FPTD FDM Config Guide 660
FPTD FDM Config Guide 660
FPTD FDM Config Guide 660
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2015–2020 Cisco Systems, Inc. All rights reserved.
CONTENTS
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
iii
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
iv
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
v
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
vi
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
vii
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
viii
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
ix
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
x
Contents
About Virtual Routers and Virtual Routing and Forwarding (VRF) 293
Configuring Policies to be Virtual-Router-Aware 294
Routing Between Virtual Routers 294
Maximum Number of Virtual Routers By Device Model 295
Guidelines for Virtual Routers 296
Managing Virtual Routers 298
Create a Virtual Router or Edit Interface Assignments 299
Configure Static Routes and Routing Processes in a Virtual Router 300
Delete a Virtual Router 301
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xi
Contents
CHAPTER 14 Route Maps and Other Objects for Route Tuning 319
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xii
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xiii
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xiv
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xv
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xvi
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xvii
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xviii
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xix
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xx
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xxi
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xxii
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xxiii
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
xxiv
CHAPTER 1
Getting Started
The following topics explain how to get started configuring Firepower Threat Defense.
• Is This Guide for You?, on page 1
• New Features in Firepower Device Manager/FTD Version 6.6.0, on page 2
• Logging Into the System, on page 8
• Setting Up the System, on page 12
• Configuration Basics, on page 32
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
1
Getting Started
New Features in Firepower Device Manager/FTD Version 6.6.0
Firepower Threat Defense Virtual for the Microsoft Azure Cloud 6.5
Firepower Threat Defense Virtual for the Amazon Web Services (AWS) 6.6
Cloud
You can also manage the device, or multiple devices, using Cisco Defense Orchestrator, a cloud-based
application. For more information about how cloud management works, you can watch a video at
https://youtu.be/fsIfsHhnpQU, and peruse the Cisco Defense Orchestrator portal (http://www.cisco.com/go/
cdo). You can find the product documentation at https://docs.defenseorchestrator.com/. For information on
connecting the device to Cisco Defense Orchestrator, see Configuring Cloud Services, on page 690.
Feature Description
Platform Features
FDM support for Firepower Threat Defense You can configure Firepower Threat Defense on Firepower Threat Defense Virtual for
Virtual for the Amazon Web Services the AWS Cloud using Firepower Device Manager.
(AWS) Cloud.
FDM for the Firepower 4112 We introduced the FTD for the Firepower 4112.
Note Requires FXOS 2.8.1.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
2
Getting Started
New Features in Firepower Device Manager/FTD Version 6.6.0
Feature Description
Ability to enable intrusion rules that are Each system-defined intrusion policy has a number of rules that are disabled by default.
disabled by default. Previously, you could not change the action for these rules to alert or drop. You can
now change the action for rules that are disabled by default.
We changed the Intrusion Policy page to display all rules, even those that are disabled
by default, and allow you to edit the action for these rules.
Intrusion Detection System (IDS) mode for You can now configure the intrusion policy to operate in Intrusion Detection System
the intrusion policy. (IDS) mode. In IDS mode, active intrusion rules issue alerts only, even if the rule action
is Drop. Thus, you can monitor or test how an intrusion policy works before you make
it an active prevention policy in the network.
In FDM, we added an indication of the inspection mode to each intrusion policy on the
Policies > Intrusion page, and an Edit link so that you can change the mode.
In the FTD API, we added the inspectionMode attribute to the IntrusionPolicy resource.
Support for manually uploading You can now manually retrieve update packages for VDB, Geolocation Database, and
Vulnerability Database (VDB), Geolocation Intrusion Rules, and then upload them from your workstation to the FTD device using
Database, and Intrusion Rule update FDM. For example, if you have an air-gapped network, where FDM cannot retrieve
packages. updates from the Cisco Cloud, you can now get the update packages you need.
We updated the Device > Updates page to allow you to select and upload a file from
your workstation.
FTD API support for access control rules Using the FTD API, you can create time range objects, which specify one-time or
that are limited based on time. recurring time ranges, and apply these objects to access control rules. Using time ranges,
you can apply an access control rule to traffic during certain times of day, or for certain
periods of time, to provide flexibility to network usage. You cannot use FDM to create
or apply time ranges, nor does FDM show you if an access control rule has a time range
applied to it.
The TimeRangeObject, Recurrence, TimeZoneObject, DayLightSavingDateRange, and
DayLightSavingDayRecurrence resources were added to the FTD API. The
timeRangeObjects attribute was added to the accessrules resource to apply a time range
to the access control rule. In addition, there were changes to the GlobalTimeZone and
TimeZone resources.
Object group search for access control While operating, the FTD device expands access control rules into multiple access
policies. control list entries based on the contents of any network objects used in the access rule.
You can reduce the memory required to search access control rules by enabling object
group search. With object group search enabled, the system does not expand network
objects, but instead searches access rules for matches based on those group definitions.
Object group search does not impact how your access rules are defined or how they
appear in Firepower Device Manager. It impacts only how the device interprets and
processes them while matching connections to access control rules. Object group search
is disabled by default.
In Firepower Device Manager, you must use FlexConfig to enable the
object-group-search access-control command.
VPN Features
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
3
Getting Started
New Features in Firepower Device Manager/FTD Version 6.6.0
Feature Description
Backup peer for site-to-site VPN. (FTD You can use the FTD API to add a backup peer to a site-to-site VPN connection. For
API only.) example, if you have two ISPs, you can configure the VPN connection to fail over to
the backup ISP if the connection to the first ISP becomes unavailable.
Another main use of a backup peer is when you have two different devices on the other
end of the tunnel, such as a primary-hub and a backup-hub. The system would normally
establish the tunnel to the primary hub. If the VPN connection fails, the system
automatically can re-establish the connection with the backup hub.
We updated the FTD API so that you can specify more than one interface for
outsideInterface in the SToSConnectionProfile resource. We also added the BackupPeer
resource, and the remoteBackupPeers attribute to the SToSConnectionProfile resource.
You cannot configure a backup peer using FDM, nor will the existence of a backup peer
be visible in FDM.
Support for Datagram Transport Layer You can now use DTLS 1.2 in remote access VPN. This can be configured using the
Security (DTLS) 1.2 in remote access VPN. FTD API only, you cannot configure it using FDM. However, DTLS 1.2 is now part of
the default SSL cipher group, and you can enable the general use of DTLS using FDM
in the AnyConnect attributes of the group policy. Note that DTLS 1.2 is not supported
on the ASA 5508-X or 5516-X models.
We updated the protocolVersion attribute of the sslcipher resource to accept DTLSV1_2
as an enum value.
Deprecated support for less secure The following features are deprecated and will be removed in a future release. You
Diffie-Hellman groups, and encryption and should avoid configuring these features in IKE proposals or IPSec policies for use in
hash algorithms. VPNs. Please transition away from these features and use stronger options as soon as
is practical.
• Diffie-Hellman groups: 2, 5, and 24.
• Encryption algorithms for users who satisfy export controls for strong encryption:
DES, 3DES, AES-GMAC, AES-GMAC-192, AES-GMAC-256. DES continues
to be supported (and is the only option) for users who do not satisfy export controls.
• Hash algorithms: MD5.
Routing Features
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
4
Getting Started
New Features in Firepower Device Manager/FTD Version 6.6.0
Feature Description
Virtual routers and Virtual Routing and You can create multiple virtual routers to maintain separate routing tables for groups
Forwarding (VRF)-Lite. of interfaces. Because each virtual router has its own routing table, you can provide
clean separation in the traffic flowing through the device.
Virtual routers implement the “light” version of Virtual Routing and Forwarding, or
VRF-Lite, which does not support Multiprotocol Extensions for BGP (MBGP).
We changed the Routing page so you can enable virtual routers. When enabled, the
Routing page shows a list of virtual routers. You can configure separate static routes
and routing processes for each virtual router.
We also added the [vrf name | all] keyword set to the following CLI commands,
and changed the output to indicate virtual router information where applicable: clear
ospf, clear route, ping, show asp table routing, show bgp, show ipv6 route, show
ospf, show route, show snort counters.
We added the following command: show vrf.
OSPF and BGP configuration moved to the In previous releases, you configured OSPF and BGP in the Advanced Configuration
Routing pages. pages using Smart CLI. Although you still configure these routing processes using Smart
CLI, the objects are now available directly on the Routing pages. This makes it easier
for you to configure processes per virtual router.
The OSPF and BGP Smart CLI objects are no longer available on the Advanced
Configuration page. If you configured these objects before upgrading to 6.6, you can
find them on the Routing page after upgrade.
The restriction for externally authenticated Previously, an externally-authenticated user could not directly log into the standby unit
users logging into the standby unit of a high of an HA pair. The user first needed to log into the active unit, then deploy the
availability (HA) pair has been removed. configuration, before login to the standby unit was possible.
This restriction has been removed. Externally-authenticated users can log into the standby
unit even if they never logged into the active unit, so long as they provide a valid
username/password.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
5
Getting Started
New Features in Firepower Device Manager/FTD Version 6.6.0
Feature Description
Change to how interfaces are handled by Previously, you could include the clearIntfs query parameter to control the operational
the BreakHAStatus resource in the FTD status of the interfaces on the device where you break the high availability (HA)
API. configuration.
Starting with version 6.6, there is a new attribute, interfaceOption, which you should
use instead of the clearIntfs query parameter. This attribute is optional when used on
the active node, but required when used on a non-active node. You can choose from
one of two options:
• DISABLE_INTERFACES (the default)—All data interfaces on the standby device
(or this device) are disabled.
• ENABLE_WITH_STANDBY_IP—If you configured a standby IP address for an
interface, the interface on the standby device (or this device) is reconfigured to use
the standby address. Any interface that lacks a standby address is disabled.
If you use break HA on the active node when the devices are in a healthy active/standby
state, this attribute applies to the interfaces on the standby node. In any other state, such
as active/active or suspended, the attribute applies to the node on which you initiate the
break.
If you do use the clearIntfs query parameter, clearIntfs=true will act like interfaceOption
= DISABLE_INTERFACES. This means that breaking an active/standby pair with
clearIntfs=true will no longer disable both devices; only the standby device will be
disabled.
When you break HA using FDM, the interface option is always set to
DISABLE_INTERFACES. You cannot enable the interfaces with the standby IP address.
Use the API call from the API Explorer if you want a different result.
The last failure reason for High Availability If High Availability (HA) fails for some reason, such as the active device becoming
problems is now displayed on the High unavailable and failing over to the standby device, the last reason for failure is now
Availability page. shown below the status information for the primary and secondary device. The
information includes the UTC time of the event.
Interface Features
PPPoE Support You can now configure PPPoE for routed interfaces. PPPoE is not supported on High
Availability units.
New/Modified screens: Device > Interfaces > Edit > IPv4 Address > Type > PPPoE
New/Modified commands: show vpdn group, show vpdn username, show vpdn
session pppoe state
Management Interface acts as a DHCP The Management interface now defaults to obtaining an IP address from DHCP instead
client by default of using the 192.168.45.45 IP address. This change makes it easier for you to deploy
an FTD in your existing network. This feature applies to all platforms except for the
Firepower 4100/9300 (where you set the IP address when you deploy the logical device),
and the Firepower Threat Defense Virtual and ISA 3000 (which still use the
192.168.45.45 IP address). The DHCP server on the Management interface is also no
longer enabled.
You can still connect to the default inside IP address by default (192.168.1.1).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
6
Getting Started
New Features in Firepower Device Manager/FTD Version 6.6.0
Feature Description
HTTP proxy support for FDM management You can now configure an HTTP proxy for the management interface for use with FDM
connections. connections. All management connections, including manual and scheduled database
updates, go through the proxy.
We added the System Settings > HTTP Proxy page to configure the setting. In addition,
we added the HTTPProxy resource to the FTD API.
Set the MTU for the Management interface You can now set the MTU for the Management interface up to 1500 bytes. The default
is 1500 bytes.
New/Modified commands: configure network mtu, configure network
management-interface mtu-management-channel
No modified screens.
Licensing Features
Smart Licensing and Cloud Services You can now enroll for cloud services using your security account rather than your
enrollment are now separate, and you can Smart Licensing account. Enrolling using the security account is the recommended
manage your enrollments separately. approach if you intend to manage the device using Cisco Defense Orchestrator. You
can also unregister from cloud services without unregistering from Smart Licensing.
We changed how the System Settings > Cloud Services page behaves, and added the
ability to unregister from cloud services. In addition, the Web Analytics feature was
removed from the page and you can now find it at System Settings > Web Analytics.
In the FTD API, the CloudServices resources were modified to reflect the new behavior.
Support for Permanent License Reservation. If you have an air-gapped network, where there is no path to the internet, you cannot
register directly with the Cisco Smart Software Manager (CSSM) for Smart Licensing.
In this situation, you can now get authorization to use Universal Permanent License
Reservation (PLR) mode, where you can apply a license that does not need direct
communication with CSSM. If you have an air-gapped network, please contact your
account representative and ask for authorization to use Universal PLR mode in your
CSSM account, and to obtain the necessary licenses.
We added the ability to switch to PLR mode, and to cancel and unregister a Universal
PLR license, to the Device > Smart License page. In the FTD API, there are new
resources for PLRAuthorizationCode, PLRCode, PLRReleaseCode, PLRRequestCode,
and actions for PLRRequestCode, InstallPLRCode, and CancelReservation.
FDM direct support for Precision Time You can use FDM to configure the Precision Time Protocol (PTP) on ISA 3000 devices.
Protocol (PTP) configuration for ISA 3000 PTP is a time-synchronization protocol developed to synchronize the clocks of various
devices. devices in a packet-based network. The protocol is designed specifically for industrial,
networked measurement and control systems. In previous releases, you had to use
FlexConfig to configure PTP.
We grouped PTP with NTP on the same System Settings page, and renamed the System
Settings > NTP page to Time Services. We also added the PTP resource to the FTD
API.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
7
Getting Started
Logging Into the System
Feature Description
Trust chain validation for the FDM When you configure a non-self-signed certificate for the FDM web server, you now
management web server certificate. need to include all intermediate certificates, and the root certificate, in the trust chain.
The system validates the entire chain.
We added the ability to select the certificates in the chain on the Management Web
Server tab on the Device > System Settings > Management Access page.
Support for encrypting backup files. You can now encrypt backup files using a password. To restore an encrypted backup,
you must supply the correct password.
We added the ability to choose whether to encrypt backup files for recurring, scheduled,
and manual jobs, and to supply the password on restore, to the Device > Backup and
Restore page. We also added the encryptArchive and encryptionKey attributes to the
BackupImmediate and BackupSchedule resources, and encryptionKey to the
RestoreImmediate resource in the FTD API.
Support for selecting which events to send When you configure the device to send events to the Cisco cloud, you can now select
to the Cisco cloud for use by cloud services. which types of events to send: intrusion, file/malware, and connection. For connection
events, you can send all events or just the high-priority events, which are those related
to connections that trigger intrusion, file, or malware events, or that match Security
Intelligence blocking policies.
We changed how the Send Events to the Cisco Cloud Enable button works. The feature
is on the System Settings > Cloud Services page.
FTD REST API version 5 (v5). The FTD REST API for software version 6.6 has been incremented to version 5. You
must replace v1/v2/v3/v4 in the API URLs with v5, or preferentially, use /latest/ to
signify you are using the most recent API version that is supported on the device.
The v5 API includes many new resources that cover all features added in software
version 6.6. Please re-evaluate all existing calls, as changes might have been mode to
the resource models you are using. To open the API Explorer, where you can view the
resources, log into FDM, then click the more options button ( ) and choose API
Explorer.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
8
Getting Started
Your User Role Controls What You Can See and Do
These privileges are not related to those available for CLI users.
Note If you type in the wrong password and fail to log in on 3 consecutive attempts, your account is locked for 5
minutes. You must wait before trying to log in again.
Procedure
Step 1 Using a browser, open the home page of the system, for example, https://ftd.example.com.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
9
Getting Started
Logging Into the Command Line Interface (CLI)
You can use any of the following addresses. You can use the IPv4 or IPv6 address or the DNS name, if you
have configured one.
• The management address. By default (on most platforms), the Management interface is a DHCP client,
so the IP address depends on your DHCP server.
• The address of a data interface that you have opened for HTTPS access. By default (on most platforms),
the “inside” interface allows HTTPS access, so you can connect to the default inside address 192.168.1.1.
See Default Configuration Prior to Initial Setup, on page 27 for details about your model's inside IP
address.
Tip If your browser is not configured to recognize the server certificate, you will see a warning about
an untrusted certificate. Accept the certificate as an exception, or in your trusted root certificate
store.
Step 2 Enter your username and password defined for the device, then click Login.
You can use the admin username, which is a pre-defined user. The default admin password is Admin123.
Your session will expire after 30 minutes of inactivity, and you will be prompted to log in again. You can log
out by selecting Log Out from the user icon drop-down menu in the upper right of the page.
Note On Firepower models, the CLI on the Console port is FXOS. For the Firepower
1000/2100, you can get to the FTD CLI using the connect ftd command. For the
Firepower 4100/9300, see Connect to the Console of the Application, on page
178. Use the FXOS CLI for chassis-level troubleshooting only. Use the FTD CLI
for basic configuration, monitoring, and normal system troubleshooting. See the
FXOS documentation for information on FXOS commands.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
10
Getting Started
Changing Your Password
Tips
• After logging in, for information on the commands available in the CLI, enter help or ?. For usage
information, see Cisco Firepower Threat Defense Command Reference at http://www.cisco.com/c/en/
us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense.html.
• You can create local user accounts that can log into the CLI using the configure user add command.
However, these users can log into the CLI only. They cannot log into the Firepower Device Manager
web interface.
• You can create user accounts for SSH access in an external server. For information about configuring
external authentication for SSH access, see Configuring External Authorization (AAA) for FTD CLI
(SSH) Users, on page 715.
Note If you are logged into the CLI, you can change your password using the configure password command. You
can change the password for a different CLI user with the configure user password username command.
Procedure
Step 1 Select Profile from the user icon drop-down list in the upper right of the menu.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
11
Getting Started
Setting Up the System
Procedure
Step 1 Select Profile from the user icon drop-down list in the upper right of the menu.
Step 2 On the Profile tab, configure the following and click Save.
• Time Zone for Scheduling Tasks—Select the time zone you want to use for scheduling tasks such as
backups and updates. The browser time zone is used for dashboards and events, if you set a different
zone.
• Color Theme—Select the color theme you want to use in the user interface.
Step 3 On the Password tab, you can enter a new password and click Change.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
12
Getting Started
Cabling for ASA 5508-X and 5516-X
Do not connect any of the inside interfaces to a network that has an active DHCP server. This will conflict
with the DHCP server already running on the inside interface . If you want to use a different DHCP server
for the network, disable the unwanted DHCP server after initial setup.
The following topics show how to cable the system for this topology when using the inside interfaces to
configure the device.
You can later configure FDM management access from other interfaces.
• Connect the outside network to the GigabitEthernet1/1 interface.
By default, the IP address is obtained using DHCP, but you can set a static address during initial
configuration.
• Connect other networks to the remaining interfaces.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
13
Getting Started
Cabling for ASA 5525-X, 5545-X, and 5555-X
You can later configure FDM management access from other interfaces.
• Connect the outside network to the GigabitEthernet 0/0 interface.
By default, the IP address is obtained using DHCP, but you can set a static address during initial
configuration.
• Connect other networks to the remaining interfaces.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
14
Getting Started
Cabling for Firepower 1010
You can later configure FDM management access from other interfaces.
• Connect the outside network to the Ethernet 1/1 interface.
By default, the IP address is obtained using DHCP, but you can set a static address during initial
configuration.
• Connect inside devices to the remaining switch ports, Ethernet 1/2 through 1/8.
Ethernet 1/7 and 1/8 are Power over Ethernet+ (PoE+) ports.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
15
Getting Started
Cabling for Firepower 1100
You can later configure FDM management access from other interfaces.
• Connect the outside network to the Ethernet1/1 interface (labeled WAN).
By default, the IP address is obtained using DHCP, but you can set a static address during initial
configuration.
• Connect other networks to the remaining interfaces.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
16
Getting Started
Cabling for Firepower 2100
You can later configure FDM management access from other interfaces.
• Connect the outside network to the Ethernet1/1 interface (labeled WAN).
By default, the IP address is obtained using DHCP, but you can set a static address during initial
configuration.
• Connect other networks to the remaining interfaces.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
17
Getting Started
Cabling for Firepower 4100
Perform initial FTD configuration on the logical device Management interface. You can later enable
management from any data interface. The FTD requires internet access for licensing and updates, and the
default behavior is to route management traffic to the gateway IP address you specified when you deployed
the FTD. If you want to route management traffic over the backplane to the data interfaces instead, you can
configure that setting in FDM later.
Cable the following interfaces for initial chassis setup, continued monitoring, and logical device use.
• Console port—Connect your management computer to the console port to perform initial setup of the
chassis. The Firepower 4100 includes an RS-232–to–RJ-45 serial console cable. You might need to use
a third party serial-to-USB cable to make the connection.
• Chassis Management port—Connect the chassis management port to your management network for
configuration and ongoing chassis management.
• FTD Logical device Management interface—You can choose any interface on the chassis for this purpose
other than the chassis management port, which is reserved for FXOS management.
• Data interfaces—Connect the data interfaces to your logical device data networks. You can configure
physical interfaces, EtherChannels, and breakout ports to divide up high-capacity interfaces.
For High Availability, use a Data interface for the failover/state link.
Note All interfaces other than the console port require SFP/SFP+/QSFP transceivers. See the hardware installation
guide for supported transceivers.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
18
Getting Started
Cabling for Firepower 9300
Perform initial FTD configuration on the logical device Management interface. You can later enable
management from any data interface. The FTD requires internet access for licensing and updates, and the
default behavior is to route management traffic to the gateway IP address you specified when you deployed
the FTD. If you want to route management traffic over the backplane to the data interfaces instead, you can
configure that setting in FDM later.
Cable the following interfaces for initial chassis setup, continued monitoring, and logical device use.
• Console port—Connect your management computer to the console port to perform initial setup of the
chassis. The Firepower 9300 includes an RS-232–to–RJ-45 serial console cable. You might need to use
a third party serial-to-USB cable to make the connection.
• Chassis Management port—Connect the chassis management port to your management network for
configuration and ongoing chassis management.
• Logical device Management interface—Use one or more interfaces to manage logical devices. You can
choose any interfaces on the chassis for this purpose other than the chassis management port, which is
reserved for FXOS management. Management interfaces can be shared among logical devices, or you
can use a separate interface per logical device. Typically, you share a management interface with all
logical devices, or if you use separate interfaces, put them on a single management network. But your
exact network requirements may vary.
• Data interfaces—Connect the data interfaces to your logical device data networks. You can configure
physical interfaces, EtherChannels, and breakout ports to divide up high-capacity interfaces. You can
cable multiple logical devices to the same networks or to different networks, as your network needs
dictate. All traffic must exit the chassis on one interface and return on another interface to reach another
logical device.
For High Availability, use a Data interface for the failover/state link.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
19
Getting Started
Virtual Cabling for Firepower Threat Defense Virtual
Note All interfaces other than the console port require SFP/SFP+/QSFP transceivers. See the hardware installation
guide for supported transceivers.
How VMware Network Adapters and Interfaces Map to Firepower Threat Defense Physical Interfaces
You can configure up to 10 interfaces for a VMware Firepower Threat Defense Virtual device. You must
configure a minimum of 4 interfaces.
Ensure that the Management0-0 source network is associated to a VM network that can access the Internet.
This is required so that the system can contact the Cisco Smart Software Manager and also to download system
database updates.
You assign the networks when you install the OVF. As long as you configure an interface, you can later
change the virtual network through the VMware Client. However, if you need to add a new interface, be sure
to add an interface at the end of the list; if you add or remove an interface anywhere else, then the hypervisor
will renumber your interfaces, causing the interface IDs in your configuration to line up with the wrong
interfaces.
The following table explains how the VMware network adapter and source interface map to the Firepower
Threat Defense Virtual physical interface names. For additional interfaces, the naming follows the same
pattern, increasing the relevant numbers by one. All additional interfaces are data interfaces. For more
information on assigning virtual networks to virtual machines, see the VMware online help.
Destination Network
Network Adapter Source Network (Physical Interface Name) Function
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
20
Getting Started
Cabling for ISA 3000
Destination Network
Network Adapter Source Network (Physical Interface Name) Function
• Connect GigabitEthernet 1/1 to an outside router, and GigabitEthernet 1/2 to an inside router.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
21
Getting Started
(Optional) Change Management Network Settings at the CLI
Note You do not need to use this procedure for the Firepower 4100/9300, because you set the IP address manually
when you deployed.
Note You cannot repeat the CLI setup script unless you clear the configuration; for example, by reimaging. However,
all of these settings can be changed later at the CLI using configure network commands. See the FTD
command reference.
Procedure
Step 1 Connect to the FTD console port. See Logging Into the Command Line Interface (CLI), on page 10 for more
information.
Step 2 Log in with the username admin and the password Admin123.
Step 3 The first time you log in to FTD, you are prompted to accept the End User License Agreement (EULA). You
are then presented with the CLI setup script.
Defaults or previously-entered values appear in brackets. To accept previously entered values, press Enter.
See the following guidelines:
• Enter the IPv4 default gateway for the management interface—If you set a manual IP address, enter
either data-interfaces or the IP address of the gateway router. The data-interfaces setting sends outgoing
management traffic over the backplane to exit a data interface. This setting is useful if you do not have
a separate Management network that can access the internet. Traffic originating on the Management
interface includes license registration and database updates that require internet access. If you use
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
22
Getting Started
Complete the Initial Configuration Using the Setup Wizard
data-interfaces, you can still use FDM on the Management interface if you are directly-connected to
the Management network, but for remote management on Management, you need to enter the IP address
of a gateway router on the Management network. Note that FDM management on data interfaces is not
affected by this setting. If you use DHCP, the system uses the gateway provided by DHCP and uses the
data-interfaces as a fallback method if DHCP doesn't provide a gateway.
• If your networking information has changed, you will need to reconnect—If you are connected with
SSH to the default IP address but you change the IP address at initial setup, you will be disconnected.
Reconnect with the new IP address and password. Console connections are not affected.
• Manage the device locally?—Enter yes to use FDM. A no answer means you intend to use the FMC
to manage the device.
Example:
>
Note The Firepower 4100/9300 and ISA 3000 do not support the setup wizard, so this procedure does not apply to
these models. For the Firepower 4100/9300, all initial configuration is set when you deploy the logical device
from the chassis. For the ISA 3000, a special default configuration is applied before shipping.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
23
Getting Started
Complete the Initial Configuration Using the Setup Wizard
Procedure
Step 3 Configure the following options for the outside and management interfaces and click Next.
Caution Your settings are deployed to the device when you click Next. The interface will be named “outside”
and it will be added to the “outside_zone” security zone. Ensure that your settings are correct.
Outside Interface
• Configure IPv4—The IPv4 address for the outside interface. You can use DHCP or manually enter a
static IP address, subnet mask, and gateway. You can also select Off to not configure an IPv4 address.
Do not configure an IP address on the same subnet as the default inside address (see Default Configuration
Prior to Initial Setup, on page 27), either statically or through DHCP. You cannot configure PPPoE using
the setup wizard. PPPoE may be required if the interface is connected to a DSL modem, cable modem,
or other connection to your ISP, and your ISP uses PPPoE to provide your IP address. You can configure
PPPoE after you complete the wizard. See Configure a Physical Interface, on page 226.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
24
Getting Started
Complete the Initial Configuration Using the Setup Wizard
• Configure IPv6—The IPv6 address for the outside interface. You can use DHCP or manually enter a
static IP address, prefix, and gateway. You can also select Off to not configure an IPv6 address.
Management Interface
• DNS Servers—The DNS server for the system's management address. Enter one or more addresses of
DNS servers for name resolution. The default is the OpenDNS public DNS servers, or the DNS servers
you obtain from the DHCP server. If you edit the fields and want to return to the default, click Use
OpenDNS to reload the appropriate IP addresses into the fields. Your ISP might require that you use
specific DNS servers. If after completing the wizard, you find that DNS resolution is not working, see
Troubleshooting DNS for the Management Interface, on page 726.
• Firewall Hostname—The hostname for the system's management address.
What to do next
• If you want to use features covered by optional licenses, such as category-based URL filtering, intrusion
inspection, or malware prevention, enable the required licenses. See Enabling or Disabling Optional
Licenses, on page 88.
• Connect the other data interfaces to distinct networks and configure the interfaces. For information on
configuring interfaces, see How to Add a Subnet, on page 70 and Interfaces, on page 221.
• If you are managing the device through the inside interface, and you want to open CLI sessions through
the inside interface, open the inside interface to SSH connections. See Configuring the Management
Access List, on page 672.
• Go through the use cases to learn how to use the product. See Best Practices: Use Cases for Firepower
Threat Defense, on page 43.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
25
Getting Started
What to Do if You Do Not Obtain an IP Address for the Outside Interface
Procedure
Step 1 Click Device, then click the link in the Interfaces summary.
Step 2 Mouse over the Actions column for the inside interface and click the edit icon ( ).
Step 3 On the IPv4 Address tab, enter a static address on a unique subnet, for example, 192.168.2.1/24 or
192.168.46.1/24. Note that the default management address is 192.168.45.45/24, so do not use that subnet.
You also have the option to use DHCP to obtain an address if you have a DHCP server already running on
the inside network. However, you must first click Delete in the DHCP SERVER IS DEFINED FOR THIS
INTERFACE group to remove the DHCP server from the interface.
Step 4 In the DHCP SERVER IS DEFINED FOR THIS INTERFACE area, click Edit and change the DHCP
pool to a range on the new subnet, for example, 192.168.2.5-192.168.2.254.
Step 5 Click OK to save the interface changes.
Step 6 Click the Deploy button in the menu to deploy your changes.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
26
Getting Started
Default Configuration Prior to Initial Setup
Note You can pre-configure many of these settings using the CLI setup ((Optional) Change Management Network
Settings at the CLI, on page 22) before you perform setup using the FDM wizard.
Password for admin user. Admin123 Yes. You must change the default
password.
Firepower 4100/9300: Set the password
when you deploy the logical device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
27
Getting Started
Default Configuration Prior to Initial Setup
DNS servers for the management interface. The OpenDNS public DNS servers, Yes
208.67.220.220 and 208.67.222.222. DNS
servers obtained from DHCP are never
used.
Firepower 4100/9300: Set the DNS servers
when you deploy the logical device.
DHCP server for inside clients. Running on the inside interface with the No.
address pool 192.168.1.5 - 192.168.1.254.
Firepower 4100/9300: No DHCP server
enabled.
ISA 3000: No DHCP server enabled.
Firepower Threat Defense Virtual: The
address pool on the inside interface is
192.168.45.46 - 192.168.45.254.
DHCP auto-configuration for inside clients. Enabled on outside interface. Yes, but indirectly. If you configure a static
(Auto-configuration supplies clients with IPv4 address for the outside interface,
addresses for WINS and DNS servers.) DHCP server auto-configuration is
disabled.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
28
Getting Started
Configuration After Initial Setup
Firepower 4100 series Data interfaces are not pre-configured. Data interfaces are not pre-configured.
Firepower 9300 appliance Data interfaces are not pre-configured. Data interfaces are not pre-configured.
Note The Firepower 4100/9300 and ISA 3000 do not support the setup wizard. For the Firepower 4100/9300, all
initial configuration is set when you deploy the logical device from the chassis. For the ISA 3000, a special
default configuration is applied before shipping.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
29
Getting Started
Configuration After Initial Setup
Management gateway. The data interfaces on the device. Typically the outside interface Default.
becomes the route to the Internet. The management gateway works
for from-the-device traffic only. If the device receives a default
gateway from the DHCP server, then that gateway is used.
Firepower 4100/9300: The gateway IP address you set when you
deployed the logical device.
ISA 3000: 192.168.45.1
Firepower Threat Defense Virtual: 192.168.45.1
DNS servers for the The OpenDNS public DNS servers, 208.67.220.220 and Explicit.
management interface. 208.67.222.222, or whatever you entered. DNS servers obtained
from DHCP are never used.
Firepower 4100/9300: The DNS servers you set when you
deployed the logical device.
Management access through A data interface management access list rule allows HTTPS access Implied.
data interfaces. through the inside interface. SSH connections are not allowed.
Both IPv4 and IPv6 connections are allowed.
Firepower 4100/9300: No data interfaces have default
management access rules.
ISA 3000: No data interfaces have default management access
rules.
Firepower Threat Defense Virtual: No data interfaces have default
management access rules.
System time. The time zone and NTP servers you selected. Explicit.
Firepower 4100/9300: System time is inherited from the chassis.
ISA 3000: Cisco NTP servers: 0.sourcefire.pool.ntp.org,
1.sourcefire.pool.ntp.org, 2.sourcefire.pool.ntp.org.
Smart license. Either registered with a base license, or the evaluation period Explicit.
activated, whichever you selected.
Subscription licenses are not enabled. Go to the smart licensing
page to enable them.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
30
Getting Started
Configuration After Initial Setup
DHCP server for inside clients. Running on the inside interface with the address pool 192.168.1.5 Default.
- 192.168.1.254.
Firepower 4100/9300: No DHCP server enabled.
ISA 3000: No DHCP server enabled.
Firepower Threat Defense Virtual: The address pool on the inside
interface is 192.168.45.46 - 192.168.45.254.
DHCP auto-configuration for Enabled on outside interface if you use DHCP to obtain the outside Explicit, but indirectly.
inside clients. interface IPv4 address.
(Auto-configuration supplies
If you use static addressing, DHCP auto-configuration is disabled.
clients with addresses for WINS
and DNS servers.)
Outside physical interface and The default outside port based on the device model. See Default Interface is Default.
IP address. Configuration Prior to Initial Setup, on page 27.
Addressing is Explicit.
The IP address is obtained by DHCP, or it is a static address as
entered (IPv4, IPv6, or both).
Firepower 4100/9300: Data interfaces are not pre-configured.
ISA 3000: None. You must set the BVI1 IP address manually.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
31
Getting Started
Configuration Basics
Static routes. If you configure a static IPv4 or IPv6 address for the outside Implied.
interface, a static default route is configured for IPv4/IPv6 as
appropriate, pointing to the gateway you defined for that address
type. If you select DHCP, the default route is obtained from the
DHCP server.
Network objects are also created for the gateway and the "any"
address, that is, 0.0.0.0/0 for IPv4, ::/0 for IPv6.
Security zones. inside_zone, containing the inside interfaces. For the Firepower Implied.
4100/9300, you need to add interfaces manually to this security
zone.
outside_zone, containing the outside interfaces. For the Firepower
4100/9300, you need to add interfaces manually to this zone.
(You can edit these zones to add other interfaces, or create your
own zones.)
Access control policy. A rule trusting all traffic from the inside_zone to the outside_zone. Implied.
This allows without inspection all traffic from users inside your
network to get outside, and all return traffic for those connections.
The default action for any other traffic is to block it. This prevents
any traffic initiated from outside to enter your network.
Firepower 4100/9300: There are no pre-configured access rules.
ISA 3000: A rule trusting all traffic from the inside_zone to the
outside_zone, and a rule trusting all traffic from the outside_zone
to the inside_zone. Traffic is not blocked. The device also has
rules trusting all traffic between the interfaces in the inside_zone
and in the outside_zone. This allows without inspection all traffic
between users on the inside, and between users on the outside.
NAT An interface dynamic PAT rule translates the source address for Implied.
any IPv4 traffic destined to the outside interface to a unique port
on the outside interface's IP address.
There are additional hidden PAT rules to enable HTTPS access
through the inside interfaces, and routing through the data
interfaces for the management address. These do not appear in
the NAT table, but you will see them if you use the show nat
command in the CLI.
Firepower 4100/9300: NAT is not pre-configured.
ISA 3000: NAT is not pre-configured.
Configuration Basics
The following topics explain the basic methods for configuring the device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
32
Getting Started
Configuring the Device
Procedure
Step 2 Click the links in each group to configure the settings or perform the actions.
Following is a summary of the groups:
• Interface—You should have at least two data interfaces configured in addition to the management
interface. See Interfaces, on page 221.
• Routing—The routing configuration. You must define a default route. Other routes might be necessary
depending on your configuration. See Routing, on page 277.
• Updates—Geolocation, intrusion rule, and vulnerability database updates, and system software upgrades.
Set up a regular update schedule to ensure that you have the latest database updates if you use those
features. You can also go to this page if you need to download an update before the regularly schedule
update occurs. See Updating System Databases and Feeds, on page 697.
• System Settings—This group includes a variety of settings. Some are basic settings that you would
configure when you initially set up the device and then rarely change. See System Settings, on page 671.
• Smart License—Shows the current state of the system licenses. You must install the appropriate licenses
to use the system. Some features require additional licenses. See Licensing the System, on page 83.
• Backup and Restore—Back up the system configuration or restore a previous backup. See Backing Up
and Restoring the System, on page 703.
• Troubleshoot—Generate a troubleshooting file at the request of the Cisco Technical Assistance Center.
See Creating a Troubleshooting File, on page 731.
• Site-to-Site VPN—The site-to-site virtual private network (VPN) connections between this device and
remote devices. See Managing Site-to-Site VPNs, on page 566.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
33
Getting Started
Configuring Security Policies
• Remote Access VPN—The remote access virtual private network (VPN) configuration that allows
outside clients to connect to your inside network. See Configuring Remote Access VPN, on page 606.
• Advanced Configuration—Use FlexConfig and Smart CLI to configure features that you otherwise
cannot configure using Firepower Device Manager. See Advanced Configuration, on page 739.
• Device Administration—View the audit log or export a copy of the configuration. See Auditing and
Change Management, on page 708.
Step 3 Click the Deploy button in the menu to deploy your changes.
Changes are not active on the device until you deploy them. See Deploying Your Changes, on page 35.
What to do next
Click Policies in the main menu and configure the security policy for the system. You can also click Objects
to configure the objects needed in those policies.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
34
Getting Started
Searching for Rules or Objects
so that the Security Intelligence block lists update dynamically. Using feeds, you do not need to edit the
policy to add or remove items in the block lists. See Configuring Security Intelligence, on page 419.
• NAT (Network Address Translation)—Use the NAT policy to convert internal IP addresses to externally
routeable addresses. See Configure NAT, on page 484.
• Access Control—Use the access control policy to determine which connections are allowed on the
network. You can filter by security zone, IP address, protocol, port, application, URL, user or user group.
You also apply intrusion and file (malware) policies using access control rules. Use this policy to
implement URL filtering. See Configuring the Access Control Policy, on page 434.
• Intrusion—Use the intrusion policies to inspect for known threats. Although you apply intrusion policies
using access control rules, you can edit the intrusion policies to selectively enable or disable specific
intrusion rules. See Intrusion Policies, on page 463.
Step 3 Click the Deploy button in the menu to deploy your changes.
Changes are not active on the device until you deploy them. See Deploying Your Changes, on page 35.
This process gives you the opportunity to make a group of related changes without forcing you to run a device
in a “partially configured” manner. In most cases, the deployment includes just your changes. However, if
necessary, the system will reapply the entire configuration, which might be disruptive to your network. In
addition, some changes require inspection engines to restart, with traffic dropping during the restart. Thus,
consider deploying changes when potential disruptions will have the least impact.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
35
Getting Started
Deploying Your Changes
Note If the deployment job fails, the system must roll back any partial changes to the previous configuration.
Rollback includes clearing the data plane configuration and redeploying the previous version. This will disrupt
traffic until the rollback completes.
After you complete the changes you want to make, use the following procedure to deploy them to the device.
Caution The Firepower Threat Defense device using the Firepower Device Manager drops traffic when the inspection
engines are busy because of a software resource issue, or down because a configuration requires the engines
to restart during configuration deployment. For detailed information on changes that require a restart, see
Configuration Changes that Restart Inspection Engines, on page 37.
Procedure
Step 1 Click the Deploy Changes icon in the upper right of the web page.
The icon is highlighted with a dot when there are undeployed changes.
The Pending Changes window shows a comparison of the deployed version of the configuration with the
pending changes. These changes are color-coded to indicate removed, added, or edited elements. See the
legend in the window for an explanation of the colors.
If the deployment requires that inspection engines be restarted, the page includes a message that provides
detail on what changed that requires a restart. If momentary traffic loss at this time would be unacceptable,
close the dialog box and wait until a better time to deploy changes.
If the icon is not highlighted, you can still click it to see the date and time of the last successful deployment
job. There is also a link to show you the deployment history, which takes you to the audit page filtered to
show deployment jobs only.
Step 2 If you are satisfied with the changes, you can click Deploy Now to start the job immediately.
