject packets dropped 0
>
Summary
This chapter discusses the techniques for bypassing packet inspection. It provides the
steps for configuring different methods. The chapter also shows how to analyze the flows
of bypassed packets to demonstrate how an FTD device acts with different bypassing
options. This chapter also shows various debugging tools, which help you to determine
whether the bypass process is working as designed.
Quiz
1. Which of the following rules can bypass one or more types of security inspection?
a. Prefilter rule
b. Tunnel rule
c. Access rule
d. All of the above
3. You are running the capture-traffic command on FTD. When you initiate a
connection between two hosts, you do not see any packet in the capture output, but
the hosts can connect successfully. Which of the following scenarios may be related?
a. Traffic between two hosts is inspected by the Snort engine, but events are
suppressed.
b. Traffic between two hosts is trusted by the access control policy.
c. Traffic between two hosts is fastpathed by the prefilter policy.
d. None of the above. If the traffic goes through an FTD device and the hosts are
connected, FTD must see the traffic.
You can use FTD to limit the rate of network traffic after an access control rule allows
or trusts the traffic. An FTD device, however, does not regulate the rate of any particular
traffic when a Prefilter policy applies the Fastpath action on them. Limiting the rate of
traffic is a way to manage the bandwidth of a network and to ensure quality of service
(QoS) for business-critical applications. This chapter discusses the steps in configuring a
QoS policy on an FTD device and to verify its operations.
Figure 15-1 illustrates the crests and troughs of the traffic pattern when an FTD device
rate limits traffic using the policing method.
Figure 15-2 shows a typical graph illustrating traffic that is rate limited by the shaping
mechanism.
At any given time, an FTD device can have only one active QoS policy. However, you
can add multiple QoS rules within a QoS policy. Each QoS rule must be associated with
a source interface and a destination interface, where both of them have to be routed
interfaces. You can set separate upload and download speed limits for the traffic that
match the conditions of a QoS rule. Furthermore, FTD allows you to define the QoS rule
conditions based on advanced networking characteristics, such as network address, port
number, application, URL, and user identity.
446 Chapter 15: Rate Limiting Traffic
Policing of Traffic to a
Predefined Rate Limit
Traff c
Traff c
Troughs
Time Time
Shaping of Traffic to a
Predefined Transfer Rate
Traff c
Traff c
Time Time
Figure 15-2 Traffic Shaping Queues Excessive Traffic for Later Transmission
The Firepower engine evaluates a QoS rule and classifies traffic. When a packet matches
with a QoS rule, the Firepower engine sends the ID of the matching rule to the Firewall
engine. The firewall engine limits the rate of individual flows based on the download and
upload speed limits defined on a QoS rule. You must enable logging at the end of a con-
nection to view QoS-related information.
Figure 15-3 shows a workflow of the QoS feature on the Firepower System. You use the
FMC to configure and apply a QoS policy and view any QoS events. FTD ensures that
the traffic conforms to the QoS rule.
Best Practices for QoS Rules 447
Administrator
User Interface
FMC
Policy Event
Database Database
SFTunnel
Firewall Engine
FTD
Firepower Engine
Figure 15-4 shows an example of a typical network where FTD enables different QoS
rules through the same QoS policy. Traffic is originated from different source networks
and rate limited by different QoS rules.
448 Chapter 15: Rate Limiting Traffic
Telecommuter
32 MBps traffic.
(Connected via VPN)
Server Farm
QoS Rule 1 (Telecommuters)
Up: 4 MBps, Down: 8 MBps
Management Network
DMZ
Zone
Mgmt. Outside
Zone Internet
FMC Inside
QoS Rule 2 (Internet Users)
Zone
Up: 1 MBps, Down: 4 MBps
Corporate Network
Unknown User
(Connected via Internet)
End Users
Fulfilling Prerequisites
Each interface participating in a QoS policy must be in Routed Mode and associated
with an interface object. You cannot apply a QoS policy to an interface that is in Inline
Mode, Passive Mode, or Switched Mode. (Read Chapter 8, “Firepower Deployment in
Routed Mode,” to learn about Routed Mode.)
Figure 15-5 shows the configuration of the FTD interface. Both of the participating
interfaces are in Routed Mode (assigned with IP addresses) and associated with security
zones (interface objects).
Configuring Rate Limiting 449
Step 1. Navigate to the Devices > QoS page. FTD does not provide a default policy,
so click the New Policy button to create one (see Figure 15-6). The New
Policy window appears.
Step 2. Give a name to the new policy and add a target device to which you want to
apply this policy. Click Save to save the changes. The QoS policy editor page
appears.
Step 3. As shown in Figure 15-7, select a device for the new QoS policy you want to
create and click Add to Policy. Then click Save.
Step 4. On the QoS policy editor page, notice that there is a link to the Policy
Assignments option that you can use to associate a new managed device with
this policy. Click the Add Rule button (see Figure 15-8). The Add Rule win-
dow appears, and in it you can define a rule condition.
Step 5. Give a name to the new QoS rule. Using the Apply QoS On dropdown, define
where you want to rate limit traffic. In addition, on the Interface Objects tab,
add a source and destination interface to the rule condition.
Tip You should rate limit traffic as close to the source as possible to ensure that the traf-
fic rate does not go beyond an entitled limit throughout the network.
Configuring Rate Limiting 451
Figure 15-9 shows a new QoS rule, named Rate Limiting Rule, that is
applied on Interfaces in Source Interface Objects. This rule limits rates only
when the traffic originates from Inside_Zone interface and is destined for
Outside_Zone.
Step 6. Enter a desired traffic limit for the interface. FTD allows you to enter upload
and download limits separately. If you do not enter a value, FTD supports the
maximum throughput for that physical interface.
Table 15-1 provides a conversion chart for commonly used traffic rates. When
you enter a traffic limit, FTD considers the value as megabit per second
(Mbps), not megabytes per second (MBps). The highlighted rows of this table
are used in the configuration example in this chapter.
Table 15-1 Megabits per Second to Megabytes per Second Conversion Table
Megabits per Second Megabytes per Second
1 Mbps 0.125 MBps
4 Mbps 0.5 MBps
8 Mbps 1 MBps
10 Mbps 1.25 MBps
16 Mbps 2 MBps
40 Mbps 5 MBps
80 Mbps 10 MBps
100 Mbps 12.5 MBps
Note FTD supports the rate limit 0.008 to 1000 Mbps per interface. If you want to allo-
cate below 0.008 Mbps to any hosts, it implies that those hosts are not important to you.
You may just want to consider blocking them by using an access rule or a prefilter rule.
Figure 15-10 shows the traffic limits for download and upload flows, 40
Mbps and 8 Mbps, respectively.
Step 7. Optionally, add a precise rate limiting condition based on any additional net-
working characteristics, such as network address, port number, application,
URL, user identity, and so on.
Step 8. Once you outline a rule condition, click the OK button to create the QoS
rule. The browser returns to the QoS policy editor page. Click the Save but-
ton to preserve the QoS rules you have created.
Figure 15-11 shows the custom QoS rule you have just created.
Configuring Rate Limiting 453
Figure 15-11 The Overview of All of the QoS Rules on the QoS Policy Editor Page
At this point, you can click the Deploy button to activate a QoS rule, but
by default, FTD does not generate a log when a QoS rule triggers. A QoS
policy does not offer an option for logging. If you want to view QoS-related
statistics for any specific connection, you must identify the associated
access rule that triggers the QoS rule and enable logging at the end of that
connection. To accomplish that, you have to edit the access control policy
and redeploy the revised policy.
454 Chapter 15: Rate Limiting Traffic
Figure 15-12 shows the steps to enable logging. Because this exercise does not use any
custom access rules, you can enable logging for the default action to generate QoS data
when a connection hits the default action.
3
1
Figure 15-12 Enabling Logging at the End of Connection in an Access Control Policy
Example 15-1 Policy Map Showing the Active QoS Policy on an Interface
Now, you can verify the impact of the QoS policy you have deployed. First, download a
file from the server to a client system. Then upload a file from the client PC to the server.
You should notice two different traffic rates.
456 Chapter 15: Rate Limiting Traffic
Figure 15-13 shows the topology of a simple deployment that you can use to verify the
download and upload speeds through an FTD device.
Management Network
FMC
10.1.1.16
Administrator
10.1.1.100
FTD
10.1.1.2
Data Network
Download Limit: 40 Mbps (5 MBps) Download the software image.iso File from the Server via HTTP
Upload Limit: 8 Mbps (1 MBps) Upload the User Guide.pdf File to the Server via SFTP
Figure 15-13 A Simple Lab Topology to Test Rate Limiting of Traffic Through an
FTD Device
Figure 15-14 shows the download of a software image file. FTD enforces the download
rate within 5 MBps.
Figure 15-15 shows the upload of a PDF file. FTD regulates the upload rate below
1 MBps.
Both of these transfers—download of the ISO and upload of the PDF—are initiated by
a host that is located at the inside zone. Therefore, the traffic matches the QoS rule Rate
Limiting Rule, and FTD regulates the traffic rate. However, if the connection is initiated
by an outside system, it does not match the QoS rule condition. Hence, the QoS policy
does not limit the traffic rate; the source and destination should be able to utilize the full
capacity of the FTD interface bandwidth.
Verifying the Rate Limit of a File Transfer 457
Figure 15-16 shows two sets of connection events. The bottom two connections are orig-
inated by an inside client; they match the conditions in the Rate Limiting Rule, and rate is
limited. However, the top two connections are not rate limited because they are initiated
by an outside system.
The top two connections are initiated by the outside server. Traffic is
not rate limited; therefore, no QoS rules are associated with events.
The bottom two events are originated by the inside client. They match
the conditions in Rate Limiting Rule, and traffic is rate limited.
Example 15-2 demonstrates the actions of a QoS policy on an FTD device. This example
provides two commands that you can use to determine any drop due to a rate limiting
rule during a file transfer.
Analyzing QoS Events and Statistics 459
Example 15-2 Statistics of Dropped Packets Due to a QoS Policy (Rule ID: 268442624)
Interface INSIDE_INTERFACE:
Service-policy: policy_map_INSIDE_INTERFACE
Flow-rule QoS id: 268442624
Input police Interface INSIDE_INTERFACE:
cir 8000000 bps, bc 250000 bytes
conformed 334152 packets, 21168506 bytes; actions: transmit
exceeded 0 packets, 0 bytes; actions: drop
conformed 473456 bps, exceed 0 bps
Output police Interface INSIDE_INTERFACE:
cir 40000000 bps, bc 1250000 bytes
conformed 1129736 packets, 1618239735 bytes; actions: transmit
exceeded 127629 packets, 182986654 bytes; actions: drop
conformed 36194128 bps, exceed 4092744 bps
>
Frame drop:
No route to host (no-route) 79
TCP packet SEQ past window (tcp-seq-past-win) 1
Output QoS rate exceeded (rate-exceeded) 127629
Slowpath security checks failed (sp-security-failed) 4
FP L2 rule drop (l2_acl) 18
Flow drop:
Example 15-3 reveals the connections that are rate limited by a QoS rule. The flags asso-
ciated with a connection confirm whether it is going through a Firepower deep packet
inspection process.
! You can use a QoS Rule ID to view any associated active connections.
! To determine the meaning of each flag, you can use the "detail" keyword. For exam-
ple, the flag 'N' confirms that the Firepower Snort engine inspects the connection.
>
Analyzing QoS Events and Statistics 461
Example 15-4 shows the real-time debug messages generated by the firewall and
Firepower engines, due to the match of a QoS rule (ID: 268442624).
^C
Caught interrupt signal
Exiting.
>
The statistics in these examples were captured when a client PC was downloading a large
ISO file from the server using a web browser. You could perform similar analysis on
uploaded traffic. Before you begin uploading a file from the client PC to the server, you
can run the following commands to reset the counters.
Summary
In this chapter, you have learned the steps to configure QoS policy on an FTD device.
This chapter also provides an overview to the common rate limiting mechanisms and how
an FTD device implements QoS. Finally, this chapter provides the command-line tools
you can use to verify the operation of QoS policies in FTD.
Quiz
1. Which of the following statements is correct?
a. The Firepower engine not only evaluates but also enforces a QoS rule.
b. Snort rate limits traffic as soon as it receives it.
c. The ASA firewall engine enforces the actual rate limit.
d. All of the above.
3. To limit the download rate to 50 MBps, which value should you enter in a QoS rule?
a. 5
b. 50
c. 400
d. 500
4. Which of the following commands confirms whether traffic is rate limited by FTD?
a. show service-policy police
b. show conn detail
c. show asp drop
d. All of the above
Chapter 16
Blacklisting Suspicious
Addresses by Using Security
Intelligence
Figure 16-1 shows that any traffic that is not prefiltered goes through the Security
Intelligence inspection.
Several enhancements have been made to the Security Intelligence technology since the
Firepower System introduced this feature. Besides blacklisting an IP address, which is one
of the most common uses of Security Intelligence, FTD also supports the blacklisting
of URLs and domain names. To demonstrate the operations of Security Intelligence, this
chapter primarily focuses on the blacklisting of IP addresses.
So far, you have been using the diagram shown in Figure 16-1 to understand the flows
and drops of packets through an FTD device. In this chapter, we zoom in on both firewall
and Firepower engines, view the low-level components of both engines, and determine
the flows of packets through them.
Figure 16-2 shows the low-level architecture of an FTD device. It shows that Security
Intelligence is one of the earliest lines of defense in a Firepower engine.
464
Chapter 16: Blacklisting Suspicious Addresses by Using Security Intelligence
Fastpath Rule Match wh
ich Ap P
Ingress Ta plie refil
Interface ke s a ter
sP F P
lac ast olic
wh Acc e B pa y
Blocking of Traffic by the Prefilter Policy
Trust Rule Match efo th R
ich ess re u
Security Access Control Is C an le,
Intelligence Su ont yA
ACL: L3-L4 r
bje ol
Overrun, Buffer Overflow
ct Po na
(IP Address) to licy lys
Passed Identity Check Ide is
Security nti App
d R Ru
ate le,
Rate Limited Lim
Access Control it
ACL: L7
Application Control
Intrusion Attempt
Rate Limit
Next Hop Lookup
L3-L2
Routing
Dropped Due to the Firepower Engine
Egress
Interface
Blocked by the Firewall Engine
Drop
Firepower
Engine Data
Fast Path Acquisition
Block
Firewall
Engine
Yes
Ingress Existing No VPN UN-NAT/ Prefilter ACL Flow
Packet
Fastpath Trust
Figure 16-2 Flows of Packets Through the Firewall and Firepower Engines
465
466 Chapter 16: Blacklisting Suspicious Addresses by Using Security Intelligence
Input Methods
To input a potential suspicious address, Security Intelligence supports three methods:
■ Feed: Cisco has a dedicated threat intelligence and research team, known as Talos.
The team analyzes the behavior of Internet traffic, performs in-depth analysis on any
suspicious activities, categorizes the potential addresses based on their characteris-
tics, and lists these addresses in a file called the Cisco Intelligence Feed. One of the
processes running on the FMC, CloudAgent, periodically communicates with the
Cisco cloud to download the latest feed. When the FMC downloads a feed, it sends
the feed to its managed devices automatically; redeployment of the access control
policy is not necessary.
■ List: FMC also allows you to input custom addresses for blacklisting. You can list the
addresses in a text file (.txt format) and upload the file manually to the FMC through
a web browser. The file requires you to enter one address per line. Table 16-1 shows
the key differences between the feed and list types of Security Intelligence input.
Figure 16-3 illustrates the key operational steps of the Security Intelligence feature on
the FMC, FTD, and Cisco Cloud.
Administrator User Interface
Blacklist/
Object Management
Whitelist Now
FMC
Download Upload Custom
Updates List of Address
Automatically
List
FMC Periodically Feed Policy Event
Connects to the Cloud, Cisco Cloud Sends Database Database
If the FMC Has a Valid an Updated Feed
Threat License Enabled to FMC
SFTunnel
Cisco Talos
Cloud
Firewall Engine
467
468 Chapter 16: Blacklisting Suspicious Addresses by Using Security Intelligence
Fulfilling Prerequisites
To use Security Intelligence, you need a Threat license. If that license expires after you
enable the Security Intelligence feature, the FMC stops communicating with the cloud
for the latest Cisco Intelligence feed. While you are in the process of purchasing a license,
you can enable Evaluation Mode to configure an access rule with the Security Intelligence
condition, and to deploy the associated access control policy to an FTD. To learn more
about Evaluation Mode, read Chapter 7, “Firepower Licensing and Registration.”
Configuring Blacklisting
Security Intelligence is enabled through an access control policy. However, you do not
need to add an additional access rule. There are three ways to blacklist an address, as
described in the following sections:
Figure 16-4 shows a simple topology that is used in this chapter to demonstrate the
configurations of Security Intelligence.
Note If you are configuring a newly installed system, the list of Security Intelligence objects
might not be available for selection. To populate the Security Intelligence categories in the
Available Objects field, you might need to update the Cisco Intelligence Feed from the cloud
at least once. Without populating these objects, you cannot use them as rule conditions.
Configuring Blacklisting 469
Management Network
Malware
Administrator FMC
10.1.1.100 10.1.1.16 Phishing
Internet
CnC
Client FTD
Data Network
Various
Gateway Means for
Router Attackers
Figure 16-5 shows the page to update the Security Intelligence feed and list.
The list of intelligence categories may not be available for selection until you
update the Cisco Intelligence Feed from the cloud.
Step 4. On the Network subtab, select a category that you want to blacklist. You can
also select a specific zone for inspection. By default, FTD inspects traffic
from Any zone.
Note This chapter shows how to enable the Security Intelligence feature based on
network and IP addresses. If you want to enable this feature based on URL conditions,
select the URL subtab. The remaining configuration steps are identical.
Step 5. Click the Add to Blacklist button. The categories appear inside the Blacklist
field. Figure 16-6 illustrates the detailed steps to add the Security Intelligence
categories for blacklist.
470 Chapter 16: Blacklisting Suspicious Addresses by Using Security Intelligence
After an update, the last Click this button Use the pencil icon to modify
updated date is shown. to update. the frequency of updates.
Step 6. Next to the Blacklist field, click the logging icon to verify whether Log
Connections is checked for Security Intelligence events. Click OK to return to
the Security Intelligence tab. Figure 16-7 shows the steps to verify logging for
the connections that are subject to Security Intelligence blacklist.
Step 7. When the configuration is complete, click Save to save the changes, and click
Deploy to deploy the new access control policy to your FTD device.
Now if you attempt to access a malicious IP address that is included in the Cisco
Intelligence Feed, FTD should block the connection.
Tip The “Verification and Troubleshooting Tools” section of this chapter discusses how
to reverse engineer the Cisco Intelligence Feed data to identify the addresses that are
selected for blacklisting.
Figure 16-8 shows the action of Security Intelligence. After it is enabled, the host is
blocked from accessing certain addresses. These addresses, as of this writing, are known
for spreading malware and spam.
Configuring Blacklisting 471
Save Changes
5 4
3 Enable
Logging
1 2
Select Desired
Added to Blacklist
Objects
Figure 16-8 Connection Events Page Shows the Security Intelligence Events
Figure 16-9 shows an individual page that allows you to find any connections that are
triggered due to Security Intelligence.
Figure 16-9 Security Intelligence Events Page Showing Only Its Own Events
that you have found a new security advisory in a security-related community forum or
website. While Cisco is investigating the new information, you just want to blacklist the
potential malicious address on your own without any delay. Using a text editor, you can
create a file to list any potential IP addresses. Firepower System enables you to input this
file to blacklist any custom list of IP addresses.
Step 1. Write or copy the potential malicious addresses into a text editor, and save
the file in .txt format. When you create a list, enter one record per line.
Optionally, if you want to insert a comment on an IP address for future
reference, use the hash sign (#) at the beginning of a line.
Figure 16-10 shows the creation of a .txt file using notepad. The file contains
a custom list of IP addresses. These addresses are listed for demonstration
purpose only, and should not be considered as a definitive guideline. Perform
your own research before you consider an address for blacklisting; otherwise,
a legitimate site might get blocked.
474 Chapter 16: Blacklisting Suspicious Addresses by Using Security Intelligence
Figure 16-10 A Custom List of Potential Malicious IP Addresses Saved in a .txt File
Step 3. On the left panel, select an appropriate option under Security Intelligence. For
example, if you want to add a custom list of IP addresses, select the Network
Lists and Feeds option. Then click the Add Network Lists and Feeds but-
ton to upload your text file to the FMC. Figure 16-11 shows a configuration
window for a Security Intelligence list. After you select List from the Type
dropdown, you can browse your text file. Upon successful upload, the FMC
can show the number of addresses you uploaded.
Configuring Blacklisting 475
Step 4. Once the file is uploaded, navigate to Policies > Access Control > Access
Control and edit the access control policy that you want to deploy to
an FTD.
Step 5. When the policy editor page appears, select the Security Intelligence tab.
A list of available objects and zones appears.
Step 6. On the Network subtab, select the custom object you want to blacklist.
You can also select a specific zone for inspection. By default, FTD inspects
traffic from Any zone.
Note This chapter enables the Security Intelligence feature based on network and IP
addresses. If you want to enable this feature based on URL conditions, select the URL
subtab. The remaining configuration steps are identical.
476 Chapter 16: Blacklisting Suspicious Addresses by Using Security Intelligence
Step 7. Click the Add to Blacklist button, and the custom object appears in the
Blacklist field.
Step 8. Next to the Blacklist field, click the logging icon to verify whether Log
Connections is checked for Security Intelligence events. Click OK to return
to the Security Intelligence tab. Figure 16-12 illustrates the workflow of
blacklisting a custom Security intelligence list.