The window will show that the deployment is in progress. You can close the window, or wait for deployment
to complete. If you close the window while deployment is in progress, the job does not stop. You can see
results in the task list or audit log. If you leave the window open, click the Deployment History link to view
the results.
Optionally, you can do the following:
• Name the Job—To name the deployment job, click the drop-down arrow on the Deploy Now button
and select Name the Deployment Job. Enter a name, then click Deploy. The name will appear in the
audit and deployment history as part of the job, which might make it easier for you to find the job.
For example, if you name a job “DMZ Interface Configuration,” a successful deployment will be named
“Deployment Completed: DMZ Interface Configuration.” In addition, the name is used as the Event
Name in Task Started and Task Completed events related to the deployment job.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
36
Getting Started
Configuration Changes that Restart Inspection Engines
• Discard Changes—To discard all pending changes, click More Options > Discard All. You are prompted
for confirmation.
• Copy Changes—To copy the list of changes to the clipboard, click More Options > Copy to Clipboard.
This option works only if there are fewer than 500 changes.
• Download Changes—To download the list of changes as a file, click More Options > Download as
Text. You are prompted to save the file to your workstation. The file is in YAML format. You can view
it in a text editor if you do not have an editor that specifically supports YAML format.
Caution When you deploy, resource demands may result in a small number of packets dropping without inspection.
Additionally, deploying some configurations requires inspection engines to restart, which interrupts traffic
inspection and drops traffic.
Deployment
Some changes require that inspection engines be restarted, which will result in momentary traffic loss. Following
are the changes that require inspection engine restart:
• SSL decryption policy is enabled or disabled.
• The MTU changed on one or more physical interfaces (but not subinterfaces).
• You add or remove a file policy on an access control rule.
• The VDB was updated.
• Creating or breaking the high availability configuration.
In addition, some packets might be dropped during deployment if the Snort process is busy, with the total
CPU utilization exceeding 60%. You can check the current CPU utilization for Snort using the show asp
inspect-dp snort command.
System Updates
Installing a system update or patch that does not reboot the system and includes a binary change requires
inspection engines to restart. Binary changes can include changes to inspection engines, a preprocessor, the
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
37
Getting Started
Viewing Interface and Management Status
vulnerability database (VDB), or a shared object rule. Note also that a patch that does not include a binary
change can sometimes require a Snort restart.
Note The interface portion of the graphic, including interface status information, is also available on the Interfaces
page and the Monitoring > System dashboard.
Interface Status
Mouse over a port to see its IP addresses, and enabled and link statuses. The IP addresses can be statically
assigned or obtained using DHCP. Mousing over a Bridge Virtual Interface (BVI) also shows the list of
member interfaces.
Interface ports use the following color coding:
• Green—The interface is configured, enabled, and the link is up.
• Gray—The interface is not enabled.
• Orange/Red—The interface is configured and enabled, but the link is down. If the interface is wired, this
is an error condition that needs correction. If the interface is not wired, this is the expected status.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
38
Getting Started
Viewing System Task Status
Procedure
The task list opens, displaying the status and details of system tasks.
• Click the delete icon ( ) for a task to remove it from the list.
• Click Remove All Completed Tasks to empty the list of all tasks that are not in progress.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
39
Getting Started
Using the CLI Console to Monitor and Test the Configuration
You can keep the CLI Console open as you move from page to page, configure, and deploy features. For
example, after deploying a new static route, you could use ping in the CLI Console to verify that the target
network is reachable.
The CLI Console uses the base FTD CLI. You cannot enter the diagnostic CLI, expert mode, or FXOS CLI
(on models that use FXOS) using the CLI Console. Use SSH if you need to enter those other CLI modes.
For detailed information on commands, see Cisco Firepower Threat Defense Command Reference,
https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_
Firepower_Threat_Defense.html.
Notes:
• Although ping is supported in CLI Console, the ping system command is not supported.
• The system can process at most 2 concurrent commands. Thus, if another user is issuing commands (for
example, using the REST API), you might need to wait for other commands to complete before entering
a command. If this is a persistent problem, use an SSH session instead of the CLI Console.
• Commands return information based on the deployed configuration. If you make a configuration change
in FDM, but do not deploy it, you will not see the results of your change in the command output. For
example, if you create a new static route but do not deploy it, that route will not appear in show route
output.
Procedure
Step 1 Click the CLI Console button in the upper right of the web page.
• Click the Expand ( ) or Collapse ( ) button to make the window bigger or smaller.
• Click the Undock Into Separate Window ( ) button to detach the window from the web page into its
own browser window. To dock it again, click the Dock to Main Window ( ) button.
• Click and drag to highlight text, then press Ctrl+C to copy output to the clipboard.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
40
Getting Started
Using Firepower Device Manager and the REST API Together
• Click the Copy Last Output ( ) button to copy the output from the last command you entered to the
clipboard.
Step 3 When you are finished, simply close the console window. Do not use the exit command.
Although the credentials you use to log into Firepower Device Manager validate your access to the CLI, you
are never actually logged into the CLI when using the console.
You can view, and try out, the API methods using API Explorer. Click the more options button ( ) and choose
API Explorer.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
41
Getting Started
Using Firepower Device Manager and the REST API Together
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
42
CHAPTER 2
Best Practices: Use Cases for Firepower Threat
Defense
The following topics explain some common tasks you might want to accomplish with Firepower Threat
Defense using Firepower Device Manager. These use cases assume that you completed the device configuration
wizard and that you retained this initial configuration. Even if you modified the initial configuration, you
should be able to use these examples to understand how to use the product.
• How to Configure the Device in Firepower Device Manager, on page 43
• How to Gain Insight Into Your Network Traffic, on page 48
• How to Block Threats, on page 55
• How to Block Malware, on page 60
• How to Implement an Acceptable Use Policy (URL Filtering), on page 62
• How to Control Application Usage, on page 67
• How to Add a Subnet, on page 70
• How to Passively Monitor the Traffic on a Network, on page 75
• More Examples, on page 80
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
43
Best Practices: Use Cases for Firepower Threat Defense
How to Configure the Device in Firepower Device Manager
The following steps provide an overview of additional features you might want to configure. Please click the
help button (?) on a page to get detailed information about each step.
Procedure
Step 1 Choose Device, then click View Configuration in the Smart License group.
Click Enable for each of the optional licenses you want to use: Threat, Malware, URL. Read the explanation
of each license if you are unsure of whether you need it.
If you have not registered, you can do so from this page. Click Register Device and follow the instructions.
Please register before the evaluation license expires.
For example, an enabled Threat license should look like the following:
Step 2 If you wired other interfaces, choose Device, then click the link in the Interfaces summary, and then click
the interfaces type to view the list of interfaces.
• For the Firepower 4100/9300, no data interfaces are pre-configured with names, IP addresses, or security
zones, so you need to enable and configure any interfaces that you want to use.
• Because the ISA 3000 comes pre-configured with a bridge group containing all data interfaces, there is
no need to configure these interfaces. However, you must manually configure an IP address for the BVI.
If you want to break apart the bridge group, you can edit it to remove the interfaces you want to treat
separately. Then you can configure those interfaces as hosting separate networks.
For other models, you can create a bridge group for the other interfaces, or configure separate networks,
or some combination of both.
• For the Firepower 1010, all interfaces except for Ethernet1/1 (outside) are access mode switch ports
assigned to VLAN1 (inside). You can change switch ports to be firewall ports; add new VLAN interfaces
and assign switch ports to them; or configure trunk mode switch ports.
Click the edit icon ( ) for each interface to define the IP address and other settings.
The following example configures an interface to be used as a “demilitarized zone” (DMZ), where you place
publically-accessible assets such as your web server. Click Save when you are finished.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
44
Best Practices: Use Cases for Firepower Threat Defense
How to Configure the Device in Firepower Device Manager
Step 3 If you configured new interfaces, choose Objects, then select Security Zones from the table of contents.
Edit or create new zones as appropriate. Each interface must belong to a zone, because you configure policies
based on security zones, not interfaces. You cannot put the interfaces in zones when configuring them, so you
must always edit the zone objects after creating new interfaces or changing the purpose of existing interfaces.
The following example shows how to create a new dmz-zone for the dmz interface.
Step 4 If you want internal clients to use DHCP to obtain an IP address from the device, choose Device, then System
Settings > DHCP Server. Select the DHCP Servers tab.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
45
Best Practices: Use Cases for Firepower Threat Defense
How to Configure the Device in Firepower Device Manager
There is already a DHCP server configured for the inside interface, but you can edit the address pool or even
delete it. If you configured other inside interfaces, it is very typical to set up a DHCP server on those interfaces.
Click + to configure the server and address pool for each inside interface.
You can also fine-tune the WINS and DNS list supplied to clients on the Configuration tab.
The following example shows how to set up a DHCP server on the inside2 interface with the address pool
192.168.4.50-192.168.4.240.
Step 5 Choose Device, then click View Configuration in the Routing group and configure a default route.
The default route normally points to the upstream or ISP router that resides off the outside interface. A default
IPv4 route is for any-ipv4 (0.0.0.0/0), whereas a default IPv6 route is for any-ipv6 (::0/0). Create routes for
each IP version you use. If you use DHCP to obtain an address for the outside interface, you might already
have the default routes that you need.
The routes you define on this page are for the data interfaces only. They do not impact the management
interface. Set the management gateway on System Settings > Management Interface.
The following example shows a default route for IPv4. In this example, isp-gateway is a network object that
identifies the IP address of the ISP gateway (you must obtain the address from your ISP). You can create this
object by clicking Create New Network at the bottom of the Gateway drop-down list.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
46
Best Practices: Use Cases for Firepower Threat Defense
How to Configure the Device in Firepower Device Manager
Step 6 Choose Policies and configure the security policies for the network.
The device setup wizard enables traffic flow between the inside-zone and outside-zone, and interface NAT
for all interfaces when going to the outside interface. Even if you configure new interfaces, if you add them
to the inside-zone object, the access control rule automatically applies to them.
However, if you have multiple inside interfaces, you need an access control rule to allow traffic flow from
inside-zone to inside-zone. If you add other security zones, you need rules to allow traffic to and from those
zones. These would be your minimum changes.
In addition, you can configure other policies to provide additional services, and fine-tune NAT and access
rules to get the results that your organization requires. You can configure the following policies:
• SSL Decryption—If you want to inspect encrypted connections (such as HTTPS) for intrusions, malware,
and so forth, you must decrypt the connections. Use the SSL decryption policy to determine which
connections need to be decrypted. The system re-encrypts the connection after inspecting it.
• Identity—If you want to correlate network activity to individual users, or control network access based
on user or user group membership, use the identity policy to determine the user associated with a given
source IP address.
• Security Intelligence—Use the Security Intelligence policy to quickly drop connections from or to
selected IP addresses or URLs. By blocking known bad sites, you do not need to account for them in
your access control policy. Cisco provides regularly updated feeds of known bad addresses and URLs
so that the Security Intelligence block lists update dynamically. Using feeds, you do not need to edit the
policy to add or remove items in the block lists.
• NAT (Network Address Translation)—Use the NAT policy to convert internal IP addresses to externally
routeable addresses.
• Access Control—Use the access control policy to determine which connections are allowed on the
network. You can filter by security zone, IP address, protocol, port, application, URL, user or user group.
You also apply intrusion and file (malware) policies using access control rules. Use this policy to
implement URL filtering.
• Intrusion—Use the intrusion policies to inspect for known threats. Although you apply intrusion policies
using access control rules, you can edit the intrusion policies to selectively enable or disable specific
intrusion rules.
The following example shows how to allow traffic between the inside-zone and dmz-zone in the access control
policy. In this example, no options are set on any of the other tabs except for Logging, where At End of
Connection is selected.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
47
Best Practices: Use Cases for Firepower Threat Defense
How to Gain Insight Into Your Network Traffic
The initial access rule can provide some insight into traffic, including policies, destinations, and security
zones. But to obtain user information, you need to configure an identity policy that requires users to authenticate
(identify) themselves. To obtain information on applications used on the network, you need to make some
additional adjustments.
The following procedure explains how to set up the Firepower Threat Defense device to monitor traffic and
provides an overview of the end-to-end process of configuring and monitoring policies.
Note This procedure does not provide insight into the web site categories and reputations of sites visited by users,
so you cannot see meaningful information in the URL categories dashboard. You must implement
category-based URL filtering, and enable the URL license, to obtain category and reputation data. If you just
want to obtain this information, you can add a new access control rule that allows access to an acceptable
category, such as Finance, and make it the first rule in the access control policy. For details on implementing
URL filtering, see How to Implement an Acceptable Use Policy (URL Filtering), on page 62.
Procedure
Step 1 To gain insight into user behavior, you need to configure an identity policy to ensure that the user associated
with a connection is identified.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
48
Best Practices: Use Cases for Firepower Threat Defense
How to Gain Insight Into Your Network Traffic
By enabling the identity policy, you can collect information about who is using the network, and what resources
they are using. This information is available in the User monitoring dashboard. User information is also
available for connection events shown in Event Viewer.
In this example, we will implement active authentication to acquire user identity. With active authentication,
the device prompts the user for username and password. Users are authenticated only when they use a web
browser for HTTP connections.
If a user fails to authenticate, the user is not prevented from making web connections. This just means that
you do not have user identity information for the connections. If you want, you can create an access control
rule to drop traffic for Failed Authentication users.
a) Click Policies in the main menu, then click Identity.
The identity policy is initially disabled. When using active authentication, the identity policy uses your
Active Directory server to authenticate users and associate them with the IP address of the workstation
they are using. Subsequently, the system will identify traffic for that IP address as being the user's traffic.
b) Click Enable Identity Policy.
c) Click the Create Identity Rule button, or the + button, to create the rule to require active authentication.
In this example, we will assume you want to require authentication for everyone.
d) Enter a Name for the rule, which can be anything you choose, for example, Require_Authentication.
e) On the Source/Destination tab, leave the defaults, which apply to Any criteria.
You can constrain the policy as you see fit to a more limited set of traffic. However, active authentication
will only be attempted for HTTP traffic, so it does not matter that non-HTTP traffic matches the
source/destination criteria. For more details about identity policy properties, see Configure Identity Rules,
on page 410
f) For Action, select Active Auth.
Assuming you have not configured the identity policy settings, the Identity Policy Configuration dialog
box will open because there are some undefined settings.
g) Configure the Captive Portal and SSL Decryption settings that are required for active authentication.
When an identity rule requires active authentication for a user, the user is redirected to the captive portal
port on the interface through which they are connected and then they are prompted to authenticate. Captive
portal requires SSL decryption rules, which the system will generate automatically, but you must select
the certificate to use for the SSL decryption rules.
• Server Certificate—Select the internal certificate to present to users during active authentication.
You can select the predefined self-signed DefaultInternalCertificate, or you can click Create New
Internal Certificate and upload a certificate that your browsers already trust.
Users will have to accept the certificate if you do not upload a certificate that their browsers already
trust.
• Port—The captive portal port. The default is 885 (TCP). If you configure a different port, it must
be in the range 1025-65535.
• Decrypt Re-Sign Certificate—Select the internal CA certificate to use for rules that implement
decryption with re-signed certificates. You can use the pre-defined NGFW-Default-InternalCA
certificate (the default), or one that you created or uploaded. If the certificate does not yet exist, click
Create Internal CA to create it. (You are prompted for the decrypt re-sign certificate only if you
have not yet enabled the SSL decryption policy.)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
49
Best Practices: Use Cases for Firepower Threat Defense
How to Gain Insight Into Your Network Traffic
If you have not already installed the certificate in client browsers, click the download button ( ) to
obtain a copy. See the documentation for each browser for information on how to install the certificate.
Also see Downloading the CA Certificate for Decrypt Re-Sign Rules, on page 399.
Example:
The Identity Policy Configuration dialog box should now look like the following.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
50
Best Practices: Use Cases for Firepower Threat Defense
How to Gain Insight Into Your Network Traffic
• Type—The type of directory server. Active Directory is the only supported type, and you cannot
change this field.
• Directory Username, Directory Password—The distinguished username and password for a user
with appropriate rights to the user information you want to retrieve. For Active Directory, the user
does not need elevated privileges. You can specify any user in the domain. The username must be
fully qualified; for example, Administrator@example.com (not simply Administrator).
Note The system generates ldap-login-dn and ldap-login-password from this information. For
example, Administrator@example.com is translated as
cn=adminisntrator,cn=users,dc=example,dc=com. Note that cn=users is always part of this
translation, so you must configure the user you specify here under the common name
“users” folder.
• Base DN—The directory tree for searching or querying user and group information, that is, the
common parent for users and groups. For example, dc=example,dc=com. For information on finding
the base DN, see Determining the Directory Base DN, on page 153.
• AD Primary Domain— The fully qualified Active Directory domain name that the device should
join. For example, example.com.
• Hostname/IP Address—The hostname or IP address of the directory server. If you use an encrypted
connection to the server, you must enter the fully-qualified domain name, not the IP address.
• Port—The port number used for communications with the server. The default is 389. Use port 636
if you select LDAPS as the encryption method.
• Encryption—To use an encrypted connection for downloading user and group information, select
the desired method, STARTTLS or LDAPS. The default is None, which means that user and group
information is downloaded in clear text.
• STARTTLS negotiates the encryption method, and uses the strongest method supported by the
directory server. Use port 389. This option is not supported if you use the realm for remote
access VPN.
• LDAPS requires LDAP over SSL. Use port 636.
• Trusted CA Certificate—If you select an encryption method, upload a Certificate Authority (CA)
certificate to enable a trusted connection between the system and the directory server. If you are
using a certificate to authenticate, the name of the server in the certificate must match the server
Hostname / IP Address. For example, if you use 10.10.10.250 as the IP address but ad.example.com
in the certificate, the connection fails.
Example:
For example, the following image shows how to create an unencrypted connection for the ad.example.com
server. The primary domain is example.com, and the directory username is Administrator@ad.example.com.
All user and group information is under the Distinguished Name (DN) ou=user,dc=example,dc=com.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
51
Best Practices: Use Cases for Firepower Threat Defense
How to Gain Insight Into Your Network Traffic
Step 2 Change the action on the Inside_Outside_Rule access control rule to Allow.
The Inside_Outside_Rule access rule is created as a trust rule. However, trusted traffic is not inspected, so
the system cannot learn about some of the characteristics of trusted traffic, such as application, when the traffic
matching criteria does not include application or other conditions besides zone, IP address, and port. If you
change the rule to allow rather than trust traffic, the system fully inspects the traffic.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
52
Best Practices: Use Cases for Firepower Threat Defense
How to Gain Insight Into Your Network Traffic
Note ( ISA 3000.) Also consider changing the Outside_Inside_Rule, Inside_Inside_Rule and
Outside_Outside_Rule from Trust to Allow.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
53
Best Practices: Use Cases for Firepower Threat Defense
How to Gain Insight Into Your Network Traffic
e) Click Save.
Step 5 Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
What to do next
At this point, the monitoring dashboards and events should start showing information about users and
applications. You can evaluate this information for undesirable patterns and develop new access rules to
constrain unacceptable use.
If you want to start collecting information about intrusions and malware, you need to enable intrusion and
file policies on one or more access rule. You also need to enable the licenses for those features.
If you want to start collecting information about URL categories, you must implement URL filtering.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
54
Best Practices: Use Cases for Firepower Threat Defense
How to Block Threats
Procedure
Step 1 If you have not already done so, enable the Threat license.
You must enable the Threat license to use intrusion policies and Security Intelligence. If you are currently
using the evaluation license, you are enabling an evaluation version of the license. If you have registered the
device, you must purchase the required license and add it to your Smart Software Manager account on
Cisco.com.
a) Click Device.
b) Click View Configuration in the Smart License group.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
55
Best Practices: Use Cases for Firepower Threat Defense
How to Block Threats
Determine which rules cover traffic that should be scanned for threats. For this example, we will add intrusion
inspection to the Inside_Outside_Rule.
a) Click Policies in the main menu.
Ensure that the Access Control policy is displayed.
b) Hover over the Actions cell on the right side of the Inside_Outside_Rule row to expose the edit and delete
icons, and click the edit icon ( ) to open the rule.
c) If you have not already done so, select Allow for the Action.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
56
Best Practices: Use Cases for Firepower Threat Defense
How to Block Threats
Step 3 (Optional.) Go to Policies > Intrusion, click the gear icon, and configure a syslog server for the intrusion
policy.
Intrusion events do not use the syslog server configured for the access control rule.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
57
Best Practices: Use Cases for Firepower Threat Defense
How to Block Threats
e) Click Save.
Step 5 Configure the Security Intelligence policy to preemptively drop connections with known bad hosts and sites.
By using Security Intelligence to block connections with hosts or sites that are known to be threats, you save
your system the time needed to do deep packet inspection to identify threats in each connection. Security
Intelligence provides an early block of undesirable traffic, leaving more system time to handle the traffic you
really care about.
a) Click Device, then click View Configuration in the Updates group.
b) Click Update Now in the Security Intelligence Feeds group.
c) Also, click Configure and set a recurring update for the feeds. The default, Hourly, is appropriate for
most networks but you can decrease the frequency if necessary.
d) Click Policies, then click the Security Intelligence policy.
e) Click Enable Security Intelligence if you have not already enabled the policy.
f) On the Network tab, click + in the block/drop list, and select all of the feeds on the Network Feeds tab.
You can click the i button next to a feed to read a description of each feed.
If you see a message that there are no feeds yet, please try again later. The feeds download has not yet
completed. If this problem persists, ensure that there is a path between the management IP address and
the Internet.
g) Click OK to add the selected feeds.
If you know of additional bad IP addresses, you can click + > Network Objects and add the objects that
contain the addresses. You can click Create New Network Object at the bottom of the list to add them
now.
h) Click the URL tab, then click + > URL Feeds in the block/drop list, and select all of the URL feeds. Click
OK to add them to the list.
Similar to the network list, you can add your own URL objects to the list to block additional sites that are
not in the feeds. Click + > URL Objects. You can add new objects by clicking Create New URL Object
at the end of the list.
i) Click the gear icon, and enable Connection Events Logging, to enable the policy to generate Security
Intelligence events for matched connections. Click OK to save your changes.
If you do not enable connection logging, you will have no data to use to evaluate whether the policy is
performing to expectations. If you have an external syslog server defined, you can select it now so that
the events are also sent to that server.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
58
Best Practices: Use Cases for Firepower Threat Defense
How to Block Threats
j) As needed, you can add network or URL objects to the Do Not Block list on each tab to create exceptions
to the blocked list.
The Do Not Block lists are not real "allow" lists. They are exception lists. If an address or URL in the
exception list also appears in the blocked list, the connection for the address or URL is allowed to pass
on to the access control policy. This way, you can block a feed, but if you later find that a desirable address
or site is being blocked, you can use the exception list to override that block without needing to remove
the feed entirely. Keep in mind that these connections are subsequently evaluated by access control, and
if configured, an intrusion policy. Thus, if any connections do contain threats, they can be identified and
blocked during intrusion inspection.
Use the Access and SI Rules dashboard, and the Security Intelligence view in the Event Viewer, to
determine what traffic is actually being dropped by the policy, and whether you need to add addresses or
URLs to the Do Not Block lists.
What to do next
At this point, the monitoring dashboards and events should start showing information about attackers, targets,
and threats, if any intrusions are identified. You can evaluate this information to determine if your network
needs more security precautions, or if you need to reduce the level of intrusion policy you are using.
For Security Intelligence, you can see policy hits on the Access and SI Rules dashboard. You can also see
Security Intelligence events in the Event Viewer. Security Intelligence blocks are not reflected in intrusion
threat information, because the traffic is blocked before it can be inspected.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
59
Best Practices: Use Cases for Firepower Threat Defense
How to Block Malware
Procedure
Step 1 If you have not already done so, enable the Malware license.
You must enable the Malware license to use file policies for malware control. If you are currently using the
evaluation license, you are enabling an evaluation version of the license. If you have registered the device,
you must purchase the required license and add it to your Smart Software Manager account on Cisco.com.
a) Click Device.
b) Click View Configuration in the Smart License group.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
60
Best Practices: Use Cases for Firepower Threat Defense
How to Block Malware
f) Click the Logging tab and verify that Log Files under File Events is selected.
By default, file logging is enabled whenever you select a file policy. You must enable file logging to get
file and malware information in events and dashboards.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
61
Best Practices: Use Cases for Firepower Threat Defense
How to Implement an Acceptable Use Policy (URL Filtering)
What to do next
At this point, the monitoring dashboards and events should start showing information about file types and file
and malware events, if any files or malware are transmitted. You can evaluate this information to determine
if your network needs more security precautions related to file transmissions.
Procedure
Step 1 If you have not already done so, enable the URL license.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
62
Best Practices: Use Cases for Firepower Threat Defense
How to Implement an Acceptable Use Policy (URL Filtering)
You must enable the URL license to use URL category and reputation information, or to see the information
in dashboards and events. If you are currently using the evaluation license, you are enabling an evaluation
version of the license. If you have registered the device, you must purchase the required license and add it to
your Smart Software Manager account on Cisco.com.
a) Click Device.
b) Click View Configuration in the Smart License group.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
63
Best Practices: Use Cases for Firepower Threat Defense
How to Implement an Acceptable Use Policy (URL Filtering)
d) On the Source/Destination tab, click + for Source > Zones, select inside_zone, then click OK in the
zones dialog box.
Adding any of the criteria works the same way. Clicking + opens a little dialog box, where you click the
items you want to add. You can click multiple items, and clicking a selected item de-selects it; the check
marks indicate the selected items. But nothing is added to the policy until you click the OK button; simply
selecting the items is not sufficient.
e) Using the same technique, select outside_zone for Destination > Zones.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
64
Best Practices: Use Cases for Firepower Threat Defense
How to Implement an Acceptable Use Policy (URL Filtering)
h) To implement reputation-sensitive blocking for the Social Networking category, click Reputation: Risk
Any for that category, deselect Any, then move the slider to Questionable. Click away from the slider
to close it.
The left of the reputation slider indicates sites that will be allowed, the right side are sites that will be
blocked. In this case, only Social Networking sites with reputations in the Questionable and Untrusted
ranges will be blocked. Thus, your users should be able to get to commonly-used Social Networking sites,
where there are fewer risks.
Using reputation, you can selectively block sites within a category you otherwise want to allow.
i) Click the + next to the URLS list to the left of the categories list.
j) At the bottom of the popup dialog box, click the Create New URL link.
k) Enter badsite.example.com for both the name and URL, then click OK to create the object.
You can name the object the same as the URL or give the object a different name. For the URL, do not
include the protocol portion of the URL, just add the server name.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
65
Best Practices: Use Cases for Firepower Threat Defense
How to Implement an Acceptable Use Policy (URL Filtering)
m) Click the Logging tab and select Select Log Action > At Beginning and End of Connection.
You must enable logging to get category and reputation information into the web category dashboard and
connection events.
n) Click OK to save the rule.
Step 3 (Optional.) Set preferences for URL filtering.
When you enable the URL license, the system automatically enables updates to the web category database.
The system checks for updates every 30 minutes, although the data is typically updated once per day. You
can turn off these updates if for some reason you do not want them.
You can also elect to send URLs that are not categorized to Cisco for analysis. Thus, if the installed URL
database does not have a categorization for a site, Cisco CSI might have one. Cisco CSI returns the category
and reputation, and your category-based rules can then be applied correctly to the URL request. Selecting this
option is important for lower-end systems, which install a smaller URL database due to memory limitations.
You can set a time to live for the lookup results: the default is Never, which means lookup results are never
refreshed.
a) Click Device.
b) Click System Settings > Traffic Settings > URL Filtering Preferences.
c) Select Query Cisco CSI for Unknown URLs.
d) Select a reasonable URL Time to Live, such as 24 hours.
e) Click Save.
Step 4 Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
66
Best Practices: Use Cases for Firepower Threat Defense
How to Control Application Usage
You can wait until deployment completes, or click OK and check the task list or deployment history later.
What to do next
At this point, the monitoring dashboards and events should start showing information about URL categories
and reputations, and which connections were dropped. You can evaluate this information to determine if your
URL filtering is dropping just those sites that are objectionable, or if you need to ease up on the reputation
setting for certain categories.
Consider informing users beforehand that you will be blocking access to web sites based on their categorization
and reputation.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
67
Best Practices: Use Cases for Firepower Threat Defense
How to Control Application Usage
• Order—The default is to add new rules to the end of the access control policy. However, you must
place this rule ahead of (above) any rule that would match the same Source/Destination and other
criteria, or the rule will never be matched (a connection matches one rule only, and that is the first
rule it matches in the table). For this rule, we will use the same Source/Destination as the
Inside_Outside_Rule created during initial device configuration. You might have created other rules
as well. To maximize access control efficiency, it is best to have specific rules early, to ensure the
quickest decision on whether a connection is allowed or dropped. For the purposes of this example,
select 1 as the rule order.
• Title—Give the rule a meaningful name, such as Block_Anonymizers.
• Action—Select Block.
d) On the Source/Destination tab, click + for Source > Zones, select inside_zone, then click OK in the
zones dialog box.
e) Using the same technique, select outside_zone for Destination > Zones.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
68
Best Practices: Use Cases for Firepower Threat Defense
How to Control Application Usage
as a filter object. Unless you are writing a rule for a single application, it is easier to use the Advanced
Filter dialog box to find applications and construct appropriate criteria.
As you select criteria, the Applications list at the bottom of the dialog box updates to show exactly which
applications match the criteria. The rule you are writing applies to these applications.
Look at this list carefully. For example, you might be tempted to block all very high risk applications.
However, as of this writing, Facebook and TFPT are classified as very high risk. Most organizations
would not want to block those applications. Take the time to experiment with various filter criteria to see
which applications match your selections. Keep in mind that these lists can change with every VDB
update.
For purposes of this example, select anonymizers/proxies from the Categories list.
i) Click the Logging tab and select Select Log Action > At Beginning and End of Connection.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
69
Best Practices: Use Cases for Firepower Threat Defense
How to Add a Subnet
You must enable logging to get information about any connections blocked by this rule.
j) Click OK to save the rule.
Step 2 Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
Note This example assumes the unused interface is not part of a bridge group. If it is currently a bridge group
member, you must first remove it from the bridge group before following this procedure.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
70
Best Practices: Use Cases for Firepower Threat Defense
How to Add a Subnet
Procedure
d) Click Save.
The interface list shows the updated interface status and the configured IP address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
71
Best Practices: Use Cases for Firepower Threat Defense
How to Add a Subnet
f) Click Add.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
72
Best Practices: Use Cases for Firepower Threat Defense
How to Add a Subnet
e) Click Save.
Step 4 Create an access control rule that allows traffic between the inside networks.
Traffic is not automatically allowed between any interfaces. You must create access control rules to allow the
traffic that you want. The only exception is if you allow traffic in the access control rule's default action. For
the purposes of this example, we will assume you retained the block default action that the device setup wizard
configures. Thus, you need to create a rule that will allow traffic between the inside interfaces. If you have
already created a rule like this, skip this step.
a) Click Policies in the main menu.
Ensure that the Access Control policy is displayed.
b) Click + to add a new rule.
c) Configure the order, title, and action.
• Order—The default is to add new rules to the end of the access control policy. However, you must
place this rule ahead of (above) any rule that would match the same Source/Destination and other
criteria, or the rule will never be matched (a connection matches one rule only, and that is the first
rule it matches in the table). For this rule, we will use unique Source/Destination criteria, so adding
the rule to the end of the list is acceptable.
• Title—Give the rule a meaningful name, such as Allow_Inside_Inside.
• Action—Select Allow.
d) On the Source/Destination tab, click + for Source > Zones, select inside_zone, then click OK in the
zones dialog box.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
73
Best Practices: Use Cases for Firepower Threat Defense
How to Add a Subnet
e) Using the same technique, select inside_zone for Destination > Zones.
A security zone must contain at least two interfaces to select the same zone for source and destination.
g) Click the Logging tab and select Select Log Action > At Beginning and End of Connection.
You must enable logging to get information about any connections that match this rule. Logging adds
statistics to the dashboard as well as showing events in the event viewer.
h) Click OK to save the rule.
Step 5 Verify that required policies are defined for the new subnet.
By adding the interface to the inside_zone security zone, any existing policies for inside_zone automatically
apply to the new subnet. However, take the time to inspect your policies and ensure that no additional policies
are needed.
If you completed the initial device configuration, the following policies should already apply.
• Access Control—The Inside_Outside_Rule should allow all traffic between the new subnet and the
outside network. If you followed the previous use cases, the policy also provides intrusion and malware
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
74
Best Practices: Use Cases for Firepower Threat Defense
How to Passively Monitor the Traffic on a Network
inspection. You must have a rule that allows some traffic between the new network and the outside
network, or users cannot access the Internet or other external networks.
• NAT—The InsideOutsideNATrule applies to any interface going to the outside interface, and applies
interface PAT. If you kept this rule, traffic from the new network going to the outside will have the IP
address translated to a unique port on the outside interface's IP address. If you do not have a rule that
applies to all interfaces, or the inside_zone interfaces, when going to the outside interface, you might
need to create one now.
• Identity—There is no default identity policy. However, if you followed previous use cases, you might
have an identity policy that already requires authentication for the new network. If you do not have an
identity policy that applies, create one now if you want to have user-based information for the new
network.
What to do next
Verify that workstations on the new subnet are getting IP addresses using DHCP, and that they can reach
other inside networks and the outside network. Use the monitoring dashboards and the event viewer to evaluate
network usage.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
75
Best Practices: Use Cases for Firepower Threat Defense
How to Passively Monitor the Traffic on a Network
Note This example is for a hardware Firepower Threat Defense device. You can also use passive mode for Firepower
Threat Defense Virtual, but the network setup is different. For details, see Configure the VLAN for a Firepower
Threat Defense Virtual Passive Interface, on page 262. Otherwise, this procedure also applies to Firepower
Threat Defense Virtual.
Procedure
Step 1 Configure a switch port as a SPAN (Switched Port Analyzer) port and configure a monitoring session for the
source interfaces.
The following example sets up a SPAN port and monitoring session for two source interfaces on a Cisco
Nexus 5000 series switch. If you are using a different type of switch, the required commands might be different.
To verify:
Step 2 Connect the Firepower Threat Defense interface to the SPAN port on the switch.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
76
Best Practices: Use Cases for Firepower Threat Defense
How to Passively Monitor the Traffic on a Network
It is best to select a currently unused port on the Firepower Threat Defense device. Based on the example
switch configuration, you would connect the cable to Ethernet 1/48 on the switch. This is the destination
interface for the monitoring session.
e) Click OK.
Step 4 Create a passive security zone for the interface.
a) Select Objects, then select Security Zones from the table of contents.
b) Click the + button.
c) Enter a Name for the object and optionally, a description. For example, passive_zone.
d) For Mode, select Passive.
e) Click + and select the passive interface.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
77
Best Practices: Use Cases for Firepower Threat Defense
How to Passively Monitor the Traffic on a Network
f) Click OK.
Step 5 Configure one or more access control rules for the passive security zone.
The number and type of rules you create depends on the information you want to gather. For example, if you
want to configure the system as an IDS (intrusion detection system), you need at least one Allow rule with
an assigned intrusion policy. If you want to collect URL category data, you need at least one rule that has a
URL category specification.
You can create Block rules to see what connections the system would have blocked on an actively routed
interface. These connections are not actually blocked, because the interface is passive, but you will see clearly
how the system would have groomed the traffic on the network.
The following use cases cover the main uses for access control rules. These also apply to passive interfaces.
Simply select the passive security zone as the source zone for the rules you create.
• How to Block Threats, on page 55
• How to Block Malware, on page 60
• How to Implement an Acceptable Use Policy (URL Filtering), on page 62
• How to Control Application Usage, on page 67
The following procedure creates two Allow rules to apply an intrusion policy and to collect URL category
data.
a) Select Policies > Access Control.
b) Click + to add a rule allowing all traffic, but applying an intrusion policy.
c) Select 1 as the rule order. This rule is more specific than the default rule, but does not overlap with it. If
you already have custom rules, select an appropriate position so that traffic to the passive interface is not
matched to those rules instead.
d) Enter a name for the rule, for example, Passive_IDS.
e) Select Allow as the Action.
f) On the Source/Destination tab, select the passive zone under Source > Zones. Do not configure any
other options on the tab.
When running in evaluation mode, the rule should look like the following at this point:
g) Click the Intrusion Policy tab, click the slider to On, and select an intrusion policy such as the Balanced
Security and Connectivity policy, which is recommended for most networks.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
78
Best Practices: Use Cases for Firepower Threat Defense
How to Passively Monitor the Traffic on a Network
h) Click the Logging tab and select At End of Connection for the logging option.
i) Click OK.
j) Click + to add a rule that will require that the system do deep inspection to determine the URL and category
for all HTTP requests.
This rule makes it possible for you to see URL category information in the dashboards. To save processing
time and improve performance, the system determines URL category only if there is at least one access
control rule that specifies a URL category condition.
k) Select 1 as the rule order. This will place it above the previous rule (Passive_IDS). If you place it after
that rule (which applies to all traffic), the rule you are creating now would never be matched.
l) Enter a name for the rule, for example, Determine_URL_Category.
m) Select Allow as the Action.
Alternatively, you could select Block. Either action will accomplish your goal for this rule.
n) On the Source/Destination tab, select the passive zone under Source > Zones. Do not configure any
other options on the tab.
o) Click the URLs tab, click the + next to the Categories heading, and select any of the categories. For
example, Search Engines and Portals. You can optionally select a reputation level, or leave it at the
default Any.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
79
Best Practices: Use Cases for Firepower Threat Defense
More Examples
p) Click the Intrusion Policy tab, click the slider to On, and select the same intrusion policy you chose for
the first rule.
q) Click the Logging tab and select At End of Connection for the logging option.
However, if you selected Block as the action, select At Beginning and End of Connection. Because
blocked connections are not ended per se, you get log information at the beginning of the connection only.
r) Click OK.
Step 6 (Optional.) Configure other security policies.
You can also configure the following security policies to see how they would impact traffic:
• Identity—To collect user information. You can configure a rule in the identity policy to ensure that the
user associated with a source IP address is identified. The process for implementing identity policies for
passive interfaces is the same as the one for routed interfaces. Please follow the use case described in
How to Gain Insight Into Your Network Traffic, on page 48.
• Security Intelligence—To block known bad IP addresses and URLs. For details, see How to Block
Threats, on page 55.
Note All encrypted traffic on passive interfaces is classified as undecryptable, so SSL decryption rules
are ineffective and do not apply to passive interfaces.
Step 8 Use the monitoring dashboards to analyze the kinds of traffic and threats that are coming across the network.
If you decide you want the Firepower Threat Defense device to actively drop unwanted connections, redeploy
the device so that you can configure active routed interfaces that provide firewall protection for the monitored
network.
More Examples
In addition to the examples in the Use Case chapter, there are example configurations in some of the chapters
that explain specific services. You might find the following examples of interest.
Access Control
• How to Control Network Access Using TrustSec Security Group Tags, on page 447
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
80
Best Practices: Use Cases for Firepower Threat Defense
More Examples
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
81
Best Practices: Use Cases for Firepower Threat Defense
More Examples
SSL/TLS Decryption
• Example: Blocking Older SSL/TLS Versions from the Network, on page 401
FlexConfig Policy
• How to Enable and Disable Global Default Inspections, on page 761
• How to Undo Your FlexConfig Changes, on page 767
• How to Enable Inspections for Unique Traffic Classes, on page 768
Virtual Routing
• How to Provide Internet Access to Multiple Virtual Routers with Overlapping Address Spaces , on
page 306
• How to Route to a Distant Server through Multiple Virtual Routers, on page 301
• How to Allow RA VPN Access to Internal Networks in Different Virtual Routers, on page 662
• How to Secure Traffic from Networks in Multiple Virtual Routers over a Site-to-Site VPN, on page
593
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
82
CHAPTER 3
Licensing the System
The following topics explain how to license the Firepower Threat Defense device.
• Smart Licensing for the Firepower System, on page 83
• Managing Smart Licenses, on page 86
• Applying Permanent Licenses in Air-Gapped Networks, on page 90
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
83
Licensing the System
Periodic Communication with the License Authority
Base (automatically Perpetual All features not covered by the optional term licenses.
included)
You must also specify whether to Allow
export-controlled functionality on the products
registered with this token. You can select this option
only if your country meets export-control standards.
This option controls your use of advanced encryption
and the features that require advanced encryption.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
84
Licensing the System
License Requirements for File Policies
Malware Term-based File policies that check for malware, which use Cisco
Advanced Malware Protection (AMP) with AMP for
Firepower (network-based Advanced Malware
Protection) and Cisco Threat Grid.
File policies can detect and block malware in files
transmitted over your network. You also need the
Malware license if you configure file policies to store
files. For detailed information, see License
Requirements for File Policies, on page 85.
RA VPN: Term-based or perpetual Remote access VPN configuration. Your base license
based on license type. must allow export-controlled functionality to
• AnyConnect Plus
configure RA VPN. You select whether you meet
• AnyConnect Apex export requirements when you register the device.
Allow No Threat
Block
Block with Reset
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
85
Licensing the System
Impact of Expired or Disabled Optional Licenses
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
86
Licensing the System
Registering the Device
requests. If a retry succeeds, the agent enters either an Out-of-Compliance or Authorized state, and begins
a new Authorization Period. Try manually synchronizing the device.
Note Click the i button next to the Smart License status to view the virtual account, export-controlled features, and
get a link to open the Cisco Smart Software Manager. Export-Controlled Features control software that is
subject to national security, foreign policy, and anti-terrorism laws and regulations.
The following procedure provides an overview of how to manage licenses for the system.
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 Register the device.
You must register with the Cisco Smart Software Manager before you can assign the optional licenses. Register
before the end of the evaluation period.
See Registering the Device, on page 87.
Note When you register, you elect whether to send usage data to Cisco. You can change your election
by clicking the Go To Cisco Success Network link next to the gear icon.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
87
Licensing the System
Enabling or Disabling Optional Licenses
During initial system setup, you are prompted to register the device with Cisco Smart Software Manager. If
you instead elected to use the 90-day evaluation license, you must register the device before the end of the
evaluation period.
When you register the device, your virtual account allocates the license to the device. Registering the device
also registers any optional licenses that you have enabled.
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 Click Register Device and follow the instructions.
a) Click the link to open the Cisco Smart Software Manager and log into your account, or create a new one
if necessary.
b) Generate a new token.
When you create the token, you specify the amount of time the token is valid for use. The recommended
expiration period is 30 days. This period defines the expiration date of the token itself, and has no impact
on the device that you register using the token. If the token expires before you can use it, you can simply
generate a new token.
You must also specify whether to Allow export-controlled functionality on the products registered
with this token. You can select this option only if your country meets export-control standards. This
option controls your use of advanced encryption and the features that require advanced encryption.
c) Copy and paste the token into the edit box on the Smart License Registration dialog box.
d) Select your region for Cisco Cloud Services registration.
After registration, if you need to change this region, you must unregister the device, then register it again
and select the new region.
e) Decide whether to send usage data to Cisco.
Read the information in the Cisco Success Network step, click the Sample Data link to view the actual
data that is collected, then decide whether to leave the Enable Cisco Success Network option selected.
Even if you do not enable the connection, you are registered with the Cisco Cloud Services server so that
you can enable cloud services as you need them.
f) Click Register Device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
88
Licensing the System
Synchronizing with the Cisco Smart Software Manager
If you no longer want to use the features covered by an optional term license, you can disable the license.
Disabling the license releases it in your Cisco Smart Software Manager account, so that you can apply it to
another device.
You can also enable evaluation versions of these licenses when running in evaluation mode. In evaluation
mode, the licenses are not registered with Cisco Smart Software Manager until you register the device.
However, you cannot enable the RA VPN license in evaluation mode.
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 Click the Enable/Disable control for each optional license as desired.
• Enable—Registers the license with your Cisco Smart Software Manager account and enables the controlled
features. You can now configure and deploy policies controlled by the license.
• Disable—Unregisters the license with your Cisco Smart Software Manager account and disables the
controlled features. You cannot configure the features in new policies, nor can you deploy policies that
use the feature.
Step 3 If you enabled the RA VPN license, select the type of license you have available in your account.
You can use any of the AnyConnect licenses: Plus, Apex, or VPN Only. You can select Plus and Apex if
you have both licenses and you want to use them both.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
89
Licensing the System
Unregistering the Device
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 Select Resync Connection from the gear drop-down list.
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 Select Unregister Device from the gear drop-down list.
Step 3 Read the warning and click Unregister if you really want to unregister the device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
90
Licensing the System
Universal vs. Specific Permanent License Reservation
Note Cisco Smart Software Manager uses the device's serial number to assign the permanent license. If you need
to unregister the device, and the normal unregistration or cancellation processes fail to remove the license
assignment, you will need to contact Cisco Technical Support to remove the registration from Cisco Smart
Software Manager. Reimaging the device will not remove the license registration.
The following topics explain more about the different types of permanent license, how to apply them, and
how to cancel registration or unregister the device.
FDM supports Universal PLR only. You cannot apply a Specific PLR to an FDM-managed device.
You must work with your Cisco representative to enable Universal Permanent License Reservation (PLR)
mode in your Cisco Smart Software Manager (CSSM) account.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
91
Licensing the System
Switch to PLR Mode and Apply a Universal License
Caution If you are currently in evaluation mode, once you switch to PLR mode, you cannot switch back to evaluation
mode.
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 If you have already registered the device using Smart Licensing, select Unregister Device from the gear
drop-down list and then confirm unregistration. Wait for the unregistration task to complete before proceeding.
Step 3 Select Switch to Universal PLR from the gear drop-down list to switch to Universal Permanent License
Reservation (PLR) mode.
Read the warning and click Yes to confirm the switch.
The system converts to PLR mode and then starts the PLR registration process.
d) Back in FDM, paste the authorization code into the appropriate field.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
92
Licensing the System
Cancel PLR Registration
A valid authorization code for a Universal License has the following format:
XXXXXX-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XXXX, where X is an alpha-numeric character.
If your authorization code is instead an XML file, you have a Specific License and you cannot use it on
this system. Please cancel the registration as described in Cancel PLR Registration, on page 93, ensuring
that you release the reserved licenses in CSSM. Then, work with your Cisco representative to get your
Smart Account converted to Universal PLR.
e) Click Register.
The system will start the registration process. Refresh the Licensing page to check the registration status.
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 Select Cancel PLR from the gear drop-down list to start the cancellation process.
Step 3 Select the option that fits your situation:
• I have a license in CSSM—Use this option if you have gone through the License Registration wizard
in the Cisco Smart Software Manager (CSSM) and you have obtained an authorization code. At this
point, there are licenses reserved in CSSM, and you need to release them.
• I do not have a license in CSSM—Use this option if you have not completed the CSSM wizard to the
point where you obtained an authorization code. For example, if you started PLR registration in FDM
but then discovered the License Reservation button was not available in your Smart Account.
Step 4 (If you selected I have a license in CSSM.) You need to obtain a release code from CSSM to ensure that
your licenses are no longer marked as in-use. Otherwise, those licenses will not be usable by other devices.
a) Paste the authorization code you obtained from CSSM (when registering) into the cancellation dialog box
and click Generate Release Code.
b) When there is a code in the Release License Code field, click Save As TXT to save it to a text file, or
Print to print it. You can also select the code and press Ctrl+C to copy it to the clipboard.
c) In CSSM, find the device in the Smart Software Licensing > Inventory page (the Name is the device
serial number), click Action > Remove, and enter the release code.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
93
Licensing the System
Unregister the Device in PLR Mode
Wait for CSSM to indicate that the product was successfully removed.
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 Select Unregister Universal PLR from the gear drop-down list, read the warning, and click Yes to start
the process.
Step 3 When the Unregister Universal Permanent License Reservation dialog box opens, the Release License Code
field is populated with the code you need to release the licenses currently assigned in your CSSM account.
Click Save as TXT or Print to retain a copy of this code. You can also select it and use Ctrl+C to copy it to
the clipboard.
Step 4 Go to your CSSM account, find the device in the Smart Software Licensing > Inventory page (the Name
is the device serial number), click Action > Remove, and enter the release code.
Wait for CSSM to indicate that the product was successfully removed.
Step 5 Back in FDM, click Unregister in the Unregister Device dialog box.
This completes the process. At this point, the licenses in CSSM are free to assign to another device, and the
FTD device is unlicensed.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
94
PA R T I
System Monitoring
• Monitoring the Device, on page 97
• Alarms for the Cisco ISA 3000, on page 117
CHAPTER 4
Monitoring the Device
The system includes dashboards and an Event Viewer that you can use to monitor the device and traffic that
is passing through the device.
• Enable Logging to Obtain Traffic Statistics, on page 97
• Monitoring Traffic and System Dashboards, on page 100
• Monitoring Additional Statistics Using the Command Line, on page 103
• Viewing Events, on page 103
Event Types
The system can generate the following types of events. You must generate these events to see related statistics
in the monitoring dashboards.
Connection Events
You can generate events for connections as users generate traffic that passes through the system. Enable
connection logging on access rules to generate these events. You can also enable logging on Security
Intelligence policies and SSL decryption rules to generate connection events.
Connection events include a wide variety of information about a connection, including source and
destination IP addresses and ports, URLs and applications used, and the number of bytes or packets
transmitted. The information also includes the action taken (for example, allowing or blocking the
connection), and the policies applied to the connection.
Intrusion Events
The system examines the packets that traverse your network for malicious activity that could affect the
availability, integrity, and confidentiality of a host and its data. When the system identifies a possible
intrusion, it generates an intrusion event, which is a record of the date, time, type of exploit, and contextual
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
97
System Monitoring
Configurable Connection Logging
information about the source of the attack and its target. Intrusion events are generated for any intrusion
rule set to block or alert, regardless of the logging configuration of the invoking access control rule.
File Events
File events represent files that the system detected, and optionally blocked, in network traffic based on
your file policies. You must enable file logging on the access rule that applies the file policy to generate
these events.
When the system generates a file event, the system also logs the end of the associated connection regardless
of the logging configuration of the invoking access control rule.
Malware Events
The system can detect malware in network traffic as part of your overall access control configuration.
AMP for Firepower can generate a malware event, containing the disposition of the resulting event, and
contextual data about how, where, and when the malware was detected. You must enable file logging
on the access rule that applies the file policy to generate these events.
The disposition of a file can change, for example, from clean to malware or from malware to clean. If
AMP for Firepower queries the AMP cloud about a file, and the cloud determines the disposition has
changed within a week of the query, the system generates retrospective malware events.
Security Intelligence Events
Security Intelligence events are a type of connection event generated by the Security Intelligence policy
for each connection blocked or monitored by the policy. All Security Intelligence events have a populated
Security Intelligence Category field.
For each of these events, there is a corresponding “regular” connection event. Because the Security
Intelligence policy is evaluated before many other security policies, including access control, when a
connection is blocked by Security Intelligence, the resulting event does not contain the information that
the system would have gathered from subsequent evaluation, for example, user identity.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
98
System Monitoring
Automatic Connection Logging
• SSL Decryption rules and default action—You can configure logging at the end of a connection. For
blocked connections, the system immediately ends the session and generates an event. For monitored
connections and connections that you pass to access control rules, the system generates an event when
the session ends.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
99
System Monitoring
Sending Events to an External Syslog Server
Note The data used in traffic-related dashboards is collected from access control rules that enable connection or
file logging, and other security policies that allow logging. The dashboards do not reflect traffic that matches
rules for which no logging is enabled. Ensure that you configure your rules to log the information that matters
to you. In addition, user information is available only if you configure identity rules to collect user identity.
And finally, intrusion, file, malware, and URL category information is available only if you have a license
for those features and configure rules that use the features.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
100
System Monitoring
Monitoring Traffic and System Dashboards
Procedure
Step 1 Click Monitoring in the main menu to open the Dashboards page.
You can select predefined time ranges, such as the last hour or week, or define a custom time range with
specific start and end times, to control the data shown in the dashboard graphs and tables.
Traffic-related dashboards include the following types of display:
• Top 5 bar graphs—These are shown in the Network Overview dashboard, and in the per-item summary
dashboards you see if you click on an item in a dashboard table. You can toggle the information between
a count of Transactions or Data Usage (total bytes sent and received). You can also toggle the display
to show all transactions, allowed transactions, or denied transactions. Click the View More link to see
the table associated with the graph.
• Tables—Tables show items of a particular type (for example, applications or URL categories) with that
item's total transactions, allowed transactions, blocked transactions, data usage, and bytes sent and
received. You can toggle the numbers between raw Values and Percentages, and show the top 10, 100,
or 1000 entries. If the item is a link, click it to see a summary dashboard with more detailed information.
Step 2 Click the Dashboard links in the table of contents to see dashboards for the following data:
• Network Overview—Shows summary information about the traffic in the network, including the access
rules (policies) matched, users initiating traffic, applications used in connections, intrusion threats
(signatures) matched, URL categories for URLs accessed, and the most frequent destinations for
connections.
• Users—Shows the top users of your network. You must configure identity policies to see user information.
If there is no user identity, the source IP address is included. You might see the following special entities:
• Failed Authentication—The user was prompted to authenticate, but failed to enter a valid
username/password pair within the maximum number of allowed attempts. Failure to authenticate
does not itself prevent the user from accessing the network, but you can write an access rule to limit
network access for these users.
• Guest—Guest users are like Failed Authentication users, except that your identity rule is configured
to call these users Guest. Guest users were prompted to authenticate and failed to do so within the
maximum number of attempts.
• No Authentication Required—The user was not prompted to authentication, because the user's
connections matched identity rules that specified no authentication.
• Unknown—There is no user mapping for the IP address, and there is no record of failed
authentication yet. Typically, this means that no HTTP traffic has yet been seen from that address.
• Applications—Shows the top applications, such as HTTP, that are being used in the network. The
information is available only for connections that are inspected. Connections are inspected if they match
an “allow” rule, or a block rule that uses criteria other than zone, address, and port. Thus, application
information is not available if the connection is trusted or blocked prior to hitting any rule that requires
inspection.
• Web Applications—Shows the top web applications, such as Google, that are being used in the network.
The conditions for collecting web application information are the same as those for the Application
dashboard.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
101
System Monitoring
Monitoring Traffic and System Dashboards
• URL Categories—Shows the top categories of web sites, such as Gambling or Educational Institutions,
that are being used in the network based on the categorization of web sites visited. You must have at
least one access control rule that uses URL category as a traffic matching criteria to get this information.
The information will be available for traffic that matches the rule, or for traffic that has to be inspected
to determine if it matches the rule. You will not see category (or reputation) information for connections
that match rules that come before the first web-category access control rule.
• Access And SI Rules—Shows the top access rules and Security Intelligence rule-equivalents matched
by network traffic.
• Zones—Shows the top security zone pairs for traffic entering and then exiting the device.
• Destinations—Shows the top destinations for network traffic.
• Attackers—Shows the top attackers, which are the source of connections that trigger intrusion events.
You must configure intrusion policies on access rules to see this information.
• Targets—Shows the top targets of intrusion events, which are the victims of an attack. You must configure
intrusion policies on access rules to see this information.
• Threats—Shows the top intrusion rules that have been triggered. You must configure intrusion policies
on access rules to see this information.
• File Logs—Shows the top file types seen in network traffic. You must configure file policies on access
rules to see this information.
• Malware—Shows the top Malware action and disposition combinations. You can drill down to see
information on the associated file types. You must configure file policies on access rules to see this
information.
• Possible actions are: Malware Cloud Lookup, Block, Archive Block (Encrypted), Detect, Custom
Detection, Cloud Lookup Timeout, Malware Block, Archive Block (Depth Exceeded), Custom
Detection Block, TID block, Archive Block (Failed to Inspect).
• Possible dispositions are: Malware, Unknown, Clean, Custom Detection, Unavailable.
• SSL Decryption—Shows the breakdown of encrypted vs. plain text traffic through the device, plus the
breakdown of how encrypted traffic was decrypted according to SSL decryption rules.
• System— Shows an overall system view, including a display of interfaces and their status (mouse over
an interface to see its IP addresses), overall average system throughput (in 5 minute buckets for up to
one hour, and one hour buckets for longer periods), and summary information on system events, CPU
usage, memory usage, and disk usage. You can restrict the throughput graph to show a specific interface
rather than all interfaces.
Note The information shown on the System dashboard is at the overall system level. If you log into
the device CLI, you can use various commands to see more detailed information. For example,
the show cpu and show memory commands include parameters for showing other details,
whereas these dashboards show data from the show cpu system and show memory system
commands.
Step 3 You can also click these links in the table of contents:
• Events—To view events as they occur. You must enable connection logging in individual access rules
to see connection events related to those rules. Also, enable logging in the Security Intelligence policy
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
102
System Monitoring
Monitoring Additional Statistics Using the Command Line
and SSL decryption rules to see Security Intelligence events and additional connection event data. These
events can help you resolve connection problems for your users.
• Sessions—To view and manage Firepower Device Manager user sessions. For more information, see
Managing Firepower Device Manager User Sessions, on page 717.
Viewing Events
You can view events that are generated from your security policies that enable logging. Events are also
generated for intrusion and file policies that are triggered.
The event viewer table shows the events generated in real time. As new events are generated, older events
are rolled out of the table.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
103
System Monitoring
Viewing Events
• Security Intelligence events—You must enable and configure the Security Intelligence policy, and enable
logging.
Procedure
Step 3 Click the tab that shows the type of event you want to view.
You can do the following with the event list:
• Click Pause to stop the addition of new events so that you can more easily find and analyze an event.
Click Resume to allow new events to appear.
• Select a different refresh rate (5, 10, 20, or 60 seconds) to control how fast new events are shown.
• Create a custom view that includes the columns you want. To create a custom view, either click the +
button in the tab bar, or click Add/Remove Columns. You cannot change the pre-set tabs, so adding or
removing columns creates a new view. For more information, see Configuring Custom Views, on page
105.
• To change the width of a column, click and drag the column heading divider to the desired width.
• Mouse over an event and click View Details to see complete information on an event. For a description
of the various fields in an event, see Event Field Descriptions, on page 106.
Step 4 If necessary, apply a filter to the table to help you locate the desired events based on various event attributes.
To create a new filter, either manually type in the filter by selecting atomic elements from the drop-down list
and entering the filter value, or build a filter by clicking a cell in the events table that includes a value on
which you want to filter. You can click multiple cells in the same column to create an OR condition among
the values, or click cells in different columns to create an AND condition among the columns. If you build
the filter by clicking cells, you can also edit the resulting filter to fine-tune it. For detailed information about
creating filter rules, see Filtering Events, on page 105.
Once you build the filter, do any of the following:
• To apply the filter and update the table to show only those events that match the filter, click the Filter
button.
• To clear an entire filter that you have applied and return the table to a non-filtered state, click Reset
Filters in the Filter box.
• To clear one of the atomic elements of a filter, mouse over the element and click the X for the element.
Then, click the Filter button.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
104
System Monitoring
Configuring Custom Views
Procedure
Step 3 Click the Add/Remove Columns link above the events table on the right, and select or deselect columns until
the selected list includes only those columns to include in the view.
Click and drag columns between the available (but not used) and selected lists. You can also click and drag
columns in the selected list to change the left-to-right order of the columns in the table. For a description of
the columns, see Event Field Descriptions, on page 106.
When finished, click OK to save your column changes.
Note If you change column selection while viewing a pre-defined view, a new view is created.
Step 4 If necessary, change column widths by clicking and dragging the column separators.
Filtering Events
You can create complex filters to limit the events table to the events that currently interest you. You can use
the following techniques, alone or in combination, to build a filter:
Clicking columns
The easiest way to build a filter is to click on cells in the events table that contain the values on which
you intend to filter. Clicking a cell updates the Filter field with a correctly-formulated rule for that value
and field combination. However, using this technique requires that the existing list of events contains
the desired values.
You cannot filter on all columns. If you can filter on the contents of a cell, it is underlined when you
mouse over it.
Selecting atomic elements
You can also build a filter by clicking in the Filter field and selecting the desired atomic element from
the drop-down list, then typing in the match value. These elements include event fields that are not shown
as columns in the events table. They also include operators to define the relationship between the value
you type in and the events to display. Whereas clicking columns always results in an “equals (=)” filter,
when you select an element, you can also select “greater than (>)” or “less than (<)” for numeric fields.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
105
System Monitoring
Event Field Descriptions
Regardless of how you add an element to the Filter field, you can type into the field to adjust the operator or
value. Click Filter to apply the filter to the table.
!= Not equals. The event does not match the specified value. You must type in the !
(exclamation point) to build a not-equals expression.
> Greater than. The event contains a value that is greater than the specified value. This
operator is available for numeric values only, such as port and IP address.
< Less than. The event contains a value that is less than the specified value. This operator
is available for numeric values only.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
106
System Monitoring
Event Field Descriptions
Trust
Trusted connections. TCP connections detected by a trust rule on the first packet only generate an
end-of-connection event. The system generates the event one hour after the final session packet.
Block
Blocked connections. The Block action can be associated with Allow access rules under the following
conditions:
• Connections where an exploit was blocked by an intrusion policy.
• Connections where a file was blocked by a file policy.
• Connections blocked by Security Intelligence.
• Connections blocked by an SSL policy.
Default Action
The connection was handled by the default action.
For file or malware events, the file rule action associated with the rule action for the rule the file matched,
and any associated file rule action options.
Allowed Connection
Whether the system allowed the traffic flow for the event.
Application
The application detected in the connection.
Application Business Relevance
The business relevance associated with the application traffic detected in the connection: Very High,
High, Medium, Low, or Very Low. Each type of application detected in the connection has an associated
business relevance; this field displays the lowest (least relevant) of those.
Application Categories, Application Tag
Criteria that characterize the application to help you understand the application's function.
Application Risk
The risk associated with the application traffic detected in the connection: Very High, High, Medium,
Low, or Very Low. Each type of application detected in the connection has an associated risk; this field
displays the highest of those.
Block Type
The type of block specified in the access control rule matching the traffic flow in the event: block or
interactive block.
Client Application, Client Version
The client application and version of that client detected in the connection.
Client Business Relevance
The business relevance associated with the client traffic detected in the connection: Very High, High,
Medium, Low, or Very Low. Each type of client detected in the connection has an associated business
relevance; this field displays the lowest (least relevant) of those.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
107
System Monitoring
Event Field Descriptions
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
108
System Monitoring
Event Field Descriptions
Clean
Indicates that the AMP cloud categorized the file as clean, or that a user added the file to the clean
list.
Unknown
Indicates that the system queried the AMP cloud, but the file has not been assigned a disposition;
in other words, the AMP cloud has not categorized the file.
Custom Detection
Indicates that a user added the file to the custom detection list.
Unavailable
Indicates that the system could not query the AMP cloud. You may see a small percentage of events
with this disposition; this is expected behavior.
N/A
Indicates that a Detect Files or Block Files rule handled the file and the system did not query the
AMP cloud.
Egress Interface, Egress Security Zone
The interface and zone through which the connection exited the device.
Egress Virtual Router
The name of the virtual router, if any, to which the destination interface belongs.
Event, Event Type
The type of event.
Event Seconds, Event Microseconds
The time, in seconds or microseconds, when the event was detected.
File Category
The general categories of file type, for example: Office Documents, Archive, Multimedia, Executables,
PDF files, Encoded, Graphics, or System Files.
File Event Timestamp
The time and date the file or malware file was created.
File Name
The name of the file.
File Rule Action
The action associated with file policy rule that detected the file, and any associated file rule action options.
File SHA-256
The SHA-256 hash value of the file.
File Size (KB)
The size of the file, in kilobytes. File size can be blank in cases where the system blocked the file before
it was completely received.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
109
System Monitoring
Event Field Descriptions
File Type
The type of file, for example, HTML or MSEXE.
File/Malware Policy
The file policy associated with the generation of the event.
Filelog Blocktype Indicator
The type of block specified in the file rule matching the traffic flow in the event: block or interactive
block.
Firewall Policy Rule, Firewall Rule
The access control rule or default action that handled the connection.
First Packet
The date and time the first packet of the session was seen.
HTTP Referrer
The HTTP referrer, which represents the referrer of a requested URL for HTTP traffic detected in the
connection (such as a website that provided a link to, or imported a link from, another URL).
HTTP Response
The HTTP status code sent in response to a client's HTTP request over a connection.
IDS Classification
The classification where the rule that generated the event belongs.
Ingress Interface, Ingress Security Zone
The interface and zone through which the connection entered the device.
Ingress Virtual Router
The name of the virtual router, if any, to which the source interface belongs.
Initiator Bytes, Initiator Packets
The total number of bytes or packets transmitted by the session initiator.
Initiator Country and Continent
The country and continent of the host that initiated the session. Available only if the initiator IP address
is routable.
Initiator IP
The host IP address (and hostname, if DNS resolution is enabled) that initiated the session in a connection
or Security Intelligence event.
Inline Result
Whether the system dropped or would have dropped the packet that triggered an intrusion event if
operating in inline mode. Blank indicates that the triggered rule was not set to Drop and Generate Events
Intrusion Policy
The intrusion policy where the rule that generated the event was enabled.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
110
System Monitoring
Event Field Descriptions
Reason Description
DNS Block The system denied the connection without inspection, based on the domain
name and Security Intelligence data. A reason of DNS Block is paired with
an action of Block, Domain not found, or Sinkhole, depending on the DNS
rule action.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
111
System Monitoring
Event Field Descriptions
Reason Description
DNS Monitor The system would have denied the connection based on the domain name
and Security Intelligence data, but you configured the system to monitor,
rather than deny, the connection.
File Block The connection contained a file or malware file that the system prevented
from being transmitted. A reason of File Block is always paired with an action
of Block.
File Custom Detection The connection contained a file on the custom detection list that the system
prevented from being transmitted.
File Monitor The system detected a particular type of file in the connection.
File Resume Allow File transmission was originally blocked by a Block Files or Block Malware
file rule. After a new access control policy allowing the file was deployed,
the HTTP session automatically resumed.
File Resume Block File transmission was originally allowed by a Detect Files or Malware Cloud
Lookup file rule. After a new access control policy blocking the file was
deployed, the HTTP session automatically stopped.
Intrusion Block The system blocked or would have blocked an exploit (intrusion policy
violation) detected in the connection. A reason of Intrusion Block is paired
with an action of Block for blocked exploits and Allow for
would-have-blocked exploits.
Intrusion Monitor The system detected, but did not block, an exploit detected in the connection.
This occurs when the state of the triggered intrusion rule is set to Generate
Events.
IP Block The system denied the connection without inspection, based on the IP address
and Security Intelligence data. A reason of IP Block is always paired with an
action of Block.
SSL Block The system blocked an encrypted connection based on the SSL inspection
configuration. A reason of SSL Block is always paired with an action of
Block.
URL Block The system denied the connection without inspection, based on the URL and
Security Intelligence data. A reason of URL Block is always paired with an
action of Block.
Receive Times
The date and time the event was generated.
Referenced Host
If the protocol in the connection is HTTP or HTTPS, this field displays the hostname that the respective
protocol was using.
Responder Bytes, Responder Packets
The total number of bytes or packets transmitted by the session responder.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
112
System Monitoring
Event Field Descriptions
Action Description
Decrypt (Resign) Represents an outgoing connection decrypted using a re-signed server certificate.
Decrypt (Replace Represents an outgoing connection decrypted using a self-signed server certificate
Key) with a substituted public key.
Decrypt (Known Represents an incoming connection decrypted using a known private key.
Key)
Default Action Indicates the connection was handled by the default action.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
113
System Monitoring
Event Field Descriptions
If undecryptable traffic matches an SSL rule, this field displays Not Checked.
SSL Cipher Suite
The cipher suite used in the connection.
SSL Expected Action
The action specified in the SSL rule the connection matched.
SSL Flow Flags
The first ten debugging level flags for an encrypted connection.
SSL Flow Messages
The SSL/TLS messages exchanged between client and server during the SSL handshake, such as
HELLO_REQUEST and CLIENT_HELLO. See http://tools.ietf.org/html/rfc5246 for more information
about the messages exchanged in TLS connections.
SSL Policy
The name of the SSL Decryption policy applied to the connection.
SSL Rule
The name of the SSL Decryption rule applied to the connection.
SSL Session ID
The hexadecimal Session ID negotiated between the client and server during the SSL handshake.
SSL Ticket ID
A hexadecimal hash value of the session ticket information sent during the SSL handshake.
SSL URL Category
The URL category of the destination web server as determined during SSL decryption processing.
SSL Version
The SSL/TLS version used in the connection.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
114
System Monitoring
Event Field Descriptions
TCP Flags
The TCP flags detected in the connection.
Total Packets
The total number of packets transmitted in the connection, which is Initiator Packets + Responder
Packets.
URL, URL Category, URL Reputation, URL Reputation Score
The URL requested by the monitored host during the session and its associated category, reputation, and
reputation score, if available.
If the system identifies or blocks an SSL application, the requested URL is in encrypted traffic, so the
system identifies the traffic based on an SSL certificate. For SSL applications, therefore, the URL indicates
the common name contained in the certificate.
User
The user associated with the initiator IP address.
VLAN
The innermost VLAN ID associated with the packet that triggered the event.
Web App Business Relevance
The business relevance associated with the web application traffic detected in the connection: Very High,
High, Medium, Low, or Very Low. Each type of web application detected in the connection has an
associated business relevance; this field displays the lowest (least relevant) of those.
Web App Categories, Web App Tag
Criteria that characterize the web application to help you understand the web application's function.
Web App Risk
The risk associated with the web application traffic detected in the connection: Very High, High, Medium,
Low, or Very Low. Each type of web application detected in the connection has an associated risk; this
field displays the highest of those.
Web Application
The web application, which represents the content or requested URL for HTTP traffic detected in the
connection.
If the web application does not match the URL for the event, the traffic is probably referred traffic, such
as advertisement traffic. If the system detects referred traffic, it stores the referring application (if available)
and lists that application as the web application.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
115
System Monitoring
Event Field Descriptions
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
116
CHAPTER 5
Alarms for the Cisco ISA 3000
You can configure the alarm system on a Cisco ISA 3000 device to alert you when undesirable conditions
occur.
• About Alarms, on page 117
• Defaults for Alarms, on page 119
• Configuring Alarms for the ISA 3000, on page 120
• Monitoring Alarms, on page 125
About Alarms
You can configure the ISA 3000 to issue alarms for a variety of conditions. If any conditions do not match
the configured settings, the system triggers an alarm, which is reported by way of LEDs, syslog messages,
SNMP traps, and through external devices connected to the alarm output interface. By default, triggered alarms
issue syslog messages only.
You can configure the alarm system to monitor the following:
• Power supply.
• Primary and secondary temperature sensors.
• Alarm input interfaces.
The ISA 3000 has internal sensors plus two alarm input interfaces and one alarm output interface. You can
connect external sensors, such as door sensors, to the alarm inputs. You can connect external alarm devices,
such as buzzers or lights, to the alarm output interface.
The alarm output interface is a relay mechanism. Depending on the alarm conditions, the relay is either
energized or de-energized. When it is energized, any device connected to the interface is activated. A
de-energized relay results in the inactive state of any connected devices. The relay remains in an energized
state as long as alarms are triggered.
For information about connecting external sensors and the alarm relay, see Cisco ISA 3000 Industrial Security
Appliance Hardware Installation Guide.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
117
System Monitoring
Alarm Input Interfaces
Alarm activated Minor alarm—solid Relay energized Syslog generated SNMP trap sent
red
Major
alarm—flashing red
Alarm activated Solid red Relay energized Syslog generated SNMP trap sent
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
118
System Monitoring
Syslog Alarms
Syslog Alarms
By default, the system sends syslog messages when any alarm is triggered. You can disable syslog messaging
if you do not want the messages.
For syslog alarms to work, you must also enable diagnostic logging on Device > System Settings > Logging
Settings. Configure a syslog server, console logging, or internal buffer logging.
Without enabling a destination for diagnostic logging, the alarm system has nowhere to send syslog messages.
After you create the object, add it to the FlexConfig policy (Device > Advanced Configuration > FlexConfig
Policy) and deploy the configuration.
This is a minimal example, and it works for SNMP versions 1 and 2c. For complete information on configuring
SNMP, including how to configure SNMP version 3, see the SNMP chapter of the CLI Book 1: Cisco ASA
Series General Operations CLI Configuration Guide for the newest version of the ASA software. The guides
are available at https://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-firewalls/
products-installation-and-configuration-guides-list.html.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
119
System Monitoring
Configuring Alarms for the ISA 3000
Temperature Enabled for the — — Enabled for Enabled for Enabled for
primary primary primary primary
temperature temperature temperature temperature
alarm (default alarm alarm alarm
values of 92°C
and -40°C for the
high and low
thresholds
respectively)
Disabled for the
secondary alarm.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
120
System Monitoring
Configure Alarm Input Contacts
For example, to set the severity of contact 1 to Major, enter the following:
For example, you connect a door sensor to alarm input contact 1, and its normal state has no electrical
current flowing through the alarm contact (it is open). If the door is opened, the contact is closed and
electrical current flows through the alarm contact. You would set the alarm trigger to closed so that the
alarm goes off when the electrical current starts flowing.
For example, to enable all actions for the alarm input contact 1, enter the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
121
System Monitoring
Configure Power Supply Alarms
Step 6 In the Negate Template editor, enter the lines required to undo this configuration.
All of these commands take the no form to disable them and return to default settings. For example, if your
template includes all of the command examples shown in this procedure, the negate template would be the
following:
Step 9 After deployment completes, in CLI Console or an SSH session, use the show running-config command and
verify that the running configuration has the correct changes. Test the external sensor to verify that alarms
are getting triggered.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
122
System Monitoring
Configure Power Supply Alarms
power-supply dual
b) Configure the actions to take when the power supply alarm is triggered.
alarm facility power-supply rps {relay | syslog | notifies | disable}
You can configure more than one action. For example, you can configure the device to activate the external
alarm, send syslog messages, and also send SNMP traps.
• relay—Energize the alarm output relay, which activates the external alarm that you attached to it,
such as a buzzer or a flashing light. The output LED also goes red.
• syslog—Send a syslog message. This option is enabled by default.
• notifies—Send an SNMP trap.
• disable—Disable the power supply alarm. Any other actions configured for the power supply alarm
are inoperable.
For example, to enable all actions for the power supply alarm, enter the following:
Step 6 In the Negate Template editor, enter the lines required to undo this configuration.
All of these commands take the no form to disable them and return to default settings. For example, if your
template includes all of the command examples shown in this procedure, the negate template would be the
following:
no power-supply dual
no alarm facility power-supply rps relay
no alarm facility power-supply rps syslog
no alarm facility power-supply rps notifies
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
123
System Monitoring
Configure Temperature Alarms
Step 9 After deployment completes, in CLI Console or an SSH session, use the show running-config command and
verify that the running configuration has the correct changes.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
124
System Monitoring
Monitoring Alarms
For example, to enable all actions for the secondary temperature alarm, enter the following:
Step 6 In the Negate Template editor, enter the lines required to undo this configuration.
All of these commands take the no form to return to default settings (for the primary alarm) or disable them
(for the secondary alarm). For example, if your template includes all of the command examples shown in this
procedure, the negate template would be the following:
Step 9 After deployment completes, in CLI Console or an SSH session, use the show running-config command and
verify that the running configuration has the correct changes.
Monitoring Alarms
The following topics explain how to monitor and manage alarms.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
125
System Monitoring
Monitoring Syslog Messages for Alarms
Shows information about the physical status of the input alarm contacts.
• show facility-alarm relay
Shows information about the alarms that have triggered the output relay.
• show facility-alarm status [info | major | minor]
Shows information on all alarms that have been triggered. You can limit the view by filtering on major
or minor status. The info keyword provides the same output as using no keyword.
Temperature Alarms
In these alarms, Celsius is replaced by the temperature detected on the device, in Celsius.
• %FTD-6-806001: Primary alarm CPU temperature is High Celsius
• %FTD-6-806002: Primary alarm for CPU high temperature is cleared
• %FTD-6-806003: Primary alarm CPU temperature is Low Celsius
• %FTD-6-806004: Primary alarm for CPU Low temperature is cleared
• %FTD-6-806005: Secondary alarm CPU temperature is High Celsius
• %FTD-6-806006: Secondary alarm for CPU high temperature is cleared
• %FTD-6-806007: Secondary alarm CPU temperature is Low Celsius
• %FTD-6-806008: Secondary alarm for CPU Low temperature is cleared
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
126
PA R T II
Reusable Objects
• Objects, on page 129
• Certificates, on page 143
• Identity Sources, on page 151
CHAPTER 6
Objects
Objects are reusable containers that define criteria that you want to use in policies or other settings. For
example, network objects define host and subnet addresses.
Objects let you define criteria so that you can easily reuse the same criteria in different policies. When you
update an object, all policies that use the object are automatically updated.
• Object Types, on page 129
• Managing Objects, on page 132
Object Types
You can create the following types of object. In most cases, if a policy or setting allows an object, you must
use an object.
AnyConnect Client Remote access VPN. AnyConnect client profiles are downloaded to clients along with
Profile the AnyConnect client software. These profiles define many
client-related options, such as auto connect on startup and auto
reconnect, and whether the end user is allowed to change the
option from the AnyConnect client preferences and advanced
settings.
See Configure and Upload Client Profiles, on page 607.
Application Filter Access control rules. An application filter object defines the applications used in an
IP connection, or a filter that defines applications by type,
category, tag, risk, or business relevance. You can use these
objects in policies to control traffic instead of using port
specifications.
See Configuring Application Filter Objects, on page 136.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
129
Reusable Objects
Object Types
DNS Groups DNS settings for the DNS groups define a list of DNS servers and some associated
management and attributes. DNS servers are needed to resolve fully-qualified
data interfaces. domain names (FQDN), such as www.example.com, to IP
addresses.
See Configuring DNS Groups, on page 680.
Event List Filters System logging Event list filters create a custom filter list for syslog messages.
settings for select You can use them to limit the messages that are sent to a
logging destinations. particular logging location, such as a syslog server or the internal
log buffer.
See Configure Event List Filters, on page 677.
Geolocation Security policies. A geolocation object defines countries and continents that host
the device that is the source or destination of traffic. You can
use these objects in policies to control traffic instead of using IP
addresses.
See Configuring Geolocation Objects, on page 139.
Identity Sources Identity policies. Identity sources are servers and databases that define user
accounts. You can use this information in a variety of ways, such
Remote access VPN.
as providing the user identity associated with an IP address, or
Firepower Device authenticating remote access VPN connections or access to
Manager access. Firepower Device Manager.
See Identity Sources, on page 151.
IKE Policy VPN. Internet Key Exchange (IKE) Policy objects define the IKE
proposal used to authenticate IPsec peers, negotiate and distribute
IPsec encryption keys, and automatically establish IPsec security
associations (SAs). There are separate objects for IKEv1 and
IKEv2.
See Configuring the Global IKE Policy, on page 570.
IPsec Proposal VPN. IPsec Proposal objects configure the IPsec proposal used during
IKE Phase 2 negotiations. The IPsec proposal defines the
combination of security protocols and algorithms that secure
traffic in an IPsec tunnel. There are separate objects for IKEv1
and IKEv2.
See Configuring IPsec Proposals, on page 574.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
130
Reusable Objects
Object Types
Network Security policies and Network groups and network objects (collectively referred to as
a wide variety of network objects) define the addresses of hosts or networks.
device settings.
See Configuring Network Objects and Groups, on page 132.
Port Security policies. Port groups and port objects (collectively referred to as port
objects) define the protocols, ports, or ICMP services for traffic.
See Configuring Port Objects and Groups, on page 134.
Secret Keys Smart CLI and Secret key objects define passwords or other authentication
FlexConfig policies. strings that you want to encrypt and hide.
See Configuring Secret Key Objects, on page 759.
Security Zone Security policies. A security zone is a grouping of interfaces. Zones divide the
network into segments to help you manage and classify traffic.
See Configuring Security Zones, on page 135.
SLA Monitors Static routes. An SLA Monitor defines a target IP address to use for monitoring
a static route. If the monitor determines the target IP address can
no longer be reached, the system can install a backup static route.
See Configure SLA Monitor Objects, on page 289.
Syslog Servers Access control rules. A syslog server object identifies a server that can receive
connection-oriented or diagnostic system log (syslog) messages.
Diagnostic logging.
See Configuring Syslog Servers, on page 140.
Security Intelligence
policies.
SSL decryption
rules.
Intrusion policies.
File/malware
policies
URL Access control rules. URL objects and groups (collectively referred to as URL objects)
define the URL or IP addresses of web requests.
Security Intelligence
policies. See Configuring URL Objects and Groups, on page 138.
Users Remote access VPN. You can create user accounts directly on the device for use with
remote access VPN. You can use the local user accounts instead
of, or in addition to, an external authentication source.
See Configure Local Users, on page 165.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
131
Reusable Objects
Managing Objects
Managing Objects
You can configure objects directly through the Objects page, or you can configure them while editing policies.
Either method yields the same results, a new or updated object, so use the technique that suits your needs at
the time.
The following procedure explains how you can create and manage your objects directly through the Objects
page.
Note When you edit a policy or setting, if a property requires an object, you are shown a list of the ones that are
already defined, and you select the appropriate object. If the desired object does not yet exist, simply click
the Create New Object link shown in the list.