5 4
3
Enable
Logging
Added to Blacklist
2
Select Custom Object
Step 9. When the configuration is complete, click Save to save the changes and
deploy the new access control policy to your FTD device. Now if you
attempt to access one of the addresses that you included in the text file, FTD
will block the connection.
Figure 16-13 shows the blocking of a connection due to a match with the Security
Intelligence list.
Configuring Blacklisting 477
Step 2. Right-click the address you want to blacklist. For example, if you want
blacklist an unknown suspicious address, right-click an address under the
Responder IP column.
Step 3. From the context menu that appears, select the Blacklist IP Now option.
A confirmation window appears. Click the Blacklist Now button to confirm.
Figure 16-14 shows the steps to blacklist an IP address using the context
menu. No additional configuration is necessary after these steps. The
configuration is complete. If you attempt to connect to that IP address, FTD
will block it.
Figure 16-15 shows the result of an immediate blacklist. Although Action and
Reason look identical, Security Intelligence categorizes this event as a Global-
Blacklist event.
Configuring Blacklisting 479
Figure 16-15 The FMC Displays a Block Event due to the Blacklist IP Now Action
Warning If you delete the entire Global-Blacklist object by using the Security
Intelligence configuration page, the access control policy does not enforce the Blacklist IP
Now function.
Figure 16-16 shows the IP address that you blacklisted earlier by using the Blacklist IP
Now option. To allow this IP address once again, click Delete and then click Save to save
the changes.
480 Chapter 16: Blacklisting Suspicious Addresses by Using Security Intelligence
Monitoring a Blacklist
Occasionally, you might want to monitor the activities of certain hosts in a network
instead of blocking them completely. Doing so allows you to analyze the characteristics
of suspicious traffic and helps you build an appropriate defense. Follow these steps to
enable monitoring functionality using Security Intelligence:
Note The following steps assume that you have already blacklisted certain traffic by
using the instructions in the previous section. This time, you just want to change the action
(monitor only instead of block) for certain traffic.
Step 1. In the access control policy editor page, go to the Security Intelligence tab.
Step 2. From the Blacklist field, right-click a category that you want to monitor.
Note FTD does not support the Monitor-only mode for the Global-Blacklist category.
Configuring Blacklisting 481
Step 3. From the context menu that appears, select the Monitor-only (do not block)
option. The icon changes from a red × to a green down arrow.
Figure 16-17 shows the steps to enable Monitor-only mode for a certain
Security Intelligence category while leaving all other categories in Block
mode.
1 2
Right-click on the
Custom-List
Step 4. When the configuration is complete, click Save to save the changes and
redeploy the access control policy.
This configuration changes the action from Block to Monitor-only for any addresses
in the custom list. To test the operation of Monitor-only mode, access one of the
addresses from the custom list, and FTD allows that connection and generates a
monitor event.
482 Chapter 16: Blacklisting Suspicious Addresses by Using Security Intelligence
Figure 16-18 shows the difference between the Block and Monitor-only actions. The first
connection attempt from host 192.168.1.2 to 46.161.9.48 was blocked; however, the sec-
ond attempt was allowed, and the connection was monitored.
Bypassing a Blacklist
If you find an address blacklisted by the Cisco Intelligence Feed, but it has been essential
for your regular business, you can report it to Cisco. If you want to access the address
anyway while Cisco reinvestigates, you can whitelist that particular address. Whitelisting
bypasses the Security Intelligence check, but traffic is still subject to any subsequent
inspection. If other components of an FTD device find any anomaly, they can still block
the connection, although Security Intelligence whitelists it initially.
Configuring Blacklisting 483
Right-click on an address
that you want to whitelist.
Whitelisted
Warning If you delete the entire Global-Whitelist object by using the Security
Intelligence configuration page, the access control policy stops enforcing the Whitelist IP
Now function.
Figure 16-21 shows the steps to delete an address from the Global-Whitelist object.
Verification and Troubleshooting Tools 485
3 1
■ Check whether Security Intelligence’s health module is enabled on the health policy.
This module allows the FMC to generate alerts if the system fails to download the
Security Intelligence data, and it loads the data into memory.
Figure 16-22 shows the option to enable the health module for Security Intelligence.
To find this page, go to System > Health > Policy, edit a health policy, and select
Security Intelligence from the left panel. You must redeploy a health policy if you
change any settings.
486 Chapter 16: Blacklisting Suspicious Addresses by Using Security Intelligence
■ Check whether the FMC has a valid Threat license and whether the license is applied
on the desired FTD device. If the Threat license is disabled or expired, the FMC
stops obtaining the latest Cisco Intelligence Feed from the Cisco cloud.
Figure 16-23 shows the device management page where you can enable and disable a
Threat license for a managed device.
Figure 16-23 Device Management Page with Options for License Administration
Example 16-1 shows the Security Intelligence files on the FMC before and after a Cisco
Intelligence Feed is downloaded.
Verification and Troubleshooting Tools 487
! Right after a fresh installation, an FMC does not contain any blacklist files by
default:
! After updating the Cisco Intelligence Feed from the cloud, FMC shows the blacklist
files:
Example 16-2 shows the Security Intelligence blacklist (.blf) and whitelist (.wlf) files.
A new FTD installation comes with the global blacklist and whitelist files. The Cisco
Intelligence Feed files appear as soon as the FTD device receives an access control policy
from the FMC.
! After a fresh installation, FTD shows only the empty blacklist (.blf) and
whitelist (.wlf) files. At this point, FMC has not applied a Cisco Intelligence
Feed yet:
> expert
admin@firepower:~$ ls -halp /var/sf/iprep_download/
total 40K
drwxr-xr-x 5 www www 4.0K Apr 28 10:44 ./
drwxr-xr-x 66 root root 4.0K Dec 12 00:19 ../
-rw-rw-r-- 1 www www 118 Apr 28 10:17 .zones
-rw-rw-r-- 1 www www 17 Apr 28 10:44 IPRVersion.dat
-rw-r--r-- 1 root root 40 Apr 28 10:17 c76556bc-6167-11e1-88e8-479de99bfdf1.blf
-rw-r--r-- 1 root root 40 Apr 28 10:17 d8eea83e-6167-11e1-a154-589de99bfdf1.wlf
drwxr-xr-x 2 www www 4.0K Sep 19 2016 health/
drwxr-xr-x 2 www www 4.0K Sep 19 2016 peers/
drwxr-xr-x 2 www www 4.0K Apr 28 10:44 tmp/
-rw-rw-r-- 1 www www 151 Apr 28 10:44 zone.info
admin@firepower:~$
Tip If you have enabled Security Intelligence based on URL, you can find the list of
blacklisted and whitelisted URLs in similar format. The files are located in the /var/sf/
siurl_download directory.
Example 16-3 shows the debugging messages in FTD when it loads the Security
Intelligence configuration and entries into the device’s memory. The following messages
confirm that the Custom-List object has loaded all 25 of the addresses into its memory.
Example 16-3 FTD Loads the Security Intelligence Data into Its Memory
To determine whether the memory is loaded with the latest set of Security Intelligence
data, you can verify the timestamp of the FTD shared memory file. The timestamp
should record the UTC time of the latest access control policy applied:
Step 1. Run the following command to search for a specific IP address within the
list file:
Step 2. The output from Step 1 shows the list file where the IP address is listed, but
it does not display the category. To determine the category type, run the fol-
lowing command to view the first line of the file:
Figure 16-24 shows the Security Intelligence configuration page. To blacklist or whitelist
malicious URLs, select the URL subtab (instead of the Network subtab, which you
selected for IP-based intelligence).
492 Chapter 16: Blacklisting Suspicious Addresses by Using Security Intelligence
Likewise, you can apply the same troubleshooting techniques to investigate issues
with URL-based Security Intelligence. You can find the blacklist and whitelist files for
URL-based Security Intelligence at /var/sf/siurl_download.
Example 16-4 shows the blacklist and whitelist files for URL-based Security Intelligence.
Unlike with IP-based Security Intelligence, all the URL-based Security Intelligence files
use .lf (list file) as their file extensions.
1 2
The URL subtab allows you to blacklist URL Phishing is set to Monitor-only
or whitelist a malicious URL category. mode for demonstration purposes.
Figure 16-24 URL Subtab Showing the Categories of the Malicious Sites
Example 16-4 Blacklist and Whitelist Files for URL-Based Security Intelligence
Because both blacklist and whitelist files use the same .lf extension, you cannot
distinguish the purpose of a file by looking at the extension. However, you can use the
url.rules file to determine this.
Example 16-5 shows the purpose of each list file. The first file is a whitelist file, and the
last file is set to Monitor-only mode. All other list files are configured to block traffic.
Example 16-5 The url.rules File, Showing the Action or Purpose of Each List File
si,5a0b6d6b-e2c3-436f-b4a1-48248b333b57.lf,1048599,block,any
si,5f8148f1-e5e4-427a-aa3b-ee1c2745f481.lf,1048600,block,any
si,6ba968f4-7a25-4793-a2c8-7cc77f1f1256.lf,1048601,block,any
si,30f9e69c-d64c-479c-821d-0e4edab852ab.lf,1048607,block,any
si,2b15cb6f-a3fc-4e0e-a342-ccc5e5806394.lf,1048612,block,any
si,1b117672-7453-478c-be31-b72e89ca4bfc.lf,1048606,block,any
si,3e2af68e-5fc8-4b1c-b5bc-b4e7cab5c9eb.lf,1048610,block,any
si,a27c6aae-8e52-4174-a81a-47c59fecf1c3.lf,1048604,block,any
si,2ccda18e-ddff-4f5c-af9a-f0098521b525.lf,1048611,block,any
si,60f4e2ab-d96c-44a0-bd38-830252b67077.lf,1048602,block,any
si,032ba433-c295-11e4-a919-d4ae5275d599.lf,1048609,block,any
si,b1df3aa8-2841-4c88-8e64-bfaacec71300.lf,1048603,block,any
si,23f2a124-8278-4c03-8c9d-d28fe08b8fc9.lf,1048605,block,any
si,d7d996a6-6b92-4a56-8f10-e8506e434dd6.lf,1048608,monitor,any
admin@firepower:~$
A list file uses a universally unique identifier (UUID) as its filename. It does not state the
type of intelligence category it contains. To find that answer, you can view the first line
of the list file. For example, the following example confirms that d7d996a6-6b92-4a56-
8f10- e8506e434dd6.lf stores the URLs of the phishing websites.
Summary
In this chapter, you have learned how to detect a malicious address by using the Security
Intelligence feature. When there is a match, you can ask an FTD device to block, monitor,
or whitelist an address. This chapter also describes the back-end file systems for the
Security Intelligence feature. You can apply this knowledge to troubleshooting issues
with Security Intelligence.
Quiz
1. Security Intelligence is a first-level-defense mechanism implemented on which of the
following?
a. Firewall engine
b. Firepower engine
c. Firepower Management Center
d. All of the above
Quiz 495
3. Which of the following commands displays the name of the Security Intelligence
category from a blacklist file?
a. tail -f filename.blf
b. tail filename.blf
c. head filename.blf
d. grep category_name filename.blf
4. Which of the following commands displays an exact IP address and confirms that
the address is included in the current blacklist file?
a. cat filename.blf
b. head ip_address filename.blf
c. grep ip_address *.blf
d. tail ip_address filename.blf
This page intentionally left blank
Chapter 17
Attackers often send phishing emails with links to malware websites. A user in your net-
work may be deceived by the hoax content and click on an obfuscated link by mistake.
Firepower can intelligently prevent a user from accessing a malicious website by blocking
its DNS query—one of the first things a client computer performs to access a website.
This chapter describes the implementation of a DNS policy on an FTD system.
When you want to visit a website, you open a browser and enter the URL. However,
before your browser learns the IP address of a website, the following tasks happen behind
the scenes:
Step 1. The browser sends a query to the local DNS server in your network.
Step 2. If the local network has no internal DNS server or the DNS server has no
information about the site you want to visit, a query is sent to the recursive
498 Chapter 17: Blocking a Domain Name System (DNS) Query
DNS server of your Internet service provider (ISP). If the recursive server
has information about the IP address in its cache, your browser receives that
information. No additional queries are performed.
Step 3. However, if the recursive server does not know the IP address, the recursive
server sends the query to one of the 13 sets of root name servers located
worldwide. A root server knows the DNS information about a top-level
domain (TLD).
Step 4. The DNS server of a TLD sends information about the second-level domain
and its authoritative name server. An authoritative name server knows all the
addressing information for a particular domain.
Step 5. The authoritative name server responds to a query by returning the Address
Record (A record) to your ISP. The ISP’s recursive server stores the record
on its cache for a specific amount of time and sends the IP address to your
browser.
Figure 17-1 shows various levels of DNS queries for a domain. Depending on the records
on the intermediate server cache, the number of queries can be higher or lower. The pro-
cess can happen within less than a second.
a.root servers.net
b.root servers.net
2 3 c.root servers.net
d.root servers.net
Data Center Network
e.root servers.net
f.root servers.net
g.root servers.net
h.root servers.net
ISP i.root servers.net
Local DNS j.root servers.net
Server DMZ
k.root servers.net
Outside 4 l.root servers.net
Name m.root servers.net
Inside Recursive Space
Corporate Network
1 DNS Server
Top Level Domain
.com .org (TLD) DNS Server
Figure 17-2 shows an access rule that blocks DNS traffic solely based on DNS service
ports. This static rule is unable to determine the risk level of a domain, and, therefore, it
cannot block an unsafe domain dynamically.
Figure 17-2 Identifying and Blocking DNS Traffic Based on Service Ports
The DNS-based Security Intelligence feature of Firepower allows you to identify a sus-
ceptible DNS query and blacklist the resolution of an unsafe domain name, while any
queries to legitimate websites are allowed. It leads to a browser not being able to obtain
the IP address of a website. FTD blocks the request for a website before a potential HTTP
connection is even established. Consequently, FTD does not need to engage its resources
for further HTTP inspection.
Figure 17-3 shows the workflow of a DNS query. It also shows where an FTD device
functions.
500 Chapter 17: Blocking a Domain Name System (DNS) Query
Recursive DNS
Server at ISP
Authoritative
Name Server
Figure 17-3 Placement of an FTD Device Within the Workflow of a DNS Query
■ Drop: With this option, FTD simply drops the DNS query for a particular domain.
Warning A user may still access a website if the client computer caches the DNS records
and the existing records are not expired.
Firepower DNS Policy Essentials 501
Figure 17-5 illustrates the drop action on an FTD device. The device simply drops
the DNS query, and no response is provided to the client.
Local DNS
Server
DMZ ISP
Outside
Recursive cisco.com
Inside
DNS Server Public IP Address
FTD drops the query.
Local
Cache
■ Domain Not Found: With this option, as a response to a DNS query, a user receives
an NXDOMAIN (nonexistent domain name) message (see Figure 17-6). The
NXDOMAIN message indicates that the requested domain name does not exist.
502 Chapter 17: Blocking a Domain Name System (DNS) Query
The browser cannot resolve the IP address for a domain. Consequently, the user fails
to access the website.
Local DNS
Server
DMZ ISP
Outside
Recursive cisco.com
Inside
Response: The domain DNS Server Public IP Address
cisco.com is not found.
2
Query: What is the IP address of cisco.com?
1
Local
Cache
■ Sinkhole: With this option, FTD responds to a DNS query with a false IP address.
A browser does not realize that an intermediate security device—FTD in this
example—acts as a spoof DNS server, and it responds to its query with a false IP
address. The IP address may or may not be assigned to an existing DNS server. Using
Sinkhole functionality, you can redirect malicious traffic to an alternate location for
further security analysis.
Figure 17-7 shows a spoof DNS server. FTD uses the IP address of this spoof DNS
server as a response to a DNS query only when the domain is categorized as harmful.
Figure 17-8 shows the implementation of a sinkhole without a physical spoof server.
You can assign any false IP address within a sinkhole object. Then FTD uses this
false address to respond to any query to a harmful domain.
■ Whitelist: This action allows the traffic to bypass an intelligence-based check; how-
ever, the traffic is still subject to other security inspections.
■ Monitor: This action allows an FTD device to generate alerts when there is any
match, but FTD does not interrupt traffic flow.
Firepower DNS Policy Essentials 503
Local DNS 3
Server Host sends
the DNS query
to the sinkhole
afterward. ISP
DMZ
Outside
Recursive cisco.com
Inside
Sinkhole DNS Server Public IP Address
192.168.1.91
Response: IP Address of
cisco.com is 192.168.1.91
2
Query: What is the IP address of cisco.com?
1
Local
Cache
Figure 17-7 DNS Sinkhole Action (Fake Address Represents a Spoof DNS Server)
Local DNS
Server
DMZ ISP
Outside
Recursive cisco.com
Inside
Response: IP Address of DNS Server Public IP Address
cisco.com is 192.168.1.91
2
Query: What is the IP address of cisco.com?
1
Local
Cache
Figure 17-8 DNS Sinkhole Action (Fake Address Does Not Represent any Server)
504 Chapter 17: Blocking a Domain Name System (DNS) Query
Sources of Intelligence
To learn about the new suspicious domains, the Firepower System updates its intelligence
database from the following sources:
■ Feed: Cisco has a dedicated threat intelligence and research team, known as Talos,
that analyzes the behavior of Internet traffic, performs in-depth analysis on any sus-
picious activities, categorizes the potential domains based on their characteristics,
and lists the domains in a file.
One of the processes running on the FMC, CloudAgent, periodically communicates
with the Cisco cloud to download the latest feed. The frequency for updating the feed
is configurable. Once the FMC downloads a feed, it sends the feed to its managed
devices automatically. Redeployment of the access control policy is not necessary.
Figure 17-9 shows the configuration of the update frequency for the Cisco
Intelligence Feed. To find this page, go to Object > Object Management. Under
Security Intelligence, select DNS Lists and Feeds and edit Cisco-DNS-and-URL-
Intelligence-Feed by using the pencil icon.
Table 17-1 shows the key differences between the feed and list types of Security
Intelligence input.
■ List: FMC supports the blacklisting or whitelisting of custom lists of domains. You
can list the domains in a text file (.txt format) and upload the file manually to the
FMC. Upon a successful upload, a custom DNS object appears along with the sys-
tem-provided DNS objects. The process to add a DNS rule is described later in this
chapter, in the section “Configuring DNS Query Blocking.”
Firepower DNS Policy Essentials 505
Tip When you create your own list of domains for blacklisting, enter one domain name
per line. You can add a comment for future reference. Use the hash sign (#) at the begin-
ning of a line to enter a comment.
Figure 17-10 shows the DNS List/Feed configuration window. To find this window,
go to Object Management and select the DNS Lists and Feeds option under Security
Intelligence. Then click the Add DNS Lists and Feeds button. The DNS List/Feed
configuration window then appears when you select List from the Type dropdown.
You can clear the cache of a DNS server manually. However, it may not be feasible to
clear the cache of all of the network hosts manually in real time. To expedite the enforce-
ment of a new Firepower DNS policy, you can consider the following best practices:
■ Disable DNS caching on the local workstations. The system administrator of your
organization can confirm this setting.
■ Position your FTD device between the local area network (LAN) and the DNS server
so that any egress traffic from the LAN is subject to Firepower inspection. Placing
an FTD device at the perimeter edge allows the hosts to resolve an address by using
the cache of the internal DNS server.
Figure 17-11 shows different options for placement of an FTD device. In Network A, FTD
allows queries to an internal DNS server and blocks the queries to an external DNS server.
However, the FTD in Network B blocks queries to any DNS servers, local or external.
Network A
Fulfilling Prerequisites
Before you configure a DNS policy, make sure the following prerequisites are fulfilled:
■ If the DNS policy requires a Threat license and you are in the process of purchasing
a license, you can enable Evaluation Mode to avoid any logistic and administrative
delays. Evaluation Mode allows you to configure and deploy any features as if you
have already installed a paid license.
■ If you want to redirect a DNS query to a sinkhole, you must configure a sinkhole
object (with a real or fake IP address) before you select the Sinkhole action for a
DNS rule. You can create multiple sinkhole objects using different IP addresses and
use them for different purposes (for example, one object for malware, one object for
phishing, and so on).
Figure 17-12 shows the configuration of a sinkhole object. To find this configuration
window, navigate to Objects > Object Management > Sinkhole and click the Add
Sinkhole button.
Note If you want to set up the sinkhole functionality without a physical DNS server,
select the Block and Log Connections to Sinkhole option shown in Figure 17-12.
■ Create a new DNS policy or edit an existing one by adding the necessary DNS rule
conditions.
■ Invoke the desired DNS policy within an access control policy and deploy the
policies on an FTD device.
The following sections describe the process of enabling DNS policies successfully on an
FTD device. Figure 17-13 shows the lab topology that is used in this chapter to configure
DNS-based Security Intelligence (DNS policy).
Management
Traffic
Data Traffic
Management Network
FMC
10.1.1.16
Administrator
10.1.1.100
FTD
Data Network
10.1.1.2
Client Inside Outside
192.168.1.2 Zone Zone Internet
Gateway Router
Step 1. Navigate to Policies > Access Control > DNS. The system-provided Default
DNS Policy appears. You can edit this default policy and add your custom
DNS rules to it.
Configuring DNS Query Blocking 509
Alternatively, you can create a brand new DNS policy and customize it. To
do that, click the Add DNS Policy button. The system prompts you to name
your new DNS policy. After you save the name, the DNS policy editor page
appears. The remaining steps in this example describe how to customize a
new DNS policy.
Figure 17-14 shows a DNS policy editor page. Each DNS policy, by default,
comes with two items—a global whitelist and global blacklist—that have
higher precedence than a custom DNS rule.
Step 2. When the DNS policy editor page appears, click the Add DNS Rule button.
The Add Rule window appears.
Step 3. Give a name to your DNS rule and select a desired action from the Action
dropdown. The section “DNS Query Blocking Essentials,” earlier in this
chapter, describes the functions of each action.
Step 4. Select the Zones, Networks, and VLAN tabs and define the source and
destination traffic, as appropriate.
Step 5. Select the DNS tab, which shows the categories for unsafe DNS traffic. Add
the desired categories to your rule.
Figure 17-15 shows the DNS rule editor window, which allows you to select a
Security Intelligence category that you want to detect and to define an action
for any matching traffic.
Step 6. When the rule configuration is complete, click the OK button to exit the DNS
rule editor. Click the Save button to save the changes on your DNS policy.
510 Chapter 17: Blocking a Domain Name System (DNS) Query
Step 1. Navigate to Policies > Access Control > Access Control. Edit the access
control policy that will be applied on an FTD device.
Step 2. In the access control policy editor page that appears, select the Security
Intelligence tab.
Step 3. In the Security Intelligence tab, from the DNS Policy dropdown select the
desired DNS policy (see Figure 17-16).
Step 4. Click Save to save the configuration and deploy the policy to your
FTD device.
Verification and Troubleshooting Tools 511
To review the old logs that are related to DNS policy, run the following command:
To debug the deployment of a DNS policy in real time, run the following command:
Example 17-1 shows confirmation that the DNS policy is allocated with a shared memory
of 5 MB, and the size of the DNS blacklisting database is 4.32 MB. There are 341440
rules on this DNS policy that are loaded from 13 blacklisting categories.
512 Chapter 17: Blocking a Domain Name System (DNS) Query
Upon a successful deployment, the DNS Security Intelligence rules are stored in the /var/
sf/sidns_download directory, in list file (.lf) format. The DNS policy configuration file,
dns.rules, is also located in this directory. FTD creates all these files at the time when you
deploy a DNS policy. Therefore, matching the timestamp, which uses the UTC time zone,
is an important indicator of whether the latest policy is deployed.
Example 17-2 shows the list files that contain the blacklisted and whitelisted DNS
addresses. These files are created at the same time the dns.rules file is created.
Example 17-2 List Files (.lf) That Store the Blacklisted and Whitelisted DNS Addresses
After you configure a DNS policy using the GUI and deploy it on an FTD device, the
FTD device writes the configurations into the dns.rules file. A dns.rules file saves the
DNS rule conditions and associates the actions with the related blacklist and whitelist
files. The file also records the time when the latest DNS policy is deployed.
Example 17-3 explains the contents of a dns.rules file. The example elaborates the sink-
hole rule as an example. The sinkhole rule (rule ID 7) matches the domain names on the
23f2a124-8278-4c03-8c9d-d28fe08b71ab.lf list file (list ID 1048587). When there is a
match, the rule responds to a DNS query with the sinkhole IP address 192.168.1.91.
514 Chapter 17: Blocking a Domain Name System (DNS) Query
interface 1 e2b1d576-2cf5-11e7-8ea7-e184e4106fb3
interface 2 e295985c-2cf5-11e7-8ea7-e184e4106fb3
To determine the category of domains that are listed in an .lf file, view the first line of
the file. For example, the following command confirms that the file 23f2a124-8278-4c03-
8c9d-d28fe08b71ab.lf (DNS list ID 1048587) lists all the domains that are susceptible for
malware:
Figure 17-17 shows some of the contents in a dns.rules file on the GUI—accessible from
the DNS policy configuration editor. The example highlights the rule that enables the
sinkhole action.
this, this chapter uses three different websites that can trigger the Security Intelligence
events for three different categories.
Warning If your computer is connected to the Internet, you should not attempt to access
a malicious website until an FTD device is actively protecting your network.
Example 17-4 shows the DNS intelligence category for the domains that you will be test-
ing next.
Example 17-4 Identifying the DNS Intelligence Category for Certain Domains
Table 17-2 summarizes the domains that you will query from a client computer to test the
DNS policy operation. As of writing this book, they are available in the current revision
of the Cisco Intelligence Feed and added in the DNS rule.
Verification and Troubleshooting Tools 517
Before you begin testing, enable the firewall-engine-debug command on the FTD CLI
so that FTD device generates debug output while a client performs a DNS query. The
following pages show you how to access the selected domains one by one from a client
computer in your inside network.
Tip Depending on the placement of your FTD device, the DNS-based Security
Intelligence may not begin to function if the existing cache of your DNS server is not
cleared. Therefore, before you begin an investigation, wait until the existing cache expires
or manually delete the cache entries from your DNS server. Read the “DNS Query
Blocking Best Practices” section of this chapter for more information.
Example 17-5 shows the debugging messages that are generated by the firewall-
debug-engine tool on the FTD device. Each time a domain name is queried by the host
192.168.1.2, FTD matches the domain with the names on the list files. When there is a
match, FTD triggers the action configured on the matching DNS rule.
Now, for the three DNS queries in Example 17-5, the FMC should log events. You can
view them on the Analysis > Connections > Security Intelligence Events page.
Figure 17-18 shows three types of DNS-based Security Intelligence actions. FTD trig-
gered these events when a client attempted to access three different matching websites.
Figure 17-18 Security Intelligence Event Page Showing Events Triggered by DNS Rules
You can also use the nslookup command-line tool to resolve a domain name to its IP
address. The tools is available on both Windows and Linux operating systems. It allows
you to view the IP address of a domain without accessing the web contents.
Example 17-6 shows the resolutions of the same domain names used in the previous
examples from a network host. The client uses the nslookup command-line tool and
receives three different types of results.
Non-authoritative answer:
Name: iolmau.com
Address: 192.168.1.91
Users@Linux:~$
520 Chapter 17: Blocking a Domain Name System (DNS) Query
! The following answer reflects the "Domain Not Found" action. The DNS query fails
with NXDOMAIN message, which means the domain appears to be non-existent.
! The following answer reflects the "Monitor" action. The DNS query is able to
resolve the domain name. It shows the public IP address for the domain.
Name: rent.sinstr.ru
Address: 81.222.82.37
Users@Linux:~$
Summary
This chapter describes various techniques for administering DNS queries using a
Firepower DNS policy. Besides using a traditional access control rule, an FTD device can
incorporate Cisco Intelligence Feed and dynamically blacklist suspicious domains. In
this chapter, you have learned various ways to configure and deploy a DNS policy. This
chapter also demonstrates several command-line tools you can run to verify, analyze, and
troubleshoot issues with DNS policy.
Quiz
1. Which of the following actions does not interrupt traffic flow immediately?
a. Domain Not Found
b. Whitelist
c. Blacklist
d. Monitor
2. Which of the following directories stores the files related to a DNS policy?
a. /var/sf/sidns_intelligence
b. /var/sf/sidns_download
c. /var/log/sidns_policy
d. /var/log/sidns_list
Quiz 521
New websites are coming out every day. A security analyst strives to determine the
relevance of a new website for business operations and its risk level for security reasons.
However, it is challenging to catch up with the exponentially growing number of new
websites every day. In this chapter, you will learn how Firepower can empower you with
automatic classification of millions of websites using the Web Reputation technology.
Reputation Index
You can download the Firepower URL database from the cloud by using the FMC GUI.
As of this writing, the cloud has analyzed more than 600 million domains and more
than 27 billion URLs and categorized them into more than 83 different classes. The
analysis engine in the cloud can categorize more than 2500 URLs per second. The URL
database maintains the Web Reputation Index (WRI), which is based on many different
data points, such as age and history of the site, reputation and location of the hosting
IP address, subject and context of the content, and so on.
Table 18-1 shows the WRI descriptions. WRI is calculated dynamically based on
collective intelligence from various sources.
524 Chapter 18: Filtering URLs Based on Category, Risk, and Reputation
Figure 18-1 shows the implementation of URL categories and reputations in the FMC
web interface.
When you select the Block action, the FMC automatically selects all the
reputation levels that are riskier than your selected level.
Figure 18-1 URL Categories and Reputations in the Access Rule Editor
Based on the type of action—Allow or Block—you select for an access rule, the
FMC automatically adds extra URL reputation levels along with your original selection.
For example, when you select the Allow action for a certain reputation level, the FMC
allows all the URLs of that level as well as the URLs that are more benign than your
selected level. Likewise, if you select the Block action for a particular reputation level,
FMC blocks all the URLs of that level along with any URLs that are riskier than the level
you selected.
URL Filtering Essentials 525
Figure 18-2 shows different behaviors between the Allow and Block actions. Compare
this image with Figure 18-1. Note that both show the same reputation level selected
(3 - Benign sites with security risks), but the ultimate reputation selections are different
due to the actions—Allow versus Block.
When you select the Allow action, the FMC automatically selects all the
reputation levels that are more benign than your selected level.
Figure 18-2 FMC Selecting Extra URL Reputations—Depending on the Selected Action
Operational Architecture
The Firepower system loads the URL dataset into its memory for a faster lookup.
Depending on the size of available memory on a Firepower system, the cloud publishes
two types of datasets in a URL database—20 million URLs and 1 million URLs. After the
initial download of a database, the FMC receives updates from the cloud periodically, as
long as the automatic update is enabled. The periodic updates are incremental and smaller.
However, the total download time depends on the last URL database installed on the
FMC and, of course, the download speed.
Table 18-2 shows that the number of URLs included in a database depends on the
available memory on a Firepower system.
During traffic inspection, an FTD device can resolve most of the URLs the first time it
sees them. However, depending on other factors, an FTD device might have to go through
multiple steps to resolve a URL by category and reputation. Here are some steps, for
example:
Step 1. The Firepower Snort engine on an FTD device performs an immediate lookup
on the local URL dataset. FTD is able to determine the category in most
cases. If the URL is unavailable in the FTD cache, FTD forwards the query to
the FMC.
Step 2. If the FMC can retrieve the URL category from its local database, it sends the
query result to the FTD device so that FTD can act on traffic according to the
access control policy. Figure 18-3 shows the steps to resolve an unknown new
URL into its category and reputation.
Step 3. If the FMC is unable to resolve the URL category from its local database, it
checks the Cisco Collective Security Intelligence (CSI) configuration:
■ If the query to the CSI is disabled, the FMC places the unknown URL
into the Uncategorized group.
■ If the query to the CSI is enabled, the FMC queries the cloud for the
unknown URL.
Fulfilling Prerequisites
Before you begin configuring an access rule with URL Filtering conditions, fulfill the
following requirements:
■ A URL Filtering license is necessary to use the URL classification and reputation
database of a Firepower system. Furthermore, as a prerequisite, the FMC requires
you to enable a Threat license before you enable URL Filtering.
Figure 18-4 shows the page where you can enable or disable any license for an
FTD device. To find this page, navigate to Devices > Device Management. Edit
the device where you want to enable URL Filtering license and then select the
Devices tab.
Without a URL Filtering license, you can create an access rule based on any
URL conditions; however, you cannot deploy an access control policy with the URL
conditions until you enable a URL Filtering license on your FTD device. Similarly,
if the URL license expires after you deploy an access control policy, FTD stops
matching any access rule with URL conditions, and the FMC stops updating the
URL database.
1. Two types of datasets are published for local
installation: 20 million URLs and 1 million URLs.
1
CSI Cloud
Capture and
Analyze
9. If the FMC fails to resolve a URL, it can send the query
2. The cloud sends a URL dataset to the cloud. If the cloud lookup is disabled, the FMC
2 9 places an unknown URL into the Uncategorized category.
when the FMC requests it.
Categorize
8. The FMC performs a lookup on its own URL database URLs
3. Depending on the size of available when it receives a request from FTD. Because the FMC
memory, the FMC installs a URL dataset 3 8 can have a larger URL dataset than FTD, it should Index Risk
locally and loads it into memory. be able to resolve most of the URLs. Levels
5. Depending on the size of available 7. FTD resolves a URL into its category and
memory, FTD installs a URL dataset 5 7 reputation by looking up its local URL cache. If it
locally and loads it into memory. cannot resolve it, it forwards the query to the FMC. Tracking of Millions Any new unknown
of Domains and URL can be resolved
6. FTD inspects the end-user traffic Billions of URLs and at a speed of 2500
and performs an immediate lookup 6 IP Addresses 0 URLs/second.
on its local URL database.
Fulfilling Prerequisites
Threat Traps and Third-Party
Database Honeypots Source
527
528 Chapter 18: Filtering URLs Based on Category, Risk, and Reputation
Edit Icon
URL Filtering
License Is Enabled
Tip If you are in the process of purchasing a license, you can enable Evaluation Mode to
avoid any administrative delays. Evaluation Mode allows you to configure and deploy any
features as if you have already enabled a paid license.
■ Make sure the URL Filtering and Cisco CSI communication are enabled. The FMC
should enable them automatically after you add a valid URL Filtering license.
Figure 18-5 confirms that URL Filtering and automatic updating of the URL
database have been enabled.
Best Practices for URL Filtering Configuration 529
■ Check whether the URL Filtering Monitor health module is enabled in the current
health policy. If this module is enabled, the FMC generates alerts if it fails to deploy
a URL dataset to the managed devices or fails to download the latest URL database
from the Cisco CSI.
Figure 18-6 shows the option to enable the health module for URL Filtering. To
find this page, go to System > Health > Policy, edit a health policy, and select URL
Filtering Monitor from the left panel. You must redeploy a health policy after you
change any settings.
■ The FMC communicates with Cisco CSI every 30 minutes to determine if a new
update for the URL Filtering database is available. Therefore, if the automatic update
option is enabled, you should not create a separate scheduled task for URL database
updates. However, a recurring scheduled task for URL database updates is useful if
you want to manage the URL database update manually.
530 Chapter 18: Filtering URLs Based on Category, Risk, and Reputation
Figure 18-7 shows the options to create a scheduled task for URL database updates.
In this configuration, the FMC updates the URL Filtering database daily at 5 a.m., as
opposed to the system default of every 30 minutes.
Figure 18-7 Scheduling a Recurring Task to Update the URL Filtering Database
■ To prevent access to any suspicious websites, you can consider blocking the DNS
queries to those domains. If an FTD device can block a connection during DNS reso-
lution, a URL lookup for that connection will no longer be necessary. Hence, it can
improve system performance.
Figure 18-8 highlights the positions of the Firepower engine components. The URL-
based Security Intelligence (DNS policy) can block a packet before it is categorized
and blocked by a URL Filtering rule.
Back Orifice,
Identity ACL (L7) QoS Host and User File Type Malware
Portscan,
Policy App, URL Classify Discovery Control Analysis
Rate-Based,
Blacklisted Restricted Type Malware Sensitive Data
Drop
Firepower
Engine Data
Fast Path Acquisition
531
532 Chapter 18: Filtering URLs Based on Category, Risk, and Reputation
Step 1. Navigate to Policies > Access Control > Access Control and select an
existing access control policy to edit or create a new one.
Step 2. On the access control policy editor page, click the Add Rule button. The Add
Rule window appears.
Step 3. Give a name to the access rule and select an action for the rule.
Step 4. Click the URLs tab. A list of URL categories and reputations appear. Select
the categories and reputations you want to block and add them to the rule.
Figure 18-9 shows the creation of an access rule with a URL Filtering
condition. The rule blocks all the URLs that are related to the Job
Search category.
Step 5. On the Logging tab, enable Log at Beginning of Connection. This step is
optional, but it allows you to view events when FTD blocks a connection due
to a URL Filtering condition.
Figure 18-10 Enabling Logging for an Access Rule with a URL Filtering Condition
Step 7. Click Save to save the changes on the access control policy. Finally, activate
the policy by clicking the Deploy button.
Figure 18-11 shows the creation of a simple access rule called Job Search Rule.
This rule blocks any URLs that are within the Job Search category.
534 Chapter 18: Filtering URLs Based on Category, Risk, and Reputation
Save
2 1
Changes
Only the URLs related to the Any other URLs are subject
Job Search category are blocked. to the default action.
Figure 18-11 Viewing a Simple URL Filtering Rule on the Access Control Policy Editor
Attempt to visit the following websites and notice the result in each case:
Figure 18-12 shows the blocking of both job search engines, dice.com and
careerbuilder.com. However, because of the default action, FTD does not block the
general search engine google.com.
Figure 18-12 Access Rule with URL Filtering Conditions Blocking Desired Connections
You can also debug the actions in an FTD device and analyze the firewall-engine-debug
messages for troubleshooting purposes.
Example 18-1 shows the firewall-engine-debug messages when FTD allows you access to
a general search engine, such as google.com. The debug message shows that FTD can per-
form a URL lookup successfully, but the URL itself does not match with a URL Filtering
condition. The default action allows the URL.
536 Chapter 18: Filtering URLs Based on Category, Risk, and Reputation
Example 18-1 Debug Messages by an Access Rule with a URL Condition (Action: Allow)
Example 18-2 shows the firewall-engine-debug messages when FTD denies you access
to a job search engine, such as dice.com. The debug message confirms that FTD is able to
perform a URL lookup successfully, but the URL itself is blocked due to a matching
condition in the job search rule access rule.
Allowing a Specific URL 537
Example 18-2 Debug Messages by an Access Rule with a URL Condition (Action: Block)
Step 1. Go to Objects > Object Management and create an object of type URL.
Figure 18-13 shows the workflow to create a new URL object. In this exam-
ple, the URL-Object-for-Dice.com custom object represents the dice.com site.
1 3 2
5 4
Step 2. Once a URL object is created, create a new access rule to allow this URL
object. Figure 18-14 shows an access rule that allows the URL-Object-for-
Dice.com object. Note that the job search whitelist rule is placed above the
existing rule #1. The custom URL object is located under the URLs subtab.
Note Because an FTD device analyzes rules top to bottom, a whitelist rule must
be positioned above a block rule. You can define the position as you add the rule.
Alternatively, after adding a rule, you can go to the access control policy editor page to
drag a rule to a desired position.
Allowing a Specific URL 539
Step 4. Click the Add button to complete the creation of the access rule. The browser
returns to the access control policy editor page.
Figure 18-15 shows all the access rules on a policy editor page. The rule that
allows/whitelists your desired URL is positioned above the rule that blocks
the entire Job Search category. This page allows you to drag a rule and place it
in a different order.
Step 5. Click Save to save the changes in the access control policy, and click Deploy
to deploy the policy to your FTD device.
540 Chapter 18: Filtering URLs Based on Category, Risk, and Reputation
Figure 18-15 Access Control Policy Editor Page Showing a Summary of the
Access Rules
Attempt to visit the same three websites once again and notice the difference:
Figure 18-16 shows that dice.com is now allowed, while the careerbuilder.com site
remains blocked. Because of the default action on the access control policy, FTD allows
the general search engine google.com.
You can use the firewall-engine-debug tool to debug the whitelisting actions.
The debugging messages are helpful for troubleshooting purposes.
Allowing a Specific URL 541
Example 18-3 shows the firewall-engine-debug messages when FTD allows you to access
the whitelisted URL dice.com.
Example 18-4 shows the firewall-engine-debug messages when FTD denies you access
to a job search engine, such as careerbuilder.com. The debugging messages confirm that
FTD is able to perform a URL lookup successfully, but the URL itself is blocked due to a
matching condition in the job search rule access rule.
If you enter a new and uncommon URL, the FMC may be unable to resolve the category
by looking up its local database. In such a case, it can send the query to the Cisco CSI
cloud. If the cloud lookup times out, or if the query to the CSI is disabled due to privacy
concerns, the FMC places the unknown URL into the Uncategorized group.
Warning When a host attempts to connect an uncategorized URL, FTD does not match
a connection against an access rule that uses the URL Filtering condition.
544 Chapter 18: Filtering URLs Based on Category, Risk, and Reputation
Figure 18-17 illustrates the reason for receiving an uncategorized URL event. When
the FMC is unable to query an unknown URL to the cloud, it marks that URL as
Uncategorized.
5. Depending on the size of available 7. FTD resolves a URL into its category and
memory, FTD installs a URL dataset 5 7 reputation by looking up its local URL cache. If it
locally and loads it into memory. cannot find it, it forwards the query to the FMC.
Step 2. Enable the Query Cisco CSI for Unknown URLs option.
Figure 18-18 shows the configuration page to enable cloud lookup for unknown URLs.
Querying the Cloud for Uncategorized URLs 545
While resolving a URL category, FTD does not let the uncategorized traffic pass until
the URL lookup is complete or a lookup process times out, whichever comes first. If the
volume of uncategorized traffic grows, FTD keeps holding the traffic in memory. FTD
considers a URL uncategorized until an appropriate category is determined during a
cloud lookup. FTD allows the initial flows, but for subsequent connections, it continues
to look up that URL with the hope of resolving and caching it.
This behavior, however, can lead to performance degradation. To avoid this situation, you
can let an FTD device pass traffic immediately whenever a URL appears uncached and
the URL category cannot be determined locally. The following steps show how to disable
a retry when a local cache fails the first lookup:
Step 1. Go to Policies > Access Control > Access Control and edit the access control
policy that is deployed on your FTD device.
Step 2. In the access control policy editor page that appears, select the Advanced tab.
Step 3. Select the pencil icon next to General Settings. The General Settings
configuration window appears.
546 Chapter 18: Filtering URLs Based on Category, Risk, and Reputation
Step 4. Disable the Retry URL Cache Miss Lookup option and click OK to return to
the access control policy editor page.
Step 5. Click Save to save the changes and click Deploy to redeploy the policy to
your FTD device.