Procedure
Step 2 Select the object type from the table of contents and do any of the following:
• To create an object, click the + button. The content of the objects differ based on type; see the configuration
topic for each object type for specific information.
• To create a group object, click the Add Group ( ) button. Group objects include more than one item.
• To edit an object, click the edit icon ( ) for the object. You cannot edit the contents of a pre-defined
object.
• To delete an object, click the delete icon ( ) for the object. You cannot delete an object if it is currently
being used in a policy or another object, or if it is a pre-defined object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
132
Reusable Objects
Configuring Network Objects and Groups
Procedure
Step 1 Select Objects, then select Network from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
• To create a group, click the Add Group ( ) button.
• To edit an object or group, click the edit icon ( ) for the object.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Step 3 Enter a Name for the object and optionally, a description, and define the object contents.
We recommend that you do not use an IP address alone for the name so that you can easily tell object names
from object contents or standalone IP addresses. If you want to use an IP address in the name, prefix it with
something meaningful, such as host-192.168.1.2 or network-192.168.1.0. If you use an IP address as the name,
the system adds a vertical bar as a prefix, for example, |192.168.1.2. FDM does not show the bar in the object
selectors, but you will see this naming standard if you examine the running configuration using the show
running-config command in the CLI.
• Range—A range of addresses, with the starting and ending address separated by a hyphen. You can
specify IPv4 or IPv6 ranges. Do not include masks or prefixes. For example, 192.168.1.10-192.168.1.250
or 2001:DB8:0:CD30::10-2001:DB8:0:CD30::100.
• FQDN—Enter a single fully-qualified domain name, such as www.example.com. You cannot use
wildcards. Also, select the DNS Resolution to determine whether you want the IPv4, IPv6, or both IPv4
and IPv6 addresses associated with the FQDN. The default is both IPv4 and IPv6. You can use these
objects in access control rules only. The rules match the IP address obtained for the FQDN through a
DNS lookup.
Network Groups
Click the + button to select network objects or groups to add to the group. You can also create new objects.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
133
Reusable Objects
Configuring Port Objects and Groups
Note When creating port group objects, ensure that the combination of objects makes sense. For example, you
cannot have a mixture of protocols in an object if you use it to specify both source and destination ports in an
access rule. Exercise care when editing an object that is already being used, or you could invalid (and disable)
policies that use the object.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create port objects while editing a service property by clicking the Create New Port link shown in
the object list.
Procedure
Step 1 Select Objects, then select Ports from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
• To create a group, click the Add Group ( ) button.
• To edit an object or group, click the edit icon ( ) for the object.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Step 3 Enter a name for the object and optionally, a description, and define the object contents.
Port Objects
Select the Protocol, then configure the protocol as follows:
• TCP, UDP—Enter the single port or port range number, for example, 80 (for HTTP) or 1-65535 (to
cover all ports).
• ICMP, IPv6-ICMP—Select the ICMP Type and optionally, the Code. Select Any for the type to apply
to all ICMP messages. For information on the types and codes, see the following pages:
• ICMP—http://www.iana.org/assignments/icmp-parameters/icmp-parameters.xml
• ICMPv6—http://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xml
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
134
Reusable Objects
Configuring Security Zones
Port Groups
Click the + button to select port objects to add to the group. You can also create new objects.
Typically, you would group interfaces by the role they play in your network. For example, you would place
the interface that connects to the Internet in the outside_zone security zone, and all of the interfaces for your
internal networks in the inside_zone security zone. Then, you could apply access control rules to traffic
coming from the outside zone and going to the inside zone.
Before creating zones, consider the access rules and other policies you want to apply to your networks. For
example, you do not need to put all internal interfaces into the same zone. If you have 4 internal networks,
and you want to treat one differently than the other three, you can create two zones rather than one. If you
have an interface that should allow outside access to a public web server, you might want to use a separate
zone for the interface.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create security zones while editing a security zone property by clicking the Create New Security
Zone link shown in the object list.
Procedure
Step 1 Select Objects, then select Security Zones from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
135
Reusable Objects
Configuring Application Filter Objects
The mode relates directly to the interface mode, either Routed or Passive. The zone can contain a single type
of interface. For normal zones for through traffic, select Routed.
Step 5 In the Interfaces list, click + and select the interfaces to add to the zone.
The list shows all named interfaces that are not currently in a zone. You must configure an interface and give
it a name before you can add it to a zone.
If all named interfaces are already in zones, the list is empty. If you are trying to move an interface to a different
zone, you must first remove it from its current zone.
Note You cannot add a bridge group interface (BVI) to a zone. Instead, add the member interfaces. You
can put the members into different zones.
Note Cisco frequently updates and adds additional application detectors via system and vulnerability database
(VDB) updates. Thus, a rule blocking high risk applications can automatically apply to new applications
without you having to update the rule manually.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create application filter objects while editing an access control rule by clicking the Save As Filter
link after adding application criteria to the Applications tab.
Procedure
Step 1 Select Objects, then select Application Filters from the table of contents.
Step 2 Do one of the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
136
Reusable Objects
Configuring Application Filter Objects
To delete an unreferenced object, click the trash can icon ( ) for the object.
Risks
The likelihood that the application is used for purposes that might be against your organization's security
policy, from very low to very high.
Business Relevance
The likelihood that the application is used within the context of your organization's business operations, as
opposed to recreationally, from very low to very high.
Types
The type of application:
• Application Protocol—Application protocols such as HTTP and SSH, which represent communications
between hosts.
• Client Protocol—Clients such as web browsers and email clients, which represent software running on
the host.
• Web Application—Web applications such as MPEG video and Facebook, which represent the content
or requested URL for HTTP traffic.
Categories
A general classification for the application that describes its most essential function.
Tags
Additional information about the application, similar to category.
For encrypted traffic, the system can identify and filter traffic using only the applications tagged SSL Protocol.
Applications without this tag can only be detected in unencrypted or decrypted traffic. Also, the system assigns
the decrypted traffic tag to applications that the system can detect in decrypted traffic only, not encrypted
or unencrypted.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
137
Reusable Objects
Configuring URL Objects and Groups
Note URL objects will not match HTTPS traffic if the browser resumes a TLS session
because the certificate information is no longer available. Thus, even if you
carefully configure the URL object, you might get inconsistent results for HTTPS
connections.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
138
Reusable Objects
Configuring Geolocation Objects
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create URL objects while editing a URL property by clicking the Create New URL link shown in
the object list.
Procedure
Step 1 Select Objects, then select URL from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
• To create a group, click the Add Group ( ) button.
• To edit an object or group, click the edit icon ( ) for the object.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Note To ensure that you are using up-to-date geographical location data to filter your traffic, Cisco strongly
recommends that you regularly update the geolocation database (GeoDB).
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create geolocation objects while editing a network property by clicking the Create New Geolocation
link shown in the object list.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
139
Reusable Objects
Configuring Syslog Servers
Procedure
Step 1 Select Objects, then select Geolocation from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
To delete an unreferenced object, click the trash can icon ( ) for the object.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create syslog server objects while editing a syslog server property by clicking the Add Syslog Server
link shown in the object list.
Procedure
Step 1 Select Objects, then select Syslog Servers from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
140
Reusable Objects
Configuring Syslog Servers
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
141
Reusable Objects
Configuring Syslog Servers
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
142
CHAPTER 7
Certificates
Digital certificates provide digital identification for authentication. Certificates are used for SSL (Secure
Socket Layer), TLS (Transport Layer Security), and DTLS (Datagram TLS) connections, such as HTTPS and
LDAPS. The following topics explain how to create and manage certificates.
• About Certificates, on page 143
• Configuring Certificates, on page 146
About Certificates
Digital certificates provide digital identification for authentication. A digital certificate includes information
that identifies a device or user, such as the name, serial number, company, department, or IP address. A digital
certificate also includes a copy of the public key for the user or device. Certificates are used for SSL (Secure
Socket Layer), TLS (Transport Layer Security), and DTLS (Datagram TLS) connections, such as HTTPS and
LDAPS.
You can create the following types of certificate:
• Internal certificates—Internal identity certificates are certificates for specific systems or hosts. You can
generate these yourself using the OpenSSL toolkit or get them from a Certificate Authority. You can
also generate a self-signed certificate.
• Internal Certificate Authority (CA) certificates—Internal CA certificates are certificates that the system
can use to sign other certificates. These certificates differ from internal identity certificates with respect
to the basic constraints extension and the CA flag, which are enabled for CA certificates but disabled for
identity certificates. You can generate these yourself using the OpenSSL toolkit or get them from a
Certificate Authority. You can also generate a self-signed internal CA certificate. If you configure
self-signed internal CA certificates, the CA runs on the device itself.
• Trusted Certificate Authority (CA) certificates—A trusted CA certificate is used to sign other certificates.
It is self-signed and called a root certificate. A certificate that is issued by another CA certificate is called
a subordinate certificate.
Certificate Authorities (CAs) are trusted authorities that “sign” certificates to verify their authenticity, thereby
guaranteeing the identity of the device or user. CAs issue digital certificates in the context of a PKI, which
uses public-key or private-key encryption to ensure security. A CA can be a trusted third party, such as
VeriSign, or a private (in-house) CA that you establish within your organization. CAs are responsible for
managing certificate requests and issuing digital certificates. For more information, see Public Key
Cryptography, on page 144.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
143
Reusable Objects
Public Key Cryptography
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
144
Reusable Objects
Example: Generating an Internal Certificate using OpenSSL
Note The OpenSSL commands shown here are examples only. Adjust the parameters to fit your security requirements.
Procedure
openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
Because Firepower Device Manager does not support encrypted keys, try to skip the challenge password by
just pressing return when generating a self signed certificate.
Step 4 Upload the files into the appropriate fields when creating an internal certificate object in Firepower Device
Manager.
You can also copy/paste the file contents. The sample commands create the following files:
• server.crt—Upload or paste the contents into the Server Certificate field.
• server.key—Upload or paste the contents into the Certificate Key field. If you provided a password when
generating the key, you can decrypt it using the following command. The output is sent to stdout, where
you can copy it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
145
Reusable Objects
Configuring Certificates
Configuring Certificates
FTD supports X509 certificates in PEM or DER format. Use OpenSSL to generate certificates if needed,
obtain them from a trusted Certificate Authority, or create self-signed certificates.
For more information on certificates, see About Certificates, on page 143.
For information on which type is used for each feature, see Certificate Types Used by Feature, on page 144.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create certificate objects while editing a certificate property by clicking the Create New Certificate
link shown in the object list.
Procedure
Step 1 Select Objects, then select Certificates from the table of contents.
The system comes with the following pre-defined certificates, which you can use as is or replace.
• DefaultInternalCertificate
• DefaultWebserverCertificate
• NGFW-Default-InternalCA
The system also includes many trusted CA certificates from third party Certificate Authorities. These are used
by SSL decryption policies for Decrypt Re-Sign actions.
You can click the pre-defined search filters to limit the list to just System-defined or User-defined certificates.
• To view or edit a certificate, click either the edit icon ( ) or the view icon ( ) for the certificate.
• To delete an unreferenced certificate, click the trash can icon ( ) for the certificate.
For detailed information on creating or editing certificates, see the following topics:
• Uploading Internal and Internal CA Certificates, on page 147
• Generating Self-Signed Internal and Internal CA Certificates, on page 148
• Uploading Trusted CA Certificates, on page 149
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
146
Reusable Objects
Uploading Internal and Internal CA Certificates
Procedure
Step 1 Select Objects, then select Certificates from the table of contents.
Step 2 Do one of the following:
• Click + > Add Internal Certificate, then click Upload Certificate and Key.
• Click + > Add Internal CA Certificate, then click Upload Certificate and Key.
• To edit or view a certificate, click the information icon ( ). The dialog box shows the certificate subject,
issuer, and valid time range. Click Replace Certificate to upload a new certificate and key. You can also
paste the certificate and key in the dialog box.
Step 4 Click Upload Certificate (or Replace Certificate when editing) and select the certificate file (for example,
*.crt). Allowed file extensions are .pem, .cert, .cer, .crt, and .der. Alternatively, paste in the certificate.
The certificate must be an X509 certificate in PEM or DER format.
The certificate you paste must include the BEGIN CERTIFICATE and END CERTIFICATE lines. For
example:
-----BEGIN CERTIFICATE-----
MIICMTCCAZoCCQDdUV3NGK/cUjANBgkqhkiG9w0BAQsFADBdMQswCQYDVQQGEwJV
UzETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50ZXJuZXQgV2lkZ2l0
(...5 lines removed...)
shGJDReRYJQqilhHZrYTWZAYTrD7NQPHutK+ZiJng67cPgnNDuXEn55UwMOQoHBp
HMUwmhiGZlzJM8BpX2Js2yQ3ms30pr8rO+gPCPMCAwEAATANBgkqhkiG9w0BAQsF
AAOBgQCB02CebA6YjJCGr2CJZrQSeUwSveRBpmOuoqm98o2Z+5gJM5CkqgfxwCUn
RV7LRfQGFYd76V/5uor4Wx2ZCjqy6+zuQEm4ZxWNSZpA9UBixFXJCs9MBO4qkG5D
vlk3WYJfcgyJ10h4E4b0W2xiixBU+xoOTLRATnbKY36EWAG5cw==
-----END CERTIFICATE-----
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
147
Reusable Objects
Generating Self-Signed Internal and Internal CA Certificates
Step 5 Click Upload Key (or Replace Key when editing) and select the certificate file (for example, *.key). The file
extension must be .key. Alternatively, paste in the key for the certificate.
The key cannot be encrypted.
For example:
Note New self-signed certificates are generated with a 5-year validity term. Be sure to replace certificates before
they expire.
Procedure
Step 1 Select Objects, then select Certificates from the table of contents.
Step 2 Do one of the following:
• Click + > Add Internal Certificate, then click Self-Signed Certificate.
• Click + > Add Internal CA Certificate, then click Self-Signed Certificate.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
148
Reusable Objects
Uploading Trusted CA Certificates
Note
To edit or view a certificate, click the information icon ( ). The dialog box shows the certificate
subject, issuer, and valid time range. Click Replace Certificate to upload a new certificate and key.
When replacing a certificate, you cannot redo the self-signed characteristics explained in the following
steps. Instead, you must paste or upload a new certificate as described in Uploading Internal and
Internal CA Certificates, on page 147. The remaining steps apply to new self-signed certificates
only.
Step 4 Configure at least one of the following for the certificate subject and issuer information.
• Country (C)—The two-character ISO 3166 country code to include in the certificate. For example, the
country code for the United States is US. Select the country code from the drop-down list.
• State or Province (ST)—The state or province to include in the certificate.
• Locality or City (L)—The locality to include in the certificate, such as the name of the city.
• Organization (O)—The organization or company name to include in the certificate.
• Organizational Unit (Department) (OU)—The name of the organization unit (for example, a department
name) to include in the certificate.
• Common Name (CN)—The X.500 common name to include in the certificate. This could be the name
of the device, web site, or another text string. This element is usually required for successful connections.
For example, you must include a CN in the internal certificate used for remote access VPN.
Procedure
Step 1 Select Objects, then select Certificates from the table of contents.
Step 2 Do one of the following:
• Click + > Add Trusted CA Certificate.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
149
Reusable Objects
Uploading Trusted CA Certificates
The name is used in the configuration as an object name only, it does not become part of the certificate itself.
Step 4 Click Upload Certificate (or Replace Certificate when editing) and select the trusted CA certificate file (for
example *.pem). Allowed file extensions are .pem, .cert, .cer, .crt, and .der. Alternatively, paste in the trusted
CA certificate.
The name of the server in the certificate must match the server Hostname / IP Address. For example, if you
use 10.10.10.250 as the IP address but ad.example.com in the certificate, the connection fails.
The certificate must be an X509 certificate in PEM or DER format.
The certificate you paste must include the BEGIN CERTIFICATE and END CERTIFICATE lines. For
example:
-----BEGIN CERTIFICATE-----
MIIFgTCCA2mgAwIBAgIJANvdcLnabFGYMA0GCSqGSIb3DQEBCwUAMFcxCzAJBgNV
BAYTAlVTMQswCQYDVQQIDAJUWDEPMA0GA1UEBwwGYXVzdGluMRQwEgYDVQQKDAsx
OTIuMTY4LjEuMTEUMBIGA1UEAwwLMTkyLjE2OC4xLjEwHhcNMTYxMDI3MjIzNDE3
WhcNMTcxMDI3MjIzNDE3WjBXMQswCQYDVQQGEwJVUzELMAkGA1UECAwCVFgxDzAN
BgNVBAcMBmF1c3RpbjEUMBIGA1UECgwLMTkyLjE2OC4xLjExFDASBgNVBAMMCzE5
Mi4xNjguMS4xMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5NceYwtP
ES6Ve+S9z7WLKGX5JlF58AvH82GPkOQdrixn3FZeWLQapTpJZt/vgtAI2FZIK31h
(...20 lines removed...)
hbr6HOgKlOwXbRvOdksTzTEzVUqbgxt5Lwupg3b2ebQhWJz4BZvMsZX9etveEXDh
PY184V3yeSeYjbSCF5rP71fObG9Iu6+u4EfHp/NQv9s9dN5PMffXKieqpuN20Ojv
2b1sfOydf4GMUKLBUMkhQnip6+3W
-----END CERTIFICATE-----
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
150
CHAPTER 8
Identity Sources
Identity sources are servers and databases that define user accounts. You can use this information in a variety
of ways, such as providing the user identity associated with an IP address, or authenticating remote access
VPN connections or access to Firepower Device Manager.
The following topics explain how to define the identity sources. You would then use these objects when you
configure the services that require an identity source.
• About Identity Sources, on page 151
• Active Directory (AD) Identity Realms, on page 152
• RADIUS Servers and Groups, on page 158
• Identity Services Engine (ISE), on page 162
• Local Users, on page 165
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
151
Reusable Objects
Active Directory (AD) Identity Realms
Cisco Identity Services Engine (ISE) or Cisco Identity Services Engine Passive Identity Connector (ISE
PIC)
If you are using ISE, you can integrate the Firepower Threat Defense device with your ISE deployment.
See Identity Services Engine (ISE), on page 162.
You can use this source for the following purposes:
• Identity policy, as a passive identity source to collect user identity from ISE.
LocalIdentitySource
This is the local user database, which includes users that you have defined in Firepower Device Manager.
Select Objects > Users to manage the user accounts in this database. See Local Users, on page 165.
Note The local identity source database does not include users you configure in the CLI for CLI access (using
the configure user add command). CLI users are completely separate from those you create in Firepower
Device Manager.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
152
Reusable Objects
Limitations on Number of Users
last name sn
department department
distinguishedname (if department has no value)
Tip To get the correct bases, consult the administrator who is responsible for the directory servers.
For active directory, you can determine the correct bases by logging into the Active Directory server as domain
administrator, and using the dsquery command at a command prompt as follows to determine the bases:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
153
Reusable Objects
Configuring AD Identity Realms
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
154
Reusable Objects
Configuring AD Identity Realms
• Access Control, SSL Decryption—You can select the realm in the user criteria for the rule to apply the
rule to all users within the realm.
Work with your directory administrator to get the values required to configure the directory server properties.
Note If the directory server is not on an attached network or available through the default route, create a static route
for the server. Select Device > Routing > View Configuration to create static routes.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create identity realm objects while editing a realm property by clicking the Create New Identity
Realm link shown in the object list.
Procedure
Step 1 Select Objects, then select Identity Sources from the table of contents.
Step 2 Do one of the following:
• To create an AD realm, click + > AD.
• To edit a realm, click the edit icon ( ) for the realm.
To delete an unreferenced object, click the trash can icon ( ) for the object.
• Base DN—The directory tree for searching or querying user and group information, that is, the common
parent for users and groups. For example, cn=users,dc=example,dc=com. For information on finding the
base DN, see Determining the Directory Base DN, on page 153.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
155
Reusable Objects
Troubleshooting Directory Server Connections
• AD Primary Domain— The fully qualified Active Directory domain name that the device should join.
For example, example.com.
• Trusted CA Certificate—If you select an encryption method, upload a Certificate Authority (CA)
certificate to enable a trusted connection between the system and the directory server. If you are using
a certificate to authenticate, the name of the server in the certificate must match the server Hostname /
IP Address. For example, if you use 10.10.10.250 as the IP address but ad.example.com in the certificate,
the connection fails.
Step 5 If there are multiple servers for the realm, click Add Another Configuration and enter the properties for
each additional server.
You can add up to 10 AD servers to the realm. These servers need to be duplicates of each other and support
the same AD domain.
You can collapse and expand each server entry for your convenience. The sections are labeled with the
hostname/IP address and port.
Step 6 Click the Test button to verify the system can contact the server.
The system uses separate processes and interfaces to access the server, so you might get errors indicating that
the connection works for one type of use but not another, for example, available for Identity policies but not
for remote access VPN. If the server cannot be reached, verify that you have the right IP address and host
name, that the DNS server has an entry for the hostname, and so forth. You might need to configure a static
route for the server. For more information, see Troubleshooting Directory Server Connections, on page 156.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
156
Reusable Objects
Troubleshooting Directory Server Connections
When you configure the identity realm, use the Test button to verify that the connection can work. Failure
messages should indicate the feature that is having connection problems. The following are the general issues
you might encounter, based on authentication attributes and routing/interface configuration.
Directory user authentication issues.
If the problem is that the system could not log into the directory server because of the username or
password, ensure that the name and password are correct and valid on the directory server. For Active
Directory, the user does not need elevated privileges. You can specify any user in the domain. The
username must be fully qualified; for example, Administrator@example.com (not simply Administrator).
Also, the system generates ldap-login-dn and ldap-login-password from the username and password
information. For example, Administrator@example.com is translated as
cn=administrator,cn=users,dc=example,dc=com. Note that cn=users is always part of this translation, so
you must configure the user you specify here under the common name “users” folder.
The directory server is accessible through a data interface.
If the directory server is on a network that is either directly connected to a data interface (such as a
GigabitEthernet interface), or routeable from a directly-connected network, you must ensure that there
is a route between the virtual management interface and the directory server.
• Using data-interfaces as the management gateway should make routing successful.
• If you have an explicit gateway on the management interface, that gateway router needs to have a
route to the directory server.
• You do not need to configure an IP address on the diagnostic interface, which is the physical
interface used by the virtual management interface. However, if you do configure an address, do
not also configure a static route (such as a default route) that would redirect traffic to the directory
server to the diagnostic interface.
• If there is a router between the directly-connected network and the network that hosts the directory
server, configure a static route for the directory server (Device > Routing).
• Verify that the data interface has the correct IP address and subnet mask.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
157
Reusable Objects
RADIUS Servers and Groups
Procedure
Step 1 Select Objects, then select Identity Sources from the table of contents.
Step 2 Do one of the following:
• To create an object, click + > RADIUS Server.
• To edit an object, click the edit icon ( ) for the object.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
158
Reusable Objects
Configure RADIUS Servers
• Authentication Port—The port on which RADIUS authentication and authorization are performed. The
default is 1812.
• Timeout—The length of time, 1-300 seconds, that the system waits for a response from the server before
sending the request to the next server. The default is 10 seconds. If you are using this server as a secondary
authentication source for remote access VPN, for example, to prompt for an authentication token, increase
this timeout to 60 seconds at least. This provides time for the user to obtain and enter the token.
• Server Secret Key—(Optional.) The shared secret that is used to encrypt data between the Firepower
Threat Defense device and the RADIUS server. The key is a case-sensitive, alphanumeric string of up
to 64 characters, with no spaces. The key must start with an alphanumeric character or an underscore,
and it can contain the special characters: $ & - _ . + @. The string must match the one configured on the
RADIUS server. If you do not configure a secret key, the connection is not encrypted.
Step 4 (Optional.) If you are using the server for remote access VPN Change of Authorization configuration, you
can click the RA VPN Only link and configure the following options.
• Redirect ACL—Select the extended ACL to use for the RA VPN redirect ACL. Create extended ACLs
using the Smart CLI Extended Access List object on the Device > Advanced Configuration > Smart
CLI > Objects page.
The purpose of the redirect ACL is to send initial traffic to Cisco Identity Services Engine (ISE) so that
ISE can assess the client posture. The ACL should send HTTPS traffic to ISE, but not traffic that is
already destined for ISE, or traffic that is directed to a DNS server for name resolution. For an example,
see Configure Change of Authorization on the FTD Device, on page 627.
• Interface Used to Connect to RADIUS Server—Which interface to use when communicating with the
server. If you select Resolve via Route Lookup, the system always uses the routing table to determine
the interface to use. If you select Manually Choose Interface, the system will always use the interface
you select.
If you are configuring Change of Authorization, you must select a specific interface so that the system
can correctly enable the CoA listener on the interface.
If the server is on the same network as the management address, which means you will select the diagnostic
interface, you must also configure an IP address on the diagnostic interface. Having a management IP
address is not sufficient. Go to Device > Interfaces, and configure an IP address on the diagnostic
interface that is on the same subnet as the management IP address.
If you also use this server for FDM administrative access, this interface is ignored. Administrative access
attempts are always authenticated through the management IP address.
Step 5 (Optional, when editing the object only.) Click Test to check whether the system can connect to the server.
You are prompted for a username and password. The test confirms whether the server can be contacted, and
if it can, that the username can be authenticated.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
159
Reusable Objects
Configure RADIUS Server Groups
Procedure
Step 1 Select Objects, then select Identity Sources from the table of contents.
Step 2 Do one of the following:
• To create an object, click + > RADIUS Server Group.
• To edit an object, click the edit icon ( ) for the object.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
160
Reusable Objects
Troubleshoot RADIUS Servers and Groups
adding the objects, you can drag and drop to rearrange them. If the object you need does not yet exist,
click Create New RADIUS Server and add it now.
You can also click the Test link to verify the system can connect to the server. You are prompted for a
username and password. The test confirms whether the server can be contacted, and if it can, that the
username can be authenticated.
Step 4 (Optional.) Click the Test All Servers button to check connectivity to each server in the group.
You are prompted for a username and password. The system checks whether each server can be contacted,
and whether the username can be authenticated on each server.
• If external authentication has been working, but has stopped working, consider the possibility that all
servers are in the dead time. When all the RADIUS servers within a group have failed, the dead time is
the number of minutes the system waits before trying the first server again. The default is 10 minutes,
but you can configure as long as 1440 minutes.
• If HTTPS external authentication works for some users but not others, evaluate the cisco-av-pair attribute
defined in the RADIUS server for each user account. This attribute might be configured incorrectly. A
missing or incorrect attribute will block all HTTS access for that user account.
• If SSH external authentication works for some users but not for others, evaluate the Service-Type attribute
defined in the RADIUS server for each user account. This attribute might be configured incorrectly. A
missing or incorrect attribute will block all SSH access for that user account.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
161
Reusable Objects
Identity Services Engine (ISE)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
162
Reusable Objects
Configure Identity Services Engine
upload them as trusted CA certificates on the Objects > Certificates page, or upload them during the
following procedure. These nodes might be using the same certificate.
• You must also configure an AD identity realm. The system obtains the list of users from AD, and from
ISE it gets information on the user-to-IP address mappings.
Procedure
Step 1 Select Objects, then select Identity Sources from the table of contents.
Step 2 Do one of the following:
• To create an object, click + > Identity Services Engine. You can create at most one ISE object.
• To edit an object, click the edit icon ( ) for the object.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Step 4 Click the Test button to verify that the system can connect to your ISE server.
If the test fails, click the See Logs link to read the detailed error messages. For example, the following message
indicates that the system could not connect to the server at the required port. The problem might be no route
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
163
Reusable Objects
Troubleshoot the ISE/ISE-PIC Identity Source
to the host, that the ISE server is not using the expected port, or that you have access control rules that prevent
the connection.
What to do next
After you configure ISE, enable the identity policy, configure passive authentication rules, and deploy the
configuration. Then, you must go into ISE/ISE PIC and accept the device as a subscriber. If you configure
ISE/ISE PIC to automatically accept subscribers, you do not need to manually accept the subscription.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
164
Reusable Objects
Local Users
Local Users
The local user database (LocalIdentitySource) includes users that you have defined in Firepower Device
Manager.
You can use locally-defined users for the following purposes:
• Remote Access VPN, as a primary or fallback identity source.
• Management access, as a primary or secondary source for Firepower Device Manager users.
The admin user is a system-defined local user. However, the admin user cannot log into a remote access
VPN. You cannot create additional local administrative users.
If you define external authentication for management access, external users who log into the device
appear on the local users list.
• Identity policy, indirectly, as a passive identity source to collect user identity from remote access VPN
logins.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
165
Reusable Objects
Configure Local Users
If you no longer need a particular user account, click the delete icon ( ) for the user.
Note Users cannot change their passwords. Notify them of their passwords, and when they need to change
them, you must edit the user account. Also, do not update the password for external MGMT users:
the passwords are controlled by the external AAA server.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
166
PA R T III
The Basics
• Logical Devices on the Firepower 4100/9300, on page 169
• High Availability (Failover), on page 181
• Interfaces, on page 221
CHAPTER 9
Logical Devices on the Firepower 4100/9300
The Firepower 4100/9300 is a flexible security platform on which you can install one or more logical devices.
You must configure chassis interfaces, add a logical device, and assign interfaces to the device on the Firepower
4100/9300 chassis using the Firepower Chassis Manager or the FXOS CLI. You cannot perform these tasks
in FDM.
This chapter describes basic interface configuration and how to add a standalone or High Availability logical
device using the Firepower Chassis Manager. To use the FXOS CLI, see the FXOS CLI configuration guide.
For more advanced FXOS procedures and troubleshooting, see the FXOS configuration guide.
• About Firepower Interfaces, on page 169
• Requirements and Prerequisites for Firepower 9300 Hardware and Software Combinations, on page 171
• Guidelines and Limitations for Logical Devices, on page 171
• Configure Interfaces, on page 172
• Configure a Logical Device, on page 174
• History for Firepower 4100/9300 Logical Devices, on page 179
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
169
The Basics
Interface Types
Note The chassis management interface does not support jumbo frames.
Interface Types
Each interface can be one of the following types:
• Data—Use for regular data. Data interfaces cannot be shared between logical devices, and logical devices
cannot communicate over the backplane to other logical devices. For traffic on Data interfaces, all traffic
must exit the chassis on one interface and return on another interface to reach another logical device.
• Data-sharing—Use for regular data. Only supported with container instances, these data interfaces can
be shared by one or more logical devices/container instances (FTD-using-FMC only).
• Mgmt—Use to manage application instances. These interfaces can be shared by one or more logical
devices to access external hosts; logical devices cannot communicate over this interface with other logical
devices that share the interface. You can only assign one management interface per logical device. For
ASA and FDM: You can later enable management from a data interface; but you must assign a
Management interface to the logical device even if you don't intend to use it after you enable data
management.
• Firepower-eventing—Use as a secondary management interface for FTD-using-FMC devices.
• Cluster—Use as the cluster control link for a clustered logical device. By default, the cluster control link
is automatically created on Port-channel 48. The Cluster type is only supported on EtherChannel interfaces.
FDM does not support clustering.
VLAN Subinterfaces
For all logical devices, you can create VLAN subinterfaces within the application.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
170
The Basics
Requirements and Prerequisites for Firepower 9300 Hardware and Software Combinations
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
171
The Basics
General Guidelines and Limitations
• For more information, see System Requirements for High Availability, on page 189.
Configure Interfaces
By default, physical interfaces are disabled. You can enable interfaces, add EtherChannels, and edit interface
properties.
Procedure
Step 2 To enable the interface, click the disabled Slider disabled ( ) so that it changes to the enabled Slider
enabled ( ).
Click Yes to confirm the change. The corresponding interface in the visual representation changes from gray
to green.
Step 3 To disable the interface, click the enbled Slider enabled ( ) so that it changes to the disabled Slider
disabled ( ).
Click Yes to confirm the change. The corresponding interface in the visual representation changes from green
to gray.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
172
The Basics
Configure a Physical Interface
Note It may take up to three minutes for an EtherChannel to come up to an operational state if you change its mode
from On to Active or from Active to On.
The Firepower 4100/9300 chassis only supports EtherChannels in Active LACP mode so that each member
interface sends and receives LACP updates. An active EtherChannel can establish connectivity with either
an active or a passive EtherChannel. You should use the active mode unless you need to minimize the amount
of LACP traffic.
LACP coordinates the automatic addition and deletion of links to the EtherChannel without user intervention.
It also handles misconfigurations and checks that both ends of member interfaces are connected to the correct
channel group. “On” mode cannot use standby interfaces in the channel group when an interface goes down,
and the connectivity and configurations are not checked.
When the Firepower 4100/9300 chassis creates an EtherChannel, the EtherChannel stays in a Suspended
state for Active LACP mode or a Down state for On LACP mode until you assign it to a logical device, even
if the physical link is up. The EtherChannel will be brought out of this Suspended state in the following
situations:
• The EtherChannel is added as a data or management interface for a standalone logical device
• The EtherChannel is added as a management interface or cluster control link for a logical device that is
part of a cluster
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
173
The Basics
Configure a Logical Device
• The EtherChannel is added as a data interface for a logical device that is part of a cluster and at least one
unit has joined the cluster
Note that the EtherChannel does not come up until you assign it to a logical device. If the EtherChannel is
removed from the logical device or the logical device is deleted, the EtherChannel will revert to a Suspended
or Down state.
Procedure
See the FDM configuration guide to start configuring your security policy.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
174
The Basics
Change an Interface on a Firepower Threat Defense Logical Device
Procedure
Step 3 Enable High Availability on the logical devices. See High Availability (Failover), on page 181.
Step 4 If you need to make interface changes after you enable High Availability, perform the changes on the standby
unit first, and then perform the changes on the active unit.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
175
The Basics
Change an Interface on a Firepower Threat Defense Logical Device
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
176
The Basics
Change an Interface on a Firepower Threat Defense Logical Device
h) A message appears on the Interfaces page. Click the link in the message.
i) Check the Task List to ensure that the migration was successful.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
177
The Basics
Connect to the Console of the Application
Procedure
Step 1 Connect to the module CLI using a console connection or a Telnet connection.
connect module slot_number {console | telnet}
To connect to the security engine of a device that does not support multiple security modules, always use 1
as the slot_number.
The benefits of using a Telnet connection is that you can have multiple sessions to the module at the same
time, and the connection speed is faster.
Example:
Firepower-module1>
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
178
The Basics
History for Firepower 4100/9300 Logical Devices
Support for FDM on the Firepower 6.5.0 You can now use FDM with FTD logical
4100/9300 devices on the Firepower 4100/9300. FDM
does not support Multi-Instance capability;
only native instances are supported.
Note Requires FXOS 2.7.1.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
179
The Basics
History for Firepower 4100/9300 Logical Devices
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
180
CHAPTER 10
High Availability (Failover)
The following topics describe how to configure and manage active/standby failover to accomplish high
availability of the Firepower Threat Defense system.
• About High Availability (Failover), on page 181
• System Requirements for High Availability, on page 189
• Guidelines for High Availability, on page 190
• Configuring High Availability, on page 192
• Managing High Availability, on page 204
• Monitoring High Availability, on page 212
• Troubleshooting High Availability (Failover), on page 215
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
181
The Basics
Primary/Secondary Roles and Active/Standby Status
Failover Events
In Active/Standby failover, failover occurs on a unit basis.
The following table shows the failover action for each failure event. For each failure event, the table shows
the failover policy (failover or no failover), the action taken by the active unit, the action taken by the standby
unit, and any special notes about the failover condition and actions.
Failure Event Policy Active Unit Action Standby Unit Action Notes
Active unit failed (power Failover n/a Become active No hello messages are
or hardware) received on any
Mark active as failed
monitored interface or the
failover link.
Standby unit failed No failover Mark standby as failed n/a When the standby unit is
(power or hardware) marked as failed, then the
active unit does not
attempt to fail over, even
if the interface failure
threshold is surpassed.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
182
The Basics
Failover and Stateful Failover Links
Failure Event Policy Active Unit Action Standby Unit Action Notes
Failover link failed No failover Mark failover link as Mark failover link as You should restore the
during operation failed failed failover link as soon as
possible because the unit
cannot fail over to the
standby unit while the
failover link is down.
Failover link failed at No failover Become active Become active If the failover link is
startup down at startup, both
Mark failover link as Mark failover link as
units become active.
failed failed
Interface failure on active Failover Mark active as failed Become active None.
unit above threshold
Interface failure on No failover No action Mark standby as failed When the standby unit is
standby unit above marked as failed, then the
threshold active unit does not
attempt to fail over even
if the interface failure
threshold is surpassed.
Failover Link
The two units in a failover pair constantly communicate over a failover link to determine the operating status
of each unit and to synchronize configuration changes.
The following information is communicated over the failover link:
• The unit state (active or standby).
• Hello messages (keep-alives).
• Network link status.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
183
The Basics
Stateful Failover Link
Note Eventing, reporting, and audit log data are not synchronized. Event viewer and the dashboards show data
related to the given unit only. In addition, deployment history, task history, and other audit log events are not
synchronized.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
184
The Basics
Avoiding Interrupted Failover and Data Links
Connect the failover link, and the dedicated state link if used, in one of the following two ways:
• Using a switch, with no other device on the same network segment (broadcast domain or VLAN) as the
failover interfaces of the Firepower Threat Defense device. A dedicated state link has the same requirement,
but must be on a different network segment than the failover link.
Note The advantage of using a switch is that if one of the unit’s interfaces goes down,
it is easy to troubleshoot which interface failed. If you are using a direct cable
connection, if one interface fails, the link is brought down on both peers, which
makes it difficult to determine which device is at fault.
• Using an Ethernet cable to connect the units directly, without the need for an external switch. The
Firepower Threat Defense device supports Auto-MDI/MDIX on its copper Ethernet ports, so you can
either use a crossover cable or a straight-through cable. If you use a straight-through cable, the interface
automatically detects the cable and swaps one of the transmit/receive pairs to MDIX.
For optimum performance when using long distance failover, the latency for the state link should be less than
10 milliseconds and no more than 250 milliseconds. If latency is more than 10 milliseconds, some performance
degradation occurs due to retransmission of failover messages.
Scenario 2—Recommended
We recommend that failover links not use the same switch as the data interfaces. Instead, use a different switch
or use a direct cable to connect the failover link, as shown in the following figures.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
185
The Basics
How Stateful Failover Affects User Connections
Scenario 3—Recommended
If the Firepower Threat Defense data interfaces are connected to more than one set of switches, then a failover
link can be connected to one of the switches, preferably the switch on the secure (inside) side of network, as
shown in the following figure.
Figure 12: Connecting with a Secure Switch
Supported Features
For Stateful Failover, the following state information is passed to the standby Firepower Threat Defense
device:
• NAT translation table.
• TCP and UDP connections and states, including HTTP connection states. Other types of IP protocols,
and ICMP, are not parsed by the active unit, because they get established on the new active unit when a
new packet arrives.
• Snort connection states, inspection results, and pin hole information, including strict TCP enforcement.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
186
The Basics
Supported Features
Note Routes are synchronized only for link-up or link-down events on an active unit.
If the link goes up or down on the standby unit, dynamic routes sent from the
active unit may be lost. This is normal, expected behavior.
• DHCP Server—DHCP address leases are not replicated. However, a DHCP server configured on an
interface will send a ping to make sure an address is not being used before granting the address to a
DHCP client, so there is no impact to the service. State information is not relevant for DHCP relay or
DDNS.
• Access control policy decisions—Decisions related to traffic matching (including URL, URL category,
geolocation, and so forth), intrusion detection, malware, and file type are preserved during failover.
However, for connections being evaluated at the moment of failover, there are the following caveats:
• AVC—App-ID verdicts are replicated, but not detection states. Proper synchronization occurs as
long as the App-ID verdicts are complete and synchronized before failover occurs.
• Intrusion detection state—Upon failover, once mid-flow pickup occurs, new inspections are
completed, but old states are lost.
• File malware blocking—The file disposition must become available before failover.
• File type detection and blocking—The file type must be identified before failover. If failover occurs
while the original active device is identifying the file, the file type is not synchronized. Even if your
file policy blocks that file type, the new active device downloads the file.
• Passive user identity decisions from the identity policy, but not those gathered through active authentication
through captive portal.
• Security Intelligence decisions.
• RA VPN—Remote access VPN end users do not have to reauthenticate or reconnect the VPN session
after a failover. However, applications operating over the VPN connection could lose packets during the
failover process and not recover from the packet loss.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
187
The Basics
Unsupported Features
Unsupported Features
For Stateful Failover, the following state information is not passed to the standby Firepower Threat Defense
device:
• Sessions inside plaintext tunnels such as GRE or IP-in-IP. Sessions inside tunnels are not replicated and
the new active node will not be able to reuse existing inspection verdicts to match the correct policy
rules.