Figure 18-19 shows an advanced setting in an access control policy that allows an FTD
device to pass uncategorized traffic immediately, without holding it for continuous
cloud lookups.
Figure 18-19 Disabling Any Retry When a Local Cache Misses URLs
Figure 18-20 shows a connection event for accessing nazmulrajib.com. The URL category
is marked as Uncategorized.
Querying the Cloud for Uncategorized URLs 547
Example 18-5 displays the debugging messages that result from connecting to the
unknown URL nazmulrajib.com. First, the FTD device performs a lookup on its local
shared memory (see the keyword ShmDBLookupURL in the example). Then it attempts
to query the cloud (see the keyword useVendorService). Because the cloud lookup is dis-
abled in this example (see the keyword feature not set), the URL lookup eventually fails.
If the Firepower System can’t categorize a URL, there are a couple items you can check
on both the FMC and FTD:
Step 1. Verify whether the FMC is updated with the latest URL database.
Example 18-6 shows two types of URL database files on the FMC
file system. The full_bcdb_rep_1m_5.174.bin file is smaller and applied
to an FTD device for an immediate URL lookup. It is 22 MB in size and
has approximately 1 million URLs. The larger database file,
full_bcdb_rep_5.174.bin, is used by the FMC when FTD misses a
URL lookup.
Querying the Cloud for Uncategorized URLs 549
If you do not see an up-to-date file, you should check whether the automatic
update of the URL database is enabled. If it is enabled, verify whether the
latest update attempt was successful. You can view the urldb_log file to deter-
mine the status of the URL database update. To view it, run the following
command on the FMC:
■ Successfully downloaded: This message confirms that the FMC was able
to download the latest database update. Along with this message, you
should also find the name of the update file, as in this example:
Step 2. Determine whether the current URL dataset on the FTD device is derived
from the latest URL database on the FMC. Example 18-7 confirms that
the FTD device can obtain a smaller version of the latest URL dataset
from the FMC.
550 Chapter 18: Filtering URLs Based on Category, Risk, and Reputation
Example 18-7 FTD Downloading a Subset of the URL Database from the FMC
Step 3. Check whether the shared memory of FTD loaded with the latest URL data-
set. Example 18-8 shows the URL database files on the shared memory of an
FTD device. The timestamp on the file indicates that the FTD is loaded with
the latest URL dataset.
Summary
This chapter describes techniques to filter traffic based on the category and reputation
of a URL. It illustrates how Firepower performs a URL lookup and how an FTD device
takes an action based on the query result. This chapter explains the connection to a URL
through debugging messages, which is critical for troubleshooting.
Quiz
1. Which of the following licenses is necessary to block a URL based on its category
and reputation?
a. Threat
b. URL
c. Malware
d. Both A and B
Quiz 551
Discovering Network
Applications and Controlling
Application Traffic
The Firepower System can dynamically discover what applications are running in a
network. It can also identify the host and user who are running a particular application.
FTD can discover a network application with or without the help of any active scanner.
FTD allows you to block certain traffic solely based on the type of an application a
user might be running. This chapter describes how to configure network discovery policy
to enable Application Visibility and Control (AVC) with Firepower.
Application Detectors
The Firepower System uses application detectors to identify the network applications
running on a monitored network. The detection capability can vary, depending on the
source of the detectors. There are mainly two sources for detectors:
■ User-created detectors: You can create your own detectors based on patterns you
notice on custom applications. The FMC provides full administrative control over
your custom detectors, so that you can modify or disable them as necessary. Behind
the scenes, it leverages OpenAppID—an open source application detection module.
Table 19-1 shows the type of application detectors supported by Firepower. Except for
the built-in internal detectors, you can activate or deactivate any types of detector, as
necessary.
Figure 19-1 shows the application detector page on the FMC. To find this page,
go to Policies > Application Detectors. You can search for any desired application
to determine its coverage. For example, Figure 19-1 shows retrieval of 69 detectors that
are related to Facebook. The total number of detectors can vary, depending on the VDB
version running on the FMC.
Application Discovery Essentials 555
Currently, 69 detectors
are found for Facebook.
Operational Architecture
FTD can control an application when a monitored connection is established between
a client and server, and the application in a session is identified. To identify an
application, FTD has to analyze the first few packets in a session. Until the identification
is complete, FTD cannot apply an application rule. To ensure protection during the
analysis period, FTD inspects those early packets by using the default intrusion policy
of an active access control policy. Upon successful identification, FTD is able to act
on the rest of the session traffic based on the access rule created using an application
filtering condition. If a prefilter policy or an access control policy is configured to
block any particular traffic, FTD does not evaluate the traffic further against a network
discovery policy.
Figure 19-2 illustrates the operational workflow of the Firepower engine. It demon-
strates that a connection is subject to Application Visibility and Control (AVC) only if it
passes the Security Intelligence inspection.
556
Chapter 19: Discovering Network Applications and Controlling Application Traffic
Back Orifice,
Identity ACL (L7) QoS Host and User File Type Malware
Portscan,
Policy App, URL Classify Discovery Control Analysis
Rate Based,
Blacklisted Restricted Type Malware Sensitive Data
Drop
Firepower
Engine Data
Fast Path Acquisition
Block
Firewall
Engine
Yes
Ingress Existing No VPN UN NAT/ Prefilter ACL Flow
Packet Decrypt Egress Int. L3 L4 Update
Interface Conn. Policy
Fast
Path Trust
Figure 19-2 Firepower Engine Workflow for Application Visibility and Control
Best Practices for Network Discovery Configuration 557
■ Keep the VDB version up to date. Installing the latest version ensures the detection
of the latest software with more precise version information.
■ By default, the FMC comes with an application discovery rule, which uses 0.0.0.0/0
and ::/0 as the network address. This address enables a Firepower system to discover
applications from any observed networks. Do not remove this default rule, as Snort
leverages the application discovery data for intrusion detection and prevention by
detecting the service metadata of a packet.
■ When you add a custom rule for host and user discovery, include only the network
addresses you own. Do not add the network address 0.0.0.0/0 and ::/0 to a host and
user discovery rule, because doing so can deplete the host and user licenses quickly.
■ Exclude the IP addresses of any NAT and load balancing devices from the list of
monitored networks. These types of IP address can represent multiple computers
running in a LAN, which leads an FTD device to generate excessive discovery events
whenever there are activities in the LAN. Exclusion of NAT and load balancing IP
addresses can improve the performance of FTD.
Figure 19-3 shows the positions of two types of intermediate devices—a router and
a load balancer—that can each represent multiple network hosts.
■ You can also exclude any ports from monitoring if you are sure about the service a
port might be running. Doing so reduces the number of discovery events for known
ports and services.
■ Avoid creating overlapping rules that include the same hosts multiple times to
prevent performance degradation.
■ Deploy the FTD device as close as possible to the hosts. The lower the hop count
between an FTD device and a host, the faster the FTD device detects the host and
with a higher confidence value.
558 Chapter 19: Discovering Network Applications and Controlling Application Traffic
Data Center Network
Data Center
Router
Load FTD
Server Farm Balancer
192.168.1.0/24
Figure 19-3 NAT Device (Router) and Load Balancer Interface Representing
Multiple Hosts
Fulfilling Prerequisites
Before you begin configuring a network discovery rule, fulfill the following requirements:
■ The Firepower System uses the Adaptive Profiles option to perform application
control. This option enhances detection capabilities of an FTD. The Adaptive Profile
Updates option leverages the service metadata and helps an FTD determine whether
a particular intrusion rule is pertinent to an application running on a particular host
and whether the rule should be enabled.
Fulfilling Prerequisites 559
By default, the Adaptive Profiles option is enabled (see Figure 19-4). You can verify
the configuration status in the Advanced tab of an access control policy, under
Detection Enhancement Settings.
■ Create network objects for the network addresses that you want to add to
a discovery rule. This helps you manage your configuration once you deploy a
network discovery policy. To create an object, go to Objects > Object Management
on the GUI. This page also enables you to modify the value of a custom object
if necessary. However, you cannot modify a system-provided network object.
To determine the type of an object, look at the rightmost column—a custom
network object shows a pencil icon (see Figure 19-5), which you can select
to modify the value of the object.
560 Chapter 19: Discovering Network Applications and Controlling Application Traffic
Custom Object
Tip The system also enables you to create an object on the fly directly from the rule
editor window (see Figure 19-8, later in the chapter).
Discovering Applications
In the following sections, you will learn how to configure a network discovery policy to
discover network applications as well as network hosts. To demonstrate the impact of an
intermediate networking device representing multiple internal hosts, a router has been
placed between the FTD device and the LAN switch in the topology.
Figure 19-6 shows the topology that is used in this chapter to demonstrate the
configuration of a network discovery policy.
Discovering Applications 561
Management
Traffic
Management Network
Data Traffic
FMC
10.1.1.16
Administrator
10.1.1.100
FTD
Data Network
10.1.1.2
Inside Outside
Zone Zone Internet
Step 1. In the FMC, navigate to Policies > Network Discovery. The default rule
for application discovery appears (see Figure 19-7). It monitors traffic from
any network to discover applications.
The default discovery rule monitors application traffic from any network.
Step 2. Click the Add Rule button. The Add Rule window appears.
Step 3. First, add a rule to exclude the IP address of any intermediate NAT and load
balancing devices. To do that, select Exclude from the Action dropdown, and
then select a network object that represents your desired IP address.
Tip If you did not create a network object previously in the Fulfilling Prerequisites sec-
tion, you can do it now on the fly using the green plus icon. Alternatively, you can add an
IP address directly on the rule editor window.
Step 4. Click the Save button to return to the network discovery policy page.
Step 5. Next, to include the network you want to monitor, click the Add Rule button
again. The Add Rule window appears.
Step 6. Select Discover from the Action dropdown, and then select a network object
that represents your desired IP network.
Tip If you want to monitor a private network, you can select one of the system-provided
network objects.
Figure 19-9 shows a network discovery rule that can discover hosts and
applications running on a network with private IP addresses (RFC 1918).
Step 7. Click the Save button to return to the network discovery policy page, and
then click the Deploy button to deploy the network discovery policy on your
FTD device.
Figure 19-10 shows the two network discovery rules you have just created.
564 Chapter 19: Discovering Network Applications and Controlling Application Traffic
Figure 19-10 A New Exclusion Rule, a Custom Discovery Rule, and the Default
Discovery Rule
Figure 19-11 shows six widgets in the Application Statistics dashboard. Each widget
displays a unique statistic of the application running in a monitored network.
Discovering Applications 565
Figure 19-12 shows different types of discovery events. They are generated when a user
connects an Apple Mac OS X to a network and opens a web browser, Safari. This figure
also shows subsequent discoveries of various applications on the Mac.
566 Chapter 19: Discovering Network Applications and Controlling Application Traffic
Figure 19-13 shows the name and version of operating systems running on a monitored
network. It also shows examples of unknown and pending operating system.
Discovering Applications 567
Tip Remember this best practice: The lower the hop count between an FTD device and
a host, the faster the FTD device detects the host and with a higher confidence value.
Moreover, additional intermediate devices between an FTD device and hosts can alter or
truncate important packet data. Therefore, you should deploy an FTD device as close as
possible to the monitored hosts.
■ Check whether the FMC generates any health alerts for exceeding the host limits.
To receive an alert due to the oversubscription of host discovery, the health monitor
module for Host Limit must be enabled.
568 Chapter 19: Discovering Network Applications and Controlling Application Traffic
Figure 19-14 shows the option to enable a health module that can trigger an alert
when the FMC exceeds its host limit. To find this page, go to System > Health >
Policy and edit a health policy you want to apply.
■ By analyzing the network map on the FMC, you can determine the number of
unique hosts identified by a Firepower system and compare the number with the
host limit for an FMC model. You can also recognize any hosts that might be repre-
senting multiple hosts, such as a router with NAT feature enabled or a load balancer.
It helps you to select an IP address for exclusion.
Table 19-2 shows the maximum number of hosts the FMC can discover at any time.
Note As of this writing, Cisco supports additional FMC models, such as FS750,
FS1500, and FS3500, which were designed prior to the Sourcefire acquisition. While this
book uses the latest hardware models, you can still apply this knowledge on any legacy
hardware models. For any specific information on the legacy hardware models, read the
official user guide.
Figure 19-15 demonstrates that, although there are only 3 hosts in an internal
network, FTD discovers more than 300 hosts in the external network within a
few minutes. This discovery consumes additional resources and licenses from the
Firepower System. To find this page, go to Analysis > Hosts > Network Map.
Figure 19-15 A Network Map on the FMC Shows All of the Hosts an
FTD Device Discovers
■ Check how the network discovery policy is configured to handle a host when
the FMC reaches the threshold for host limit. You can configure a policy to stop
discovering any new hosts or to drop the earliest discoveries when the FMC reaches
its limit.
570 Chapter 19: Discovering Network Applications and Controlling Application Traffic
Figure 19-16 shows the navigation to a dropdown where you can choose between
dropping an old host and locking down any new entries.
1 2
Blocking Applications
If an access control policy has no access rule with an application filtering condition, FTD
allows any applications as long as connections to an application are permitted by the pol-
icy on the default action. You can verify this default behavior by attempting to access an
application such as Facebook. However, if you want to restrict access to an application,
you need to add an access rule for it.
Step 1. Navigate to Policies > Access Control > Access Control. A list of available
access control policies appears.
Blocking Applications 571
Step 2. Use the pencil icon to edit the access control policy that you want to deploy
on an FTD device. The access control policy editor page appears.
Step 3. Click the Add Rule button. The rule editor window appears.
Step 4. Give a name to the rule and select a desired action for the matched traffic.
Step 5. Select the Applications tab. A list of available application filters appears.
Figure 19-17 Access Rule to Block Any Applications in the Social Networking
Category
Step 6. Use the search field in the Application Filter section to find a desired
application category. You can select traffic based on categories, business
relevance, risks, types, and so on. Alternatively, to find a specific application,
you can just enter the application name in the search field in the Available
Applications section.
Step 7. After you select the desired applications, add them to the rule.
Step 8. Go to the Logging tab to enable logging for any matching connections.
This is an optional step, but it allows you to view an event when FTD blocks a
connection.
572 Chapter 19: Discovering Network Applications and Controlling Application Traffic
Step 9. Click the Save button in the rule editor window to complete the creation of
an access rule with an application filtering condition.
Figure 19-18 shows this new access rule, which blocks any applications that
are related to the Social Networking category only. Any other applications are
subject to the default action.
Save Changes
Step 10. Finally, on the policy editor page, click Save to save the configurations, and
click Deploy to deploy the policy on an FTD device.
Figure 19-19 shows two types of connections to the Facebook application. When a
connection is allowed, it hits the default action. However, when the social networking
rule finds a match, it inspects the connection and blocks with reset packets.
Example 19-1 shows the debugging data generated by the firewall engine. It confirms that
FTD is able to detect facebook.com and then applies the rule action to block with reset.
Example 19-2 shows the debugging of application data generated by the Firepower
engine. It displays the identification number (appID) of the application that is detected
by the FTD device.
Example 19-3 shows a query from the FMC database. It retrieves the mapping of the
appID with an associated application name (appName). It confirms that the FTD device
was able to identify the Facebook application correctly.
admin@FMC:~$ sudo OmniQuery.pl -db mdb -e "select appId,appName from appIdInfo where
appId=629";
Password:
getting filenames from [/usr/local/sf/etc/db_updates/index]
getting filenames from [/usr/local/sf/etc/db_updates/base-6.1.0]
+-------+----------+
| appId | appName |
+-------+----------+
| 629 | Facebook |
+-------+----------+
----------------------------
OmniQuery v2.1
(c) 2016 Cisco Systems, Inc.
.:|:.:|:.
----------------------------
mdb> exit
admin@FMC:~$
Summary
This chapter describes how the Firepower System can make you aware of the
applications running on your network and empower you to control access to any
unwanted applications. It also shows how to verify whether an FTD device can identify
an application properly.
576 Chapter 19: Discovering Network Applications and Controlling Application Traffic
Quiz
1. Which of the following statements is true?
a. A network discovery policy allows you to exclude network addresses but not any
port numbers.
b. You cannot determine the number of unique hosts identified by a Firepower
system until it reaches the license limit.
c. If a prefilter policy or an access control policy is configured to block any
particular traffic, FTD does not evaluate the traffic further against a network
discovery policy.
d. All of the above.
As a security professional, you might not want your users to download and open random
files from the Internet. While you allow your users to visit certain websites, you might
want to block their attempts to download files from the sites they visit or to upload
files to external websites. Unsafe downloads can spread viruses, malware, exploit kits,
and other dangers on your network, and they can make the entire network vulnerable to
various types of attacks. Likewise, to comply with the policy of your organization, you
might not want your users to upload any particular types of files to the Internet from
your corporate network.
The Firepower system enables you to block the download and upload of files based on
file type (extension) and suspicious activity (malware).
Figure 20-1 shows an architectural diagram of the Firepower engine. The figure highlights
both components of a file policy—file type control and malware analysis—which are
described in the following sections.
578
Chapter 20: Controlling File Transfer and Blocking the Spread of Malware
Back Orifice,
Identity ACL (L7) QoS Host and User File Type Malware
Portscan,
Policy App, URL Classify Discovery Control Analysis
Rate-Based,
Blacklisted Restricted Type Malware Sensitive Data
Drop
Firepower
Engine Data
Fast Path Acquisition
Block
Firewall
Engine
Yes
Ingress Existing No VPN UN-NAT/ Prefilter ACL Flow
Packet Decrypt Egress Int. L3-L4 Update
Interface Conn. Policy
Fast
Path Trust
Figure 20-1 Placement of the File Policy Components in the Firepower Architecture
File Policy Essentials 579
Figure 20-2 demonstrates the magic number on a TCP packet. This packet is captured when
a client downloads an executable file from a website. After completing the TCP three-way
handshake, the server (172.16.100.100) sends this information to the client (192.168.1.200).
Figure 20-2 Retrieval of the Magic Number from the Stream of Packets
file traverses a network. To expedite the analysis process and to conserve resources, FTD
can perform both types of malware analysis—local and dynamic. Let’s take a look at the
technologies behind them.
Figure 20-3 illustrates the purposes of any interactions between the Firepower System
and the Cisco clouds.
DC FTD
Data Center (DC)
Network
AMP Cloud
SHA-256 Lookup
FMC
Disseminates
Updates
to the FTD
Server Farm
Management Network
FMC
Talos Cloud
Internet Signature Update
or Local Analysis
FTD Sends
Files to the
Cloud Directly
for Dynamic
Campus Network
Analysis
End Users
Figure 20-3 Firepower Communications to the Cisco Clouds for Malware Analysis
FTD calculates the SHA-256 hash value (Secure Hash Algorithm with 256 bits) of a file
and uses the value to determine a disposition. The FMC performs a lookup on the cached
disposition before it sends a new query to the AMP cloud. It provides a faster lookup result
and improves overall performance. Depending on the action you select on a file policy, a
Firepower system can perform additional advanced analysis in the following order:
■ Spero analysis: The Spero analysis engine examines the MSEXE files only.
It analyzes the structure of an MSEXE file and submits the Spero signature to
the cloud.
File Policy Essentials 581
■ Local analysis: FTD uses two types of rulesets for local analysis: high-fidelity
rules and preclassification rules. The FMC downloads high-fidelity malware
signatures from Talos and disseminates the rulesets to FTD. FTD matches the
patterns and analyzes files for known malware. It also uses the file preclassification
filters to optimize resource utilization.
■ Dynamic analysis: The dynamic analysis feature submits a captured file to the threat
grid sandbox for dynamic analysis. A sandbox environment can be available in the
cloud or on premises. Upon analysis, the sandbox returns a threat score—a scoring
system for considering a file as potential malware. A file policy allows you to adjust
the threshold level of the dynamic analysis threat score. Thus, you can define when
an FTD device should treat a file as potential malware.
Storage
Licensing Capability
With the installation of a Threat license, a Firepower system automatically enables the
file type control. This means that if you are currently using the security intelligence
and intrusion prevention features on an FTD device, you should be able to control
the transfer of a particular file type without the need for any new license. However,
to perform a malware analysis, Firepower requires an additional license, known as
a Malware license.
Figure 20-5 shows the actions and features you can enable by using the Threat and
Malware licenses.
Files
Local Malware Analysis
Can Store Files Regardless
of Malware Disposition
Dynamic Analysis
Table 20-1 summarizes the differences between the capabilities of a Threat license and a
Malware license.
■ When you want to block a file by using file policy, use the Reset Connection option.
It allows an application session to close before the connection times out by itself.
■ If you want to download a captured file to your desktop, make sure you take extra
precautions on your desktop before you download. The file might be infected with
malware that could be harmful to your desktop.
■ Keep the file size limit low to improve performance. An access control policy allows
you to limit the file size. It can impact the following activities:
■ In case of a communication failure between the Firepower System and the Cisco
clouds, FTD can hold the transfer of a file for a short period of time when the file
matches a rule with the Block Malware action. Although this holding period is
configurable, Cisco recommends that you use the default value.
584 Chapter 20: Controlling File Transfer and Blocking the Spread of Malware
Figure 20-6 displays the advanced settings of an access control policy in which you can
define the file holding period and file size limits.
Figure 20-6 Configuration of the File Holding Period and File Size Limits
Fulfilling Prerequisites
The following items are necessary for a successful file policy deployment:
■ Make sure to install an appropriate license. To control the transfer of a particular file
type, only a Threat license is necessary. To perform malware analysis, an additional
Malware license is required.
■ A file policy uses the adaptive profile feature. Make sure the feature is enabled in the
advanced settings of an access control policy (see Figure 20-7).