• Decrypted TLS/SSL connections—The decryption states are not synchronized, and if the active unit
fails, then decrypted connections will be reset. New connections will need to be established to the new
active unit. Connections that are not decrypted (they match a do-not-decrypt rule) are not affected and
are replicated correctly.
• Multicast routing.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
188
The Basics
System Requirements for High Availability
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
189
The Basics
License Requirements for HA
• Both devices must have the same registration status with Cisco Defense Orchestrator: either both registered,
or neither registered.
• For the following cloud services, either both the primary and secondary device must be enabled, or the
primary can be disabled while the secondary is enabled (the secondary will be disabled after HA join).
• Cisco Success Network
• Cisco Threat Response
• You must deploy any pending changes before you configure high availability.
Note If you register the devices to accounts that have different settings for export controlled features, or try to create
an HA pair with one unit registered and the other in evaluation mode, the HA join might fail. If you configure
an IPsec encryption key with inconsistent settings for export controlled features, both devices will become
active after you activate HA. This will impact routing on the supported network segments, and you will have
to manually break HA on the secondary unit to recover.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
190
The Basics
Guidelines for High Availability
• Firepower 1010:
• You should not use the switch port functionality when using High Availability. Because the switch
ports operate in hardware, they continue to pass traffic on both the active and the standby units.
High Availability is designed to prevent traffic from passing through the standby unit, but this
feature does not extend to switch ports. In a normal High Availability network setup, active switch
ports on both units will lead to network loops. We suggest that you use external switches for any
switching capability. Note that VLAN interfaces can be monitored by failover, while switch ports
cannot. Theoretically, you can put a single switch port on a VLAN and successfully use High
Availability, but a simpler setup is to use physical firewall interfaces instead.
• You can only use a firewall interface as the failover link.
• Firepower Threat Defense Virtual—HA configuration is not supported for Firepower Threat Defense
Virtual for the Microsoft Azure Cloud or the Amazon Web Services (AWS) Cloud.
Additional Guidelines
• 169.254.0.0/16 and fd00:0:0:*::/64 are internally used subnets and you cannot use them for the failover
or state links.
• The configuration from the active unit is synchronized to the standby unit when you run a deployment
job on the active unit. However, some changes do not show up in the pending changes even though they
are not synchronized on the standby unit until you deploy changes. If you alter any of the following, the
changes are hidden and you must run a deployment job before they are configured on the standby unit.
If you need to apply the change immediately, you will need to make some other change that does appear
in the pending changes. Hidden changes include edits to the following: schedules for rule, geodatabase,
Security Intelligence, or VDB updates; schedules for backups; NTP; DNS for the management interface;
license entitlement; cloud services options; URL filtering options.
• You should do backups on both the primary and secondary units. To restore a backup, you must first
break HA. Do not restore the same backup on both units, because they would then both go active. Instead,
restore the backup on the unit you want to go active first, then restore the equivalent backup on the other
unit.
• The Test button for the various identity sources works on the active unit only. If you need to test identity
source connectivity for the standby device, you must first switch modes to make the standby peer the
active peer.
• Creating or breaking the high availability configuration restarts the Snort inspection process on both
devices when the configuration change is deployed. This can result in through traffic disruption until the
process completely restarts.
• When you initially configure high availability, if the Security Intelligence and Geolocation database
versions on the secondary are different than they are on the primary, jobs to update the databases are
scheduled on the secondary unit. These jobs are run on the next deployment from the active unit. Even
if the HA join fails, these jobs remain and will execute on the next deployment.
• When the active unit fails over to the standby unit, the connected switch port running Spanning Tree
Protocol (STP) can go into a blocking state for 30 to 50 seconds when it senses the topology change. To
avoid traffic loss while the port is in a blocking state, you can enable the STP PortFast feature on the
switch:
interface interface_id spanning-tree portfast
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
191
The Basics
Configuring High Availability
This workaround applies to switches connected to both routed mode and bridge group interfaces. The
PortFast feature immediately transitions the port into STP forwarding mode upon linkup. The port still
participates in STP. So if the port is to be a part of the loop, the port eventually transitions into STP
blocking mode.
• Configuring port security on the switches connected to the high availability pair can cause communication
problems when a failover event occurs. This problem occurs because when a secure MAC address
configured or learned on one secure port moves to another secure port, a violation is flagged by the switch
port security feature.
• For Active/Standby high availability and a VPN IPsec tunnel, you cannot monitor both the active and
standby units using SNMP over the VPN tunnel. The standby unit does not have an active VPN tunnel,
and will drop traffic destined for the network management system (NMS). You can instead use SNMPv3
with encryption so the IPsec tunnel is not required.
Procedure
Step 1 Prepare the Two Units for High Availability, on page 192.
Step 2 Configure the Primary Unit for High Availability, on page 194.
Step 3 Configure the Secondary Unit for High Availability, on page 197.
Step 4 Configure Failover Criteria for Health Monitoring, on page 198.
The criteria includes peer monitoring and interface monitoring. Although all failover criteria have default
settings, you should at least examine them to verify that the default settings work for your network.
• Configure Peer Unit Health Monitoring Failover Criteria, on page 198.
• Configure Interface Health Monitoring Failover Criteria, on page 199.
For information on interface testing, see How the System Tests Interface Health, on page 201.
Step 5 (Optional but recommended.) Configure Standby IP and MAC Addresses, on page 202.
Step 6 (Optional.) Verify the High Availability Configuration, on page 203.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
192
The Basics
Prepare the Two Units for High Availability
Procedure
Step 1 Ensure that the devices meet the requirements explained in Hardware Requirements for HA, on page 189.
Step 2 Determine whether you will use a single failover link, or separate failover and stateful failover links, and
identify the ports you will use.
You must use the same port number on each device for each link. For example, GigabitEthernet 1/3 on both
devices for the failover link. Know which ones you will use so that you do not accidentally use them for other
purposes. For more information, see Failover and Stateful Failover Links, on page 183.
Step 3 Install the devices, connect them to the network, and complete the initial setup wizard on each device.
a) Review the recommended network designs in Avoiding Interrupted Failover and Data Links, on page 185.
b) Connect at least the outside interfaces, as explained in Connect the Interfaces, on page 12.
You can also connect the other interfaces, but you must ensure that you use the same port on each device
to connect to a given subnet. Because the devices will share the same configuration, you must connect
them to your networks in a parallel manner.
Note The setup wizard does not let you change the IP addresses on the management and inside
interface. Thus, if you connect either of these interfaces on the primary device to the network,
do not also connect the interfaces on the secondary device, or you will get an IP address conflict.
You can directly connect your workstation to one of these interfaces and get an address through
DHCP, so that you can connect to Firepower Device Manager and configure the device.
c) Complete the initial setup wizard on each device. Ensure that you specify static IP addresses for the outside
interface. In addition, configure the same NTP servers. For more information, see Complete the Initial
Configuration Using the Setup Wizard, on page 23.
Choose the same licensing and Cisco Success Network options for the units. For example, evaluation
mode for each or register the devices.
d) On the secondary device, select Device > System Settings > Management Interface and configure a
unique IP address, change the gateway if necessary, and disable or change the DHCP server settings to
suit your needs.
e) On the secondary device, select Device > Interface and edit the inside interface. Either delete the IP
address, or change it. Also, delete the DHCP server defined for the interface, because you cannot have
two DHCP servers on the same network.
f) Deploy the configuration on the secondary device.
g) If necessary based on your network topology, log into the primary device and change the management
address, gateway, and DHCP server settings, and the inside interface IP address and DHCP server settings.
Deploy the configuration if you make any changes.
h) If you have not connected the inside interface, or management interface if you use a separate management
network, you can now connect them to the switches.
Step 4 Verify that the devices have the exact same software version, which means the same major (first), minor
(second), and maintenance (third) numbers. You can find the version in Firepower Device Manager on the
Devices page, or you can use the show version command in the CLI.
If they are not running the same software versions, obtain the preferred software version from Cisco.com and
install it on each device. For details, see Upgrading Firepower Threat Defense Software, on page 701.
Step 5 Connect and configure the failover and stateful failover links.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
193
The Basics
Configure the Primary Unit for High Availability
a) Following your preferred network design (chosen from Avoiding Interrupted Failover and Data Links,
on page 185), connect the failover interfaces for each device appropriately, either to a switch or directly
to each other.
b) If you are using a separate state link, also connect the stateful failover interfaces for each device
appropriately.
c) Log into each device in turn and go to Device > Interface. Edit each interface and verify there are no
interface names or IP addresses configured.
If the interfaces are configured with names, you might need to remove them from security zones and
delete other configurations before you can delete the name. If deleting the name fails, examine the error
messages to determine what other changes you need to make.
Step 6 On the primary device, connect the remaining data interfaces and configure the device.
a) Select Device > Interface, edit each interface used for through traffic and configure the primary static IP
addresses.
b) Add the interfaces to security zones, and configure the basic policies needed to handle traffic on the
connected networks. For example configurations, see the topics listed in Best Practices: Use Cases for
Firepower Threat Defense, on page 43.
c) Deploy the configuration.
Step 7 Verify that you meet all the requirements explained in Software Requirements for HA, on page 189.
Step 8 Verify that you have consistent licensing (registered or in evaluation mode). For more information, see License
Requirements for HA, on page 190.
Step 9 On the secondary device, connect the remaining data interfaces to the same networks as the equivalent interfaces
on the primary device. Do not configure the interfaces.
Step 10 On each device, select Device > System Settings > Cloud Services and verify that you have the same settings
for Cisco Defense Orchestrator and the other cloud services, such as Cisco Success Network and Cisco Threat
Defense.
You are now ready to configure high availability on the primary device.
Note Once you establish the high availability pair, you must break the pair in order to edit the configuration described
in this procedure.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
194
The Basics
Configure the Primary Unit for High Availability
objects, then edit the interfaces to delete the name. The interfaces must also be in routed mode, not passive
mode. These interfaces must be dedicated for use in the HA configuration: you cannot use them for any other
purposes.
If there are any pending changes, you must deploy them before you can configure HA.
Procedure
Step 3 On the High Availability page, click the Primary Device box.
If the secondary device is already configured, and you copied the configuration to the clipboard, you can click
the Paste from Clipboard button and paste in the configuration. This will update the fields with the appropriate
values, which you can then verify.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
195
The Basics
Configure the Primary Unit for High Availability
• Use the Same Interface as the Failover Link—Select this option if you want to use a single link for
the failover and stateful failover communications. If you select this option, continue with the next step.
• Physical Interface—If you want to use a separate stateful failover link, select the interface you connected
to the secondary device for use as the stateful failover link. This must be an unnamed interface. Then,
configure the following properties:
• Type—Select whether you will use an IPv4 or IPv6 address for the interface. You can configure
one type of address only.
• Primary IP—Enter the IP address for the interface on this device. The address must be on a different
subnet than the one used for the failover link. For example, 192.168.11.1. For IPv6 addresses, you
must include the prefix length in standard notation, for example, 2001:a0a:b00:a::a0a:b70/64.
• Secondary IP—Enter the IP address that should be configured on the other end of the link for the
interface on the secondary device. The address must be on the same subnet as the primary address,
and it must be different than the primary address. For example, 192.168.11.2 or
2001:a0a:b00:a::a0a:b71/64.
• Netmask (IPv4 only)—Enter the subnet mask for the primary/secondary IP address.
Step 6 (Optional.) Enter an IPsec Encryption Key string if you want to encrypt communication between the two
units in the pair.
You must configure the exact same key on the secondary node, so make a note of the string you enter.
If you do not enter a key, all communication on the failover and stateful failover links is in plain text. If you
are not using direct cable connections between the interfaces, this could be a security problem.
You can now configure the secondary unit. See Configure the Secondary Unit for High Availability, on page
197.
Note The selected interfaces are not configured directly. However, if you enter show interface in the
CLI, you will see that the interfaces are using the specified IP addresses. The interfaces are named
“failover-link” and if you configure a separate state link, “stateful-failover-link.”
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
196
The Basics
Configure the Secondary Unit for High Availability
Note If you have not done so already, copy the high availability configuration from the primary device to the
clipboard. It is much easier to configure the secondary device using copy/paste than to manually enter the
data.
Procedure
Step 3 On the High Availability page, click the Secondary Device box.
Step 4 Do one of the following:
• Easy method—Click the Paste from Clipboard button, paste in the configuration and click OK. This
will update the fields with the appropriate values, which you can then verify.
• Manual method—Configure the failover and stateful failover links directly. Enter the exact same settings
on the secondary device that you entered on the primary device.
Step 5 If you configured an IPSec Encryption Key on the primary device, enter the exact same key for the secondary
device.
Step 6 Click Activate HA.
The system immediately deploys the configuration to the device. You do not need to start a deployment job.
If you do not see a message saying that your configuration was saved and deployment is in progress, scroll
to the top of the page to see the error messages.
After configuration completes, you get a message saying that you have configured HA. Click Got It to dismiss
the message.
At this point, you should be on the High Availability page, and your device status should indicate that this is
the secondary device. If the join with the primary device was successful, the device will synchronize with the
primary, and eventually the mode should be Standby and the peer should be Active.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
197
The Basics
Configure Failover Criteria for Health Monitoring
Note The selected interfaces are not configured directly. However, if you enter show interface in the
CLI, you will see that the interfaces are using the specified IP addresses. The interfaces are named
“failover-link” and if you configure a separate state link, “stateful-failover-link.”
The active unit loses power or stops normal operation. 800 milliseconds 15 seconds 45 seconds
An active unit interface physical link is down. 500 milliseconds 5 seconds 15 seconds
An active unit interface is up, but a connection problem 5 seconds 25 seconds 75 seconds
causes interface testing.
The following topics explain how to customize the failover health monitoring criteria and also how the system
tests interfaces.
You can configure the poll and hold time for the hello messages.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
198
The Basics
Configure Interface Health Monitoring Failover Criteria
Procedure
Note When an interface goes down, for failover it is still considered to be a unit issue. If the unit detects that an
interface is down, failover occurs immediately (if you keep the default threshold of 1 interface), without
waiting for the interface holdtime. The interface holdtime is only useful when the unit considers its status to
be OK, although it is not receiving hello packets from the peer.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
199
The Basics
Configure Interface Health Monitoring Failover Criteria
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
200
The Basics
How the System Tests Interface Health
b) Click the edit icon ( ) for an interface whose monitoring status you want to change.
You cannot edit the failover or stateful failover interfaces. Interface monitoring does not apply to them.
c) Click the Advanced Options tab.
d) Select or deselect the Enable for HA Monitoring checkbox as preferred.
e) Click OK.
Step 7 (Optional, but recommended.) Configure standby IP addresses and MAC addresses for monitored interfaces.
See Configure Standby IP and MAC Addresses, on page 202.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
201
The Basics
Configure Standby IP and MAC Addresses
Because network devices see no change in the MAC to IP address pairing, no ARP entries change or time out
anywhere on the network.
If the secondary unit boots without detecting the primary unit, the secondary unit becomes the active unit and
uses its own MAC addresses, because it does not know the primary unit MAC addresses. However, when the
primary unit becomes available, the secondary (active) unit changes the MAC addresses to those of the primary
unit, which can cause an interruption in your network traffic. Similarly, if you swap out the primary unit with
new hardware, a new MAC address is used.
Virtual MAC addresses guard against this disruption because the active MAC addresses are known to the
secondary unit at startup, and remain the same in the case of new primary unit hardware. You can manually
configure virtual MAC addresses.
If you do not configure virtual MAC addresses, you might need to clear the ARP tables on connected routers
to restore traffic flow. The Firepower Threat Defense device does not send gratuitous ARPs for static NAT
addresses when the MAC address changes, so connected routers do not learn of the MAC address change for
these addresses.
Procedure
Step 2 Click the edit icon ( ) for the interface whose standby addresses you want to configure.
You cannot edit the failover or stateful failover interfaces. You set the IP addresses for these interfaces when
you configure high availability.
Step 3 Configure the Standby IP addresses on the IPv4 Address and IPv6 Address tabs.
The standby address is used by this interface on the standby device. If you do not set the standby IP address,
the active unit cannot monitor the standby interface using network tests; it can only track the link state.
Configure standby addresses for each IP version you are using.
Step 4 Click the Advance Options tab and configure the MAC Addresses.
By default, the system uses the MAC address burned into the network interface card (NIC) for the interface.
Thus, all subinterfaces on an interface use the same MAC address, so you might want to create unique addresses
per subinterface. Manually configured active/standby MAC addresses are also recommended if you configure
high availability. Defining the MAC addresses helps maintain consistency in the network in the event of
failover.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
202
The Basics
Verify the High Availability Configuration
• MAC Address—The Media Access Control address in H.H.H format, where H is a 16-bit hexadecimal
digit. For example, you would enter the MAC address 00-0C-F1-42-4C-DE as 000C.F142.4CDE. The
MAC address must not have the multicast bit set, that is, the second hexadecimal digit from the left
cannot be an odd number.)
• Standby MAC Address—For use with high availability. If the active unit fails over and the standby
unit becomes active, the new active unit starts using the active MAC addresses to minimize network
disruption, while the old active unit uses the standby address.
You can verify that the high availability configuration is working by following this procedure.
Procedure
Step 1 Test that your active unit is passing traffic as expected by using FTP (for example) to send a file between
hosts on different interfaces.
At least test connections from one workstation to systems that are connected to each of the configured interfaces.
Step 2 Switch modes so that the active unit is now the standby unit by doing one of the following:
• In Firepower Device Manager, select Switch Mode from the gear menu on the Device > High Availability
page.
• In the CLI of the active unit, enter no failover active.
Step 3 Repeat the connection testing to verify that you can make the same connections through the other unit in the
high availability pair.
If the test is not successful, verify that you connected the unit’s interfaces to the same networks as the equivalent
interfaces on the other unit.
You can see the HA status from the High Availability page. You can also use the CLI or CLI Console of the
unit, and enter the show failover command to check the failover status. Also, use the show interface
command to verify the interface configuration for the interfaces used in any connection tests that failed.
If these actions do not identify the problem, there are other steps you can take. See Troubleshooting High
Availability (Failover), on page 215.
Step 4 When you are finished, you can switch modes to return active status to the original unit that was active.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
203
The Basics
Managing High Availability
• Last Failure Reason—If the High Availability (HA) configuration fails for some reason, such as the
active device becoming unavailable and failing over to the standby device, the last reason for failure is
shown below the status information for the role and mode status. This message is derived from the failover
history.
• Failover History link—Click this link to see the detailed history of status of the devices in the pair. The
system opens the CLI Console and executes the show failover history details command.
• Deployment History link—Click this link to go to the audit log with the events filtered to show
deployment jobs only.
• High Availability Configuration—This panel shows the configuration of the failover pair. Click the
Copy to Clipboard button to load the information into the clipboard, from where you can paste it into
the secondary device’s configuration. You can also copy it into another file for your records. This
information does not show whether you defined an IPsec encryption key.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
204
The Basics
Suspending or Resuming High Availability
Note The interface configuration for HA is not reflected on the Interfaces page
(Device > Interfaces). You cannot edit the interfaces that you use in an HA
configuration.
• Failover Criteria—This panel includes the settings that determine the health criteria used when evaluating
whether the active unit has failed and the standby unit should become the active unit. Adjust these criteria
so that you get the failover performance required in your network. For details, see Configure Failover
Criteria for Health Monitoring, on page 198.
The following topics explain various management tasks related to a high availability configuration.
When you suspend high availability, you stop the pair of devices from behaving as a failover unit. The currently
active device remains active, handling all user connections. However, failover criteria are no longer monitored,
and the system will never fail over to the now pseudo-standby device. The standby device will retain its
configuration, but it will remain inactive.
The key difference between suspending HA and breaking HA is that on a suspended HA device, the high
availability configuration is retained. When you break HA, the configuration is erased. Thus, you have the
option to resume HA on a suspended system, which enables the existing configuration and makes the two
devices function as a failover pair again.
If you suspend high availability from the active unit, the configuration is suspended on both the active and
standby unit. If you suspend it from the standby unit, it is suspended on the standby unit only, but the active
unit will not attempt to fail over to a suspended unit.
You can resume a unit only if it is in Suspended state. The unit will negotiate active/standby status with the
peer unit.
Note If necessary, you can suspend HA from the CLI by entering the configure high-availability suspend
command. To resume HA, enter configure high-availability resume.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
205
The Basics
Breaking High Availability
If you are suspending high availability on the standby unit, please check whether the active unit is currently
running a deployment job. If you switch modes while a deployment job is in progress, the job will fail and
you will lose your configuration changes.
Procedure
Note Alternatively, you can use the BreakHAStatus API resource (from the API
Explorer) and use the interfaceOption attribute to direct the system to reconfigure
the standby device's interfaces using the standby IP addresses. You must use the
API if you want this result; FDM always disables the interfaces. Note that the
system reconfigures the IP addresses but otherwise does not reconfigure all
interface options, so traffic might not behave as expected until you deploy changes
after the break.
How the break actually affects the units depends on the state of each unit when you perform the break.
• If the units are in a healthy active/standby state, break HA from the active unit. This will remove the HA
configuration from both devices in the HA pair. If you want to break HA on the standby unit only, you
must log into it and first suspend HA, then you can break HA.
• If the standby unit is in a suspended or failed state, breaking HA from the active unit removes the HA
configuration from the active unit only. You must log into the standby unit and also break HA on that
unit.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
206
The Basics
Switching the Active and Standby Peers (Forcing Failover)
• If the peers are still negotiating HA or are synchronizing their configuration, you cannot break HA. Wait
for the negotiation or synchronization to complete or time out. If you believe the systems are stuck in
this state, you can suspend HA and then break HA.
Note When using Firepower Device Manager, you cannot break HA from the CLI using the configure
high-availability disable command.
Procedure
Note If necessary, you can switch between active and standby modes from the CLI. From the standby unit, enter
the failover active command. From the active unit, enter the no failover active command.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
207
The Basics
Preserving Undeployed Configuration Changes After Failover
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
208
The Basics
Editing the HA IPsec Encryption Key or HA Configuration
both enabled or both disabled. You cannot deploy configuration changes if the units have inconsistent
registration status.
Note During the upgrade, the system suspends HA while updating system libraries, which includes an automatic
deployment. The system is available for SSH connections during the last part of this process, so if you log in
shortly after applying an upgrade, you might see HA in suspended status. If the system does not go back to
standby ready state by itself, and this problem persists after FDM is available and automatic deployment was
successful, please go to the HA page and manually resume HA.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
209
The Basics
Installing Software Upgrades on HA Devices
Procedure
Step 1 Log into the standby unit and install the upgrade.
a) Select Device, then click View Configuration in the Updates summary.
b) Upload the image by clicking either Browse or Upload Another File in the System Upgrade group.
c) Click Install to start the installation process.
Note If you get the error message "you must deploy all uncommitted changes before starting a system
upgrade" and there are no uncommitted changes on the active unit, create some minor change
on the active unit and deploy the change. You can then undo the change. If this does not work,
and you have been running the HA group with mismatched versions against recommendations,
you might need to switch roles to make the standby unit active, then suspend HA. You can then
deploy from the active/suspended unit, resume HA, then switch roles to make the active unit
the standby again. Upgrade should then work.
Wait until the installation completes and you can log back in and verify that the system is functioning
normally.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
210
The Basics
Replacing a Unit in a High Availability Pair
Note If you check the high availability status, you might see an application synchronization failure.
This happens only if you deploy changes from the active device while the standby device is
upgrading the software.
Step 2 On the standby unit, click Device > High Availability, then select Switch Mode from the gear menu ( ).
This action will force failover and make the unit you are logged into the active unit. Wait for the unit’s status
to change to active.
Before proceeding, you can optionally test the network to ensure that traffic is flowing through the networks
to which the device is connected.
Step 3 Log into the new standby unit, the one that was originally the active unit, and install the upgrade.
The process is the same as the one described above. You must upload the software upgrade; it is not copied
from the other unit.
After the installation completes, log back into the standby unit to verify that the installation was successful
and the units are back in a normal active/standby state. This unit will not automatically resume active status.
Note If you check the high availability status, you should not see an application synchronization failure.
The units are now running the same software version, so the configuration import from the active
unit should succeed. If the automatic deployment fails, or if the device otherwise does not move
into the standby ready state, click Resume HA from the gear menu.
Step 4 Log into the currently active unit. If there are any pending changes, deploy them and wait for deployment to
complete successfully.
Step 5 (Optional.) If you want the current standby unit to resume active status, click Device > High Availability,
then select Switch Mode from the gear menu from either unit.
For example, if the primary unit was the active unit at the start of this process, and that is the way you want
it, switch modes.
Procedure
Step 1 If the unit you are replacing is functional, ensure that you fail over to the peer unit, then use the shutdown
command from the device CLI to bring down the device gracefully. If the unit is not functional, confirm that
the peer is operating in Active mode.
If you have Administrator privileges, you can also enter the shutdown command through the FDM CLI
Console.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
211
The Basics
Monitoring High Availability
Step 5 On the peer unit, go to the High Availability page and copy the configuration to the clipboard. Note whether
the unit is the Primary or the Secondary unit.
If there are any pending changes, deploy them now and wait for deployment to complete before continuing.
Step 6 On the replacement unit, click Configure in the High Availability group, then select the opposite unit type
from the peer. That is, if the peer is primary, select Secondary, if the peer is secondary, select Primary.
Step 7 Paste in the HA configuration from the peer, then enter the IPsec key if you use one. Click Activate HA.
Once deployment is complete, the unit will contact the peer and join the HA group. The active peer's
configuration will be imported, and the replacement unit will be either the primary or secondary unit in the
group, based on your selection. You can now verify that HA is operating correctly, and if desired, switch
modes so that the new unit is the active unit.
• On the High Availability page (click Device > High Availability), you can see the status of both units.
If any failures have occurred, the last failure reason (from the failover history) is shown. Click the
synchronization icon between them for additional status.
• From the High Availability page, click the Failover History link next to the status. The system opens
the CLI Console and executes the show failover history details command. You can also enter this
command directly in the CLI or CLI Console.
CLI Commands
From the CLI or CLI console, you can use the following commands:
• show failover
Displays information about the failover state of the unit.
• show failover history [details]
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
212
The Basics
Monitoring Status for HA-Monitored Interfaces
Displays the past failover state changes and the reason for the state change. Add the details keyword to
display failover history from the peer unit. This information helps with troubleshooting.
• show failover state
Displays the failover state of both units. The information includes the primary or secondary status of the
unit, the Active/Standby status of the unit, and the last reported reason for failover.
• show failover statistics
Displays the transmit (tx) and receive (rx) packet count of the failover interface. For example, if the
output shows that the unit is sending packets, but not receiving any, then you have a problem with the
link. This could be a bad wire, wrong IP addresses configured on the peers, or perhaps the units are
connecting the failover interfaces to different subnets.
• show monitor-interface
Displays information about the interfaces monitored for high availability. For details, see Monitoring
Status for HA-Monitored Interfaces, on page 213.
• show running-config failover
Displays the failover commands in the running configuration. These are the commands that configure
high availability.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
213
The Basics
Monitoring HA-Related Syslog Messages
Note During failover, the system logically shuts down and then brings up interfaces, generating syslog messages
411001 and 411002. This is normal activity.
To be able to see syslog messages, you must configure diagnostic logging on Device > Logging Settings.
Set up an external syslog server so that you can monitor the messages reliably.
You cannot enter configure commands. This feature is for use with show commands.
Note If you are logged into the active unit, you can reload the standby unit using the failover reload-standby
command.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
214
The Basics
Troubleshooting High Availability (Failover)
You cannot enter the these commands through the Firepower Device Manager CLI Console.
Procedure
If the ping fails, ensure that the interfaces on each device are connected to the same network segment. If you
are using a direct cable connection, check the cable.
Step 3 Check the task list or audit log on the standby device. You should see a successful “Configuration import
from Active node” task after every successful deployment on the active device. If the task fails, check the
failover link and try deployment again.
Note If the task list indicates there was a failed deployment task, there might have been a failover during
the deployment job. If the standby device was the active unit when you started the deployment task,
but failover occurred during the task, the deployment would fail. To resolve the issue, switch modes
to make the standby unit the active unit again, then redeploy the configuration changes.
Step 4 Use the show failover history command to get detailed information on the state changes on a device.
Some things to look for:
• App Sync failures:
App Sync Disabled HA state progression failed due to APP SYNC timeout
The Application Synchronization phase is where the configuration from the active device is transported
to the standby device. An application synchronization failure puts the device in disabled state, and the
device is no longer available to be made active.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
215
The Basics
Troubleshooting High Availability (Failover)
If the device is disabled due to an app sync problem, then you might be using different interfaces on the
devices for the endpoints of the failover and stateful failover links. You must be using the same port
number for each end of the link.
If the show failover command shows the secondary device in Pseudo Standby state, this could indicate
that you configured different IP addresses for the failover link on the secondary device than what you
configured on the primary device. Ensure that you are using the same primary/secondary IP addresses
on both devices for the failover link.
The Pseudo Standby state might also indicate that you configured different IPsec keys on the primary
and secondary.
For additional app sync issues, see Troubleshooting HA App Sync Failures, on page 217.
• Abnormally frequent failovers (going from active to standby and back) might indicate problems with
the failover link. In a worst-case scenario, both units might become active, which disrupts through traffic.
Ping each end of the link to verify connectivity. You can also use show arp to check that the failover IP
address and ARP mapping are proper.
If the failover link is healthy and configured correctly, consider increasing the peer poll and hold time,
the interface poll and holdtime, reducing the number of interfaces monitored for HA, or increasing the
interface threshold.
• Failures due to interface checks. The Interface Check reason includes a list of the interfaces that were
considered to have failed. Check those interfaces to ensure they are configured correctly and there are
no hardware issues. Verify there are no issues with the switch configuration on the other end of the links.
If there are no problems, consider disabling HA monitoring on those interfaces, Other options are to
increase the interface failure threshold or timing.
This Host:3
admin: inside
ctx-1: ctx1-1
ctx-2: ctx2-1
Other Host:0
Step 5 If the standby unit cannot be detected, and you cannot find a specific reason such as a bad LAN or cable
connection on the failover link, try the following steps.
a) Log into the CLI on the standby unit and enter the failover reset command. This command should change
a unit in failed state to unfailed state. Now, check the HA status on the active device. If the standby peer
is now detected, you are done.
b) Log into the CLI on the active unit and enter the failover reset command. This should reset HA status
on both the active and standby unit. Ideally, it will reestablish the link between the devices. Check the
HA status; if it is not correct yet, continue.
c) Either from the CLI on the active device, or from Firepower Device Manager, first suspend HA, then
resume HA. The CLI commands are configure high-availability suspend and configure high-availability
resume.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
216
The Basics
Troubleshooting Failed State for a Unit
==========================================================================
From State To State Reason
==========================================================================
16:19:34 UTC May 9 2018
Not Detected Disabled No Error
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
217
The Basics
Troubleshooting HA App Sync Failures
Ideally, you want to see the message “All validation passed” when the From State is App Sync, and the node
will reach the Standby Ready state. Any validation failure will transition the peer to the Disabled (Failed)
state. You must resolve the problems to make the peers function as a high availability group again. Note that
if you fix an App Sync error by making changes to the active unit, you must deploy them and then resume
HA for the peer node to join.
The following messages indicate failures, with an explanation of how you can resolve the issues. These errors
can happen on node join and on each subsequent deployment. During node join, the system performs a check
against the last deployed configuration on the active unit.
• License registration mode mismatch between Primary and Secondary Node.
The license error indicates that one peer is registered while the other peer is in evaluation mode. The
peers must both be registered or both in evaluation mode for them to join an HA group. Because you
cannot return a registered device to evaluation mode, you must register the other peer from the Device >
Smart License page.
If the device you register is the active unit, after registering the device, perform a deployment. Deployment
forces the units to refresh and synchronize configurations, which should allow the secondary unit to join
the high availability group correctly.
• License export compliance mismatch between Primary and Secondary Node.
The license compliance error indicates that the devices are registered to different Cisco Smart Software
Manager accounts, and one account is enabled for export-controlled functionality, whereas the other
account is not. The devices must be registered with accounts that have the same setting, enabled or
disabled, for export-controlled functionality. Change the device registration on the Device > Smart
License page.
• Software version mismatch between Primary and Secondary Node.
The software mismatch error indicates that the peers are running different versions of the Firepower
Threat Defense software. The system allows a mismatch only temporarily, while you are installing
software upgrades one device at a time. However, you cannot deploy configuration changes between
upgrading the peers. To resolve this problem, upgrade the peer, then redo the deployment.
• Physical interfaces mismatch between Primary and Secondary Node.
The standby unit in an HA group must have all of the physical interfaces that exist on the active unit,
and these interfaces must have the same hardware names and types (such as GigabitEthernet1/1). This
error indicates that the standby unit is missing some interfaces that are present on the active unit. You
are allowed to have more interfaces on the standby unit than on the active unit, so either switch which
unit is active, or choose another peer unit. However, mismatching interfaces should be temporary state,
for example, if you are replacing an interface module on one unit and you need to run it without the
module for a short time. For normal operations, both units should have the same number and type of
interfaces.
• Failover link interface mismatch between Primary and Secondary Node.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
218
The Basics
Troubleshooting HA App Sync Failures
When you link the failover physical interface to the network on each unit, you must choose the same
physical interface. For example, GigabitEthernet1/8 on each unit. This error indicates that you used
different interfaces. To resolve the error, correct the cabling on the peer unit.
• Stateful failover link interface mismatch between Primary and Secondary Node.
If you use a separate stateful failover link, when you link the stateful failover physical interface to the
network on each unit, you must choose the same physical interface. For example, GigabitEthernet1/7 on
each unit. This error indicates that you used different interfaces. To resolve the error, correct the cabling
on the peer unit.
• Failover/Stateful failover link EtherChannel's member interfaces mismatch between Primary and Secondary
Node
If you select an EtherChannel interface for either the failover or stateful failover interfaces, the
EtherChannels must have the same ID and member interfaces on each device. This error message indicates
whether it is the failover or the stateful failover link that has the mismatch. To resolve the error, correct
the configuration of the EtherChannel interfaces so they use the same ID and include the same interfaces
on each device.
• Device Model Number mismatch between Primary and Secondary Node.
For the peers to join an HA group, they must be devices of the exact same model. This error indicates
that the peers are not the same device model. You must choose a different peer to configure HA.
• Active and Standby Nodes cannot be on the same chassis.
You cannot configure high availability using devices that are hosted on the same hardware chassis. When
configuring high availability on models that support multiple devices on the same chassis, you must
select devices that reside on separate hardware.
• Unknown error occurred, please try again.
Something went wrong during the app sync, but the system could not identify the problem. Try deploying
the configuration again.
• Rule package is corrupted. Please update the rule package and try again.
There is an issue with the intrusion rules database. On the failed peer, go to Device > Updates, and click
Update Now in the Rule group. Wait for the update to complete, and deploy changes. You can then retry
the deployment from the active unit.
• Cisco Success Network is enabled on Active but not Standby.
When you configure HA for devices that are in evaluation mode, you must select the same option for
Cisco Success Network participation on the peer units. To resolve this error, go to Device > System
Settings > Cloud Services and enable Cisco Success Network.
• Cisco Defense Orchestrator is enabled on Active but not Standby.
When you configure HA for devices that are in evaluation mode, you must select the same option for
Cisco Defense Orchestrator on the peer units. Either both must be registered, or neither. To resolve this
error, go to Device > System Settings > Cloud Services and register the device in the Cisco Defense
Orchestrator group.
• Cisco Threat Response is enabled on Active but not Standby.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
219
The Basics
Troubleshooting HA App Sync Failures
When you configure HA, you must select the same option for Cisco Threat Response on the peer units.
To resolve this error, go to Device > System Settings > Cloud Services and enable Send Events to the
Cisco Cloud.
• Active and Standby Nodes cannot have different cloud regions.
The devices are registered in different Cisco Cloud Services regions. Determine which region is correct,
unregister the other device from Smart Licensing, and select the correct region during re-registration. If
both devices have the wrong region, unregister both devices and re-register in the correct region.
• Deployment package is corrupted. Please try again.
This is a system error. Try the deployment again, which should resolve the problem.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
220
CHAPTER 11
Interfaces
The following topics explain how to configure the interfaces on your FTD device.
• About FTD Interfaces, on page 221
• Guidelines and Limitations for Interfaces, on page 225
• Configure a Physical Interface, on page 226
• Configure Bridge Groups, on page 230
• Configure EtherChannels, on page 234
• Configure VLAN Interfaces and Switch Ports (Firepower 1010), on page 243
• Configure VLAN Subinterfaces and 802.1Q Trunking, on page 255
• Configure Passive Interfaces, on page 260
• Configure Advanced Interface Options, on page 264
• Scan for Interface Changes, and Migrate an Interface, on page 267
• Configure Hardware Bypass for Power Failure (ISA 3000), on page 272
• Monitoring Interfaces, on page 274
• Examples for Interfaces, on page 275
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
221
The Basics
Interface Modes
appropriate list. You can also view subinterfaces for supported parent interfaces. For information on how
these interfaces map to virtual interfaces and network adapters, see How VMware Network Adapters and
Interfaces Map to Firepower Threat Defense Physical Interfaces, on page 20.
The following topics explain the limitations of configuring interfaces through Firepower Device Manager as
well as other interface management concepts.
Interface Modes
You can configure one of the following modes for each interface:
Routed
Each Layer 3 routed interface requires an IP address on a unique subnet. You would typically attach
these interfaces to switches, a port on another router, or to an ISP/WAN gateway.
Passive
Passive interfaces monitor traffic flowing across a network using a switch SPAN (Switched Port Analyzer)
or mirror port. The SPAN or mirror port allows for traffic to be copied from other ports on the switch.
This function provides the system visibility within the network without being in the flow of network
traffic. When configured in a passive deployment, the system cannot take certain actions such as blocking
or shaping traffic. Passive interfaces receive all traffic unconditionally and no traffic received on these
interfaces is retransmitted.
Switch Port (Firepower 1010)
Switch ports forward traffic at Layer 2, using the switching function in hardware. Switch ports on the
same VLAN can communicate with each other using hardware switching, and traffic is not subject to
the FTD security policy. Access ports accept only untagged traffic, and you can assign them to a single
VLAN. Trunk ports accept untagged and tagged traffic, and can belong to more than one VLAN. You
cannot configure the Management interface as a switch port.
BridgeGroupMember
A bridge group is a group of interfaces that the FTD bridges instead of routes. All interfaces are on the
same network. The bridge group is represented by a Bridge Virtual Interface (BVI) that has an IP address
on the bridge network.
You can route between routed interfaces and BVIs, if you name the BVI. In this case, the BVI acts as
the gateway between member interfaces and routed interfaces. If you do not name the BVI, traffic on
the bridge group member interfaces cannot leave the bridge group. Normally, you would name the
interface so that you can route member interfaces to the internet.
One use for a bridge group in routed mode is to use extra interfaces on the Firepower Threat Defense
device instead of an external switch. You can attach endpoints directly to bridge group member interfaces.
You can also attach switches to add more endpoints to the same network as the BVI.
Management/Diagnostic Interface
The physical port labeled Management (or for Firepower Threat Defense Virtual, the Management0/0 virtual
interface) actually has two separate interfaces associated with it.
• Management virtual interface—This IP address is used for system communication. This is the address
the system uses for Smart Licensing and to retrieve database updates. You can open management sessions
to it (Firepower Device Manager and CLI). You must configure a management address, which is defined
on System Settings > Management Interface.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
222
The Basics
Recommendations for Configuring a Separate Management Network
• Diagnostic virtual interface—You can use this interface to send syslog messages to an external syslog
server. Configuring an IP address for the Diagnostic interface is optional. The main reason to configure
the interface is if you want to use it for syslog messages. This interface appears, and is configurable, on
the Device > Interfaces page. The Diagnostic interface only allows management traffic, and does not
allow through traffic.
(Hardware devices.) One way to configure Management/Diagnostic is to not wire the physical port to a
network. Instead, configure the Management IP address only, and configure it to use the data interfaces as
the gateway for obtaining updates from the internet. Then, open the inside interfaces to HTTPS/SSH traffic
(by default, HTTPS is enabled) and open Firepower Device Manager using the inside IP address (see
Configuring the Management Access List, on page 672).
For Firepower Threat Defense Virtual, the recommended configuration is to attach Management0/0 to the
same network as the inside interface, and use the inside interface as the gateway. Do not configure a separate
address for Diagnostic.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
223
The Basics
Security Zones
• (Hardware devices only.) You can use the data interfaces as the management gateway even if you
configure an IP address for Diagnostic. But Diagnostic will not use the data interfaces as a gateway. If
you need a path from Diagnostic to other networks, another router on the management network needs to
route the traffic originating from the Diagnostic IP address. If necessary, configure static routes for the
Diagnostic interface (select Device > Routing).