Fulfilling Prerequisites 585
■ Make sure the Enable Automatic Local Malware Detection Updates option is
checked (see Figure 20-8). It allows the FMC to communicate with Talos cloud every
30 minutes. When a new ruleset is available, the FMC downloads it to enrich the
local malware analysis engine.
Figure 20-8 Option to Enable the Automatic Local Malware Detection Updates
Step 1. Navigate to Policies > Access Control > Malware & File. The Malware & File
Policy page appears.
Step 2. Click the New File Policy button, and the New File Policy window appears
(see Figure 20-9).
Step 3. Give a name to the policy and click the Save button. The file policy editor
appears.
Configuring a File Policy 587
1 2
Step 4. Click the Add Rule button. The file rule editor appears.
Step 5. Select Any from the Application Protocol dropdown to detect files over mul-
tiple application protocols.
Step 6. Make a selection from the Direction of Transfer dropdown. Depending on the
underlying application protocol for a file transfer, the direction can be limited.
For example, the HTTP, FTP or NetBIOS-ssn (SMB) protocol allows any
direction—upload or download. However, SMTP (upload only) and POP3/
IMAP (download only) support unidirectional transfer.
Figure 20-10 explains the reasons for unidirectional transfer with the SMTP,
POP3, and IMAP protocols. While SMTP is used for outbound transfers,
POP3/IMAP is used to download incoming emails and any attachments.
Step 7. Select the file type categories you want to block, and click Add to add them
to the rule. You can also search for a specific file type directly.
588 Chapter 20: Controlling File Transfer and Blocking the Spread of Malware
Mail Mail
Server SMTP SMTP Server
Internet
Outbound Inbound
Mail Mail
Figure 20-10 Directions of Protocols Associated with Inbound and Outbound Emails
Step 8. Select an action from the Action dropdown. The following options are
available:
Note A file policy does not evaluate a file rule based on its position; rather, it uses
the order of actions. The order of actions is Block Files, Block Malware, Malware Cloud
Lookup, and Detect Files. When performing an advanced analysis, FTD engages Spero
analysis, local malware analysis, and dynamic analysis, successively—if you have enabled
all of them in a particular file rule.
■ Detect Files: This action detects a file transfer and logs it as a file event
without interrupting the transfer.
■ Block Files: This action blocks certain files—depending on the file formats
selected on a file rule.
Tip If you want to block a file, select the Reset Connection option. It allows an applica-
tion session to close before the connection times out by itself.
Figure 20-11 displays a file rule that blocks the transfer of any system,
executable, encoded, and archive files without analyzing them for malware.
According to the configuration, when a file matches this rule, FTD stores
the file on local storage and sends reset packets to terminate any associ-
ated connection.
Configuring a File Policy 589
Click on the Add Rule button to open the file rule editor
Figure 20-12 shows the creation of two file rules. The first rule blocks
system, encoded, executable, and archive files with reset packets and stores
the blocked file in local storage. The second rule detects the graphic, PDF,
multimedia, and Office document files but does not block or store them as
they traverse the network.
■ Block Malware: This action performs the same tasks as the Malware Cloud
Lookup action, with an addition of blocking the original file if the disposi-
tion is determined to be malware.
Note When you select the Malware Cloud Analysis or Block Malware action, the
Firepower System offers various analysis methods. Read the previous section for more
information on malware analysis methodologies.
590 Chapter 20: Controlling File Transfer and Blocking the Spread of Malware
Figure 20-12 Two File Rules for Different File Types Applying Different Actions
Figure 20-13 shows another option for a file rule (which requires a
Malware license). This rule enables an FTD device to block the transfer
of a file and to store it locally if the file has one of three criteria: infected
with malware, disposition is unknown, or matches a custom detection list.
When blocking the file transfer, FTD sends reset packets to terminate any
associated connection. This rule does not allow an FTD device to store a
file if the file appears to be clean. It prevents storage from getting full of
clean or benign files.
Step 9. Optionally, on the Advanced tab, you can enable additional features for
advanced analysis and inspection. Figure 20-14 shows the advanced settings
of a file policy. For example, here you can adjust the threshold level of the
dynamic analysis threat score, enable inspection for the archived contents,
define the depth of inspection for a nested archive file, and so on.
Step 10. Click the Save button on the policy editor to save the changes on the file
policy.
Configuring a File Policy 591
Step 1. Navigate to Policies > Access Control > Access Control. The available access
control policies appear. You can modify one of the existing policies or click
New Policy to create a new one.
Step 2. On the policy editor page, use the pencil icon to modify an existing access
rule to invoke a file policy. If there are no rules created, click the Add Rule
button to create a new access rule.
Step 3. On the rule editor window, go to the Inspection tab. You will notice drop-
downs for Intrusion Policy, Variable Set, and File Policy. Figure 20-15 shows
the dropdowns on the Inspection tab. The file policy you configured earlier
should populate here, under the File Policy dropdown.
Step 4. Choose a policy from the File Policy dropdown. Doing so automatically
enables logging for the file event. You can verify it by viewing the settings on
the Logging tab (see Figure 20-16). To view events for each connection that
matches a particular access rule condition, you can manually enable Log at
Beginning of Connection.
Verification and Troubleshooting Tools 593
Manually Enabled
Automatically Enabled
Figure 20-16 Options to Enable Logging for File Events and Connection Events
Step 5. Click the Add button to save the changes. You are returned to the access con-
trol policy editor page. If you are editing an existing access rule, you can click
the Save button instead.
Step 6. On the access control policy editor page, select a default action. You cannot
select a file policy as the default action of an access control policy. You can
only invoke a file policy within an individual access rule.
Step 7. Finally, click Save to save the changes, and click Deploy to deploy the con-
figuration to the FTD device.
The following sections of this chapter demonstrate the operation of both policies—file
type detection and malware analysis. In this scenario, a client downloads files with two
different formats—Microsoft executable (MSEXE) file format and Portable Document
Format (PDF). As a security engineer, you need to verify whether a file policy is opera-
tional and whether the transfer of files complies with the active file policy.
Figure 20-17 shows the topology that is used in the configuration examples in this chapter.
To demonstrate various scenarios, the client computer (192.168.1.200) downloads different
files from a web server (172.16.100.100), and the FTD device in the LAN acts on them.
Management Traffic
Data Center (DC) Network
DC
Router
Management Network
FMC
Internet
Campus (LAN) Network
Figure 20-18 shows the currently enabled rules on a file policy. The first rule detects and
blocks files in four categories, and the second rule only detects files in four different
categories.
Navigate to Files > File Events to view the file events. By default, the FMC shows the File
Summary page. However, to find useful contextual information about file events, you
should also check the Table View of File Events page.
Figure 20-19 confirms the blocking and detection of an MSEXE file and a PDF file.
Because the Block Files action does not perform malware analysis, the Disposition
column is blank.
Figure 20-20 shows detailed information about the detected and blocked files and their
associated source and destination hosts. The SHA256 and Threat Score columns are
blank because the FTD device does not perform any kind of malware analysis but detects
file type only.
596 Chapter 20: Controlling File Transfer and Blocking the Spread of Malware
Figure 20-21 shows the data of file events visually in various widgets. To find this dash-
board, go to Overview > Dashboards > Files Dashboard.
If you do not see a file event that you expected to see, you can use the CLI to debug
the action of a file rule and verify the operation of a file policy. If you run the system
support firewall-engine-debug command while you attempt to transfer a file, you see
detailed logs associated with file inspection and analysis.
Verification and Troubleshooting Tools 597
Example 20-1 shows the detailed debugging messages that appear when a client computer
attempts to download the executable file 7z1700.exe and the FTD device blocks it due to
the actions Block Files, Reset Connection, and Store Files.
! At this stage, the file is being transferred through the FTD. The following
messages appear after the file is stored on the FTD. FTD blocks the file transfer
as soon as it detects the end-of-file marker on a packet.
Example 20-2 shows the debugging messages that appears when a client computer
downloads the file userguide.pdf. FTD generates a log, but it does not block the PDF file
because the rule action is Detect Files.
Figure 20-22 shows a file rule that blocks the transfer of any malicious files. When FTD
determines that a file is a malicious file, this rule allows an FTD device to store the file in
local storage and send reset packets to terminate any associated connection. To conserve
disk space, files with clean disposition are not stored.
Unlike in the previous section, where you used file type detection, you will find the FTD
to calculate the SHA-256 checksum of the file. FTD later attempts to perform a cloud
lookup for the hash value.
Figure 20-23 shows a file event (table view) for downloading the same 7z1700.exe file.
Because the file policy enables malware analysis, FTD calculates the SHA-256 hash value.
However, the cloud lookup process times out.
Figure 20-24 shows the summary view of the file events. Due to the cloud lookup time-
out, malware disposition is listed as Unavailable.
Example 20-3 demonstrates that the FTD device is able to calculate the SHA-256 check-
sum locally. However, when it sends the calculated hash value for a lookup, the query
Verification and Troubleshooting Tools 601
times out (due to a communication failure to the Cisco cloud). This leads the FMC to
display the disposition as Unavailable.
Example 20-3 The FMC Calculates SHA-256 Hash Value but Is Unable to
Complete a Lookup
! Next, FTD calculates the SHA-256 hash value of the file, which is
2c8637b812f7a47802f4f91f8bfaccb978df9b62de558d038485ddb307ee982d.
To find the root cause of a lookup failure, you can analyze the syslog messages on the
FMC. To view the messages, you can use any convenient Linux commands, such as less,
cat, or tail, as needed. Note that the timestamps of messages use coordinated universal
time (UTC).
Tip Cloud Lookup Timeout in the Action column indicates that the FMC is unable to
connect to the cloud. When you see this, check whether the management interface of the
FMC is connected to the Internet. If the Internet connectivity is operational, then make
sure the FMC can resolve a DNS query.
Example 20-4 shows various states of the FMC cloud communication. The syslog mes-
sages are automatically generated by the Firepower software. To view them in real time,
you can use the tail command with the -f parameter.
Example 20-4 Analyzing Syslog Messages for FMC Communications to the Cloud
! After you fix any communication issues, FMC should be able to connect to the
cloud. The following Syslog messages confirm a successful connection.
.
Verification and Troubleshooting Tools 603
! Once the FMC is connected to the cloud, it begins the registration process. The
following messages confirm successful registrations to the Cisco Clouds.
.
[timestamp] FMC SF-IMS[25954]: [26657] SFDataCorrelator:FireAMPCloudLookup [INFO]
Successfully registered with fireamp cloud
[timestamp] FMC SF-IMS[25954]: [25954] SFDataCorrelator:FileExtract [INFO]
Successfully registered with sandbox cloud
.
! Upon successful registration, FMC is able to perform cloud lookup and obtains
updates. The following messages confirm a successful check for malware database
update.
.
[timestamp] FMC SF-IMS[25275]: [25275] CloudAgent:CloudAgent [INFO] ClamUpd, time to
check for updates
.
[timestamp] FMC SF-IMS[25275]: [25298] CloudAgent:CloudAgent [INFO] Nothing to do,
database is up to date
.
Figure 20-25 shows the DNS setting on an FMC management interface. To find this page,
go to System > Configuration and select Management Interfaces. Make sure the FMC
can communicate with the configured DNS server and resolve a domain name using this
DNS server.
This section assumes that you have fixed any connectivity or DNS issues you experi-
enced in the last section. Here you will download the MSEXE file 7z1700.exe once again.
You should notice a different type of event this time.
Figure 20-26 shows two different actions on file events for downloading the same file.
Because the FMC can communicate with the Cisco clouds, FTD returns Malware Cloud
Lookup instead of Cloud Lookup Timeout.
604 Chapter 20: Controlling File Transfer and Blocking the Spread of Malware
You can go to the File Summary view to find the malware dispositions. The Cisco clouds
can return one of the following dispositions for a query:
Example 20-5 proves that the Firepower System checks its local cached disposition first
before it sends the query to the Cisco clouds.
606 Chapter 20: Controlling File Transfer and Blocking the Spread of Malware
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Figure 20-28 shows the creation of suspicious.exe, an anti-malware test file. The example
uses notepad—a text editor for Microsoft Windows—to create the file. The file
simply contains the test string. After you copy the string, save the file in the Windows
executable (.exe) format.
Figure 20-28 Creation of an Anti-Malware Test File, suspicious.exe, Using a Text Editor
608 Chapter 20: Controlling File Transfer and Blocking the Spread of Malware
Example 20-6 details the operations of an FTD device when it analyzes a file, performs a
cloud lookup, and blocks the file based on its malware disposition.
! First, client attempts to download the suspicious.exe file using a web browser.
! At this stage, FMC receives a malware disposition from the cloud. FTD acts on the
file based on the File Policy.
>
■ Clean list: If FTD blocks a file due to its malware disposition, you could manually
allow the file by adding it to the clean list. This lets the file go through FTD moving
forward.
■ Custom detection list: If the local or dynamic analysis engine identifies a file as
clean or unknown and, therefore, FTD allows the file to transfer, you could change
this behavior by adding the file to the custom detection list. In the future, if a client
attempts to transfer the same file, FTD will block it, regardless of the disposition by
the local or dynamic analysis engine.
In short, the clean list allows you to whitelist a file, whereas you can blacklist a file by
adding it to the custom detection list.
To deploy a new file list, the FTD device must be running a file policy with the following
rule conditions:
■ The rule matches the same file type as your selected file format for a file list. For
example, if you want to add an executable file to the clean or custom detection list,
the rule on a file policy needs to match the executable file types as well.
■ The action of the rule is set to one of the malware analysis rules, such as malware
cloud lookup or block malware.
Verification and Troubleshooting Tools 611
Once these conditions are fulfilled, you can add a file to a file list in two ways: by using
the right-click context menu or by using a file list object. The context menu allows you to
add a file on the fly.
Figure 20-30 shows the addition of the 7z1700.exe file to the custom detection list
through the context menu.
Figure 20-30 Adding a File to the Custom Detection List by Using the Context Menu
Figure 20-31 shows the navigation to the file list object configuration page. Besides add-
ing the files and their SHA hash values, this page allows you to manage any previously
added files.
612 Chapter 20: Controlling File Transfer and Blocking the Spread of Malware
2 4
Figure 20-31 Adding a File to the Custom Detection List by Using the File List Object
Once you add your desired file to a file list, you can redeploy the file policy to FTD.
Then you can attempt to redownload the file you have just added. If you added the file to
the custom detection list, the client should no longer be able to download the file.
Figure 20-32 confirms the block of the latest download attempt due to custom detection.
This time, FTD blocks the same 7z1700.exe file that was allowed earlier due to unavail-
able and unknown dispositions.
Example 20-7 displays the debugging messages for a Custom Detection Block event.
Here, FTD blacklists the 7z1700.exe file due to its addition to the custom detection list.
Verification and Troubleshooting Tools 613
Example 20-7 Adding a File to the Custom Detection List Blacklists the File
>
The FMC allows you to track and visualize the path of a file by using the network file
trajectory feature. This feature can save you analysis time when you want to determine
the spread of a suspicious file. You can look up a particular file by entering its SHA-256
hash value on the Files > Network Trajectory page. Alternatively, on the file event page,
you can click a disposition icon in the SHA256 column to open the file trajectory page
(as shown in the Figure 20-32).
Figure 20-33 shows the network file trajectory for the 7z1700.exe file. Throughout the
exercises on this chapter, the file has gone through various disposition states that you can
see on this page.
Quiz 615
Unavailable (12:58) > Unknown (13:51) > Custom Detection Block (14:33)
Summary
Cisco integrates the Advanced Malware Protection (AMP) technology with the Firepower
technology. This chapter explains how these technologies work together to help you
detect and block the spread of infected files across your network. This chapter also shows
the configurations and operations of a file policy on a Firepower system, and it demon-
strates various logs and debugging messages that are useful for determining any issues
with cloud lookup and file disposition.
Quiz
1. Which of the following does not require a Malware license?
a. Sending a file to the cloud for dynamic analysis
b. Enabling a local analysis engine
c. Performing a cloud lookup without blocking a file
d. Blocking a file transfer based on its file format
616 Chapter 20: Controlling File Transfer and Blocking the Spread of Malware
One of the most popular features of Firepower Threat Defense (FTD) is that it can func-
tion as an intrusion detection system (IDS) as well as an intrusion prevention system (IPS).
FTD uses Snort, an open-source IDS/IPS, to perform deep packet inspection. Snort can
detect intrusion attempts and prevent cyber attacks in real time. When an FTD device
runs Snort along with many other next-generation security technologies (described in
recent chapters), the device turns into a next-generation intrusion prevention system
(NGIPS). In this chapter, you will learn how to configure and deploy an intrusion policy
on an FTD device.
Figure 21-1 shows a packet analyzed against a Snort ruleset as the last phase of the
Firepower engine inspection. However, any bypassed or trusted traffic is not subject to
Snort rule inspection.
■ Network analysis policy: This policy works in conjunction with preprocessor rules
to normalize traffic.
■ Intrusion policy: This policy employs the Snort rules to perform deep packet
inspection.
■ Access control policy: This policy invokes the network analysis policy and intrusion
policy for matching and nonmatching traffic.
The following sections describe all the essential components that are part of an intrusion
policy deployment.
618
Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Fastpath Rule Match wh
ich Ap P
Ingress Ta plie refil
Interface ke s a ter
sP F P
lac ast olic
Blocking of Traffic by the Prefilter Policy
Trust Rule Match wh Acc e B pa y
t
ich ess e for h R
Security Access Control Is Co e a ule
Su nt ny ,
Intelligence ACL: L3-L4 bje rol An
Overrun, Buffer Overflow
nd t R
Ra ule
Rate Limited te ,
Lim
Access Control it
ACL: L7
Application Control
Intrusion Attempt
Rate Limit
Next Hop Lookup
L3-L2
Routing
Dropped Due to the Firepower Engine
Egress
Interface
Blocked by the Firewall Engine
Figure 21-1 Snort Rule Drops a Packet at the Later Phase of Firepower Inspection
Firepower NGIPS Essentials 619
The implementation of preprocessors on open source Snort and FTD are not exactly the
same. The Firepower engine normalizes traffic in various phases as a packet goes through
additional advanced security checks.
Figure 21-2 shows the position of preprocessor in the open source Snort architecture. All
the preprocessor plugins operate at the same level—after decoding a packet and before
the Snort rule inspection.
Data Log
Packet Packet Detection Output
Acquisition Preprocessor Alerts
Stream Decoder Engine Module
via Libpcap Events
A network analysis policy on a Firepower system allows you to enable a certain prepro-
cessor and fine-tune any granular settings within. A preprocessor allows Snort to prepro-
cess, decode, and normalize traffic for advance inspection. If you disable a preprocessor
manually but Snort deems the preprocessor necessary, FTD can still engage that particu-
lar preprocessor in the backend to protect your network from a potential threat. However,
a network analysis policy configuration does not indicate when FTD enables an essential
preprocessor automatically. Visually, the preprocessor setting remains disabled on the
FMC GUI.
Figure 21-4 shows the network analysis policy editor page, where you can enable and dis-
able a desired preprocessor. Later in this chapter, you will learn how to create and deploy
a network analysis policy from scratch.
620
Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Back Orifice,
Identity ACL (L7) QoS Host and User File Type Malware
Portscan,
Policy App, URL Classify Discovery Control Analysis
Rate-Based,
Blacklisted Restricted Type Malware Sensitive Data
Drop
Firepower
Engine Data
Fast Path Acquisition
Block
Firewall
Engine
Yes
Ingress Existing No VPN UN-NAT/ Prefilter ACL Flow
Packet Decrypt Egress Int. L3-L4 Update
Interface Conn. Policy
Fast
Path Trust
Figure 21-3 Network Analysis Policy Acting in Multiple Phases Throughout an Engine
Firepower NGIPS Essentials 621
The Application Layer Preprocessors section of a network analysis policy editor allows
you to configure the advanced settings of various protocols traffic, such as DCE/RPC,
DNS, FTP and Telnet, HTTP, Sun RPC, SIP, GTP Command Channel, IMAP, POP, SMTP,
SSH, and SSL.
The FMC also provides preprocessors for very specific environments and detection.
For example, DNP3 and Modbus preprocessors have been developed for the Supervisory
Control and Data Acquisition (SCADA) network environment. Similarly, three additional
preprocessors are designed to detect very specific traffic patterns and threats, including
Back Orifice, Portscan, and Rate-Based.
the signature of a specific vulnerability. The Firepower System supports Snort rules from
various sources, including the following:
■ Standard text rules: The Cisco Talos security intelligence and research group
writes these rules in clear-text format. The Snort detection engine uses them to
analyze packets.
■ Shared object (SO) rules: Talos writes SO rules in the C programming language and
compiles them for Snort use. The content of an SO rule is made irretrievable for vari-
ous reasons, such as proprietary agreements between Cisco and third-party vendors.
■ Preprocessor rules: The Snort development team creates these rules, which the
Firepower engine uses to decode packets with various protocols.
■ Local rules: The FMC enables you to create a custom Snort rule by using its GUI.
You can also write your own rule in a text editor, save the file in .txt format, and
upload it to the FMC. When you create your own Snort rule and import it into the
FMC, the Firepower System labels it as a local rule. Similarly, if you obtain a Snort
rule from a community-based Internet forum, the system considers it a local rule as
well. The Firepower System supports text-based local rules only; it does not support
the creation and compilation of your own SO rules.
Warning Although the FMC enables you to import the community-provided rules
or to write your own local rules, you should always consider enabling a Cisco-provided
rule over a local rule. Cisco-provided rules are developed by Talos—a group of world-
class researchers who are primarily responsible for writing and improving Snort rules.