Security Zones
Each interface can be assigned to a single security zone. You then apply your security policy based on zones.
For example, you can assign the inside interface to the inside zone; and the outside interface to the outside
zone. You can configure your access control policy to enable traffic to go from inside to outside, but not from
outside to inside, for example.
Each zone has a mode, either routed or passive. This relates directly to the interface mode. You can add routed
and passive interfaces only to the same mode security zone.
For bridge groups, you add member interfaces to the zones, you cannot add the Bridge Virtual Interface (BVI).
You do not include the Diagnostic/Management interface in a zone. Zones apply to data interfaces only.
You can create security zones on the Objects page.
IPv6 Addressing
You can configure two types of unicast addresses for IPv6:
• Global—The global address is a public address that you can use on the public network. For a bridge
group, you configure the global address on the Bridge Virtual Interface (BVI), not on each member
interface. You cannot specify any of the following as a global address.
• Internally reserved IPv6 addresses: fd00::/56 (from=fd00:: to= fd00:0000:0000:00ff:ffff:ffff:ffff:ffff)
• An unspecified address, such as ::/128
• The loopback address, ::1/128
• multicast addresses, ff00::/8
• Link-local addresses, fe80::/10
• Link-local—The link-local address is a private address that you can only use on the directly-connected
network. Routers do not forward packets using link-local addresses; they are only for communication
on a particular physical network segment. They can be used for address configuration or for the Network
Discovery functions such as address resolution and neighbor discovery. In a bridge group, enabling IPv6
on the BVI automatically configures link-local addresses for each bridge group member interface. Each
interface must have its own address because the link-local address is only available on a segment, and
is tied to the interface MAC address.
At a minimum, you need to configure a link-local address for IPv6 to operate. If you configure a global address,
a link-local address is automatically configured on the interface, so you do not also need to specifically
configure a link-local address. If you do not configure a global address, then you need to configure the link-local
address, either automatically or manually.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
224
The Basics
Auto-MDI/MDIX Feature
Auto-MDI/MDIX Feature
For RJ-45 interfaces, the default auto-negotiation setting also includes the Auto-MDI/MDIX feature.
Auto-MDI/MDIX eliminates the need for crossover cabling by performing an internal crossover when a
straight cable is detected during the auto-negotiation phase. Either the speed or duplex must be set to
auto-negotiate to enable Auto-MDI/MDIX for the interface. If you explicitly set both the speed and duplex
to a fixed value, thus disabling auto-negotiation for both settings, then Auto-MDI/MDIX is also disabled. For
Gigabit Ethernet, when the speed and duplex are set to 1000 and full, then the interface always auto-negotiates;
therefore Auto-MDI/MDIX is always enabled and you cannot disable it.
Firepower 1010 60
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
225
The Basics
Configure a Physical Interface
ASA 5508-X 50
Note To configure physical interfaces as Firepower 1010 switch ports, see Configure VLAN Interfaces and Switch
Ports (Firepower 1010), on page 243.
To configure physical interfaces as passive interfaces, see Configure a Physical Interface in Passive Mode,
on page 263.
You can disable an interface to temporarily prevent transmission on the connected network. You do not need
to remove the interface's configuration.
Procedure
Step 1 Click Device, and then click the link in the Interfaces summary.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
226
The Basics
Configure a Physical Interface
The Interfaces page is selected by default. The interfaces list shows physical interfaces, their names, addresses,
and states.
Step 2 Click the edit icon ( ) for the physical interface you want to edit.
You cannot edit an interface that you are using as the failover or stateful failover link in a high availability
configuration.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
227
The Basics
Configure a Physical Interface
• Routed—Routed mode interfaces subject traffic to all firewall functions, including maintaining
flows, tracking flow states at both IP and TCP layers, IP defragmentation, and TCP normalization,
and your firewall policies. This is the normal interface mode.
• Passive—Passive interfaces monitor traffic flowing across a network using a switch SPAN or mirror
port. The SPAN or mirror port allows for traffic to be copied from other ports on the switch. This
function provides the system visibility within the network without being in the flow of network
traffic. When configured in a passive deployment, the system cannot take certain actions such as
blocking or shaping traffic. Passive interfaces receive all traffic unconditionally and no traffic received
on these interfaces is retransmitted. If you select this mode, do not following the rest of this procedure.
Instead, see Configure a Physical Interface in Passive Mode, on page 263. Note that you cannot
configure IP addresses on passive interfaces.
• Switch Port—(Firepower 1010) Switch ports allow hardware switching between ports on the same
VLAN. Switched traffic is not subject to the security policy. If you select this mode, do not following
the rest of this procedure. Instead, see Configure VLAN Interfaces and Switch Ports (Firepower
1010), on page 243
If you later add this interface to a bridge group, the mode will automatically change to
BridgeGroupMember. Note that you cannot configure IP addresses on bridge group member interfaces.
Step 4 Click the IPv4 Address tab and configure the IPv4 address.
Select one of the following options from the Type field:
• DHCP—Choose this option if the address should be obtained from the DHCP server on the network.
You cannot use this option if you configure high availability. Change the following options if necessary:
• Route Metric—If you obtain the default route from the DHCP server, the administrative distance
to the learned route, between 1 and 255. The default is 1.
• Obtain Default Route—Whether to get the default route from the DHCP server. You would
normally select this option, which is the default.
• Static—Choose this option if you want to assign an address that should not change. Type in the interface's
IP address and the subnet mask for the network attached to the interface. For example, if you attach the
10.100.10.0/24 network, you could enter 10.100.10.1/24. Ensure that the address is not already used on
the network.
If you configured high availability, and you are monitoring this interface for HA, also configure a standby
IP address on the same subnet. The standby address is used by this interface on the standby device. If
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
228
The Basics
Configure a Physical Interface
you do not set the standby IP address, the active unit cannot monitor the standby interface using network
tests; it can only track the link state.
Note If there is a DHCP server configured for the interface, you are shown the configuration. You
can edit or delete the DHCP address pool. If you change the interface IP address to a different
subnet, you must either delete the DHCP server, or configure an address pool on the new
subnet, before you can save the interface changes. See Configuring DHCP Server, on page 678.
• PPPoE—Choose this option if the address should be obtained using Point-to-point Protocol over Ethernet
(PPPoE). PPPoE may be required if the interface is connected to a DSL modem, cable modem, or other
connection to your ISP, and your ISP uses PPPoE to provide your IP address. You cannot use this option
if you configure High Availability. Set the following values:
• Group Name—Specify a group name of your choice to represent this connection.
• PPPoE Username—Specify the username provided by your ISP.
• PPPoE Password—Specify the password provided by your ISP.
• PPP Authentication—Choose PAP, CHAP, or MSCHAP.
PAP passes a cleartext username and password during authentication and is not secure. With CHAP,
the client returns the encrypted [challenge plus password], with a cleartext username in response to
the server challenge. CHAP is more secure than PAP, but it does not encrypt data. MSCHAP is
similar to CHAP but is more secure because the server stores and compares only encrypted passwords
rather than cleartext passwords as in CHAP. MSCHAP also generates a key for data encryption by
MPPE.
• PPPoE Learned Route Metric—Assign an administrative distance to the learned route. Valid
values are from 1 to 255. By default, the administrative distance for the learned routes is 1.
• Obtain Default Route from PPPoE—Check this check box to enable obtaining the default route
from the PPPoE server.
• IP Address Type—Choose Dynamic to obtain the IP address from the PPPoE server. You can
alternatively choose Static if you were assigned a static IP address from the ISP.
Step 5 (Optional.) Click the IPv6 Address tab and configure the IPv6 address.
• State—To enable IPv6 processing and to automatically configure the link-local address when you do
not configure the global address, select Enabled. The link local address is generated based on the interface
MAC addresses (Modified EUI-64 format).
Note Disabling IPv6 does not disable IPv6 processing on an interface that is configured with an
explicit IPv6 address or that is enabled for autoconfiguration.
• Address Auto Configuration—Select this option to have the address automatically configured. IPv6
stateless autoconfiguration will generate a global IPv6 address only if the link on which the device resides
has a router configured to provide IPv6 services, including the advertisement of an IPv6 global prefix
for use on the link. If IPv6 routing services are not available on the link, you will get a link-local IPv6
address only, which you cannot access outside of the device's immediate network link. The link local
address is based on the Modified EUI-64 interface ID.
Although RFC 4862 specifies that hosts configured for stateless autoconfiguration do not send Router
Advertisement messages, the FTD device does send Router Advertisement messages in this case. Select
Suppress RA to suppress messages and conform to the RFC.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
229
The Basics
Configure Bridge Groups
• Static Address/Prefix—If you do not use stateless autoconfiguration, enter the full static global IPv6
address and network prefix. For example, 2001:0DB8::BA98:0:3210/48. For more information on IPv6
addressing, see IPv6 Addressing, on page 224.
If you want to use the address as link local only, select the Link - Local option. Link local addresses are
not accessible outside the local network. You cannot configure a link-local address on a bridge group
interface.
Note A link-local address should start with FE8, FE9, FEA, or FEB, for example
fe80::20d:88ff:feee:6a82. Note that we recommend automatically assigning the link-local
address based on the Modified EUI-64 format. For example, if other devices enforce the use
of the Modified EUI-64 format, then a manually-assigned link-local address may cause packets
to be dropped.
• Standby IP Address—If you configure high availability, and you are monitoring this interface for HA,
also configure a standby IPv6 address on the same subnet. The standby address is used by this interface
on the standby device. If you do not set the standby IP address, the active unit cannot monitor the standby
interface using network tests; it can only track the link state.
• Suppress RA—Whether to suppress router advertisements. The Firepower Threat Defense device can
participate in router advertisements so that neighboring devices can dynamically learn a default router
address. By default, router advertisement messages (ICMPv6 Type 134) are periodically sent out each
IPv6 configured interface.
Router advertisements are also sent in response to router solicitation messages (ICMPv6 Type 133).
Router solicitation messages are sent by hosts at system startup so that the host can immediately
autoconfigure without needing to wait for the next scheduled router advertisement message.
You might want to suppress these messages on any interface for which you do not want the FTD device
to supply the IPv6 prefix (for example, the outside interface).
What to do next
• Add the interfaces to the appropriate security zones. See Configuring Security Zones, on page 135.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
230
The Basics
Configure Bridge Groups
The group members do not have IP addresses. Instead, all member interfaces share the IP address of the Bridge
Virtual Interface (BVI). If you enable IPv6 on the BVI, member interfaces are automatically assigned unique
link-local addresses.
You enable and disable the member interfaces individually. Thus, you can disable any unused interfaces
without needing to remove them from the bridge group. The bridge group itself is always enabled.
You typically configure a DHCP server on the bridge group interface (BVI), which provides IP addresses for
any endpoints connected through member interfaces. However, you can configure static addresses on the
endpoints connected to the member interfaces if you prefer. All endpoints within the bridge group must have
IP addresses on the same subnet as the bridge group IP address.
Guidelines and Limitations
• You can add one bridge group.
• FDM-defined EtherChannels are not supported as bridge group members. EtherChannels on the Firepower
4100/9300 can be bridge group members.
• You cannot configure bridge groups on Firepower 2100 series or Firepower Threat Defense Virtual
devices.
• For the Firepower 1010, you cannot mix logical VLAN interfaces and physical firewall interfaces in the
same bridge group.
• The ISA 3000 comes pre-configured with bridge group BVI1 (not named, which means it does not
participate in routing). BVI1 includes all data interfaces: GigabitEthernet1/1 (outside1), GigabitEthernet1/2
(inside1), GigabitEthernet1/3 (outside2), and GigabitEthernet1/4 (inside2). You must set the BVI1 IP
address to match your network.
Procedure
Step 1 Click Device, click the link in the Interfaces summary, then click Bridge Groups.
The bridge groups list shows existing bridge groups. Click the open/close arrow to view the member interfaces
for each bridge group. Member interfaces also appear separately on the Interfaces or VLANs pages.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
231
The Basics
Configure Bridge Groups
• Click Create Bridge Group or the plus icon ( ) to create a new group.
Note You can have a single bridge group. If you already have a bridge group defined, you should
edit that group instead of trying to create a new one. If you need to create a new bridge group,
you must first delete the existing bridge group.
• Click the delete icon ( ) for the bridge group if you no longer need it. When you delete a bridge group,
its members become standard routed interfaces, and any NAT rules or security zone membership are
retained. You can edit the interfaces to give them IP addresses. If you want to add them to a new bridge
group, first you need to remove the NAT rules and remove the interface from its security zone.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
232
The Basics
Configure Bridge Groups
• Add an interface—Click the plus icon ( ) , click one or more interfaces, and then click OK.
• Remove an interface—Mouse over an interface and click the x on the right side.
Step 4 Click the IPv4 Address tab and configure the IPv4 address.
Select one of the following options from the Type field:
• Static—Choose this option if you want to assign an address that should not change. Type in the bridge
group's IP address and the subnet mask. All attached endpoints will be on this network. Ensure that the
address is not already used on the network.
If you configured high availability, and you are monitoring this interface for HA, also configure a standby
IP address on the same subnet. The standby address is used by this interface on the standby device. If
you do not set the standby IP address, the active unit cannot monitor the standby interface using network
tests; it can only track the link state.
Note If there is a DHCP server configured for the interface, you are shown the configuration. You
can edit or delete the DHCP address pool. If you change the interface IP address to a different
subnet, you must either delete the DHCP server, or configure an address pool on the new
subnet, before you can save the interface changes. See Configuring DHCP Server, on page 678.
• Dynamic (DHCP)—Choose this option if the address should be obtained from the DHCP server on the
network. This is not the typical option for bridge groups, but you can configure it if needed. You cannot
use this option if you configure high availability.Change the following options if necessary:
• Route Metric—If you obtain the default route from the DHCP server, the administrative distance
to the learned route, between 1 and 255. The default is 1.
• Obtain Default Route—Whether to get the default route from the DHCP server. You would
normally select this option, which is the default.
Step 5 (Optional.) Click the IPv6 Address tab and configure the IPv6 address.
• State—To enable IPv6 processing and to automatically configure the link-local address when you do
not configure the global address, select Enabled. The link local address is generated based on the interface
MAC addresses (Modified EUI-64 format).
Note Disabling IPv6 does not disable IPv6 processing on an interface that is configured with an
explicit IPv6 address or that is enabled for autoconfiguration.
• Static Address/Prefix—If you do not use stateless autoconfiguration, enter the full static global IPv6
address and network prefix. For example, 2001:0DB8::BA98:0:3210/48. For more information on IPv6
addressing, see IPv6 Addressing, on page 224.
If you want to use the address as link local only, select the Link - Local option. Link local addresses are
not accessible outside the local network. You cannot configure a link-local address on a bridge group
interface.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
233
The Basics
Configure EtherChannels
Note A link-local address should start with FE8, FE9, FEA, or FEB, for example
fe80::20d:88ff:feee:6a82. Note that we recommend automatically assigning the link-local
address based on the Modified EUI-64 format. For example, if other devices enforce the use
of the Modified EUI-64 format, then a manually-assigned link-local address may cause packets
to be dropped.
• Standby IP Address—If you configure high availability, and you are monitoring this interface for HA,
also configure a standby IPv6 address on the same subnet. The standby address is used by this interface
on the standby device. If you do not set the standby IP address, the active unit cannot monitor the standby
interface using network tests; it can only track the link state.
• Suppress RA—Whether to suppress router advertisements. The Firepower Threat Defense device can
participate in router advertisements so that neighboring devices can dynamically learn a default router
address. By default, router advertisement messages (ICMPv6 Type 134) are periodically sent out each
IPv6 configured interface.
Router advertisements are also sent in response to router solicitation messages (ICMPv6 Type 133).
Router solicitation messages are sent by hosts at system startup so that the host can immediately
autoconfigure without needing to wait for the next scheduled router advertisement message.
You might want to suppress these messages on any interface for which you do not want the FTD device
to supply the IPv6 prefix (for example, the outside interface).
What to do next
• Ensure that all member interfaces that you intend to use are enabled.
• Configure a DHCP server for the bridge group. See Configuring DHCP Server, on page 678.
• Add the member interfaces to the appropriate security zones. See Configuring Security Zones, on page
135.
• Ensure that policies, such as identity, NAT, and access, supply the required services for the bridge group
and member interfaces.
Configure EtherChannels
This section describes EtherChannels and how to configure them.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
234
The Basics
About EtherChannels
Note You can only add EtherChannels in FDM to the Firepower 1000 and 2100 series. The Firepower 4100/9300
supports EtherChannels, but you must perform all hardware configuration of EtherChannels in FXOS on the
chassis. Firepower 4100/9300 EtherChannels appear in the FDM Interfaces page alongside single physical
interfaces.
About EtherChannels
An 802.3ad EtherChannel is a logical interface (called a port-channel interface) consisting of a bundle of
individual Ethernet links (a channel group) so that you increase the bandwidth for a single network. A port
channel interface is used in the same way as a physical interface when you configure interface-related features.
You can configure up to 48 EtherChannels, depending on how many interfaces your model supports.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
235
The Basics
Link Aggregation Control Protocol
Note If the FTD is in transparent firewall mode, and you place the FTD between two sets of VSS/vPC switches,
then be sure to disable Unidirectional Link Detection (UDLD) on any switch ports connected to the FTD with
an EtherChannel. If you enable UDLD, then a switch port may receive UDLD packets sourced from both
switches in the other VSS/vPC pair. The receiving switch will place the receiving interface in a down state
with the reason "UDLD Neighbor mismatch".
If you use the FTD in an Active/Standby failover deployment, then you need to create separate EtherChannels
on the switches in the VSS/vPC, one for each FTD. On each FTD, a single EtherChannel connects to both
switches. Even if you could group all switch interfaces into a single EtherChannel connecting to both FTD
(in this case, the EtherChannel will not be established because of the separate FTD system IDs), a single
EtherChannel would not be desirable because you do not want traffic sent to the standby FTD.
Figure 14: Active/Standby Failover and VSS/vPC
LACP coordinates the automatic addition and deletion of links to the EtherChannel without user intervention.
It also handles misconfigurations and checks that both ends of member interfaces are connected to the correct
channel group. “On” mode cannot use standby interfaces in the channel group when an interface goes down,
and the connectivity and configurations are not checked.
Load Balancing
The FTD distributes packets to the interfaces in the EtherChannel by hashing the source and destination IP
address of the packet (this criteria is configurable). The resulting hash is divided by the number of active links
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
236
The Basics
EtherChannel MAC Address
in a modulo operation where the resulting remainder determines which interface owns the flow. All packets
with a hash_value mod active_links result of 0 go to the first interface in the EtherChannel, packets with a
result of 1 go to the second interface, packets with a result of 2 go to the third interface, and so on. For example,
if you have 15 active links, then the modulo operation provides values from 0 to 14. For 6 active links, the
values are 0 to 5, and so on.
If an active interface goes down and is not replaced by a standby interface, then traffic is rebalanced between
the remaining links. The failure is masked from both Spanning Tree at Layer 2 and the routing table at Layer
3, so the switchover is transparent to other network devices.
High Availability
• When you use an EtherChannel interface as a High Availability link, it must be pre-configured on both
units in the High Availability pair; you cannot configure it on the primary unit and expect it to replicate
to the secondary unit because the High Availability link itself is required for replication.
• If you use an EtherChannel interface for the state link, no special configuration is required; the
configuration can replicate from the primary unit as normal. For the Firepower 4100/9300 chassis, all
interfaces, including EtherChannels, need to be pre-configured on both units.
• You can monitor EtherChannel interfaces for High Availability. When an active member interface fails
over to a standby interface, this activity does not cause the EtherChannel interface to appear to be failed
when being monitored for device-level High Availability. Only when all physical interfaces fail does the
EtherChannel interface appear to be failed.
• If you use an EtherChannel interface for a High Availability or state link, then to prevent out-of-order
packets, only one interface in the EtherChannel is used. If that interface fails, then the next interface in
the EtherChannel is used. You cannot alter the EtherChannel configuration while it is in use as a High
Availability link. To alter the configuration, you need to temporarily disable High Availability, which
prevents High Availability from occurring for the duration.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
237
The Basics
Add an EtherChannel
Model Support
• You can only add EtherChannels in FDM to the Firepower 1000 and 2100 series. The Firepower 4100/9300
supports EtherChannels, but you must perform all hardware configuration of EtherChannels in FXOS
on the chassis. Firepower 4100/9300 EtherChannels appear in the FDM Interfaces page alongside single
physical interfaces. You also cannot configure EtherChannels in FDM on other models, such as the ASA
5500-X series.
• You cannot use Firepower 1010 switch ports or VLAN interfaces in EtherChannels.
Add an EtherChannel
Add an EtherChannel and assign member interfaces to it.
Note You can only add EtherChannels in FDM to the Firepower 1000 and 2100 series. The Firepower 4100/9300
supports EtherChannels, but you must perform all hardware configuration of EtherChannels in FXOS on the
chassis. Firepower 4100/9300 EtherChannels appear in the FDM Interfaces page alongside single physical
interfaces.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
238
The Basics
Add an EtherChannel
Caution If you are using an interface already in your configuration, removing the name
will clear any configuration that refers to the interface.
Procedure
Step 1 Click Device, click the link in the Interfaces summary, and then click EtherChannels.
The EtherChannels list shows existing EtherChannels, their names, addresses, and states. Click the open/close
arrow to view the member interfaces for each EtherChannel. Member interfaces also appear separately on the
Interfaces page.
Step 2 Click Create EtherChannel (if there are no current EtherChannels) or the plus icon ( ) then EtherChannel
to create a new EtherChannel.
Step 3 Configure the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
239
The Basics
Add an EtherChannel
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
240
The Basics
Add an EtherChannel
function provides the system visibility within the network without being in the flow of network
traffic. When configured in a passive deployment, the system cannot take certain actions such as
blocking or shaping traffic. Passive interfaces receive all traffic unconditionally and no traffic received
on these interfaces is retransmitted. If you select this mode, do not following the rest of this procedure.
Instead, see Configure a Physical Interface in Passive Mode, on page 263.
c) Set the EtherChannel ID, between 1 and 48 (1 and 8 for the Firepower 1010).
d) Set the Status slider to the enabled setting ( ).
e) (Optional) Set the Description.
The description can be up to 200 characters on a single line, without carriage returns.
f) Choose the EtherChannel Mode.
• Active—(Recommended) Sends and receives LACP updates. An active EtherChannel can establish
connectivity with either an active or a passive EtherChannel. You should use the active mode unless
you need to minimize the amount of LACP traffic.
• On—The EtherChannel is always on, and LACP is not used. An “on” EtherChannel can only establish
a connection with another “on” EtherChannel.
• Add an interface—Click the plus icon ( ) , click one or more interfaces, and then click OK.
• Remove an interface—Mouse over an interface and click the x on the right side.
Step 4 Click the IPv4 Address tab and configure the IPv4 address.
Select one of the following options from the Type field:
• DHCP—Choose this option if the address should be obtained from the DHCP server on the network.
You cannot use this option if you configure high availability. Change the following options if necessary:
• Route Metric—If you obtain the default route from the DHCP server, the administrative distance
to the learned route, between 1 and 255. The default is 1.
• Obtain Default Route—Whether to get the default route from the DHCP server. You would
normally select this option, which is the default.
• Static—Choose this option if you want to assign an address that should not change. Type in the interface's
IP address and the subnet mask for the network attached to the interface. For example, if you attach the
10.100.10.0/24 network, you could enter 10.100.10.1/24. Ensure that the address is not already used on
the network.
If you configured high availability, and you are monitoring this interface for HA, also configure a standby
IP address on the same subnet. The standby address is used by this interface on the standby device. If
you do not set the standby IP address, the active unit cannot monitor the standby interface using network
tests; it can only track the link state.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
241
The Basics
Add an EtherChannel
Note If there is a DHCP server configured for the interface, you are shown the configuration. You
can edit or delete the DHCP address pool. If you change the interface IP address to a different
subnet, you must either delete the DHCP server, or configure an address pool on the new
subnet, before you can save the interface changes. See Configuring DHCP Server, on page 678.
• PPPoE—Choose this option if the address should be obtained using Point-to-point Protocol over Ethernet
(PPPoE). PPPoE may be required if the interface is connected to a DSL modem, cable modem, or other
connection to your ISP, and your ISP uses PPPoE to provide your IP address. You cannot use this option
if you configure High Availability. Set the following values:
• Group Name—Specify a group name of your choice to represent this connection.
• PPPoE Username—Specify the username provided by your ISP.
• PPPoE Password—Specify the password provided by your ISP.
• PPP Authentication—Choose PAP, CHAP, or MSCHAP.
PAP passes a cleartext username and password during authentication and is not secure. With CHAP,
the client returns the encrypted [challenge plus password], with a cleartext username in response to
the server challenge. CHAP is more secure than PAP, but it does not encrypt data. MSCHAP is
similar to CHAP but is more secure because the server stores and compares only encrypted passwords
rather than cleartext passwords as in CHAP. MSCHAP also generates a key for data encryption by
MPPE.
• PPPoE Learned Route Metric—Assign an administrative distance to the learned route. Valid
values are from 1 to 255. By default, the administrative distance for the learned routes is 1.
• Obtain Default Route from PPPoE—Check this check box to enable obtaining the default route
from the PPPoE server.
• IP Address Type—Choose Dynamic to obtain the IP address from the PPPoE server. You can
alternatively choose Static if you were assigned a static IP address from the ISP.
Step 5 (Optional.) Click the IPv6 Address tab and configure the IPv6 address.
• State—To enable IPv6 processing and to automatically configure the link-local address when you do
not configure the global address, select Enabled. The link local address is generated based on the interface
MAC addresses (Modified EUI-64 format).
Note Disabling IPv6 does not disable IPv6 processing on an interface that is configured with an
explicit IPv6 address or that is enabled for autoconfiguration.
• Address Auto Configuration—Select this option to have the address automatically configured. IPv6
stateless autoconfiguration will generate a global IPv6 address only if the link on which the device resides
has a router configured to provide IPv6 services, including the advertisement of an IPv6 global prefix
for use on the link. If IPv6 routing services are not available on the link, you will get a link-local IPv6
address only, which you cannot access outside of the device's immediate network link. The link local
address is based on the Modified EUI-64 interface ID.
Although RFC 4862 specifies that hosts configured for stateless autoconfiguration do not send Router
Advertisement messages, the FTD device does send Router Advertisement messages in this case. Select
Suppress RA to suppress messages and conform to the RFC.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
242
The Basics
Configure VLAN Interfaces and Switch Ports (Firepower 1010)
• Static Address/Prefix—If you do not use stateless autoconfiguration, enter the full static global IPv6
address and network prefix. For example, 2001:0DB8::BA98:0:3210/48. For more information on IPv6
addressing, see IPv6 Addressing, on page 224.
If you want to use the address as link local only, select the Link - Local option. Link local addresses are
not accessible outside the local network. You cannot configure a link-local address on a bridge group
interface.
Note A link-local address should start with FE8, FE9, FEA, or FEB, for example
fe80::20d:88ff:feee:6a82. Note that we recommend automatically assigning the link-local
address based on the Modified EUI-64 format. For example, if other devices enforce the use
of the Modified EUI-64 format, then a manually-assigned link-local address may cause packets
to be dropped.
• Standby IP Address—If you configure high availability, and you are monitoring this interface for HA,
also configure a standby IPv6 address on the same subnet. The standby address is used by this interface
on the standby device. If you do not set the standby IP address, the active unit cannot monitor the standby
interface using network tests; it can only track the link state.
• Suppress RA—Whether to suppress router advertisements. The Firepower Threat Defense device can
participate in router advertisements so that neighboring devices can dynamically learn a default router
address. By default, router advertisement messages (ICMPv6 Type 134) are periodically sent out each
IPv6 configured interface.
Router advertisements are also sent in response to router solicitation messages (ICMPv6 Type 133).
Router solicitation messages are sent by hosts at system startup so that the host can immediately
autoconfigure without needing to wait for the next scheduled router advertisement message.
You might want to suppress these messages on any interface for which you do not want the FTD device
to supply the IPv6 prefix (for example, the outside interface).
What to do next
• Add the EtherChannels to the appropriate security zones. See Configuring Security Zones, on page 135.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
243
The Basics
Understanding Firepower 1010 Ports and Interfaces
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
244
The Basics
Configure a VLAN Interface
Bridge Groups
You cannot mix logical VLAN interfaces and physical firewall interfaces in the same bridge group.
Default Settings
• Ethernet 1/1 is a firewall interface.
• Ethernet 1/2 through Ethernet 1/8 are switch ports assigned to VLAN 1.
• Default Speed and Duplex—By default, the speed and duplex are set to auto-negotiate.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
245
The Basics
Configure a VLAN Interface
Note If you only want to enable switching between switch ports on a particular VLAN, and you do not want to
route between the VLAN and other VLANs or firewall interfaces, then leave the VLAN interface name empty.
In this case, you also do not need to configure an IP address; any IP configuration is ignored.
Procedure
Step 1 Click Device, click the link in the Interfaces summary, then click VLANs.
The VLANs list shows existing VLAN interfaces. Click the open/close arrow to view the switch ports associated
with each VLAN. Switch ports also appear separately on the Interfaces page.
Step 2 Click Create VLAN Interface (if there are no current VLANs) or the plus icon ( ) to create a new VLAN
interface.
Step 3 Configure the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
246
The Basics
Configure a VLAN Interface
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
247
The Basics
Configure a VLAN Interface
Step 4 Click the IPv4 Address tab and configure the IPv4 address.
Select one of the following options from the Type field:
• DHCP—Choose this option if the address should be obtained from the DHCP server on the network.
You cannot use this option if you configure high availability. Change the following options if necessary:
• Route Metric—If you obtain the default route from the DHCP server, the administrative distance
to the learned route, between 1 and 255. The default is 1.
• Obtain Default Route—Whether to get the default route from the DHCP server. You would
normally select this option, which is the default.
• Static—Choose this option if you want to assign an address that should not change. Type in the interface's
IP address and the subnet mask for the network attached to the interface. For example, if you attach the
10.100.10.0/24 network, you could enter 10.100.10.1/24. Ensure that the address is not already used on
the network.
If you configured high availability, and you are monitoring this interface for HA, also configure a standby
IP address on the same subnet. The standby address is used by this interface on the standby device. If
you do not set the standby IP address, the active unit cannot monitor the standby interface using network
tests; it can only track the link state.
Note If there is a DHCP server configured for the interface, you are shown the configuration. You
can edit or delete the DHCP address pool. If you change the interface IP address to a different
subnet, you must either delete the DHCP server, or configure an address pool on the new
subnet, before you can save the interface changes. See Configuring DHCP Server, on page 678.
• PPPoE—Choose this option if the address should be obtained using Point-to-point Protocol over Ethernet
(PPPoE). PPPoE may be required if the interface is connected to a DSL modem, cable modem, or other
connection to your ISP, and your ISP uses PPPoE to provide your IP address. You cannot use this option
if you configure High Availability. Set the following values:
• Group Name—Specify a group name of your choice to represent this connection.
• PPPoE Username—Specify the username provided by your ISP.
• PPPoE Password—Specify the password provided by your ISP.
• PPP Authentication—Choose PAP, CHAP, or MSCHAP.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
248
The Basics
Configure a VLAN Interface
PAP passes a cleartext username and password during authentication and is not secure. With CHAP,
the client returns the encrypted [challenge plus password], with a cleartext username in response to
the server challenge. CHAP is more secure than PAP, but it does not encrypt data. MSCHAP is
similar to CHAP but is more secure because the server stores and compares only encrypted passwords
rather than cleartext passwords as in CHAP. MSCHAP also generates a key for data encryption by
MPPE.
• PPPoE Learned Route Metric—Assign an administrative distance to the learned route. Valid
values are from 1 to 255. By default, the administrative distance for the learned routes is 1.
• Obtain Default Route from PPPoE—Check this check box to enable obtaining the default route
from the PPPoE server.
• IP Address Type—Choose Dynamic to obtain the IP address from the PPPoE server. You can
alternatively choose Static if you were assigned a static IP address from the ISP.
Step 5 (Optional.) Click the IPv6 Address tab and configure the IPv6 address.
• State—To enable IPv6 processing and to automatically configure the link-local address when you do
not configure the global address, select Enabled. The link local address is generated based on the interface
MAC addresses (Modified EUI-64 format).
Note Disabling IPv6 does not disable IPv6 processing on an interface that is configured with an
explicit IPv6 address or that is enabled for autoconfiguration.
• Address Auto Configuration—Select this option to have the address automatically configured. IPv6
stateless autoconfiguration will generate a global IPv6 address only if the link on which the device resides
has a router configured to provide IPv6 services, including the advertisement of an IPv6 global prefix
for use on the link. If IPv6 routing services are not available on the link, you will get a link-local IPv6
address only, which you cannot access outside of the device's immediate network link. The link local
address is based on the Modified EUI-64 interface ID.
Although RFC 4862 specifies that hosts configured for stateless autoconfiguration do not send Router
Advertisement messages, the FTD device does send Router Advertisement messages in this case. Select
Suppress RA to suppress messages and conform to the RFC.
• Static Address/Prefix—If you do not use stateless autoconfiguration, enter the full static global IPv6
address and network prefix. For example, 2001:0DB8::BA98:0:3210/48. For more information on IPv6
addressing, see IPv6 Addressing, on page 224.
If you want to use the address as link local only, select the Link - Local option. Link local addresses are
not accessible outside the local network. You cannot configure a link-local address on a bridge group
interface.
Note A link-local address should start with FE8, FE9, FEA, or FEB, for example
fe80::20d:88ff:feee:6a82. Note that we recommend automatically assigning the link-local
address based on the Modified EUI-64 format. For example, if other devices enforce the use
of the Modified EUI-64 format, then a manually-assigned link-local address may cause packets
to be dropped.
• Standby IP Address—If you configure high availability, and you are monitoring this interface for HA,
also configure a standby IPv6 address on the same subnet. The standby address is used by this interface
on the standby device. If you do not set the standby IP address, the active unit cannot monitor the standby
interface using network tests; it can only track the link state.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
249
The Basics
Configure Switch Ports as Access Ports
• Suppress RA—Whether to suppress router advertisements. The Firepower Threat Defense device can
participate in router advertisements so that neighboring devices can dynamically learn a default router
address. By default, router advertisement messages (ICMPv6 Type 134) are periodically sent out each
IPv6 configured interface.
Router advertisements are also sent in response to router solicitation messages (ICMPv6 Type 133).
Router solicitation messages are sent by hosts at system startup so that the host can immediately
autoconfigure without needing to wait for the next scheduled router advertisement message.
You might want to suppress these messages on any interface for which you do not want the FTD device
to supply the IPv6 prefix (for example, the outside interface).
What to do next
• Add the VLANs to the appropriate security zones. See Configuring Security Zones, on page 135.
Note The Firepower 1010 does not support Spanning Tree Protocol for loop detection in the network. Therefore
you must ensure that any connection with the FTD does not end up in a network loop.
Procedure
Step 1 Click Device, and then click the link in the Interfaces summary.
The Interfaces page is selected by default. The interfaces list shows physical interfaces, their names, addresses,
and states.
Step 2 Click the edit icon ( ) for the physical interface you want to edit.
Step 3 Set the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
250
The Basics
Configure Switch Ports as Access Ports
a) Do not set the Interface Name for switch ports; only the associated VLAN interface is a named interface.
b) Set the Mode to Switch Port.
c) Set the Status slider to the enabled setting ( ).
d) (Optional) Set the Description.
The description can be up to 200 characters on a single line, without carriage returns.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
251
The Basics
Configure Switch Ports as Trunk Ports
Procedure
Step 1 Click Device, and then click the link in the Interfaces summary.
The Interfaces page is selected by default. The interfaces list shows physical interfaces, their names, addresses,
and states.
Step 2 Click the edit icon ( ) for the physical interface you want to edit.
Step 3 Set the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
252
The Basics
Configure Switch Ports as Trunk Ports
a) Do not set the Interface Name for switch ports; only the associated VLAN interface is a named interface.
b) Set the Mode to Switch Port.
c) Set the Status slider to the enabled setting ( ).
d) (Optional) Set the Description.
The description can be up to 200 characters on a single line, without carriage returns.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
253
The Basics
Configure Power Over Ethernet
d) For the Associated VLANs, click the plus icon ( ) to select one or more existing VLAN interfaces.
If you include the native VLAN in this field, it is ignored; the trunk port always removes the VLAN
tagging when sending native VLAN traffic out of the port. Moreover, it will not receive traffic that still
has native VLAN tagging.
You can add a new VLAN interface by clicking Create new VLAN. See Configure a VLAN Interface,
on page 245.
Procedure
Step 1 Click Device, and then click the link in the Interfaces summary.
The Interfaces page is selected by default. The interfaces list shows physical interfaces, their names, addresses,
and states.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
254
The Basics
Configure VLAN Subinterfaces and 802.1Q Trunking
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
255
The Basics
Configure VLAN Subinterfaces and 802.1Q Trunking
• Preventing untagged packets on the physical interface—If you use subinterfaces, you typically do not
also want the physical interface to pass traffic, because the physical interface passes untagged packets.
Because the physical interface must be enabled for the subinterface to pass traffic, ensure that the physical
interface does not pass traffic by not naming the interface. If you want to let the physical interface pass
untagged packets, you can name the interface as usual.
• Firepower 1010—Subinterfaces are not supported on switch ports or VLAN interfaces.
• You cannot configure IP addresses on bridge group member interfaces, although you can modify advanced
settings as needed.
• All subinterfaces on the same parent interface must be either bridge group members or routed interfaces;
you cannot mix and match.
• The FTD does not support the Dynamic Trunking Protocol (DTP), so you must configure the connected
switch port to trunk unconditionally.
• You might want to assign unique MAC addresses to subinterfaces defined on the FTD, because they use
the same burned-in MAC address of the parent interface. For example, your service provider might
perform access control based on the MAC address. Also, because IPv6 link-local addresses are generated
based on the MAC address, assigning unique MAC addresses to subinterfaces allows for unique IPv6
link-local addresses, which can avoid traffic disruption in certain instances on the FTD.
Procedure
Step 1 Click Device, and then click the link in the Interfaces summary.
The Interfaces page is selected by default. To add a subinterface to an EtherChannel, click EtherChannel.
The interfaces list shows physical interfaces, their names, addresses, and states.
• On the Interfaces page, click the plus icon ( ) to create a new subinterface.
• On the EtherChannel page, click the plus and down arrow icon ( ), and choose Subinterface.
• Click the edit icon ( ) for the subinterface you want to edit.
If you no longer need a subinterface, click the delete icon ( ) for the subinterface to delete it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
256
The Basics
Configure VLAN Subinterfaces and 802.1Q Trunking
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
257
The Basics
Configure VLAN Subinterfaces and 802.1Q Trunking
Step 5 Click the IPv4 Address tab and configure the IPv4 address.
Select one of the following options from the Type field:
• DHCP—Choose this option if the address should be obtained from the DHCP server on the network.
You cannot use this option if you configure high availability. Change the following options if necessary:
• Route Metric—If you obtain the default route from the DHCP server, the administrative distance
to the learned route, between 1 and 255. The default is 1.
• Obtain Default Route—Whether to get the default route from the DHCP server. You would
normally select this option, which is the default.
• Static—Choose this option if you want to assign an address that should not change. Type in the interface's
IP address and the subnet mask for the network attached to the interface. For example, if you attach the
10.100.10.0/24 network, you could enter 10.100.10.1/24. Ensure that the address is not already used on
the network.
If you configured high availability, and you are monitoring this interface for HA, also configure a standby
IP address on the same subnet. The standby address is used by this interface on the standby device. If
you do not set the standby IP address, the active unit cannot monitor the standby interface using network
tests; it can only track the link state.
Note If there is a DHCP server configured for the interface, you are shown the configuration. You
can edit or delete the DHCP address pool. If you change the interface IP address to a different
subnet, you must either delete the DHCP server, or configure an address pool on the new
subnet, before you can save the interface changes. See Configuring DHCP Server, on page 678.
• PPPoE—Choose this option if the address should be obtained using Point-to-point Protocol over Ethernet
(PPPoE). PPPoE may be required if the interface is connected to a DSL modem, cable modem, or other
connection to your ISP, and your ISP uses PPPoE to provide your IP address. You cannot use this option
if you configure High Availability. Set the following values:
• Group Name—Specify a group name of your choice to represent this connection.
• PPPoE Username—Specify the username provided by your ISP.
• PPPoE Password—Specify the password provided by your ISP.
• PPP Authentication—Choose PAP, CHAP, or MSCHAP.
PAP passes a cleartext username and password during authentication and is not secure. With CHAP,
the client returns the encrypted [challenge plus password], with a cleartext username in response to
the server challenge. CHAP is more secure than PAP, but it does not encrypt data. MSCHAP is
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
258
The Basics
Configure VLAN Subinterfaces and 802.1Q Trunking
similar to CHAP but is more secure because the server stores and compares only encrypted passwords
rather than cleartext passwords as in CHAP. MSCHAP also generates a key for data encryption by
MPPE.
• PPPoE Learned Route Metric—Assign an administrative distance to the learned route. Valid
values are from 1 to 255. By default, the administrative distance for the learned routes is 1.
• Obtain Default Route from PPPoE—Check this check box to enable obtaining the default route
from the PPPoE server.
• IP Address Type—Choose Dynamic to obtain the IP address from the PPPoE server. You can
alternatively choose Static if you were assigned a static IP address from the ISP.
Step 6 (Optional.) Click the IPv6 Address tab and configure the IPv6 address.
• State—To enable IPv6 processing and to automatically configure the link-local address when you do
not configure the global address, select Enabled. The link local address is generated based on the interface
MAC addresses (Modified EUI-64 format).
Note Disabling IPv6 does not disable IPv6 processing on an interface that is configured with an
explicit IPv6 address or that is enabled for autoconfiguration.
• Address Auto Configuration—Select this option to have the address automatically configured. IPv6
stateless autoconfiguration will generate a global IPv6 address only if the link on which the device resides
has a router configured to provide IPv6 services, including the advertisement of an IPv6 global prefix
for use on the link. If IPv6 routing services are not available on the link, you will get a link-local IPv6
address only, which you cannot access outside of the device's immediate network link. The link local
address is based on the Modified EUI-64 interface ID.
Although RFC 4862 specifies that hosts configured for stateless autoconfiguration do not send Router
Advertisement messages, the FTD device does send Router Advertisement messages in this case. Select
Suppress RA to suppress messages and conform to the RFC.
• Static Address/Prefix—If you do not use stateless autoconfiguration, enter the full static global IPv6
address and network prefix. For example, 2001:0DB8::BA98:0:3210/48. For more information on IPv6
addressing, see IPv6 Addressing, on page 224.
If you want to use the address as link local only, select the Link - Local option. Link local addresses are
not accessible outside the local network. You cannot configure a link-local address on a bridge group
interface.
Note A link-local address should start with FE8, FE9, FEA, or FEB, for example
fe80::20d:88ff:feee:6a82. Note that we recommend automatically assigning the link-local
address based on the Modified EUI-64 format. For example, if other devices enforce the use
of the Modified EUI-64 format, then a manually-assigned link-local address may cause packets
to be dropped.
• Standby IP Address—If you configure high availability, and you are monitoring this interface for HA,
also configure a standby IPv6 address on the same subnet. The standby address is used by this interface
on the standby device. If you do not set the standby IP address, the active unit cannot monitor the standby
interface using network tests; it can only track the link state.
• Suppress RA—Whether to suppress router advertisements. The Firepower Threat Defense device can
participate in router advertisements so that neighboring devices can dynamically learn a default router
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
259
The Basics
Configure Passive Interfaces
address. By default, router advertisement messages (ICMPv6 Type 134) are periodically sent out each
IPv6 configured interface.
Router advertisements are also sent in response to router solicitation messages (ICMPv6 Type 133).
Router solicitation messages are sent by hosts at system startup so that the host can immediately
autoconfigure without needing to wait for the next scheduled router advertisement message.
You might want to suppress these messages on any interface for which you do not want the FTD device
to supply the IPv6 prefix (for example, the outside interface).
What to do next
• Add the subinterfaces to the appropriate security zones. See Configuring Security Zones, on page 135.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
260
The Basics
Limitations for Passive Interfaces
• Pure IDS deployment—If you do not want to use the system as a firewall or IPS (intrusion prevention
system), you can deploy it passively as an IDS (intrusion detection system). In this deployment method,
you would use an access control rule to apply an intrusion policy to all traffic. You would also have the
system monitor multiple source ports on the switch. Then, you would be able to use the dashboards to
monitor the threats seen on the network. However, in this mode, the system can do nothing to prevent
these threats.
• Mixed deployment—You can mix active routed interfaces with passive interfaces on the same system.
Thus, you can deploy the Firepower Threat Defense device as a firewall in some networks, while
configuring one or more passive interfaces to monitor traffic in other networks.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
261
The Basics
Configure the VLAN for a Firepower Threat Defense Virtual Passive Interface
Procedure
Step 3 (Optional.) Verify the configuration using show monitor session command.
The following example shows the brief output for session 1.
Step 4 Physically connect the cable from the Firepower Threat Defense passive interface to the destination port on
the switch.
You can configure the interface in passive mode either before or after you make the physical connection. See
Configure a Physical Interface in Passive Mode, on page 263.
Configure the VLAN for a Firepower Threat Defense Virtual Passive Interface
A passive interface on a Firepower Threat Defense Virtual device works only if you configure the VLAN on
the virtual network correctly. Ensure that you do the following:
• Connect the Firepower Threat Defense Virtual interface to a VLAN that you have configured in
promiscuous mode. Then, configure the interface as explained in Configure a Physical Interface in Passive
Mode, on page 263. The passive interface will see a copy of all traffic on the promiscuous VLAN.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
262
The Basics
Configure a Physical Interface in Passive Mode
• To the same VLAN, connect one or more endpoint devices, such as virtual Windows systems. You can
use a single device if there is a connection from the VLAN to the Internet. Otherwise, you need at least
two devices so that you can pass traffic between them. To get data for URL categories, you need to have
an Internet connection.
Use passive mode when you want to analyze the traffic coming through the monitored switch ports without
impacting the traffic. For an end-to-end example of using passive mode, see How to Passively Monitor the
Traffic on a Network, on page 75.
Procedure
Step 1 Click Device, and then click the link in the Interfaces summary, and then click Interfaces or EtherChannel.
Step 2 Click the edit icon ( ) for the physical interface or EtherChannel you want to edit.
Pick a currently-unused interface. If you intend to convert an in-use interface to a passive interface, you need
to first remove the interface from any security zone and remove all other configurations that use the interface.
Note You cannot configure IPv4 or IPv6 addresses. On the Advanced tab, you can change the MTU,
duplex, and speed settings only.
What to do next
Creating a passive interface is not sufficient for populating the dashboards with information about the traffic
seen on the interface. You must also do the following. The use case covers these steps. See How to Passively
Monitor the Traffic on a Network, on page 75.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
263
The Basics
Configure Advanced Interface Options
• Create a passive security zone and add the interface to it. See Configuring Security Zones, on page 135.
• Create access control rules that use the passive security zone as the source zone. Typically, you would
apply intrusion policies in these rules to implement IDS (intrusion detection system) monitoring. See
Configuring the Access Control Policy, on page 434.
• Optionally, create SSL decryption and identity rules for the passive security zone, and enable the Security
Intelligence policy.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
264
The Basics
Path MTU Discovery
Note The Firepower Threat Defense device can receive frames larger than the configured MTU as long as there is
room in memory.
Note Increasing the MTU assigns more memory for jumbo frames, which might limit
the maximum usage of other features, such as access rules. If you increase the
MTU above the default 1500 on ASA 5500-X series devices or Firepower Threat
Defense Virtual, you must reboot the system. If the device is configured for high
availability, you must also reboot the standby device. You do not need to reboot
Firepower models, where jumbo frame support is always enabled.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
265
The Basics
Configure Advanced Options
• For bridge groups, you configure most of these options on the member interfaces. Except for DAD
attempts and Enable for HA Monitoring, these options are not available for the Bridge Virtual Interface
(BVI).
• You cannot set MTU, duplex, or speed for the Management interface on a Firepower 1000 or 2100 device.
• Advanced options are not available for Firepower 1010 switch ports.
• You cannot set duplex or speed for interfaces on the Firepower 4100/9300. Set these features for the
interface using FXOS.
• For passive interfaces, you can set the MTU, duplex, and speed only. You cannot make the interface
management only.
Procedure
Step 1 Click Device, click the link in the Interfaces summary, and then click the interfaces type to view the list of
interfaces.
Step 2 Click the edit icon ( ) for the interface you want to edit.
Step 3 Click Advanced Options.
Step 4 Select Enable for HA Monitoring if you want the health of the interface to be a factor when the system
decides whether to fail over to the peer unit in a high availability configuration.
This option is ignored if you do not configure high availability. It is also ignored if you do not configure a
name for the interface.
Step 6 Change the MTU (maximum transmission unit) to the desired value.
The default MTU is 1500 bytes. You can specify a value from 64 - 9198 (or 9000 for Firepower Threat Defense
Virtual and 9184 for the Firepower 4100/9300). Set a high value if you typically see jumbo frames on your
network.
Note If you increase MTU above 1500 on ASA 5500-X series devices, ISA 3000 series devices, or
Firepower Threat Defense Virtual, you must reboot the device. Log into the CLI and use the reboot
command. If the device is configured for high availability, you must also reboot the standby device.
You do not need to reboot Firepower models, where jumbo frame support is always enabled.
Step 7 (Physical interface only.) Modify the speed and duplex settings.
The default is that the interface negotiates the best duplex and speed with the interface at the other end of the
wire, but you can force a specific duplex or speed if necessary. The options listed are only those supported
by the interface. Before setting these options for interfaces on a network module, please read Limitations for
Interface Configuration, on page 225.
• Duplex—Choose Auto to have the interface negotiate the duplex (Auto is only available for RJ-45
interfaces), or pick a specific duplex: Half, Full.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
266
The Basics
Scan for Interface Changes, and Migrate an Interface
• Speed—Choose Auto to have the interface negotiate the speed (Auto is only available for RJ-45
interfaces), or pick a specific speed: 10, 100, 1000, 10000 Mbps. For SFP interfaces, depending on your
hardware, you can select No Negotiate to set the speed to 1000 and disable link negotiation.
Step 9 (Optional, recommended for subinterfaces and high availability units.) Configure the MAC address.
By default, the system uses the MAC address burned into the network interface card (NIC) for the interface.
Thus, all subinterfaces on an interface use the same MAC address, so you might want to create unique addresses
per subinterface. Manually configured active/standby MAC addresses are also recommended if you configure
high availability. Defining the MAC addresses helps maintain consistency in the network in the event of
failover.
• MAC Address—The Media Access Control in H.H.H format, where H is a 16-bit hexadecimal digit.
For example, you would enter the MAC address 00-0C-F1-42-4C-DE as 000C.F142.4CDE. The MAC
address must not have the multicast bit set, that is, the second hexadecimal digit from the left cannot be
an odd number.)
• Standby MAC Address—For use with high availability. If the active unit fails over and the standby
unit becomes active, the new active unit starts using the active MAC addresses to minimize network
disruption, while the old active unit uses the standby address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
267
The Basics
About Interface Scanning and Migrating
Note A syslog server egress interface change will not block deployment, although you should fix the syslog server
configuration, either manually or using the interface replacement feature.
Migrating
Adding a new interface, or removing an unused interface, has minimal impact on the FTD configuration.
However, removing an interface that is used in your security policy will impact the configuration. Interfaces
can be referenced directly in many places in the FTD configuration, including security zones, NAT, VPN,
routing, DHCP server, and so on.
FDM supports migrating an interface in your security policy to another interface, so removing an interface
can be almost seamless.
Note The migrate feature does not copy the name, IP address, and other configuration from one interface to another;
rather, this feature changes the security policy to refer to the new interface instead of the old interface. You
need to manually configure the new interface settings before migrating.
If you need to remove an interface, we recommend that you add the new interface and migrate the old interface
before you remove it. If you add and remove interfaces at the same time, the migration process will still work;
however, you cannot manually edit removed interfaces or policies referring to them, so you may find it easier
to perform the migration in stages.
If you replace an interface with the same type (for example, you need to RMA a network module), you can:
1. Remove the old module from the chassis; 2. Perform a scan; 3. Deploy changes unrelated to the removed
interfaces; 4. Replace the module; 5. Perform a new scan; 6. Deploy your configuration, including any changes
related to the interfaces. You do not need to perform a migration if the new interface has the same interface
ID and characteristics as the old interface.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
268
The Basics
Guidelines and Limitations for Interface Scanning and Migrating
Additional Guidelines
• If you need to remove an interface, we recommend that you add the new interface and migrate the old
interface before you remove it.
• For the FTDv, only add and remove interfaces at the end of the interface list. If you add or remove an
interface anywhere else, then the hypervisor will renumber your interfaces, causing the interface IDs in
your configuration to line up with the wrong interfaces.
• If a scan/migration goes bad, restore the original interfaces on the chassis, and re-scan to get back to the
original state.
• For backups, be sure to create a new backup with the new interfaces. A restore with the old configuration
will restore the old interface information, and you will have to perform the scan/replace again.
• For HA, make the same interface changes on both units before you perform the interface scan on the
active unit. You only need to perform the scan/migration on the active unit. Configuration changes are
replicated to the standby unit.
Note The migrate feature does not copy the name, IP address, and other configuration from one interface to another;
rather, this feature changes the security policy to refer to the new interface instead of the old interface. You
need to manually configure the new interface settings before migrating.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
269
The Basics
Scan and Migrate Interfaces
Procedure
a) Click Device, then click the View All Interfaces link in the Interfaces summary.
After the scan, removed interfaces show on the Interfaces page with caution symbols:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
270
The Basics
Scan and Migrate Interfaces
This process migrates the old interface to the new interface in all configuration settings that refer to the
interface.
c) Choose the new interface from the Migrate to: drop-down list.
d) A message appears on the Interfaces page. Click the link in the message.
e) Check the Task List to ensure that the migration was successful.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
271
The Basics
Configure Hardware Bypass for Power Failure (ISA 3000)
f) If the migration fails, you can view the reasons in the API Explorer.
To open API Explorer, click the more options button ( ) and choose API Explorer. Choose Interface >
GET /jobs/interfacemigrations, and then click Try it Out!.
Step 5 Remove the old interfaces on the chassis, and perform another scan.
Removed interfaces that are no longer used in your policy will be removed from the Interfaces page.
Step 6 Redeploy your configuration to remove the unused interfaces from your configuration.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
272
The Basics
Configure Hardware Bypass for Power Failure (ISA 3000)
the sequence numbers. The receiving client receives an unexpected sequence number and drops the connection,
so the TCP session needs to be re-established. Even with TCP sequence number randomization disabled, some
TCP connections will have to be re-established because of the link that is temporarily down during the
switchover.
In CLI Console or an SSH session, use the show hardware-bypass command to monitor the operational
status.
Procedure
Step 1 Click Device, then click the link in the Interfaces summary.
The Hardware Bypass section at the top of the page shows the current configuration on the allowed interface
pairs for this device.
However, you must ensure the pairs are configured in the same bridge group before you can enable hardware
bypass.
Step 2 To enable or disable automatic hardware bypass on a given pair, move the slider for the pair in the Bypass
When Power Down column.
The change is not immediate. You must deploy the configuration.
a) Move the slider for the pair to the enabled or disabled state in the Bypass Immediately column.
b) Click the Deploy Changes icon in the upper right of the web page and deploy the change.
In CLI Console or an SSH session, use the show hardware-bypass command to monitor the operational
status.
Step 4 (Optional.) Create the FlexConfig object and policy needed to disable TCP sequence number randomization.
a) Click View Configuration in Device > Advanced Configuration.
b) Click FlexConfig > FlexConfig Objects in the Advanced Configuration table of contents.
c) Click the + button to create a new object.
d) Enter a name for the object. For example, Disable_TCP_Randomization.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
273
The Basics
Monitoring Interfaces
e) In the Template editor, enter the commands to disable TCP sequence number randomization.
The command is set connection random-sequence-number disable, but you must configure it for a
specific class within a policy map. By far, the easiest approach is to disable random sequence numbers
globally, which requires the following commands:
policy-map global_policy
class default_class
set connection random-sequence-number disable
f) In the Negate Template editor, enter the lines required to undo this configuration.
For example, if you disable TCP sequence number randomization globally, the negate template would be
the following:
policy-map global_policy
class default_class
set connection random-sequence-number enable
Monitoring Interfaces
You can view some basic information about interfaces in the following areas:
• Device. Use the port graphic to monitor the current state of the interfaces. Mouse over a port to see its
IP addresses, EtherChannel membership, and enabled and link statuses. The IP addresses can be statically
assigned or obtained using DHCP.
Interface ports use the following color coding:
• Green—The interface is configured, enabled, and the link is up.
• Gray—The interface is not enabled.
• Orange/Red—The interface is configured and enabled, but the link is down. If the interface is wired,
this is an error condition that needs correction. If the interface is not wired, this is the expected
status.
• Monitoring > System. The Throughput dashboard shows information on traffic flowing through the
system. You can view information on all interfaces, or you can select a specific interface to examine.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
274
The Basics
Examples for Interfaces
• Monitoring > Zones. This dashboard shows statistics based on security zones, which are composed of
interfaces. You can drill into this information for more detail.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
275
The Basics
Examples for Interfaces
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
276
PA R T IV
Routing
• Routing Basics and Static Routes, on page 279
• Virtual Routers, on page 293
• Route Maps and Other Objects for Route Tuning, on page 319
• Open Shortest Path First (OSPF), on page 335
• Border Gateway Protocol (BGP), on page 355
CHAPTER 12
Routing Basics and Static Routes
The system uses a routing table to determine the egress interface for packets entering the system. The following
topics explain routing basics and how to configure static routing on the device.
• Best Practices for Routing, on page 279
• Routing Overview, on page 279
• Static Routes, on page 285
• Monitoring Routing, on page 290
Routing Overview
The following topics describe how routing behaves within the FTD device. Routing is the act of moving
information across a network from a source to a destination. Along the way, at least one intermediate node is
typically encountered. Routing involves two basic activities: determining optimal routing paths and transporting
packets through a network.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
279
Routing
Supported Routing Protocols
Configuration
Routing Feature Method Notes
BGP Smart CLI Configure BGP Smart CLI objects from the Device > Routing
page.
Configure objects used in BGP, such as route maps, using Smart
CLI objects from the Device > Advanced Configuration page.
Bi-directional FlexConfig Configure BFD using FlexConfig objects from the Device >
forwarding detection Advanced Configuration page. BFD is supported with BGP
(BFD) only.
EIGRP FlexConfig Configure EIGRP using FlexConfig objects from the Device >
Advanced Configuration page.
IS-IS FlexConfig Configure IS-IS using FlexConfig objects from the Device >
Advanced Configuration page.
Multicast routing FlexConfig Configure multicast routing using FlexConfig objects from the
Device > Advanced Configuration page.
OSPFv2 Smart CLI Configure OSPFv2 Smart CLI objects from the Device > Routing
page.
Configure objects used in OSPFv2, such as route maps, using
Smart CLI objects from the Device > Advanced Configuration
page.
OSPFv3 FlexConfig Configure OSPFv3 using FlexConfig objects from the Device >
Advanced Configuration page.
Policy-based routing FlexConfig Configure policy-based routing (PBR) using FlexConfig objects
(PBR) from the Device > Advanced Configuration page.
RIP FlexConfig Configure RIP using FlexConfig objects from the Device >
Advanced Configuration page.
Static routes FDM Configure static routes globally or per virtual router from the
Device > Routing page.
Virtual routers, VRF FDM Configure virtual routers from the Device > Routing page.
Route Types
There are two main types of route: static or dynamic.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
280
Routing
The Routing Table and Route Selection
Static routes are those that you define explicitly. These are stable, normally high-priority routes, that you
would use to ensure traffic to the route destination is always sent out the correct interface. For example, you
would create a default static route to cover all traffic not already covered by any other route, that is, 0.0.0.0/0
for IPv4 or ::/0 for IPv6. Another example would be a static route to an internal syslog server that you always
want to use.
Dynamic routes are those learned through the operation of a routing protocol, such as OSPF, BGP, EIGRP,
IS-IS, or RIP. You do not define the routes directly. Instead, you configure the routing protocol, and the system
then communicates with neighbor routers, transmitting routing updates to them and receiving routing updates
in turn.
Dynamic routing protocols adjust the routing table to changing network circumstances by analyzing incoming
routing update messages. If the message indicates that a network change has occurred, the system recalculates
routes and sends out new routing update messages. These messages permeate the network, stimulating routers
to rerun their algorithms and change their routing tables accordingly.
Static routing is simple and serves the purpose of basic routing. It works well in environments where network
traffic is relatively predictable and where network design is relatively simple. However, because static routes
cannot change unless you edit them, they cannot react to changes in the network.
Unless you have a small network, you would typically combine static routes with one or more dynamic routing
protocol. You would define at least one static route, as the default route for any traffic that does not match an
explicit route.
Note You can use Smart CLI to configure the following routing protocols: OSPF, BGP. Use FlexConfig to configure
other routing protocols that are supported in ASA software.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
281
Routing
Administrative Distances for Routes
For example, if the RIP and OSPF processes discovered the following routes:
• RIP: 192.168.32.0/24
• OSPF: 192.168.32.0/19
Even though OSPF routes have the better administrative distance, both routes are installed in the routing
table because each of these routes has a different prefix length (subnet mask). They are considered
different destinations and the packet forwarding logic determines which route to use.
• If the FTD learns about multiple paths to the same destination from a single routing protocol, such as
RIP, the route with the better metric (as determined by the routing protocol) is entered into the routing
table.
Metrics are values associated with specific routes, ranking them from most preferred to least preferred.
The parameters used to determine the metrics differ for different routing protocols. The path with the
lowest metric is selected as the optimal path and installed in the routing table. If there are multiple paths
to the same destination with equal metrics, load balancing is done on these equal cost paths.
• If the FTD learns about a destination from more than one routing protocol, the administrative distances
of the routes are compared, and the routes with lower administrative distance are entered into the routing
table.
Connected interface 0
Static route 1
External BGP 20
Internal EIGRP 90
OSPF 110
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
282
Routing
Backup Dynamic and Floating Static Routes
IS-IS 115
RIP 120
Unknown 255
The smaller the administrative distance value, the more preference is given to the protocol. For example, if
the Firepower Threat Defense device receives a route to a certain network from both an OSPF routing process
(default administrative distance - 110) and a RIP routing process (default administrative distance - 120), the
Firepower Threat Defense device chooses the OSPF route because OSPF has a higher preference. In this case,
the router adds the OSPF version of the route to the routing table.
In this example, if the source of the OSPF-derived route was lost (for example, due to a power shutdown),
the Firepower Threat Defense device would then use the RIP-derived route until the OSPF-derived route
reappears.
The administrative distance is a local setting. For example, if you change the administrative distance of routes
obtained through OSPF, that change would only affect the routing table for the Firepower Threat Defense
device on which the command was entered. The administrative distance is not advertised in routing updates.
Administrative distance does not affect the routing process. The routing processes only advertise the routes
that have been discovered by the routing process or redistributed into the routing process. For example, the
RIP routing process advertises RIP routes, even if routes discovered by the OSPF routing process are used in
the routing table.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
283
Routing
Routing Table for Management Traffic
• If the destination matches more than one entry in the routing table, then the packet is forwarded out of
the interface associated with the route that has the longer network prefix length.
For example, a packet destined for 192.168.32.1 arrives on an interface with the following routes in the routing
table:
• 192.168.32.0/24 gateway 10.1.1.2
• 192.168.32.0/19 gateway 10.1.1.3
In this case, a packet destined to 192.168.32.1 is directed toward 10.1.1.2, because 192.168.32.1 falls within
the 192.168.32.0/24 network. It also falls within the other route in the routing table, but 192.168.32.0/24 has
the longest prefix within the routing table (24 bits verses 19 bits). Longer prefixes are always preferred over
shorter ones when forwarding a packet.
Note Existing connections continue to use their established interfaces even if a new similar connection would result
in different behavior due to a change in routes.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
284
Routing
Equal-Cost Multi-Path (ECMP) Routing
Note This routing table does not affect the special FTD Management logical interface that it uses to communicate
with the FMC; that interface has its own routing table. The Diagnostic logical interface, on the other hand,
uses the management-only routing table described in this section.
Note This routing table does not affect the special FTD Management virtual interface that it uses to communicate
with the licensing server or for database updates; that interface has its own routing table. The Diagnostic
physical interface, on the other hand, uses the management-only routing table described in this section.
In this case, traffic is load-balanced on the outside interface between 10.1.1.2, 10.1.1.3, and 10.1.1.4. Traffic
is distributed among the specified gateways based on an algorithm that hashes the source and destination IP
addresses, incoming interface, protocol, source and destination ports.
Static Routes
You can create static routes to provide basic routing for your network.
Default Route
The simplest option is to configure a default static route to send all traffic to an upstream router, relying on
the router to route the traffic for you. A default route identifies the gateway IP address to which the FTD
device sends all IP packets for which it does not have a learned or static route. A default static route is simply
a static route with 0.0.0.0/0 (IPv4) or ::/0 (IPv6) as the destination IP address.
You should always define a default route.
Because the FTD uses separate routing tables for data traffic and for management traffic, you can optionally
configure a default route for data traffic and another default route for management traffic. Note that
from-the-device traffic uses either the management or data routing table by default depending on the type (see
Routing Table for Management Traffic, on page 284), but will fall back to the other routing table if a route is
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
285
Routing
Static Routes
not found. Default routes will always match traffic, and will prevent a fall back to the other routing table. In
this case, you must specify the interface you want to use for egress traffic if that interface is not in the default
routing table.
Static Routes
You might want to use static routes in the following cases:
• Your networks use an unsupported router discovery protocol.
• Your network is small and you can easily manage static routes.
• You do not want the traffic or CPU overhead associated with routing protocols.
• In some cases, a default route is not enough. The default gateway might not be able to reach the destination
network, so you must also configure more specific static routes. For example, if the default gateway is
outside, then the default route cannot direct traffic to any inside networks that are not directly connected
to the FTD device.
• You are using a feature that does not support dynamic routing protocols.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
286
Routing
Guidelines for Static Routing
IPv6
• Static route tracking (SLA monitor) is not supported for IPv6.
Procedure
Step 1 Click Device, then click the link in the Routing summary.
Step 2 If you enabled virtual routers, click the view icon ( ) for the router in which you are configuring a static
route.
Step 3 On the Static Routing page, do one of the following:
• To add a new route, click +.
• Click the edit icon ( ) for the route you want to edit.
If you no longer need a route, click the trash can icon for the route to delete it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
287
Routing
Configuring Static Routes
Step 5 (Optional; IPv4 routes only.) Select the SLA Monitor that should track this route's viability.
An SLA Monitor can verify that an always-available host on the target network is reachable. If it becomes
unreachable, the system can install a backup route. Thus, if you configure an SLA Monitor, you should also
configure another static route, with a larger metric, for this network. For example, if this route has the metric
1, create a backup route with the metric 10. For more information, see Backup Static Routes and Static Route
Tracking, on page 286.
If the SLA Monitor object does not yet exist, click the Create SLA Monitor link at the bottom of the list and
create it now.
Note If a monitored route is removed because the monitored address cannot be pinged, the route is
indicated in the static route table with a warning that the route is unreachable. Determine if the
problem is temporary or if you need to reconfigure the route. Consider the possibility that the route
is viable but that the monitored address is not sufficiently dependable.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
288
Routing
Configure SLA Monitor Objects
Procedure
Step 1 Select Objects, then select SLA Monitors from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
289
Routing
Monitoring Routing
• Timeout—The amount of time, in milliseconds, that the route monitoring operation should wait for a
response from the request packets, from 0 to 604800000 milliseconds (7 days). The default value is 5000
milliseconds (5 seconds). If the monitor does not get a response to at least one echo request during this
period, the process installs the backup route.
• Frequency—The number of milliseconds between SLA probes, from 1000 to 604800000, in multiples
of 1000. You cannot set a frequency that is less than the timeout value. The default is 60000 milliseconds
(60 seconds).
• Type of Service—An integer that defines the Type of Service (ToS) type in the IP header of the ICMP
echo request packet, from 0 to 255. The default is 0.
• Number of Packets—The number of packets to be sent with each poll, from 1 to 100. The default is 1
packet.
• Data Size—The size of the data payload to use in the echo request packets, from 0 to 16384 bytes. The
default value is 28. This setting specifies the size of the payload only; it does not specify the size of the
entire packet.
Monitoring Routing
To monitor and troubleshoot routing, open the CLI console or log into the device CLI and use the following
commands. You can also select some of these commands from the Commands menu on the Routing page.
• show route displays the routing table for the data interfaces, including routes for directly-connected
networks.
• show ipv6 route displays the IPv6 routing table for the data interfaces, including routes for
directly-connected networks.
• show network displays the configuration for the virtual management interface, including the management
gateway. Routing through the virtual interface is not handled by the data interface routing table, unless
you specify data-interfaces as the management gateway.
• show network-static-routes displays static routes configured for the virtual management interface using
the configure network static-routes command. Normally, there will not be any static routes, as the
management gateway suffices for management routing in most cases. These routes are not available to
traffic on the data interfaces. This command is not available in the CLI console.
• show ospf displays information about the OSPF processes and learned routes. Use show ospf ? to get a
list of options you can include to view specific information about OSPF.
• show bgp displays information about the BGP processes and learned routes. Useshow bgp ? to get a list
of options you can include to view specific information about BGP.
• show eigrp option displays information about the EIGRP processes and learned routes. Use show eigrp
? to get a list of options you can include; you must supply an option.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
290
Routing
Monitoring Routing
• show isis option displays information about the IS-IS processes and learned routes. Use show isis ? to
get a list of options you can include; you must supply an option.
• show rip database displays information about the RIP processes and learned routes.
• show vrf displays information about the virtual routers defined on the system.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
291
Routing
Monitoring Routing
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
292
CHAPTER 13
Virtual Routers
You can create virtual routers to isolate the traffic on subsets of interfaces from each other.
• About Virtual Routers and Virtual Routing and Forwarding (VRF), on page 293
• Guidelines for Virtual Routers, on page 296
• Managing Virtual Routers, on page 298
• Examples for Virtual Routers, on page 301
• Monitoring Virtual Routers, on page 317
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
293
Routing
Configuring Policies to be Virtual-Router-Aware
If you use overlapping address spaces in your virtual routers, you should use security zones to ensure that the
right policies get applied. For example, if you use the 192.168.1.0/24 address space in two separate virtual
routers, an access control rule that simply specifies the 192.168.1.0/24 network will apply to traffic in both
virtual routers. If that is not the desired outcome, you can limit the application of the rule by also specifying
the source/destination security zones for just one of the virtual routers.
For policies that do not use security zones, such as NAT, you can write rules specific to a virtual router by
selecting interfaces assigned to a single virtual router as the source and destination interfaces. If you select
source and destination interfaces from two separate virtual routers, you must ensure that you have appropriate
routes between the virtual routers to make the rule work.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
294
Routing
Maximum Number of Virtual Routers By Device Model
Configuring NAT rules that use source and destination interfaces in different virtual routers can also allow
traffic to route between virtual routers. If you do not select the option for NAT to do a route lookup, the rule
will simply send traffic out the destination interface with a NATed address whenever destination translation
happens. However, the destination virtual router should have a route for the translated destination IP address
so that next-hop lookup can succeed.
ASA 5508-X 10
ASA 5516-X 10
ASA 5525-X 10
ASA 5545-X 20
ASA 5555-X 20
Firepower 1120 5
Firepower 1140 10
Firepower 1150 10
Firepower 2110 10
Firepower 2120 20
Firepower 2130 30
Firepower 2140 40
Firepower 4110 60
Firepower 4112 60
Firepower 4115 80
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
295
Routing
Guidelines for Virtual Routers
Firepower 4120 80
Additional Guidelines
• You can configure the following features on the global virtual router only:
• OSPFv3
• RIP
• EIGRP
• IS-IS
• BGPv6
• Multicast Routing
• Policy Based Routing
• VPN
• You can configure the following features separately for each virtual router:
• Static routes and their SLA monitors.
• OSPFv2
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
296
Routing
Guidelines for Virtual Routers
• BGPv4
• The following features are used by the system when querying or communicating with the remote system
(from-the-box traffic). These features use interfaces in the global virtual router only. If you configure an
interface for the feature, it must belong to the global virtual router. As a general rule, any time the system
must look up a route to reach an external server for its own management purposes, it does the route
lookup in the global virtual router.
• DNS server when used to resolve fully-qualified names used in access control rules, or for resolving
names for the ping command. If you specify any as the interface for a DNS server, the system
considers interfaces in the global virtual router only.
• AAA server or identity realm when used with VPN. You can configure VPN on interfaces in the
global virtual router only, so the external AAA servers used for VPN, such as Active Directory,
must be reachable through an interface in the global virtual router.
• Syslog server.
• SNMP.
• In NAT, if you specify source and destination interfaces that are assigned to different virtual routers, the
NAT rule diverts traffic from one virtual router through another virtual router. Ensure that you do not
mix interfaces in NAT rules unintentionally. Normally, the source and destination interfaces are used
and the routing table is ignored, including for destination translations in manual NAT. However, if the
NAT rule does need to do a route lookup, it does the lookup in the VRF table for the inbound interface
only. If necessary, define static routes in the source virtual router for the destination interface. Note that
if you leave the interface as any, the rule applies to all interfaces regardless of virtual router membership.
When using virtual routers, carefully test your NAT rules to ensure you get the expected behavior. If
you neglect to define a needed route leak, in some cases the rule will not match all of the traffic you
expect it to match, and the translation will not be applied.
• If you configure inter-virtual-router routes, for example, leaking a route from one virtual router to a
second virtual router, the system does destination interface look-up in the source virtual router. Then, it
looks up the MAC address of the next hop in the destination virtual router. Thus, the destination virtual
router must have either a dynamic (learned) or static route for the selected interface for the destination
address.
• When using inter-virtual-router routes (leaked routes), for example, from virtual router 1 to virtual router
2, you do not need to configure a mirror (reverse) route in virtual router 2 to allow return traffic. However,
if you want to allow connections to be initiated in both directions, ensure that you leak the route in both
directions, from virtual router 1 to 2, and from virtual router 2 to 1.
• If you move an interface from one virtual router to another, all features configured for the interface are
retained. Examine the configuration to ensure that static routes, IP addresses, and other policies make
sense within the context of the new virtual router.
• If you use overlapping address spaces in multiple virtual routers, please be aware that static security
group tag (SGT) to IP address mappings downloaded from Cisco Identity Services Engine (ISE) are not
virtual-router-aware. Set up separate identity realms per virtual router if you need to create different SGT
mappings per virtual router. This is not necessary if you intend to map the same IP addresses to the same
SGT number in each virtual router.
• If you use overlapping address spaces in multiple virtual routers, dashboard data can be misleading.
Connections for the same IP address are aggregated, so it will appear there was more traffic to/from a
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
297
Routing
Managing Virtual Routers
given address when it is shared by two or more endpoints. If you carefully construct your identity policies
using separate identity realms, user-based statistics should be more accurate.
• You cannot use overlapping DHCP address pools in separate virtual routers.
• You can use DHCP server auto configuration on an interface in the global virtual router only. Auto
configuration is not supported for interfaces assigned to a user-defined virtual router.
• If you move an interface from one virtual router to another, including from the global virtual router to a
new router, any existing connections through the interface are dropped.
• The Security Intelligence policy is not virtual-router-aware. If you add an IP address, URL, or DNS name
to the block list, it is blocked for all virtual routers.
Procedure
Step 1 Click Device, then click the link in the Routing summary.
Step 2 If you have not yet enabled virtual routers, click the Add Multiple Virtual Routers link, then click Create
First Custom Virtual Router.
Creating the first virtual router is essentially the same as creating any additional virtual routers. For more
information, see Create a Virtual Router or Edit Interface Assignments, on page 299.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
298
Routing
Create a Virtual Router or Edit Interface Assignments
• To edit the name, description, or interface assignments for a virtual router, click the view icon ( ) in
the Action cell for the virtual router, then select the Virtual Router Properties tab.
• To switch between virtual routers when viewing them, click the down arrow next to the virtual router
name (above the routing table) and select the desired virtual router. You can return to the listing page by
clicking the Go Back to Virtual Routers arrow ( ).
• To delete a virtual router, click the delete icon ( ) in the Action cell for the virtual router, or the delete
icon next to the virtual router name when viewing the virtual router’s contents. When you delete the last
virtual router (other than the global router, which you cannot delete), VRF is disabled.
• To monitor routing in a virtual router, click the link for one of the show commands in the table for that
virtual router. Clicking the command opens the CLI Console, where you can examine the output of the
CLI command. You can show information on routes, OSPF, and OSPF neighbors. Note that the command
output is based on the deployed configuration; you will not see anything related to undeployed edits.
You can also execute these commands by selecting them from the Commands drop-down list when
viewing the virtual router.
Procedure
• Click the edit icon ( ) for a virtual router to edit its properties and interface list.
• When viewing a virtual router, click the Virtual Router Properties tab to edit the properties of the
virtual router you are viewing.
• When viewing a virtual router, click the down arrow next to the virtual router name and click Create
New Virtual Router.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
299
Routing
Configure Static Routes and Routing Processes in a Virtual Router
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
300
Routing
Delete a Virtual Router
Procedure
• In the list of virtual routers, click the delete icon ( ) in the Action column for the virtual router.
• When viewing the virtual router you want to delete, click the delete icon ( ) next to the router’s name.
You are prompted to confirm that you want to delete the virtual router.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
301
Routing
How to Route to a Distant Server through Multiple Virtual Routers
Procedure
Step 1 Create the network object for 10.50.0.5/24 or 10.50.0.0/24. Also, create the object for the gateway, 10.40.0.2/30.
If you want to limit the route to the single IP address of the warehouse server, use a host object to define
10.50.0.5. Alternatively, if the sales team should have access to other systems in the warehouse, create a
network object for the 10.50.0.0/24 network. In this example, we will create a route for the host IP address.
a) Choose Objects, then Networks from the table of contents.
b) Click +, then fill in the object properties for the warehouse server:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
302
Routing
How to Route to a Distant Server through Multiple Virtual Routers
c) Click OK.
d) Click +, then fill in the object properties for the router gateway to the warehouse network:
e) Click OK.
Step 2 Define the route leak in Sales that points to the Gi0/2 interface in the Warehouse virtual router.
In this example, Gi0/1 is named inside, and Gi0/2 is named inside-2.
a) Choose Device, then click View Configuration in the Routing summary.
b) In the list of virtual routers, click the view icon ( ) in the action column for the Sales virtual router.
c) On the Static Routing tab, click + and configure the route:
• Name—Any name will do, such as Warehouse-server-route.
• Interface—Select inside-2. You will see a warning saying that the interface is in a different router
and you are creating a route leak. This is what you want to do.
• Protocol—For this example, use IPv4. You can alternatively use IPv6 addresses to implement this
example.
• Networks—Select the Warehouse-Server object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
303
Routing
How to Route to a Distant Server through Multiple Virtual Routers
• Gateway—Leave this item blank. When leaking a route into another virtual router, you do not select
the gateway address.
d) Click OK.
Step 3 In the Warehouse virtual router, define the route that points to the Warehouse Router 2 gateway.
Alternatively, this can be done by configuring a routing protocol that would dynamically discover the route
from Warehouse Router 2. For this example, we will define the static route.
a) From the virtual router drop-down that currently says Sales, select the Warehouse virtual router to switch
routers.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
304
Routing
How to Route to a Distant Server through Multiple Virtual Routers
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
305
Routing
How to Provide Internet Access to Multiple Virtual Routers with Overlapping Address Spaces
c) Click OK.
Step 4 Ensure that there is an access control rule that allows access to the warehouse server.
The simplest rule would allow traffic from the source interfaces in the Sales virtual router to the destination
interfaces in the Warehouse virtual router for the destination Warehouse-Server network object. You can
apply intrusion inspection to the traffic as you see fit.
For example, if the interfaces in Sales are in the Sales-Zone security zone, and those in Warehouse are in the
Warehouse-Zone security zone, the access control rule would look similar to the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
306
Routing
How to Provide Internet Access to Multiple Virtual Routers with Overlapping Address Spaces
Note This example is simplified, where each virtual router contains a single interface. If an “inside” virtual router
has more than one interface, you need to create the NAT rules for each “inside” interface. Even if you have
some interfaces within virtual routers that do not use overlapping address spaces, explicitly identifying the
source interface in NAT rules might make troubleshooting easier, and ensure a cleaner separation between
traffic from the virtual routers that is Internet-bound.
Procedure
d) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
307
Routing
How to Provide Internet Access to Multiple Virtual Routers with Overlapping Address Spaces
Step 2 Configure the inside-2 interface for virtual router 2 (VR2), but do not specify the IP address.
a) On the Interfaces listing page, click the edit icon ( ) in the Action column for the interface you will
assign to VR2.
b) Configure at least the following properties:
• Name—For this example, inside-2.