An ill-structured rule created by a new Snort user can affect the performance of an
FTD device.
Snort uses a unique generator ID (GID) and Snort rule ID (SID) to identify a rule.
Depending on who creates a rule, the numbering schemes of GIDs and SIDs are different.
Table 21-1 provides the identification numbers that you can use to distinguish one type
of Snort rule from another.
Once you create an intrusion policy, you can enter the intrusion policy editor page to
find and enable a specific Snort rule or all of the rules within a category.
Firepower NGIPS Essentials 623
Figure 21-5 shows a search query for all the Snort rules with Telnet metadata. You can
perform a similar search to find rules with many other criteria. For now, just take a look
how the intrusion policy editor displays rules in a search query. Later in this chapter, you
will learn how to create, edit, and deploy an intrusion policy from scratch.
Option 1: Select a criterion under Clicking on a rule pops the Show Details
the Rules panel. button at the bottom of this page.
Figure 21-5 Granular Options to Search for a Specific Snort Rule in the Intrusion
Policy Editor
Tip If you want to search for rule 718 directly, enter SID:718 in the filter—rather than
just 718. If you want to perform a new search, you should clear the existing search result
by clicking the X icon in the Filter bar.
Once you find a rule, you can select the rule and click the Show Details button to view
detailed information about it.
624 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Figure 21-6 shows the syntax of Snort rule 1:718. It also provides detailed rule documen-
tation. Later in this chapter, you will learn how to create an intrusion policy from scratch
and enable a desired rule within it.
Note Throughout this chapter, Snort rule 1:718 is used as an example to demonstrate
various configurations. You can replace SID:718 with any desired rule.
System-Provided Variables
Besides using a static IP address or port number, a Snort rule can use variables to repre-
sent the source and destination information. This empowers you to enable a rule in any
network environment without modifying the original Snort rule.
Figure 21-7 illustrates Snort rule 1:718, which analyzes traffic from the $TELNET_
SERVERS variable to detect a potential brute-force attack. If you do not change the
default value of the $TELNET_SERVERS variable, Snort analyzes packets from additional
IP addresses—along with your real Telnet server—for the “Login incorrect” content with
the payloads.
Firepower NGIPS Essentials 625
Rule Header
(
msg:"PROTOCOL-TELNET login incorrect"; msg: Displays a message on the GUI when a rule triggers
flow:to_client,established; flow: Defines the traffic flows for which a rule is applied
Rule Options
content:"Login incorrect"; content: Searches for specific content in the packet payload
metadata:ruleset community, service telnet; metadata: Associates additional data with a rule for future use
You must define the $HOME_NET variable based on the network address used in your
LAN. If the default value of a variable that represents a specific server is set to any or
$HOME_NET, you must change it to a more specific value. It makes a Snort rule more
effective and reduces the probability of false positive alerts. Thus, a proper variable set-
ting can improve performance.
The purpose of a variable is explained by the variable’s name. The names ending with
$*_NET, $*_SERVERS and $*_PORTS define network addresses, IP addresses, and port
numbers, respectively. Consider these examples:
Note In this chapter, the configuration examples use the Cisco-provided Snort rules. If
you want to write your own local rules, you need to know the usage of Snort variables and
rule options, which are beyond the scope of this chapter. To learn more about custom rule
writing, read the documentation on open-source Snort at www.snort.org.
626 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Figure 21-8 shows a list of variables in the default variable set. You must redefine both
variables—$HOME_NET and $TELNET_SERVERS—to trigger SID:718 efficiently in
the appropriate condition. The list in this figure has been shortened to accommodate
both the $HOME_NET and $TELNET_SERVERS in one screenshot.
Figure 21-8 Redefining the Default Values of Variables with Specific Values
System-Provided Policies
To help you expedite a deployment, Firepower software comes with several preconfig-
ured network analysis policies and intrusion policies. You can use one of the following
system-provided policies as the default security policy for your network or as a baseline
for a custom security policy:
■ Balanced Security and Connectivity: Cisco Talos recommends this policy for the
best system performance without compromising the detection of the latest critical
vulnerabilities.
■ Connectivity over Security: This policy prioritizes connection speed while main-
taining detection of a few critical vulnerabilities.
Firepower NGIPS Essentials 627
■ Security over Connectivity: Security has higher priority than connection speed and
reachability.
■ Maximum Detection: Security has supreme priority over business continuity. Due
to the deeper inspection of packets, end users may experience latency, and FTD may
drop some legitimate traffic.
Figure 21-9 shows four system-provided policies that you can use as a base policy for a
network analysis policy (NAP).
Four Base
Policies for NAP
Figure 21-10 shows five system-provided policies in the dropdown that you can use as a
base policy for an intrusion policy. The base policy No Rules Active allows you to create
an empty intrusion policy with all the rules disabled. You can use it for two purposes:
to create an intrusion policy from scratch or to investigate any technical issues with the
Snort engine.
Five Base
Policies for IPS
Figure 21-10 System-Provided Base Policies for Intrusion Detection and Prevention
628 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Table 21-2 System-Provided Policies and Their Associations with CVSS Scores
Intrusion Policy CVSS Score Age of Vulnerability
Connectivity over Security 10 Current year plus two prior years
Balanced Security and 9 or higher Current year plus two prior years
Connectivity
Security over Connectivity 8 or higher Current year plus three prior years
Maximum Detection 7.5 or higher All the years since 2005
Figure 21-11 shows the correlation among the system-provided intrusion policies, their
detection coverages, and processing overheads. The higher the threat coverage, the higher
the utilization of the FTD resources.
Low
Number of Threat Coverage
Rule Overhead
No Rules Active
Connectivity Over Security
Balanced Security and Connectivity
Security Over Connectivity
Maximum Detection
High
Cisco releases rule updates periodically. The FMC can update the ruleset automatically
from the cloud through a scheduled task. You can also manually download a rule
update file and upload it to the FMC for installation. Each rule update comes with a
unique ruleset. While the exact number of available rules on a specific rule update is
unpredictable, the ratio of enabled rules among the system-provided policies is similar.
For example, the Security over Connectivity policy enables the highest number of
intrusion rules, whereas the Connectivity over Security policy enables the lowest number
of rules. (However, the No Rules Active policy has no rules enabled.)
Firepower NGIPS Essentials 629
Figure 21-12 shows the Policy Information page in an intrusion policy editor. Here you
can determine the number of enabled rules and the rule update version of a base policy.
Table 21-3 shows the number of rules enabled by default by Rule Update 2016-03-28-
001-vrt. Firepower Version 6.1 comes with rule update 2016-03-28-001-vrt preinstalled.
Table 21-3 Enabled Rules in the Default Ruleset of Rule Update 2016-03-28-001-vrt
Intrusion Policy Total Number of Rules to Rules to Drop and
Enabled Rules Generate Events Generate Events
No Rules Active 0 0 0
Connectivity over 459 9 450
Security
Balanced Security 7142 84 7058
and Connectivity
Security over 10,069 235 9834
Connectivity
Maximum 5533 39 5494
Detection
630 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Table 21-4 shows the number of rules enabled by default by Rule Update 2017-06-15-
001-vrt. You can compare the statistics shown here with the number of rules enabled on
2016-03-28-001-vrt, as shown in Table 21-3. These rule updates were released one year
apart, but the ratio of the enabled rules is similar.
Table 21-4 Enabled Rules in the Default Ruleset of Rule Update 2017-06-15-001-vrt
Intrusion Policy Total Number of Rules to Rules to Drop and
Rules Enabled Generate Events Generate Events
No Rules Active 0 0 0
Connectivity over 474 9 465
Security
Balanced Security 8779 71 8708
and Connectivity
Security over 12,716 245 12,471
Connectivity
Maximum 6732 40 6692
Detection
As the name suggests, the Maximum Detection policy is meant to enable the maximum
number of intrusion rules. However, the numbers in Tables 21-3 and 21-4 do not support
this assumption. Actually, the Security over Connectivity policy enables the maximum
number of rules. So, how does the Maximum Detection policy ensure the maximum
threat detection? It actually performs a much deeper analysis of packets to detect any
protocol anomalies.
Figure 21-13 illustrates the default configuration settings of the HTTP preprocessor on
the Maximum Detection policy. As you can see, much deeper inspections are enabled.
Deeper HTTP
Inspection
Figure 21-14 shows the default configuration settings of the HTTP preprocessor on the
Balanced Security and Connectivity policy. If you compare this figure with the previ-
ous one, you will find a milder HTTP inspection setting on the Balanced Security and
Connectivity policy.
632 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Note This section discusses various tips for optimal deployment and displays GUI
navigations to the related configuration pages. Later in this chapter, you will find detailed
configuration steps for each of these items.
Before you deploy an intrusion policy, you should consider the following best practices,
in general:
■ To match a packet using five tuples—source port, destination port, source address,
destination address, and protocol—you should consider using an access rule, not an
intrusion rule. The purpose of a Snort-based intrusion rule is to perform advanced
deep packet inspection.
Best Practices for Intrusion Policy Deployment 633
■ Select the Balanced Security and Connectivity policy as the default policy when
you create the network analysis policy and intrusion policy.
Figure 21-15 shows the selection of Balanced Security and Connectivity as the base
policy for both the network analysis policy (top) and intrusion policy (bottom).
Also, notice the check boxes for Inline Mode and Drop When Inline; you must
select both of them if you want FTD to block an intrusion attempt.
Intrusion Policy
Figure 21-15 Policy Creation Windows for the Network Analysis Policy and
Intrusion Policy
■ Use the Firepower Recommendations feature within the intrusion policy. This feature
can incorporate the network discovery data to determine the intrusion rules that are
related to the operating systems, services, and applications running in a network.
Figure 21-16 shows the Firepower Recommendations configuration page within the
intrusion policy editor. The number of recommended rules can vary based on your
settings.
634 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
■ Enable the Adaptive Profiles and Enable Profile Update features to leverage the
service metadata and allow FTD to apply the enabled intrusion rules to the relevant
traffic intelligently.
Figure 21-17 shows the advanced settings for an access control policy where you can
configure the Adaptive Profiles and Enable Profile Update settings.
Table 21-6 shows the differences between the Firepower Recommendations and
Enable Profile Update features. Although both features work together to enable
traffic-specific intrusion rules, there are some differences between them.
Best Practices for Intrusion Policy Deployment 635
■ In the network analysis policy, configure the Inline Normalization preprocessor with
the Normalize TCP Payload option enabled to ensure consistent retransmission of
data (see Figure 21-18).
Some of the best practices are applicable to a particular deployment mode, and depend
on your traffic handling policy. For example:
■ If you want to prevent cyber attacks by blocking intrusion attempts, you need to
deploy FTD device bump in the wire (BITW). The BITW deployment requires an
inline interface pair—you include the ingress and egress interfaces to an inline inter-
face pair and then assign the interface pair to an inline set. To learn more about Inline
Mode, see Chapter 11, “Blocking Traffic Using Inline Interface Mode.”
■ If your goal is to deploy FTD for detection-only purposes—that is, you do not
want to block an intrusion attempt in real time—consider deploying an FTD device
in Inline Tap Mode instead of in Passive Mode. Doing so enables you to switch to
Inline Mode faster, without the need for a cabling change. This is critical in case
of an emergency. To learn more, read Chapter 12, “Inspecting Traffic Without
Blocking It.”
NGIPS Configuration 637
■ If you choose to deploy an FTD device in Passive Mode anyway, make sure the
Adaptive Profiles option is enabled on the advanced settings access control policy.
This option enables an FTD device to adapt intrusion rules dynamically based on the
metadata of the service, client application, and host traffic.
■ When FTD prompts you to select a firewall mode (during initialization after a reim-
age), choose Routed Mode. While Transparent Mode can block an intrusion attempt,
you could accomplish the same goal—transparency or a bump in the wire—by using
Inline Mode, which has less configuration overhead. Using the FTD CLI, you can
switch between Routed Mode and Transparent Mode. To learn more about Routed
Mode, read Chapter 8, “Firepower Deployment in Routed Mode.”
NGIPS Configuration
Configuring an FTD device as a next-generation intrusion prevention system (NGIPS) can
involve three different security policies: network analysis policy, intrusion policy, and
access control policy. In the following sections, you will learn how to configure all of
these policies in order to deploy an FTD device with NGIPS functionality.
Figure 21-19 shows the navigation to the network analysis policy through the intrusion
policy page. You will find a similar link on the access control policy page.
Figure 21-19 Link to Access the Network Analysis Policy Configuration Page
Step 1. Click the Create Policy button. The Create Network Analysis Policy window
appears (see Figure 21-20).
Note By default, the Inline Mode option is enabled. It allows the preprocessors to
normalize traffic flows and drop any packets that contain anomalies.
Step 3. As the base policy, select Balanced Security and Connectivity. This policy
provides the best system performance without compromising the detection of
the latest and critical vulnerabilities.
Step 4. Click the Create Policy button to create a network analysis policy using the
default settings. You will return to the network analysis policy configuration
page. The network analysis policy you have just created should appear in the
list on this page.
Optionally, if you want to modify the default settings of the network analysis policy,
read on; otherwise, skip to the next section, “Configuring an Intrusion Policy”.
NGIPS Configuration 639
Step 1. On the network analysis policy editor page, select Settings in the panel on
the left. A list of preprocessors appears. Figure 21-21 shows the network anal-
ysis policy editor page, where you can enable, disable, and modify preproces-
sor configurations.
The extra preprocessors appear in this list after you enable them on demand.
Step 2. Enable (or disable) any desired preprocessors in addition to the preprocessors
enabled (or disabled) by default on the base policy.
640 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Tip Enable the Inline Normalization preprocessor with the Normalize TCP Payload
option to ensure consistent retransmission of data (refer to Figure 21-18).
Figure 21-22 shows the impact of your changes to the network analysis
policy. Although Inline Normalization and Rate-Based Attack Prevention
preprocessors are disabled on the base policy, your custom configuration
overrides the default behavior of the base policy.
Step 3. When you are finished with modifications, make sure you save the changes.
On the left panel, select the Policy Information section, and click the
Commit Changes button (see Figure 21-23). This button is comparable
to a Save button, in that any modification is saved but not deployed on a
managed device.
NGIPS Configuration 641
Step 1. Navigate to Policies > Access Control > Intrusion. The intrusion policy
configuration page appears.
Step 2. Click the Create Policy button. The Create Intrusion Policy window appears
(see Figure 21-24).
642 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Note By default, the Drop When Inline option is enabled, which means an FTD device
can drop packets when you deploy it in Inline, Routed, or Transparent Mode. This option,
however, does not affect the traffic flow if you deploy the FTD device in Inline Tap or
Passive Mode.
Step 4. Select Balanced Security and Connectivity as the base policy. This policy
provides the best system performance without compromising the detection of
the latest and critical vulnerabilities.
Step 5. Click the Create Policy button to create an intrusion policy using the default
settings.
Tip Generate and use Firepower Recommendations after the majority of your network
hosts generate traffic and your FTD discovers them. If you apply recommendations with-
out waiting some time to perform the network discovery, FTD may recommend disabling
many intrusion rules, which may not be desired.
Step 1. Edit the intrusion policy where you want to enable Firepower
Recommendations. If you are currently in the process of creating an intrusion
policy, click the Create and Edit Policy button to enter the policy editor
page right away. If a policy is already created, you can enter the editor page
by using the pencil icon, which is next to the name of the intrusion policy
(see Figure 21-25).
Step 4. Click the Generate and Use Recommendations button. This button appears
if the FMC did not generate any recommendation before. If a recommen-
dation has already been generated, you will see different buttons, whose
labels are self-explanatory, such as Update Recommendations, Do Not Use
Recommendations, and so on.
Figure 21-27 shows the recommendations for 963 rules (20 rules to gener-
ate events, 943 rules to drop and generate events). These rules are suggested
based on the information on two hosts.
For testing purposes, you can try regenerating recommendations with low
rule overhead threshold. You will notice that, for the same network hosts, the
number of recommended rules is now significantly lower. Figure 21-28 shows
the recommendations for only three rules (two rules to generate events and
one rule to drop and generate events). The number of recommended rules for
the same two network hosts are significantly lower because the rule process-
ing overhead is set to low.
646 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Step 5. Make sure to save any changes by clicking the Commit Changes button on
the Policy Information page.
Step 1. Edit the intrusion policy where you want to enable or disable an intrusion
rule. If you are currently in the process of creating an intrusion policy, click
the Create and Edit Policy button to enter the policy editor page right away.
If a policy has already been created, you can enter the editor page by using
the pencil icon, which is next to the name of the intrusion policy.
Step 2. On the intrusion policy editor page, select Rules in the panel on the left.
A list of rules appears.
NGIPS Configuration 647
Step 3. When you find a desired rule, select its check box and define the Rule State
to enable the rule.
Tip If you manually enable additional intrusion rules (on top of a base policy), and you
want FTD to block any matching packets, the state of those rules should be set to Drop
and Generate Events.
Figure 21-29 illustrates the steps to find and enable a desired rule using the
intrusion policy editor.
1 2 5
3 4
Steps to enable a rule
1. Select Rules on the left panel.
2-3. Select the criteria to find the desired rules.
4. Select the desired rules using the check box.
5. Define an action by selecting a rule state.
Step 4. Make sure you save any changes by clicking the Commit Changes button on
the Policy Information page.
648 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
You must define the $HOME_NET variable based on the network address used in your
LAN. If the default value of a variable that represents a specific server is set to any or
$HOME_NET, you must change it to a more specific value. Doing so makes a Snort rule
more effective and reduces the probability of false positive alerts. Thus, a proper variable
setting can improve performance.
To modify the system-provided default set or to add a new variable set, follow
these steps:
Step 2. Select Variable Set from the menu on the left. The list of available variable
sets appears.
Step 3. You can edit an existing variable set or create a new one. To create a new one,
click the Add Variable Set button, and the New Variable Set configuration
window appears.
Step 4. Find the variables that need updates. Click a variable’s pencil icon to edit the
value of the variable. To define a value, you can add a network address direct-
ly or select a predefined network object. The system also allows you to create
a new network object on the fly.
Figure 21-30 shows how to navigate to the New Variable Set configuration
window, where you can customize the default variables. For example, when
you click the pencil icon next to the HOME_NET variable, the Edit Variable
HOME_NET window, which is a variable editor, appears. Figure 21-30
shows the customized values for the HOME_NET, EXTERNAL_NET, and
TELNET_SERVERS variables. (You can see the variable editor in the back-
ground in Figure 21-31.)
NGIPS Configuration 649
1 2 4 3
Step 5. When the values of the necessary variables are updated with the new network
addresses or ports, save the configuration.
650 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
■ Adaptive Profiles: An access control policy allows you to enable Adaptive Profiles
and Enable Profile Updates features, which empower an FTD device to apply the
enabled intrusion rules intelligently to the relevant traffic.
Figure 21-32 shows the configuration window for the Adaptive Profiles and Enable
Profile Updates features. To find this window, go to the Advanced tab of the access
control policy and use the pencil icon next to Detection Enhancement Settings.
■ Invoking the policies: An access control policy invokes various Firepower policies that
you configure all over the GUI (for example, network analysis policy, intrusion policy).
NGIPS Configuration 651
First, on the Advanced tab, select an intrusion policy that is applied before an access
rule is determined for the traffic. Here, you can also select a variable set that is used by
the intrusion policy and a network analysis policy that the system uses by default.
Figure 21-33 shows the selection of an intrusion policy, a variable set, and a network
analysis policy with an access control policy.
Then, when you add an access rule, you can invoke an intrusion policy and a variable
set for the matching traffic. You can define this on the Inspection tab of the access
rule editor.
Figure 21-34 shows the selection of an intrusion policy and a variable set within an
access rule. When a packet matches the condition of this access rule, it is subject to
the inspection of this intrusion policy and variable set.
652 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Finally, for any traffic that does not match an access rule condition, you can select
an intrusion policy as the default action.
Figure 21-35 shows the selection of a custom intrusion policy as the default action
for the traffic that does not match any of the access rule conditions.
Once you have invoked all the necessary policies and configurations in your access con-
trol policy, you must click the Save button to store the configurations locally. Finally, to
activate the new policies, click the Deploy button.
Figure 21-36 shows three places where you can connect an intrusion policy with an
access control policy. It also clarifies their relationships with traffic flow.
654 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
2 3
Inspection Tab of an Access Rule Editor: Default Action of an Access Control Policy:
This intrusion policy is invoked when This intrusion policy is invoked if traffic
traffic matches an access rule. does not match any access rule.
To verify the action of an intrusion policy, this chapter uses a simple Snort rule 1:718.
Here is the rule syntax:
According to the syntax of this rule, when a Telnet server does not authenticate a client
and responds to the client with a “Login incorrect” message on its payload (due to an
incorrect login credential), an FTD device triggers this rule to prevent any potential
brute-force attack. Furthermore, if you define a variable set precisely, this rule is
applicable on the Telnet traffic to $EXTERNAL_NET. It should not apply on the Telnet
traffic to $HOME_NET.
Figure 21-37 shows the payload of a packet on a packet analyzer. A Telnet server sends
this packet when you enter an incorrect credential. Snort rule 1:718 can detect this
payload.
Figure 21-38 shows the lab topology that is used in the configuration examples in
this chapter.
If you attempt to connect to your Telnet server from an external network host and enter
a valid login credential, you will be able to access the server as usual. However, if you
enter an incorrect credential, the server sends the client a “Login incorrect” message
in a packet.
656 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Lab Topology
Data Center Network
Variable Set
$HOME_NET: 192.168.1.0/24
Server Farm Has a
$EXTERNAL_NET: !$HOME_NET
Telnet Server with
$TELNET_SERVERS: 192.168.1.200
IP Address
192.168.1.200
Management Network
DMZ
Zone
Outside
Zone
FMC
Mgmt. Internet
Inside
Zone
Corporate Network
Example 21-1 shows the messages on the CLI when you attempt to connect to a Telnet
server running on a Linux-based system. Note the “Login incorrect” message when the
login attempt is unsuccessful.
internal-user@Ubuntu:~$
Login incorrect
Ubuntu login:
Tip Some Telnet servers may return a different failure message, such as “Login Failed.”
To detect this string, a different Snort rule, 1:492, is available.
Depending on the rule state, policy setting, and interface mode, a Firepower system can
act differently on the same Telnet traffic, and you may find different types of intrusion
events for the same Snort rule. For example, if the interface mode is set to Inline Mode,
the intrusion policy is set to Drop When Inline, and the rule state is Drop and Generate
Events, then an FTD device can block a matching packet. The FMC displays a “dropped”
event (indicated by a dark gray down arrow).
However, if the Drop When Inline option is unchecked in the intrusion policy, or if the
interface mode is Inline Tap Mode or Passive Mode, the FMC shows a “would have
dropped” event (indicated by a light gray down arrow). To find more scenarios for “would
have dropped” events, see Chapter 12.
Figure 21-39 shows three different types of intrusion events triggered by the same
Snort rule.
To analyze an intrusion event further, you can click on the down arrow at the beginning
of each row. It allows you to drill down into an intrusion event and the associated packet
data to determine whether an event is false positive.
Figure 21-40 shows various contextual information about an intrusion event (for example,
timestamp, priority, and classification of the event). You can also find the ingress and
egress interfaces, source and destination details, and any associated rule and policy
references.
658 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Rule State: Drop and Generate Events Rule State: Generate Events
Interface Mode: Inline Interface Mode: Inline, Inline Tap, or Passive
Figure 21-41 shows the packet information associated with an intrusion event. It allows
you to compare the rule content with the packet payload on the same page without the
need for any additional tool. This page also offers you an option to download any packet
for offline analysis on third-party software.
Figure 21-42 shows the option in the Device Management page that enables an FTD
device to capture a packet as it matches a Snort rule. You can disable this option if you
do not want to store a complete packet due to any privacy or security policy.
Verification and Troubleshooting Tools 659
By analyzing the tracing data of a packet, you can determine whether a packet is blocked
by Snort or any other component of the Firepower System. The process is described in
detail in Chapter 10, “Capturing Traffic for Advanced Analysis.”
First, run the capture tool to begin capturing Telnet packets, making sure to add the
trace keyword to collect the tracing data:
> capture telnet_inside trace interface INSIDE_INTERFACE match tcp any any eq 23
>
You can run the show capture command any time to see the status of the capture or to
view the captured packets:
Now, you can attempt to access the Telnet server once again. To reproduce an intrusion
event, enter an incorrect credential. The capture tool captures all the packets on a Telnet
session—including the first three-way handshake, which is completely allowed by the
FTD device, per the current intrusion policy.
Verification and Troubleshooting Tools 661
Example 21-2 shows the first few packets of a Telnet session. Later, it analyzes the tracing
data of the first packet. It reveals how an FTD device makes a decision and sends a packet
to Snort for deep packet inspection.
Phase: 2
Type: ACCESS-LIST
Subtype:
662 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: NGIPS-MODE
Subtype: ngips-mode
Result: ALLOW
Config:
Additional Information:
The flow ingressed an interface configured for NGIPS mode and NGIPS services will be
applied
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268435458
access-list CSM_FW_ACL_ remark rule-id 268435458: ACCESS POLICY: AC Policy -
Default/1
access-list CSM_FW_ACL_ remark rule-id 268435458: L4 RULE: DEFAULT ACTION RULE
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be
reached
Phase: 5
Type: NGIPS-EGRESS-INTERFACE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Ingress interface OUTSIDE_INTERFACE is in NGIPS inline mode.
Egress interface INSIDE_INTERFACE is determined by inline-set configuration
Phase: 6
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 848, packet dispatched to next module
Verification and Troubleshooting Tools 663
Phase: 7
Type: EXTERNAL-INSPECT
Subtype:
Result: ALLOW
Config:
Additional Information:
Application: 'SNORT Inspect'
Phase: 8
Type: SNORT
Subtype:
Result: ALLOW
Config:
Additional Information:
Snort Verdict: (pass-packet) allow this packet
Phase: 9
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
MAC Access list
Result:
input-interface: INSIDE_INTERFACE
input-status: up
input-line-status: up
Action: allow
1 packet shown
>
Example 21-3 shows the Snort verdict “drop this packet,” which appears in tracing output
when a packet matches a Snort rule syntax and the rule state is set to drop and generate
the event.
664 Chapter 21: Preventing Cyber Attacks by Blocking Intrusion Attempts
Example 21-3 Snippet of the Tracing Information When a Packet Is Blocked by Snort
Phase: 8
Type: SNORT
Subtype:
Result: DROP
Config:
Additional Information:
Snort Verdict: (block-packet) drop this packet
.
.
<Output Omitted for Brevity>
Example 21-4 shows the statistics of a Snort drop. According to this output, Snort
requests to drop five frames after an incorrect credential was entered to authenticate a
Telnet server.
Frame drop:
Snort requested to drop the frame (snort-drop) 5
FP L2 rule drop (l2_acl) 1
Flow drop:
Summary
This chapter describes one of the most important and widely used features of a
Firepower system: the Snort-based next-generation intrusion prevention system (NGIPS).
In this chapter, you have learned how to configure an NGIPS, how to apply deploy
associated policies, and how to drill down into intrusion events for advanced analysis.
Most importantly, this chapter discusses the best practices for generating Firepower
recommendations and demonstrates how the recommended ruleset can reduce system
overhead by incorporating discovery data.
Quiz
1. Which of the following policy configurations can influence the behavior of the
intrusion prevention functionality of an FTD?
a. Network analysis policy
b. Intrusion policy
c. Access control policy
d. All of the above
3. Which of the following base policies enables the largest number of standard text
Snort rules by default?
a. Connectivity over Security
b. Balanced Security and Connectivity
c. Security over Connectivity
d. Maximum Detection
Any external user, whether an attacker or a legitimate Internet user, should have no
visibility into your internal network. You can hide the internal addresses of your network
by masquerading them into public addresses. However, assigning a dedicated public
address to each of the internal hosts is not a feasible option. You can meet this challenge
by enabling the Network Address Translation (NAT) functionality on an FTD device. This
chapter demonstrates how to configure NAT and how NAT can masquerade an internal
IP address as a public IP address.
Note In this chapter, the terms translation and masquerading refer to the same
operation and are interchangeable. In other words, translation of an address and
masquerading of an address refer to the same technology: NAT.
NAT Essentials
NAT allows FTD to translate an internal IP address into an address from a different
subnet. The NAT process is transparent to both internal and external hosts. When NAT
is in action, an internal host is unaware that its original IP address is being translated or
masqueraded to a public address, while the external host assumes that the public address
is the actual address of the internal host.
Figure 22-1 shows that the NAT operations of an FTD device take place on the
Firewall engine.
668
Chapter 22: Masquerading the Original IP Address of an Internal Network Host
Back Orifice,
Identity ACL (L7) QoS Host and User File Type Malware
Portscan,
Policy App, URL Classify Discovery Control Analysis
Rate-Based,
Blacklisted Restricted Type Malware Sensitive Data
Drop
Firepower
Engine Data
Fast Path Acquisition
Block
Firewall
Engine
Yes
Ingress Existing No VPN UN-NAT/ Prefilter ACL Flow
Packet Decrypt Egress Int. L3-L4 Update
Interface Conn. Policy
Fast
Path Trust
Figure 22-1 Architectural Overview of an FTD Device, Highlighting the NAT Components
NAT Essentials 669
Another advantage of NAT is the ability to route private traffic to the Internet. Internal
hosts of an organization use private IP addresses, as defined in RFC 1918. However,
these addresses are not routable to the Internet unless you map or translate them into
public addresses. This “limitation” of private address space actually allows different orga-
nizations to reuse the same addresses within their internal networks and to maintain them
regardless of any changes of their public IP address. Thus, it conserves the use of public
IP addresses.
Table 22-1 shows the range of private IP addresses and the number of available hosts in
Classes A, B, and C.
NAT Techniques
NAT allows you to masquerade IP addresses in various scenarios, such as one-to-one,
one-to-many, many-to-one, many-to-many, few-to-many, and many-to-few. However,
before you enable NAT, you need to answer the following questions:
■ How many external or public addresses are available for selection? One or more?
Your answers to these questions can help you determine the type of translations to
enable. You can categorize NAT mainly into three types:
■ Static NAT: FTD permanently maps the original IP address with a translated
IP address. Because the mapping is permanent, either the internal or an external host
is able to initiate a connection.
■ Port Address Translation (PAT): If a dynamic address pool has fewer external
addresses than there are internal hosts, it is impossible for all the internal hosts
to connect to external networks at the same time. To address this issue, FTD can
translate both the IP address and port number of a connection (as opposed to just
the IP address) and can multiplex over 65,000 connections over a single IP address.
670 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
RFC documents describe this feature as Network Address and Port Translation
(NAPT), but due to the nature of its operation, this feature is also known as Port
Address Translation (PAT), NAT overload, and IP masquerading. The Firepower
System calls it PAT.
Figure 22-2 shows the major differences between NAT and PAT.
192.168.1.10 203.0.113.3
1 19
2.1
68
192.168.1.11 203.0.113.4 .1.
192 1
2 .168 0
.1.1
1
192.168.1.12 203.0.113.5 192.168.1.12 203.0.113.3
3 1
3
1.1
203.0.113.10
. 1 68. 203.0.113.10
192.168.1.13 192 .14 203.0.113.3: Port 1
6 8.1 2
2.1 203.0.113.3: Port 2
192.168.1.14 19 3 203.0.113.3: Port 3
203.0.113.3: Port 4
203.0.113.3: Port 5
FTD can use the IP address of the egress interface for PAT operation. This means that
when any internal host connects to a resource over the Internet, the source IP address
of the connection appears as the egress interface of the FTD device instead of as the
original internal host address. However, if the number of concurrent connections exceeds
its limit, any additional hosts are unable to connect to the external network. To address
this issue, you can combine the PAT functionality with a dynamic address pool. This
allows an FTD device to select a new IP address from the pool when the first selection
from the pool is no longer available for multiplexing a new connection.
■ Auto NAT: An Auto NAT rule can translate one address—either a source or
destination address—in a single rule. This means that to translate both source
and destination addresses, two separate Auto NAT rules are necessary.
NAT Essentials 671
■ Manual NAT: A Manual NAT rule allows the translation of both source and
destination addresses within the same rule. A Manual NAT rule may be necessary
when you want to make an exception for translation.
Figure 22-3 compares the available translation options in the NAT rule editor. An Auto
NAT Rule supports the translation of one address per rule, while a Manual NAT Rule
allows you to translate both source and destination addresses in a single rule.
Figure 22-3 Auto NAT Versus Manual NAT: Comparison of Rule Editor Windows
A NAT policy editor categorizes NAT rules into three groups: NAT Rules Before, Auto
NAT Rules, and NAT Rules After. In the CLI, you can find the rules under Section 1,
Section 2, and Section 3, respectively. During evaluation, FTD begins with the rules
under Section 1. Until there is a match, FTD continues evaluating the rules in the next
sections.
Any rules under the NAT Rules Before and NAT Rules After sections are part of manual
NAT policies. Their names and priorities are relative to the Auto NAT Rules, which allow
you to translate one type of address at a time. To translate destination addresses, a
separate Auto NAT rule is necessary.
In this chapter, you will learn how to configure Auto NAT rules with both static and
dynamic types.
672 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
3
GUI: NAT Rules Before Manual NAT policies. Top
CLI: Section 1 priority, when available.
Top to GUI: Auto NAT Rules Static type has higher Longer prefix length has
Bottom CLI: Section 2 priority than Dynamic type. higher priority within type.
Priority
■ Configuring an Auto NAT rule is simpler than configuring a Manual NAT rule. Cisco
recommends that you choose an Auto NAT rule, as you can easily implement most
of the common NAT scenarios with it. A Manual NAT rule may be necessary when
you want to make an exception for translation.
■ If you modify an existing NAT rule or redeploy a new NAT policy, you may find that
the new policy is not in action until the timer for any existing connections expires.
To have FTD act on the latest NAT policy immediately, you can clear the current
translations by running the command clear xlate.
■ The larger the translation table, the higher the processing overhead. If the number
of translated connections grows excessively, it can affect the CPU and memory
utilization of an FTD device.
■ Review the addresses on dynamic and static NAT rules carefully before you apply
them. Avoid creating rules with overlapping IP addresses.
Fulfilling Prerequisites 673
■ Make sure the idle timeout values for Translation Slot (xlate) and Connection (Conn)
are set for optimal performance. You can adjust the timeout values on the Platform
Settings page of FTD.
Figure 22-5 shows the timeout values for an FTD. To find this configuration page, go to
Devices > Platform Settings. You can update an existing policy or create a new one.
Figure 22-5 Configuring FTD Timeout Values on the Platform Settings Page
Fulfilling Prerequisites
Before you add a NAT rule, ensure that you have understood and fulfilled the
following items:
Figure 22-6 Using the None Option to Turn an Interface into a Regular
Firewall Interface
■ If you use an FTD device in an IPS-only mode, make sure all the associated
interfaces where you want to enable NAT are now configured with IP address and
security zones. Figure 22-7 shows the allocation of IP addresses and security zones
in FTD. The lab topology in this chapter uses three routed interfaces on FTD—
GigabitEthernet1/1, GigabitEthernet1/2, and GigabitEthernet1/3.
■ Before you begin the process of adding a NAT rule, define any network objects that
may be invoked within a NAT rule. To add a network object, go to the Objects >
Object Management page and select the Add Network menu. Figure 22-8 shows the
network objects that are used in the configuration examples in this chapter. You can
add any additional objects needed for your own deployment.
Fulfilling Prerequisites 675
Figure 22-7 Allocating IP Addresses and Security Zones on FTD Routed Interfaces
Configuring NAT
FTD enables you to accomplish translation in various ways. You can select any type
(static versus dynamic) with any combination of NAT rule (Auto versus Manual).
However, Cisco recommends that you use Auto NAT rule, as it is easier to configure and
simpler to troubleshoot. In the following sections, you will learn how to configure Auto
NAT to masquerade IP addresses in the following real-world deployment scenarios:
■ Allowing an external host to connect to an internal host when an external host uses a
masqueraded destination address
Note This section assumes that you have already configured any necessary objects
described earlier in this chapter, in the “Fulfilling Prerequisites” section.
Figure 22-9 shows a scenario where an internal host connects to an external host through
an FTD device. When an end user initiates a connection using the original source IP
address, FTD translates (masquerades) the original source IP address into an address that
is predefined in an address pool.
Configuring NAT 677
Source IP Destination IP
Original Packet 192.168.1.10 203.0.113.10
Server Farm
External Host
Campus Network
Original Source IP
203.0.113.10
192.168.1.10
Figure 22-9 Lab Topology Demonstrating Dynamic NAT for Outbound Traffic
Step 1. Navigate to Devices > NAT. The NAT Policy window appears.
Step 2. To create a new NAT policy for an FTD device, select Threat Defense NAT
Policy (see Figure 22-10).
678 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
Figure 22-10 NAT Policy Configuration Options for Different Hardware Models
Step 3. When the New Policy window appears, give a name to your policy and add your
FTD device from the list of available devices to the policy (see Figure 22-11).
Click the Save button. The NAT policy editor page appears.
Step 4. On the policy editor page, click the Add Rule button to create a NAT rule.
The Add NAT Rule window appears.
Step 5. From the NAT Rule dropdown select Auto NAT Rule, and from the
Type dropdown select Dynamic. Depending on your selections in both
of these dropdowns, you will find different configurable options in
the Translation tab. For instance, for an Auto NAT Rule with Dynamic type,
you need to configure the Original Source and Translated Source.
Step 6. Use the Original Source dropdown to define the source IP addresses of the
packets that you want to masquerade. You can select a network object that
you defined in the section “Fulfilling Prerequisites,” earlier in this chapter. If
you did not create an object earlier, you can create one on the fly by clicking
the green plus icon next to a dropdown.
Step 7. Define a translated address—the address that appears as the source address
of a translated packet. You need to select one of the following translation
methods on the Translation or PAT Pool tab, depending on the type of NAT
(static or dynamic) you want to configure.
■ Destination Interface IP: This allows an FTD device to use the same IP
address as the egress interface of an FTD.
Table 22-2 shows a matrix of various Auto NAT rule selections. In this
section, you will implement dynamic NAT with an address pool
(highlighted row).
At this point, you could save the configuration and deploy the policy on
the FTD device. However, you may want to consider the following optional
configurations.
Step 8. On the PAT Pool tab, select Flat Port Range and Include Reserve Ports to
enable an FTD device to use the complete range of port numbers, 1 to 65535,
even though the same source port number is unavailable for mapping.
Step 9. On the Interface Objects tab, select the ingress and egress interfaces for the
traffic you want to translate. The Available Interface Objects field shows
the associated security zones that you assigned in the Devices > Devices
Management page.
When you complete all the steps, click the OK button on the NAT rule editor window to
create the NAT rule. The browser returns to the NAT policy editor, where you can see the
NAT rule you have just created. To activate the policy, first click Save to save the policy,
and then click Deploy to deploy it on your FTD device.
Configuring NAT 681
Figure 22-13 shows a dynamic Auto NAT rule that translates the source IP addresses of
any hosts from the INSIDE_ZONE to the OUTSIDE_ZONE. The translated packet uses
an address from the address pool, Pool-OUT-203.0.113.3-5, as its source IP address.
In the following sections, you will learn how to verify the configuration on the CLI and
how to determine whether an FTD device is translating addresses as expected.
Example 22-1 exhibits the running configurations of NAT and the definitions of any
associated objects that are invoked in a NAT rule.
682 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
You can also run the show nat detail command to display more detailed information
about a NAT policy, such as the priority of a rule (Auto NAT versus Manual NAT) or
the type of a rule (static versus dynamic). The output of this command also displays the
number of matching connections in both forward and reverse directions, through the
translate_hits and untranslate_hits counters, respectively.
Example 22-2 shows an Auto NAT rule (dynamic PAT) for translating traffic from the
192.168.1.0/24 network to the address pool 203.0.113.3 to 203.0.113.5. The zero hit count
indicates that the rule has not matched any connections.
Examples 22-1 and 22-2 display the source (INSIDE_INTERFACE) and destination
(OUTSIDE_INTERFACE) defined in a NAT rule. However, the output in these examples
does not show the status, IP address, or name of an interface. You can find them by run-
ning other commands, such as show nameif and show interfaces ip brief.
Configuring NAT 683
Example 22-3 shows how to map the physical interfaces with their logical names. It also
shows how to verify the IP address and status of an interface.
Let’s initiate a connection from an internal host 192.168.1.10 to an external SSH server
203.0.113.10. If NAT is operational on FTD, the external SSH server sees 203.0.113.3
as the source IP address of the internal host instead of its original source IP address,
192.168.1.10.
Example 22-4 shows an SSH connection between the internal client and the external
server. The connection table shows the original IP address (192.168.1.10) of the internal
server with a translation (xlate) ID. However, you can determine the masqueraded or
translated address (203.0.113.3) from the translation table.
684 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
>
By looking at the output of the show nat detail command, you can determine whether
the traffic matches a particular NAT rule and how many times a rule finds a match.
Configuring NAT 685
Example 22-5 confirms that the Auto NAT rule found one matching connection when a
host sent traffic from INSIDE_INTERFACE to OUTSIDE_INTERFACE.
By capturing the traffic in real time when an address is translated, you can analyze the
FTD operation during address translation.
Example 22-6 demonstrates the capture of any SSH traffic on the inside interface. Later,
you will analyze the translation of these packets.
> capture ssh_traffic_inside trace interface INSIDE_INTERFACE match tcp any any
eq 22
At this stage, you can initiate an SSH connection from the internal host to the external
SSH server. FTD should capture the traffic on the inside interface. You can view the pack-
ets in the CLI.
Example 22-7 shows the first few captured packets for an SSH connection. Later, it ana-
lyzes the first packet to demonstrate the detailed operation of an address translation.
686 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
! To view all of the captured packets (press Ctrl+C to exit from a long show):
> show capture ssh_traffic_inside
81 packets captured
81 packets captured
Phase: 2
Type: ACCESS-LIST
Subtype:
Configuring NAT 687
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 203.0.113.10 using egress ifc OUTSIDE_INTERFACE
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268435457
access-list CSM_FW_ACL_ remark rule-id 268435457: ACCESS POLICY: AC Policy -
Mandatory/1
access-list CSM_FW_ACL_ remark rule-id 268435457: L7 RULE: Traffic Selection
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be
reached
Phase: 5
Type: CONN-SETTINGS
Subtype:
Result: ALLOW
Config:
class-map class-default
match any
policy-map global_policy
class class-default
set connection advanced-options UM_STATIC_TCP_MAP
service-policy global_policy global
Additional Information:
Phase: 6
Type: NAT
Subtype:
Result: ALLOW
688 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
Config:
object network Net-IN-192.168.1.0
nat (INSIDE_INTERFACE,OUTSIDE_INTERFACE) dynamic pat-pool Pool-OUT-203.0.113.3-5
flat include-reserve
Additional Information:
Dynamic translate 192.168.1.10/41934 to 203.0.113.3/41934
Phase: 7
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 8
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 9
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 10
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 11
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 442, packet dispatched to next module
Phase: 12
Type: EXTERNAL-INSPECT
Configuring NAT 689
Subtype:
Result: ALLOW
Config:
Additional Information:
Application: 'SNORT Inspect'
Phase: 13
Type: SNORT
Subtype:
Result: ALLOW
Config:
Additional Information:
Snort Verdict: (pass-packet) allow this packet
Phase: 14
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 203.0.113.10 using egress ifc OUTSIDE_INTERFACE
Phase: 15
Type: ADJACENCY-LOOKUP
Subtype: next-hop and adjacency
Result: ALLOW
Config:
Additional Information:
adjacency Active
next-hop mac address 0023.2472.1d3c hits 139985869104448
Phase: 16
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
MAC Access list
Result:
input-interface: OUTSIDE_INTERFACE
input-status: up
input-line-status: up
output-interface: OUTSIDE_INTERFACE
690 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
output-status: up
output-line-status: up
Action: allow
1 packet shown
>
Example 22-8 shows how to enable the capture tool on the outside interface.
> capture ssh_traffic_outside trace interface OUTSIDE_INTERFACE match tcp any any
eq 22
Now if you attempt to connect from an external host to an internal host, regardless of
the destination IP address you choose—either original or masqueraded—the connection
attempt fails.
Example 22-9 shows the failed connection attempts from the external host 203.0.113.10
to the same internal host—through the masqueraded IP address 203.0.113.3 and the origi-
nal IP address 192.168.1.10.22.
Configuring NAT 691
8 packets captured
Example 22-10 analyzes the trace data of the first captured packet, where the external
host tries to connect to the internal host using its masqueraded IP address, 203.0.113.3.
8 packets captured
Subtype:
Result: ALLOW
Config:
Additional Information:
MAC Access list
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 203.0.113.3 using egress ifc OUTSIDE_INTERFACE
Result:
input-interface: OUTSIDE_INTERFACE
input-status: up
input-line-status: up
output-interface: OUTSIDE_INTERFACE
output-status: up
output-line-status: up
Action: drop
Drop-reason: (nat-no-xlate-to-pat-pool) Connection to PAT address without pre-exist-
ing xlate
1 packet shown
>
Example 22-11 analyzes the trace data of the fifth captured packet where the external
host tries to connect to the internal host by using its original IP address, 192.168.1.10.
Configuring NAT 693
8 packets captured
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 192.168.1.10 using egress ifc INSIDE_INTERFACE
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268435457
access-list CSM_FW_ACL_ remark rule-id 268435457: ACCESS POLICY: AC Policy -
Mandatory/1
access-list CSM_FW_ACL_ remark rule-id 268435457: L7 RULE: Traffic Selection
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be
reached
694 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
Phase: 5
Type: CONN-SETTINGS
Subtype:
Result: ALLOW
Config:
class-map class-default
match any
policy-map global_policy
class class-default
set connection advanced-options UM_STATIC_TCP_MAP
service-policy global_policy global
Additional Information:
Phase: 6
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 7
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 8
Type: NAT
Subtype: rpf-check
Result: DROP
Config:
object network Net-IN-192.168.1.0
nat (INSIDE_INTERFACE,OUTSIDE_INTERFACE) dynamic pat-pool Pool-OUT-203.0.113.3-5
flat include-reserve
Additional Information:
Result:
input-interface: OUTSIDE_INTERFACE
input-status: up
input-line-status: up
output-interface: INSIDE_INTERFACE
output-status: up
Configuring NAT 695
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
1 packet shown
>
Figure 22-14 illustrates a scenario where an external host connects to an internal DMZ
server of a company. When an external host initiates a connection to a masqueraded pub-
lic address, FTD translates the address into an internal original address.
Figure 22-15 illustrates a static NAT rule that enables an outside host to connect to a
DMZ server (internal IP address 172.16.1.10) via SSH service (internal port 22) without
knowing the internal addressing scheme. The outside host can access the DMZ server
only if the outside host uses the masqueraded IP address 203.0.113.2 and port 2200 as its
destination.
Figure 22-16 shows two rules in a NAT policy—the static Auto NAT rule (bottom) has
just been created to translate inbound connections. The dynamic NAT rule (top) was
added earlier to translate outbound connections.
After you add a new NAT rule, you must click the Save and Deploy buttons to enable the
new NAT policy on your FTD device.
696 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
203.0.113.10
Data Center Network
External Host
3
Server Farm
FTD Translates
Back into Original
Destination IP
172.16.1.10
Outside Interface
IP Address: 203.0.113.1
-------------------------------------
External Address for DMZ 1
IP Address: 203.0.113.2
------------------------------------- External Host
NAT Address Pool
IP Range: 203.0.113.3-5 Initiates
Management Network
Connection
2
DMZ Interface
IP Address: 172.16.1.1
Source IP Destination IP
Original Packet 203.0.113.10 203.0.113.2:2200
Masqueraded Packet 203.0.113.10 172.16.1.10:22
192.168.1.10
Inside Zone
Figure 22-14 Lab Topology to Demonstrate Static NAT for Inbound Traffic
Before you begin, you should clear the NAT counters and any existing translations so that
you will be able to notice any new changes quickly:
Figure 22-15 Defining a Static Auto NAT Rule for Inbound Connections
Figure 22-16 Dynamic NAT and Static NAT Rules for Outbound and Inbound Traffic
698 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
Now you can try to access the internal DMZ server from an external host. Using an SSH
client, connect to port 2200 of the translated (masqueraded) IP address 203.0.113.2. You
will be connected to the internal DMZ server, although the original IP address of the
server is 172.16.1.10, and the server listens to port 22 for SSH connections. This happens
due to the static NAT on the FTD device.
Example 22-12 shows confirmation that the inbound SSH traffic matches the first rule
on the Auto NAT policy. The untranslate_hits counter confirms the matching of one
connection in the reverse direction.
Example 22-13 shows the status of the current translations. The flag confirms a static
port translation between an external host and an internal DMZ server.
>
To better understand the NAT operation, you can capture SSH traffic on an outside inter-
face (on the translated port) and analyze it (see Example 22-14).
Configuring NAT 699
Example 22-14 Capturing SSH Traffic on an Outside Interface (on a Translated Port)
! Now, initiate an SSH connection from the external host to the internal DMZ
server. Use the masqueraded IP address and port number. It generates the following
traffic.
59 packets captured
Example 22-15 shows how to analyze the tracing data of a captured packet.
FTD translates and allows the packet as you are connecting through IP address
203.0.113.2 and port 2200.
Example 22-15 Analyzing a Translated Packet (Where the Packet Matches a Rule)
59 packets captured
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
object network Serv-Real-172.16.1.10
nat (DMZ_INTERFACE,OUTSIDE_INTERFACE) static Serv-Mask-203.0.113.2 service
tcp ssh 2200
Additional Information:
NAT divert to egress interface DMZ_INTERFACE
Untranslate 203.0.113.2/2200 to 172.16.1.10/22
Phase: 4
Type: ACCESS-LIST
Subtype: log
Configuring NAT 701
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268435457
access-list CSM_FW_ACL_ remark rule-id 268435457: ACCESS POLICY: AC
Policy - Mandatory/1
access-list CSM_FW_ACL_ remark rule-id 268435457: L7 RULE: Traffic Selection
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be
reached
Phase: 5
Type: CONN-SETTINGS
Subtype:
Result: ALLOW
Config:
class-map class-default
match any
policy-map global_policy
class class-default
set connection advanced-options UM_STATIC_TCP_MAP
service-policy global_policy global
Additional Information:
Phase: 6
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 7
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 8
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
object network Serv-Real-172.16.1.10
702 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
Phase: 9
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 10
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 11
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 505, packet dispatched to next module
Phase: 12
Type: EXTERNAL-INSPECT
Subtype:
Result: ALLOW
Config:
Additional Information:
Application: 'SNORT Inspect'
Phase: 13
Type: SNORT
Subtype:
Result: ALLOW
Config:
Additional Information:
Snort Verdict: (pass-packet) allow this packet
Phase: 14
Type: ROUTE-LOOKUP
Configuring NAT 703
Phase: 15
Type: ADJACENCY-LOOKUP
Subtype: next-hop and adjacency
Result: ALLOW
Config:
Additional Information:
adjacency Active
next-hop mac address a4ba.db9f.9460 hits 5205
Result:
input-interface: OUTSIDE_INTERFACE
input-status: up
input-line-status: up
output-interface: DMZ_INTERFACE
output-status: up
output-line-status: up
Action: allow
1 packet shown
>
Instead of using the translated address, if you attempt to connect using the original IP
address, the connection attempt should fail. To verify it, you can use the command shown
in Example 22-16, which analyzes the tracing data of a captured packet. FTD captures
the packet when an external host attempts to connect to the internal DMZ server using
its original IP address, but the attempt fails.
Example 22-16 Analyzing a Packet (Where the Packet Does Not Match a Rule)
6 packets captured
Subtype:
Result: ALLOW
Config:
Additional Information:
MAC Access list
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 172.16.1.10 using egress ifc DMZ_INTERFACE
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268435457
access-list CSM_FW_ACL_ remark rule-id 268435457: ACCESS POLICY: AC
Policy - Mandatory/1
access-list CSM_FW_ACL_ remark rule-id 268435457: L7 RULE: Traffic Selection
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be
reached
Phase: 5
Type: CONN-SETTINGS
Subtype:
Result: ALLOW
Config:
class-map class-default
match any
Configuring NAT 705
policy-map global_policy
class class-default
set connection advanced-options UM_STATIC_TCP_MAP
service-policy global_policy global
Additional Information:
Phase: 6
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 7
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 8
Type: NAT
Subtype: rpf-check
Result: DROP
Config:
object network Serv-Real-172.16.1.10
nat (DMZ_INTERFACE,OUTSIDE_INTERFACE) static Serv-Mask-203.0.113.2 service tcp
ssh 2200
Additional Information:
Result:
input-interface: OUTSIDE_INTERFACE
input-status: up
input-line-status: up
output-interface: DMZ_INTERFACE
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
1 packet shown
>
706 Chapter 22: Masquerading the Original IP Address of an Internal Network Host
Summary
This chapter describes various types of NAT on an FTD device. It shows the steps to
configure a NAT rule and demonstrates how FTD can leverage NAT technology to
masquerade internal IP addresses in a real-world scenario.
Quiz
1. Which NAT technique allows you to translate one external destination IP address to
multiple internal hosts?
a. Static NAT
b. Dynamic NAT
c. PAT
d. All of the above
4. After you deploy a new NAT policy, if a connection still uses a rule from the prior
version of the NAT policy, how could you ensure that FTD will use the new policy?
a. Deploy the NAT policy one more time.
b. Make the NAT rule more specific.
c. Clear the current translation table.
d. All of the above.
Appendix A
Chapter 2
1. d
2. b
3. c
4. a
5. a
6. b
7. c
8. d
Chapter 3
1. b
2. d
3. b
4. d
5. b
Chapter 4
1. b
2. d
708 Appendix A: Answers to the Review Questions
3. d
4. c
5. b
6. c
7. d
Chapter 5
1. c
2. c
3. d
4. b
5. d
Chapter 6
1. c
2. d
3. d
4. d
5. d
6. c
Chapter 7
1. b
2. c
3. c
4. d
5. c
6. c
Chapter 12 709
Chapter 8
1. c
2. b
3. c
4. d
Chapter 9
1. d
2. c
3. d
4. c
Chapter 10
1. d
2. c
3. a
4. c
Chapter 11
1. d
2. d
3. b
4. c
Chapter 12
1. c
2. b
3. d
4. b
710 Appendix A: Answers to the Review Questions
Chapter 13
1. d
2. d
3. d
4. c
Chapter 14
1. d
2. b
3. c
4. d
Chapter 15
1. c
2. d
3. c
4. d
Chapter 16
1. b
2. c
3. c
4. c
Chapter 17
1. d
2. b
3. c
4. b
Chapter 22 711
Chapter 18
1. d
2. c
3. c
4. d
Chapter 19
1. c
2. d
3. c
4. d
Chapter 20
1. d
2. b
3. d
4. c
Chapter 21
1. d
2. d
3. c
4. d
Chapter 22
1. a
2. a
3. b
4. c
This page intentionally left blank
Appendix B
The Firepower System allows you to collect copies of various logs and configuration
files so that you can investigate any technical issues offline or send them to Cisco for
advanced analysis. In this appendix, you will learn the procedures to generate and col-
lect troubleshooting files from the Firepower Management Center (FMC) and Firepower
Threat Defense (FTD).
Step 1. Navigate to System > Health > Monitor. The Appliance Status Summary
appears, in which you can view the overall health status of all the managed
devices as well as the FMC (see Figure B-1).
Step 2. Click on the name of an appliance from which you want to collect trouble-
shooting files. The Module Status Summary appears.
Tip If you do not see your device in the Appliance Status Summary, expand an arrow key
next to the status counts (refer to Figure B-1). This page does not display an appliance if
the health status is normal.
Step 3. When you see the buttons Generate Troubleshooting Files and Advanced
Troubleshooting next to the appliance name, click the Generate
Troubleshooting Files button. The Troubleshooting Options window
appears (see Figure B-2).
714 Appendix B: Generating and Collecting Troubleshooting Files Using the GUI
Figure B-1 Health Monitor Page Showing a Summary of the Appliance Health Status
Figure B-2 Clicking the Generate Troubleshooting Files Button to Get Data Choices
Generating Troubleshooting Files with the GUI 715
Step 4. In the Troubleshooting Options window, select the data you want to include
in the troubleshooting files. Click the Generate button to begin the process.
Depending on the volume of events in the database and the sizes of various
files, a Firepower system can take several minutes to complete the task.
Tip Selecting the All Data check box allows a Firepower system to include a copy of
all of the important configurations and log files in a compressed file (in .tar.gz format).
It ensures that any necessary troubleshooting data is not left unidentified during the
initial analysis.
Step 5. To view the status in real time, click the health status icon (in the right-top
corner), and go to the Tasks tab.
Step 6. When the troubleshooting files are generated, click the Click to retrieve
generated files download link to begin the download (see Figure B-3).
Figure B-3 Tasks Status Window Showing the Status of the File Generation Process
This page intentionally left blank
Appendix C
Although using the GUI is the preferred method of generating troubleshooting files,
in some circumstances, generating the files using the CLI may be the only choice (for
example, when the FMC is inaccessible via the GUI or when the registration between
the FMC and FTD fails).
The commands to generate troubleshooting files are different at the FMC CLI and at the
FTD CLI, as their shells are different. In addition, once the troubleshooting files are gen-
erated, there are multiple ways to transfer them from a Firepower system to your desktop.
In the following sections, you will learn the available options and see examples.
Example C-1 demonstrates the use of the system generate-troubleshoot all command
that creates troubleshooting files at the FTD CLI.
Once a .tar.gz file is created, you can view the file status by using the file list command.
Any files you see in the file list command output can be copied into your desktop using
either of two methods:
Step 1. Go to System > Health > Monitor and select the appliance from which you
want to copy the file.
Step 2. Click the Advanced Troubleshooting button. The File Download page
appears.
Step 3. Enter the name of the file you want to download (you do not need to include
the full path; just enter the filename). Click the Download button.
Step 4. When the system prompts you to download the file to your desktop, click Save.
Figure C-1 shows the steps to download the FTD troubleshooting files in the FMC GUI.
Note that only the filename is entered in the form.
1
3
After you copy a file, you can delete it to free up the disk space. Run the file delete
command as below:
Example C-2 shows the use of the sf_troubleshoot.pl command, which creates
troubleshooting files at the FMC CLI.
Once a .tar.gz file is created, it is stored in the /var/common/ directory. You can view the
file status by using the ls command.
Example C-3 shows confirmation that the troubleshooting file is generated and stored in
the /var/common folder in .tar.gz format.
720 Appendix C: Generating and Collecting Troubleshooting Files Using the CLI
To copy the file from the FMC CLI to your desktop, you can use the File Download fea-
ture on the GUI of the FMC. The processes are identical to the steps you followed for the
FTD file transfer in the previous section. Alternatively, you can use the scp (Secure Copy
over SSH protocol) command at the FMC CLI, which has the following syntax:
After you copy a file, you can delete it to free up disk space. To do so, run the rm
command with administrative privilege:
network settings, 29
ping test, 30
C
reloading ASA hardware, -c option (tcpdump), 280
27–28 capture command, 289, 314, 328,
ROMMON configuration mode 362, 421, 660
commands, 28–29 capture icmp_traffic, 304
system software, installing, 32–44 capture inside_telnet trace, 342
bootup process, interrupting, 28 capture ssh_traffic_inside trace, 685
BPF (Berkeley Packet Filter), 280 capture ssh_traffic_outside trace,
BVI (Bridge Virtual Interface), 251, 314 690
bypassing blacklists, 482–485 capture-traffic command, 279–280,
bypassing inspection, 409 305, 422, 424–425, 433–434
best practices, 412 capturing traffic. See traffic capture
encapsulated traffic cat command, 602
access control policy settings, cat /var/sf/run/fans.status, 130
401–402 cat /var/sf/run/power.status, 125
custom prefilter policy, 397–400 cat /var/sf/sidns_download/dns.rules,
packet flow analysis, 405–406 514
policy verification, 403–404 cat /var/sf/siurl_download/url.rules,
Fastpath, 413 493
advanced analysis tools, chassis, verifying, 87–90
421–422 checklists (power supply unit), 129
analysis of, 422–427 Choose the Transport Protocol option
definition of, 409–410 (FMC), 114–116
prefilter policy configuration, CIMC (Cisco Integrated Management
413–419 Controller), 101–103
prefilter policy verification, Cisco acquisition of Sourcefire, 1–2
420–421 Cisco Firepower Appliance
tunnel rule, 409 Configuration menu (FMC), 113
prerequisites, 412 Cisco Integrated Management
Controller (CIMC), 101–103
trust rules, 417–427
Cisco Intelligence Feed, 466
advanced analysis tools,
430–432 automatic blacklisting with,
468–472
Allow action, 440–442
verification
analyzing, 432–440
latest file downloads,
configuration, 427–429 486–489
definition of, 410–411 loading of addresses into mem-
verification, 429–430 ory, 489–491
728 Cisco Intelligence Feed
deleting
D addresses from blacklist, 479–480
dashboard of file events, 596 files from storage devices, 48
data interfaces, enabling, 68–69 logical devices, 64–65
dd NAT Rule window, 679 traffic captures from ASA engines,
290–291
debug command, 238–239
Deploy OVF Template window, 154
debug dhcpd packet, 248
deployment (Firepower)
debug http 255, 293
routed mode, 231, 311
debug icmp trace
best practices, 231–232
routed mode, 243
configuration during
transparent mode, 263–267
initialization, 233
debug snort event, 461
DHCP services, 238–243
debugging
DHCP settings, verifying,
application blocking 246–249
messages for application firewall mode, 234–235
identification, 574–575
host/FTD device
messages generated by firewall communication, 231–232
engine, 573–574
interface configuration,
connections to uncategorized URLs, verifying, 243–246
546–548
prerequisites, 234
debugging logs
routed interface, 235–239
DNS policy, 512
troubleshooting tools, 243
SFTunnel, 227–229
transparent mode
disabling, 297
best practices, 252–253
firewall engine, 384, 422
compared to Inline mode, 314
QoS rule-related events, 461
configuration during
Smart Licensing issues, 209–211 initialization, 253
URL Filtering, 534–537 firewall mode, 254–255
default shell (FTD), 44 host/FTD device
default username/password communication, 251–252
FMC (Firepower Management Layer 2 networks, 255–267
Center), 181 Layer 3 networks, 267–271
FMC Virtual, 161 prerequisites, 254
FTD on ASA 5500-X Series design, management network,
hardware, 42 176–179
FTD Virtual, 162 destination NAT (Network Address
delete flash command, 48 Translation)
DNS query traffic 733
initialization
H Firepower virtual appliances, 160–161
hardware chassis, verifying, 87–90 FMC Virtual appliances,
161–162
hardware platforms, 9–10
FTD Virtual appliances, 162–163
hash sign (#), 473, 505
FMC (Firepower Management
Health Monitor page
Center), 120–122
Appliance Status Summary, 713
FTD on ASA 5500-X Series
File Download page, 718 hardware, 38–42
URL Filtering Monitor. See URL FTD on FXOS (Firepower eXtensible
Filtering Operating System), 77–79
help command, 28 routed mode configuration, 233
$HOME_NET variable, 625 transparent mode configuration, 253
host discovery. See also application Inline interface mode, 311–312
discovery
best practices, 316
analyzing, 566–567
compared to Passive mode, 312–313
network discovery policy configura-
compared to transparent mode, 314
tion, 561–564
fault tolerance features, 333–336
undiscovered new hosts, 567–570
inline sets
Hosts page, 566–567
creating, 317–321
HTTP service, enabling in FTD,
293–297 packet flow verification with
packet-tracer, 324–327
$HTTP_PORTS, 625
packet flow verification with
$HTTP_SERVERS variable, 625
real packet capture, 328–333
HV (hypervisor), 109
verifying configuration of,
321–324
I packet drops
analysis with real packets,
ICMP traffic. See traffic blocking; 342–344
traffic capture
analysis with simulated pack-
IDs, mapping to application names, ets, 340–342
575
tracing, 314–316
ifconfig command, 185–186, 298
port blocking
images (boot). See boot image
configuration, 336–338
immediate blacklisting with
verification, 339–340
connection events, 477–480
prerequisites, 317
Import/Export page (FMC), 107, 141
installation 743