• Mode—Select Routed.
• Status—Enable the interface.
• IPv4 Address > Type—Select Static.
• IPv4 Address and Subnet Mask—Leave these fields empty. If you try to configure the same address
as the inside interface at this point, the system will show an error message and prevent you from
creating a non-functional configuration. You cannot route to the same address space through different
interfaces within the same router.
c) Click OK.
Step 3 Configure virtual router VR1, including the static default route leak to the outside interface.
a) Choose Device, then click View Configuration in the Routing summary.
b) Click Add Multiple Virtual Routers at the top of the Routing page.
c) At the bottom right of the explanatory panel, click Create First Custom Virtual Router.
d) Fill in the properties for virtual router VR1.
• Name—Enter VR1 or another name of your choosing.
• Interfaces—Click +, select inside, and click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
308
Routing
How to Provide Internet Access to Multiple Virtual Routers with Overlapping Address Spaces
e) Click OK.
The dialog box closes, and you are shown the list of virtual routers.
f) In the list of virtual routers, click the view icon ( ) in the action column for the VR1 virtual router.
g) On the Static Routing tab, click + and configure the route:
• Name—Any name will do, such as default-VR1.
• Interface—Select outside. You will see a warning saying that the interface is in a different router
and you are creating a route leak. This is what you want to do.
• Protocol—For this example, use IPv4.
• Networks—Select the any-ipv4 object. This will be the default route for any traffic that cannot be
routed within VR1.
• Gateway—Leave this item blank. When leaking a route into another virtual router, you do not select
the gateway address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
309
Routing
How to Provide Internet Access to Multiple Virtual Routers with Overlapping Address Spaces
h) Click OK.
Step 4 Configure virtual router VR2, including the static default route leak to the outside interface.
a) When viewing VR1, click the back button ( ) to return to the list of virtual routers.
b) Click + at the top of the list.
c) Fill in the properties for virtual router VR2.
• Name—Enter VR2 or another name of your choosing.
• Interfaces—Click +, select inside-2, and click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
310
Routing
How to Provide Internet Access to Multiple Virtual Routers with Overlapping Address Spaces
d) Click OK.
The dialog box closes, and you are shown the list of virtual routers.
e) In the list of virtual routers, click the view icon ( ) in the action column for the VR2 virtual router.
f) On the Static Routing tab, click + and configure the route:
• Name—Any name will do, such as default-VR2.
• Interface—Select outside. You will see a warning saying that the interface is in a different router
and you are creating a route leak. This is what you want to do.
• Protocol—For this example, use IPv4.
• Networks—Select the any-ipv4 object. This will be the default route for any traffic that cannot be
routed within VR2.
• Gateway—Leave this item blank. When leaking a route into another virtual router, you do not select
the gateway address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
311
Routing
How to Provide Internet Access to Multiple Virtual Routers with Overlapping Address Spaces
g) Click OK.
Step 5 Create the default route in global router to the outside interface.
The purpose of this route is to assign the right gateway to traffic leaked from the two virtual routers to the
outside interface in the global router.
a) When viewing VR2, click the VR2 name at the top of the page to open the list of virtual routers, and select
the Global router.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
312
Routing
How to Provide Internet Access to Multiple Virtual Routers with Overlapping Address Spaces
b) On the Static Routing tab for the Global router, click + and configure the route:
• Name—Any name will do, such as default-ipv4.
• Interface—Select outside.
• Protocol—For this example, use IPv4.
• Networks—Select the any-ipv4 object. This will be the default route for any IPv4 traffic.
• Gateway—Assuming the object does not already exist, click Create New Network Object, then
define a host object for the IP address of the gateway at the other end of the network link on the
outside interface, in this case, 172.16.1.2. After you create the object, select it in the Gateway field
of the static route.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
313
Routing
How to Provide Internet Access to Multiple Virtual Routers with Overlapping Address Spaces
c) Click OK.
Step 6 Go back to the Interfaces page and add the IP address to inside-2.
a) Click Device, then View All Interfaces in the Interface summary.
b) Click the edit icon ( ) in the Action column for the inside-2 interface that you assigned to VR2.
c) On the IPv4 Address tab, enter 192.168.1.1/24 as the IP address and subnet mask.
d) Click OK.
You do not get an error for a duplicate IP address this time because the inside and inside-2 interfaces are
now in separate virtual routers.
Step 7 Create the NAT rule to PAT inside to outside traffic to 10.100.10.1.
a) Choose Policies, then click NAT.
b) If there is already a manual NAT rule named InsideOutsideNatRule for the inside to outside interface,
applying interface PAT, click the edit icon ( ) for the rule. Otherwise, click + to create a new rule.
If you edit an existing rule, note that there is now a warning that the source and destination interfaces are
in different virtual routers and you need to define routes. This is what you did earlier in the procedure.
c) Assuming you are editing an existing rule, click the drop-down arrow in Translated Packet > Source
Address, and click Create New Network (assuming you do not already have a host object defining
10.100.10.1).
d) Configure the host network object for the PAT address. The object should be similar to the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
314
Routing
How to Provide Internet Access to Multiple Virtual Routers with Overlapping Address Spaces
e) Select the new object as the Translated Packet > Source Address. The NAT rule should look similar
to the following:
f) Click OK.
Step 8 Create the NAT rule to PAT inside-2 to outside traffic to 10.100.10.2.
This rule will look exactly like the rule for VR1, with these exceptions:
• Name—This must be unique, for example, Inside2OutsideNatRule.
• Original Packet > Source Interface—Select inside-2.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
315
Routing
How to Provide Internet Access to Multiple Virtual Routers with Overlapping Address Spaces
• Translated Packet > Source Address—Create a new host network object for 10.100.10.2.
Step 9 Choose Policies > Access Control, and configure an access control rule to allow traffic from inside_zone
and inside2_zone to outside_zone.
Finally, you need to configure the access control policy to allow traffic from the inside and inside-2 interfaces
to the outside interface. Because the access control rule requires the use of security zones, you need to create
zones for each of these interfaces. Alternatively, you could create a single zone to hold both inside and inside-2,
but it is likely that you will want to create additional rules, here or in other policies, that differentiate how
traffic is treated in these routers.
Assuming that you create zones named after the interfaces, a basic rule that allows all traffic to flow to the
Internet will look like the following. You can apply an intrusion policy to this rule as you see fit. You can
define additional rules to block unwanted traffic, for example, to implement URL filtering.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
316
Routing
Monitoring Virtual Routers
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
317
Routing
Monitoring Virtual Routers
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
318
CHAPTER 14
Route Maps and Other Objects for Route Tuning
The various routing protocols let you fine-tune activities such as route distribution and aggregation. For some
tuning features, you use route maps or other objects to identify the routes that should be subject to your tuning
policy. Route maps have the additional ability to set options on matching routes, so that you can make changes
to the route that the next hop router can use to apply custom behavior.
Whether you need to create any of these objects is based on what your needs are for fine-tuning the behavior
of the routing protocols that you implement. By first evaluating your requirements, you will determine which
types of object you need for the tuning command you want to configure.
• Configure Route Maps, on page 319
• Configure Access Lists, on page 324
• Configure AS Path Access Lists, on page 327
• Configure Community Lists, on page 329
• Configure Policy Lists, on page 331
• Configure Prefix Lists, on page 332
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
319
Routing
Route Map Match and Set Statements
For example, for each route that is being redistributed, the router first evaluates the match criteria of a clause
in the route map. If the route matches the criteria, then the route is redistributed or rejected as dictated by the
permit or deny clause. For matches to permit clauses, some of the route's attributes might be modified by the
values from the set commands. If the route does not match the criteria, then this clause is not applicable to
the route, and the system proceeds to evaluate the route against the next clause in the route map. Scanning of
the route map continues until a clause is found that matches the route or until the end of the route map is
reached. If there are no matches, the route is considered to not match the route map (equivalent to a deny
action).
For the match and set statements in a single clause:
• Multiple match statements are ANDed. That is, a route must satisfy each statement to match the clause.
• Multiple values within a single match statement are ORed. That is, if a route matches any value within
that match statement, it is considered to match the statement as a whole.
• If there are no match statements, all routes match the clause.
• If there are no set statements in a route map permit clause, then the feature (such as redistribution) is
applied to the route without modification of the route's current attributes.
• Any set statements in a deny clause are ignored. “Denied” routes simply do not match the route map, so
it is pointless to include set clauses, because the set action cannot be applied.
• An empty clause, one with no match or set statements, matches any routes that have not been matched
by earlier clauses. For example:
• An empty permit clause allows the redistribution of the remaining routes without modification.
• An empty deny clause does not allow the redistribution of the remaining routes. This is the default
action if a route map is completely scanned, but no explicit match is found.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
320
Routing
Configure a Route Map
For a detailed explanation of how match and set statements are evaluated, carefully read Route Map Match
and Set Statements, on page 320.
Procedure
To delete an unreferenced object, click the trash can icon ( ) for the object.
b) Click the sequence-number variable and enter the number for the clause, from 1-65535.
This number is relative to the other numbered clauses within the route map. A typical practice is to skip
count by 10, that is, 10, 20, 30, to leave room to insert new clauses in the future.
Step 7 Click Show Disabled and configure the match statements for the clause.
a) Click the + next to the configure clause command to enable it.
b) Click clause and either pick bgp-match-clause for BGP route maps, or match-clause for all other routing
protocols.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
321
Routing
Configure a Route Map
c) (BGP route maps.) Configure any combination of the following match statements to identify the specific
routes you are targeting in this clause. Be sure to click the - icon to disable any commands that you do
not configure.
• match as-path. Click the variable and select the AS Path objects that define the autonomous system
numbers to match.
• match community. Click the variable and select the community list objects that define the
communities to match.
• match policy-list. Click the variable and select the policy list objects that define the match criteria
for the clause.
• match tag. Click the variable and enter the route tag value to match, from 0-4294967295.
d) (All other routing protocols.) Configure any combination of the following match statements to identify
the specific routes you are targeting in this clause. Be sure to click the - icon to disable any commands
that you do not configure. You might need to click + to enable some of these commands.
• match interface. Click the variable and select all of the interfaces in the routes to match.
• configure match ipv4/ipv6 ip address list-type. Enable the correct command for your IP version.
Then, click the list-type variable and select whether you want to match the IP address in the route
based on access-list or prefix-list. This will add a match ipv4/ipv6 address command, where you
can click the variable and select either the access lists or prefix lists that define the IP addresses to
match.
• configure match ipv4/ipv6 ip next-hop list-type. Click the list-type variable and select whether
you want to match the IP address of the next hop router in the route based on access-list or prefix-list.
This will add a match ipv4/ipv6 next-hop command, where you can click the variable and select
either the access lists or prefix lists that define the IP addresses to match.
• configure match ipv4/ipv6 ip route-source list-type. Click the list-type variable and select whether
you want to match the IP address of the route source in the route based on access-list or prefix-list.
This will add a match ipv4/ipv6 route-source command, where you can click the variable and select
either the access lists or prefix lists that define the IP addresses to match.
• match metric. Click the variable and enter the routing metric to match, from 1-4294967295.
• match route-type. (OSPF, EIGRP.) Click the variable and select the route type:
• external-1, external-2. OSPF or EIGRP external type-1 or type-2 routes.
• internal. OSPF intra-area and interarea routes or EIGRP internal routes.
• local. Locally generated BGP routes.
• nssa-external-1, nssa-external-2. External Not So Stubby Area (NSSA) type-1 or type-2 routes.
Step 8 (Optional, permit clauses only.) For permitted, that is, matched routes, you can configure set statements to
modify the route attributes. You do not need to modify routes; for example, you can redistribute them
unchanged.
a) Click ... > Duplicate to the left of the configure match-clause or configure bgp-match-clause command
within the permit clause. A new configure clause command is added at the end of the permit clause.
b) Click clause and either pick bgp-set-clause or set-clause, based on what you picked for the match clause.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
322
Routing
Configure a Route Map
c) (BGP route maps.) Configure any combination of the following set statements to modify the attributes of
matching routes. Be sure to click the - icon to disable any commands that you do not configure.
• configure set as-path options. Click options and select properties, which adds the following
commands you need to configure. By adding items to the paths, even duplicate AS numbers, you
lengthen the path and make the route less likely to be selected as the best route.
• set as-path prepend as-path. Click as-path and enter up to 10 autonomous system numbers
to be added to be beginning of the AS_PATH attribute of the route. The change applies to
outbound BGP route maps.
• set as-path prepend last-as value. Click value and enter how many times the system should
prepend the advertising neighbor’s autonomous system number to the start of the AS_PATH
variable. The change applies to inbound BGP route maps.
• set as-path tag. Converts the tag of a route into an autonomous system path. Applies only when
redistributing routes into BGP.
• set community community-number properties. Click community-number and enter the community
for the route, from 1-4694967295. Optionally, you can click properties and add one of the following:
• internet—Routes with this community are advertised to all peers (internal and external).
• no-advertise—Routes with this community are not advertised to any peer (internal or external).
• no-export—Routes with this community are advertised to only peers in the same autonomous
system or to only other sub-autonomous systems within a confederation. These routes are not
advertised to external peers.
• set local-preference. Click the variable and enter the a preference value for the autonomous system
path, from 0-4294967295. Unless you change it in the global BGP options, the default preference
for BGP routes is 100. The route with the highest preference number is preferred.
• set weight. Click the variable and enter the weight for the route, 0-65535. If the router learns about
more than one route to the same destination, the route with the highest weight is preferred.
• set origin options. The origin of a BGP route is based on the path information of the route in the
main IP routing table. You can change this by clicking options and select how you want to set the
BGP origin code.
• igp. Set the origin to the remote Interior Gateway Protocol (IGP) system.
• incomplete. Set the origin as unknown heritage.
• configure next-hop ipv4/ipv6 options. These are separate commands. Click options for the
appropriate IP version and select one of the following. Setting the next hop gateway is typically
something you would do when implementing policy-based routing.
• specific-ip. Select this option if you want to explicitly set the IP address of the next hop gateway
for this route. The set ip/ipv6 next-hop ip-address command is added. Click the variable and
enter the IP address of the next hop gateway. You can add multiple IP addresses, separated by
a space. If the address of the first gateway is unreachable, the next address is tried, and so forth.
• user-peer-address. Select this option if you want to set the next hop gateway as the BGP peer’s
IP address. If you use this option in an outbound route map of a BGP peer, the next hop of the
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
323
Routing
Configure Access Lists
advertised matching routes will be set to be the peering address of the local router, thus disabling
the next hop calculation. No additional configuration is required for this command.
• set ipv4/ipv6 address prefix-list. These are separate commands. Change the IP address of the route
based on the contents of the prefix list that you select.
• set automatic-tag. Have the system automatically compute a tag value for the route.
d) (All other routing protocols.) Configure any combination of the following set statements to modify the
attributes of matching routes. Be sure to click the - icon to disable any commands that you do not configure.
• set metric. Click the variable and enter the metric value, from 0-4294967295. This value is not used
by EIGRP.
• set metric-type. Click the variable and select the type of metric:
• type-1, type-2. The type of external route in OSPF. Type-2 is the default.
• internal. Sets the Multi Exit Discriminator (MED) value on prefixes advertised to external BGP
(eBGP) neighbors to match the Interior Gateway Protocol (IGP) metric of the next hop of the
route. This applies to generated, internal BGP (iBGP)-, and eBGP-derived routes.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
324
Routing
Configure Extended Access Lists
An ACL is composed of one or more access control entry (ACE), or rule. The order of ACEs is important.
When the ACL is evaluated to determine if a packet matches a “permit” ACE, the packet is tested against
each ACE in the order in which the entries are listed. After a match is found, no more ACEs are checked. For
example, if you want to match 10.100.10.1, but exclude the rest of 10.100.10.0/24, the permit entry for
10.100.10.1 must come before the deny entry for 10.100.10.0/24. In general, place more specific rules at the
top of an ACL.
Packets that do not match a permit entry are considered to be denied or excluded from the match.
The following topics explain how to configure ACL objects.
Procedure
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
325
Routing
Configure Standard Access Lists
b) In the permit/deny network command, click the variables to select the network objects that define the
source IP address and the destination IP address of the connection. You can select multiple objects. To
specify “any” address, select the any-ipv4 and any-ipv6 objects.
c) In the configure permit/deny port command, click options and select one of the following, which will
add the associated permit/deny command to the template:
• any—If the port does not matter. That is, you are matching any type of IP traffic.
• any-source—If the source TCP/UDP port does not matter, but you want to specify the destination
port. Click the destination-port variable in the permit/deny port command and select the port object.
• any-destination—If the destination TCP/UDP port does not matter, but you want to specify the
source port. Click the source-port variable in the permit/deny port command and select the port
object.
• source-destination—If both the source and destination TCP/UDP ports matter. Click the source-port
and destination-port variables in the permit/deny port command and select the port objects.
d) In the configure logging command, select disabled. Logging applies to ACLs that are used for access
control, and you cannot use these objects for access control. Thus, the logging options are ignored no
matter what you select.
Step 7 Add ACEs to complete the ACL.
To add an ACE, click ... > Duplicate to the left of the configure access list entry line. A new ACE group is
added immediately after the ACE for which you click the Duplicate command.
Thus, when you have many ACEs in the object, choose wisely which ACE you “duplicate.” You cannot move
the ACEs within the object, so if you make a mistake, you need to manually recreate the ACE in the correct
location.
Note that duplicating an ACE simply inserts a new, empty ACE, with no pre-configured characteristics. After
creating the “duplicate,” proceed as explained above to configure it for your needs.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
326
Routing
Configure AS Path Access Lists
To delete an unreferenced object, click the trash can icon ( ) for the object.
b) In the permit/deny host command, click the variable to select the network object that defines the destination
IP address of the connection. The object can specify a network or host address. You can select one object
per permit/deny host command; click ... > Duplicate on the command to specify additional addresses,
which will become unique ACEs with the same action. To specify “any” address, select the any-ipv4
object.
Step 7 Add ACEs to complete the ACL.
To add an ACE, click ... > Duplicate to the left of the configure action line. A new ACE group is added
immediately after the ACE for which you click the Duplicate command.
Thus, when you have many ACEs in the object, choose wisely which ACE you “duplicate.” You cannot move
the ACEs within the object, so if you make a mistake, you need to manually recreate the ACE in the correct
location.
Note that duplicating an ACE simply inserts a new, empty ACE, with no pre-configured characteristics. After
creating the “duplicate,” proceed as explained above to configure it for your needs.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
327
Routing
Configure AS Path Access Lists
You can also apply AS path filtering in the outbound direction and filter the updates you send to neighbors.
In addition, you can use AS path objects in route maps for BGP address aggregation,
Procedure
To delete an unreferenced object, click the trash can icon ( ) for the object.
b) Click regex and enter the regular expression that defines the AS numbers that should match this entry.
In its simplest form, the regular expression is just a complete AS path number, and you are either permitting
or denying route updates from a single autonomous system.
The AS number can be from 1 to 4294967295 or from 1.0 to 65535.65535. The AS number is a uniquely
assigned value that identifies each network on the Internet. The system supports asplain and asdot notation
as defined in RFC 5396. Which notation you need to use depends on whether you enable the bgp asnotation
dot command in the BGP global settings.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
328
Routing
Configure Community Lists
Procedure
To delete an unreferenced object, click the trash can icon ( ) for the object.
Step 4 Select Standard Community List or Expanded Community List as the CLI Template.
Step 5 Enter a Name for the Smart CLI object. Note that this name is also entered as the Community List name in
the first line of the CLI template (in the community-list command).
Step 6 (Standard List.) Configure a community list entry.
Each entry is contained on a single line starting with the action option.
a) Click action and select one of the following:
• permit—Match. Connections that match this rule are selected for the feature you are configuring.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
329
Routing
Configure Community Lists
• deny—Do not match. Connections that match this rule are excluded from the feature. Note that
“denied” traffic is not dropped, it simply does not get the service applied to it. For example, in a
route map, if you use this rule to define which routes get redistributed, “denied” address spaces are
simply not redistributed.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
330
Routing
Configure Policy Lists
Procedure
To delete an unreferenced object, click the trash can icon ( ) for the object.
Step 7 Click Show Disabled above the template to expose the match commands. You must click the + icon to the
left of the match statements you want to enable. Configure any combination of the following match statements
to define the routes you are targeting.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
331
Routing
Configure Prefix Lists
• match as-path. Click the variable and select the AS Path objects that define the autonomous system
numbers to match.
• configure match ip address list-type. Click the list-type variable and select whether you want to match
the IP address in the route based on access-list or prefix-list. This will add a match ip address command,
where you can click the variable and select either the standard access lists or IPv4 prefix lists that define
the IP addresses to match.
• configure match ip next-hop list-type. Click the list-type variable and select whether you want to match
the IP address of the next hop router in the route based on access-list or prefix-list. This will add a match
ip next-hop command, where you can click the variable and select either the standard access lists or
IPv4 prefix lists that define the IP addresses to match.
• configure match ip route-source list-type. Click the list-type variable and select whether you want to
match the IP address of the route source in the route based on access-list or prefix-list. This will add a
match ip route-source command, where you can click the variable and select either the standard access
lists or IPv4 prefix lists that define the IP addresses to match.
• match community community-list options. Click the community-list variable and select the community
list objects that define the communities to match. If you want routes to match the community list only
if all communities in the list are matched, click options and select exact-match.
• match interface. Click the variable and select all of the interfaces in the routes to match.
• match metric. Click the variable and enter the routing multi-exit discriminator (MED) metric to match,
from 1-4294967295.
• match tag. Click the variable and enter the route tag value to match, from 0-4294967295.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
332
Routing
Configure Prefix Lists
To delete an unreferenced object, click the trash can icon ( ) for the object.
Step 4 Select IPv4 Prefix List or IPv6 Prefix List as the CLI Template.
Step 5 Enter a Name for the Smart CLI object. Note that this name is also entered as the Prefix List name in the first
line of the CLI template (in the prefix-list command).
Step 6 Configure a prefix list entry, the seq command line.
Each entry is contained on a single line starting with the seq option.
a) In seq, click sequence-number and enter the number for this rule, from 1-4294967294. The number is
relative to the sequence numbers for the other rules, with 1 being the first rule evaluated. Common practice
is to skip count by 5, that is, 5, 10, 15, etc. This leaves you room to insert new rules without needing to
change the sequence numbers of other rules.
b) Click action and select one of the following:
• permit—Match. Connections that match this rule are selected for the feature you are configuring.
• deny—Do not match. Connections that match this rule are excluded from the feature. Note that
“denied” traffic is not dropped, it simply does not get the service applied to it. For example, in a
route map, if you use this rule to define which routes get redistributed, “denied” address spaces are
simply not redistributed.
c) Click ip-address-mask and enter the network address and mask (in CIDR format for IPv4) or prefix-length
for IPv6. For example, 10.100.10.0/24 (IPv4) or 2001:DB8:0:CD30::/60 (IPv6).
The system uses an exact match for this address/mask unless you also include one of the ge or le options.
For example, 10.100.10.10/8 does not match 10.100.10.0/24 unless you include ge 9 in the rule.
The mask or prefix length can be:
• IPv4 = 0-32
• IPv6 = 0-128
d) (Optional.) You can use the ge and le keywords to specify the range of the prefix length to be matched
for prefixes that are more specific than the IP address and mask/prefix length. Without these keywords,
only exact matches are considered to match the rule.
ge min-prefix-length specifies the minimum prefix length to be matched. The minimum must be greater
than the mask/prefix length and less than or equal to the maximum defined in the le option, if present.
le max-prefix-length specifies the maximum prefix length to be matched. The maximum must be greater
than or equal to the minimum, if present, or greater than the mask/prefix length if the minimum value is
not defined.
Besides the relative length limits mentioned above, the lengths in these options have the following outside
limits:
• IPv4 = 1-32
• IPv6 = 0-128
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
333
Routing
Configure Prefix Lists
Examples
Following are some examples for how to match prefixes using a prefix list. The sequence number is
left out of the examples for simplicity. The actual behavior of each rule is modified by any sequentially
earlier rule that matches a subset of the covered address spaces.
• Deny the default route 0.0.0.0/0:
deny 0.0.0.0/0
• Deny mask lengths greater than 25 bits in routes with a prefix of 192/8:
deny 192.168.0.0/8 ge 25
• Deny all masks with a length greater than 25 bits for routes with a prefix of 192.168.1/24:
deny 192.168.1.0/24 ge 25
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
334
CHAPTER 15
Open Shortest Path First (OSPF)
Open Shortest Path First (OSPF) is a link-state interior gateway protocol. OSPF routers flood link-state
information to neighboring routers so that all routers in an OSPF area have a complete view of the network
topology.
There are separate OSPF versions based on the IP version: OSPFv2 for IPv4 networks, and OSPFv3 for IPv6
networks. These versions are independent; that is, OSPFv3 is not a replacement for OSPFv2.
You can configure OSPFv2 using Smart CLI objects to integrate your device into the OSPFv2 network
topology.
• Configure the OSPFv2 Process and Areas, on page 335
• Customizing OSPF Process and Area Characteristics, on page 337
• Configure OSPFv2 Interface Settings and OSPF Authentication, on page 349
• Monitoring OSPF, on page 353
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
335
Routing
Configure the OSPFv2 Process and Areas
Procedure
• Click the edit icon ( ) for the object you want to edit. Note that when you edit an object, you might see
lines that you did not directly configure. These lines are exposed to show you the default values that are
being configured.
If you no longer need a process, click the trash can icon for the object to delete it.
Step 7 Click the Show Disabled link above the object body to add all other possible configuration lines.
Step 8 Configure the area number.
a) Click the + to the left of the area area-id line to enable the command. You cannot configure a command
until you enable it.
b) Click area-id and enter the number of the area. This area number needs to be the same as the one used
by the other routers that define the OSPFv2 area. You can specify the area ID as either a decimal number
or an IP address. Valid decimal values range from 0 to 4294967295.
Step 9 Configure the networks and interfaces that should be routed within the area.
a) Click the + to the left of the configure area area-id options line.
b) Click area-id and enter the same area number from the area command.
c) Click options and select properties. This action adds several lines, including one that is enabled by default,
the network command.
d) In the network command, click network-object and select the object that defines a network that should
be included in this area. Typically, this would be a directly-connected network. For example, if the IP
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
336
Routing
Customizing OSPF Process and Area Characteristics
address of the inside interface is 192.168.1.1/24, the associated network object for this command would
contain 192.168.1.0/24. If the object does not already exist, click Create New Network and create it now.
e) (Optional.) In the network command, click tag-interface and select the interface that hosts or routes to
the network. If you select the interface, the system can prevent you from changing the address on the
interface because it is used in the routing process. This helps remind you that any change to interface
addressing can impact your routing configuration.
If you select an interface here, before you can change the address on an interface, you must first remove
it from the routing process. Then, after the changing the IP address, remember to return here and select
the new networks and interface to ensure a correctly-configured routing process.
f) All other new area lines are optional and disabled by default. Configure them only if you need these
services. For more information, see Customizing OSPF Process and Area Characteristics, on page 337.
Step 10 If you are configuring the process for a multiple-area network, mouse over the area to the left of the circled
- on the area and configure area lines and click ... > duplicate. Then, configure the new area and its networks
as explained above. Repeat this process until you have defined all areas in which this routing process should
participate.
Step 11 Click OK.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
337
Routing
Configure Advanced Settings for an OSPF Process
Step 7 (Optional.) Configure RFC 1583 compatibility when calculating summary route costs.
Click + to enable the configure summary-route-cost command, then click the variable and select either any,
which turns off RFC 1583 compatibility, or rfc1583, which turns it on.
Even though this command is not enabled by default in the OSPF object, in fact RFC 1583 compatibility is
the default method used when calculating summary route costs. If you examine the configuration defined in
the CLI, only the disabled setting is shown.
Routing loops can occur with RFC 1583 compatibility enabled. Disable it to prevent routing loops. Ensure
that you set RFC 1583 compatibility the same on all OSPF routers in an OSPF routing domain.
Step 8 (Optional.) Suppress syslog messages for multicast OSPF (MOSPF) link state advertisements (LSA).
Click + to enable the ignore lsa mospf command.
The system does not support LSA Type 6 MOSPF packets. You can enable this command so the system does
not send syslog messages when it receives these packets, to reduce the noise in your syslog server.
Step 10 Configure the route calculation timers for the OSPF process.
The following timer commands are enabled with these default values.
• timers lsa arrival 1000. Click the number and set the minimum interval at which the system accepts the
same link-state advertisement (LSA) from OSPF neighbors, from 0 to 600000 milliseconds. Use this
command to indicate the minimum interval that must pass between acceptance of the same LSA that is
arriving from neighbors. LSAs arriving before this minimum time are ignored.
• timers pacing flood 33. Click the number and set the time at which LSAs in the flooding queue are
paced in-between updates, from 5 to 100 milliseconds.
• timers pacing lsp-group 240. Click the number and set the interval at which OSPF link-state
advertisements (LSAs) are collected into a group and refreshed, checksummed, or aged, from 10 to 1800
seconds.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
338
Routing
Configure Advanced Settings for an OSPF Process
• timers pacing retransmission 66. Click the number and set the time interval at which LSAs in the
retransmission queue are paced, 5 milliseconds to 200 milliseconds. We recommend that you do not
change the packet retransmission pacing timer unless all other options to meet OSPF packet flooding
requirements have been exhausted. Specifically, configure summarization, stub area usage, queue tuning,
and buffer tuning before changing the default flooding timers.
• timers throttle lsa 0 5000 5000. Click the numbers and set rate-limiting values for Open Shortest Path
First (OSPF) link-state advertisement (LSA) generation. LSA and SPF throttling provide a dynamic
mechanism to slow down LSA updates in OSPF during times of network instability and allow faster
OSPF convergence. The values are:
• Start Interval (first number)—The minimum delay to generate the first occurrence of an LSA,
from 1 to 600000 milliseconds. The first instance of LSA is generated immediately after a local
OSPF topology change. The next LSA is generated only after this start interval. Specify 0 to have
LSAs generated without delay.
• Hold Time (second number)—The minimum delay to generate the LSA again, from 1 to 600000
milliseconds. This value is used to calculate the subsequent rate limiting times for LSA generation.
• Maximum Interval (third number)—The maximum delay to generate the LSA again, from 1 to
600000 milliseconds.
• timers throttle spf 5000 10000 10000. Click the numbers and set rate-limiting values for the shortest
path first (SPF) generation. The values are:
• Start Interval (first number)—The delay to receive a change to the SPF calculation, from 1 to
600000 milliseconds.
• Hold Time (second number)—The delay between the first and second SPF calculations, from 1 to
600000 milliseconds.
• Maximum Interval (third number)—The maximum wait time for SPF calculations, from 1 to
600000 milliseconds.
Step 11 (Optional.) Generate a default external route into an OSPF routing domain.
Click + to enable the default-information originate command. You can optionally enable and configure the
following commands to fine-tune the feature:
• default-information originate always. Always advertise a default route even if there is no default route.
• default-information originate metric 1 metric-type metric-type-value. The metric type and value for
generating the default route.
• Click the metric number and enter the OSPF default metric value, from 0 to 16777214. Unless you
know you need a different value, enter 10.
• Click the metric-type number and select 1 or 2 as the external link type associated with the default
route advertised into the OSPF routing domain. The default is 2.
• default-information originate route-map route-map. Select a route map that specifies the routing
process that generates the default route if the route map is satisfied.
Step 12 (Optional.) Configure Non-Stop Forwarding (NSF) graceful restart if the device is configured for High
Availability (HA).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
339
Routing
Configure Advanced Settings for an OSPF Process
The system can experience some known failure situations that should not affect packet forwarding across the
switching platform. The Non-Stop Forwarding (NSF) capability allows data forwarding to continue along
known routes, while the routing protocol information is being restored. This capability is useful when there
is a component failure (for example, in HA, the active unit fails over to the standby unit, or in a cluster, the
primary unit fails with a secondary unit being elected as new primary), or when there is a scheduled hitless
software upgrade.
You can configure graceful restart on OSPFv2 by using either using NSF Cisco (RFC 4811 and RFC 4812)
or NSF IETF (RFC 3623).
You can configure a device as NSF-capable or NSF-aware. A NSF-capable device can indicate its own restart
activities to neighbors and a NSF-aware device can help a restarting neighbor.
• You can configure a device as NSF-aware irrespective of the mode in which it operates.
• A device has to be in either High Availability (failover) or Spanned Etherchannel (L2) cluster mode for
you to configure it as NSF-capable.
Note You must not configure the OSPF process to use fast hello packets if you also configure graceful
restart. Graceful restart cannot occur with fast hello packets, because the time taken for the role
change between the active and standby units is more than the configured dead interval.
c) Your selection in the previous step adds the commands required to implement graceful restart according
to your specifications. Do not disable these commands. There is only one command that optionally needs
further configuration. Following is an explanation of the added commands; a no form of the command
turns off the related feature.
• nsf cisco helper. Enable Cisco nonstop forwarding (NSF) helper mode. When the NSF-capable FTD
device is performing graceful restart, the helper FTD devices assist in the nonstop forwarding recovery
process.
• nsf ietf helper mode-option. Enable IETF nonstop forwarding (NSF) helper mode. When the
NSF-capable FTD device is performing graceful restart, the helper FTD devices assist in the nonstop
forwarding recovery process. Optionally, you can click mode-option and enable strict link-state
advertisement (LSA) checking. With strict LSA checking enabled, the helper system will terminate
the helping process of the restarting system if it detects that there is a change to an LSA that would
be flooded to the restarting system or if there is a changed LSA on the retransmission list of the
restarting system when the graceful restart process is initiated.
• capability lls. Enables Link Local Signaling (LLS), which is needed for Cisco graceful restart.
• capability opaque. Enables opaque Link State Advertisements (LSAs), which is needed for IETF
graceful restart.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
340
Routing
Configure OSPF Area Properties
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
341
Routing
Configure OSPF Area Properties
If you select an interface here, before you can change the address on an interface, you must first remove
it from the routing process. Then, after the changing the IP address, remember to return here and select
the new networks and interface to ensure a correctly-configured routing process.
Step 7 (Optional.) Configure the cost for the default summary route sent to a stub area or a not-so-stubby area (NSSA).
This option is meaningful only if you configure the area to be a stub or NSSA, as explained below. Click +
to enable to following command in the area properties:
area area-id default-cost 1
If necessary, enter the correct area ID. Then, click the number and enter the relative cost of the route, from 0
to 16777214. The default is 1. The higher the number, the less likely the route will be used over another route
that applies for the destination.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
342
Routing
Configure OSPF Area Properties
to handle the redistribution. With NSSA, you can extend OSPFv2 to cover the remote connection by defining
the area between the corporate router and the remote router as an NSSA.
Before you use this feature, consider these guidelines:
• You can set a Type 7 default route that can be used to reach external destinations. When configured, the
router generates a Type 7 default into the NSSA or the NSSA area boundary router.
• Every router within the same area must agree that the area is NSSA; otherwise, the routers cannot
communicate with each other.
d) (Optional.) If the system is an ABR, and you want redistribution from other routing protocols to import
routes into normal areas only and not into the NSSA, click the + to enable the following command:
area area-id nssa no-redistribution
e) (Optional.) If you do not want to inject summary routes into the NSSA, click + to enable the following
command:
area area-id nssa no-summary
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
343
Routing
Configure Static OSPF Neighbors
• retransmit-interval 5. Click the number and enter the time between LSA retransmissions for the
virtual link, from 1 to 65535 seconds.
• transmit-delay 1. Click the number and enter the delay time between when OSPF receives a topology
change and when it starts a shortest path first (SPF) calculation, from 0 to 65535 seconds.
d) You can click ... > Duplicate next to the configure area virtual-link command to define another virtual
link. Define as many as you require.
Step 12 (Optional.) If the system is an area border router (ABR), configure ranges to consolidate or summarize routes
for the area.
When you configure the area range command, the result is that a single summary route is advertised to other
areas by the ABR. Routing information is condensed at area boundaries. External to the area, a single route
is advertised for each address range. This behavior is called route summarization. You can configure multiple
area range commands for an area. In this way, OSPF can summarize addresses for many different sets of
address ranges.
To configure route summarization:
a) Click the + to the left of the area area-id range network-object range-parameters line.
b) Click network-object and select the network object that defines the address range whose routes you want
summarized.
c) (Optional.) Click range-parameters and select one of the following attributes:
• advertise. Sets the address range status to advertise and generates Type 3 summary link-state
advertisements (LSAs). This is the default if you select no option.
• not-advertise. Sets the address range status to DoNotAdvertise. The Type 3 summary LSA is
suppressed, and the component networks remain hidden from other networks.
d) You can click ... > Duplicate next to the area range command to define another route summarization.
Define as many as you require.
Step 13 If you are configuring the process for a multi-area network, mouse over the area to the left of the circled - on
the area and configure area lines and click ... > Duplicate. Then, configure the new area and its networks
and other settings as explained above. Repeat this process until you have defined all areas in which this routing
process should participate.
Step 14 Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
344
Routing
Configure OSPF Summary Addresses
Procedure
Step 9 You can click ... > Duplicate next to the neighbor command to define another static neighbor. Define as
many as you require.
Step 10 Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
345
Routing
Configure OSPF Filter Rules
Procedure
Step 8 (Optional.) To add a tag value to the summarized route, click + to enable the summary-address tag command,
click the tag-number variable, and enter the tag number, from 0 to 4294967295.
This value is not used by OSPF itself. It may be used to communicate information between autonomous system
boundary routers (ASBR). If none is specified, then the remote autonomous system number is used for routes
from BGP and EGP; for other protocols, zero (0) is used.
The primary reason to use tag values is for controlling redistribution based on the tag number. If you do not
use it in your redistribution route maps, there is no need to configure it here.
Step 9 You can click ... > Duplicate next to the configure summary-address command to define another route
summarization. Define as many as you require.
Step 10 Click OK.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
346
Routing
Configure OSPF Redistribution
Step 9 You can click ... > Duplicate next to the configure filter-rules command to define another filter rule. Define
as many as you require.
Step 10 Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
347
Routing
Configure OSPF Redistribution
Procedure
Step 8 (Optional; IS-IS only.) On the redistribute isis level-2 command, click level-2 and select whether you are
redistributing routes learned only within an IS-IS area (level-1), between IS-IS areas (level-2) or both (level-1-2).
Step 9 (Optional; all protocols.) If you apply tags to routes in order to control redistribution, click + to enable the
redistribute tag tag-number command, then click the variable and enter the tag associated with routes you
want to redistribute. The tag number is from 0 to 4294967295.
Step 10 (Optional; all protocols.) If you want to redistribute routes for all subnets, not just those that abide by the
standard class, click + to enable the redistribute subnets command.
For example, if you do not enable this command, a specific route for 10.100.10.0/24 would not be redistributed;
instead, only a route for 10.0.0.0/8 would be redistributed.
Step 11 (Optional; all protocols.) To fine-tune which routes are redistributed based on a route map, click + to enable
the redistribute route-map command, click the variable, and select the route map that defines your restrictions.
If you do not apply a route map, all routes for the process (that fit the other commands configured for
redistribution), are redistributed.
Step 12 (Optional; all protocols.) To fine-tune the metrics for redistributed routes, click + to enable the following
command and configure the options:
redistribute protocol metric metric-value metric-type metric-type-value
Click the variables and configure the following:
• metric. The metric value for the routes being distributed, from 0 to 16777214. When redistributing from
one OSPF process to another OSPF process on the same device, the metric will be carried through from
one process to the other if you do not specify a metric value. When redistributing other processes to an
OSPF process, the default metric is 20.
• metric-type. The metric type is the external link type that is associated with the default route that is
advertised into the OSPF routing domain. The available options are 1 for a Type 1 external route or 2
for a Type 2 external route. The default is 2.
Step 13 (Optional; OSPF only.) The following commands are enabled by default when you redistribute routes from
another OSPF process. You can click - to disable unwanted commands.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
348
Routing
Configure OSPFv2 Interface Settings and OSPF Authentication
These commands specify the criteria by which OSPF routes are redistributed into other routing domains.
• redistribute ospf match external 1. Routes that are external to the autonomous system, but are imported
into OSPF as Type 1 external routes.
• redistribute ospf match external 2. Routes that are external to the autonomous system, but are imported
into OSPF as Type 2 external routes.
• redistribute ospf match internal. Routes that are internal to a specific autonomous system.
• redistribute ospf match nssa-external 1. Routes that are external to the autonomous system, but are
imported into OSPF as Type 1 external routes and marked as Not-So-Stubby-Area (NSSA) only.
• redistribute ospf match nssa-external 2. Routes that are external to the autonomous system, but are
imported into OSPF as Type 2external routes and marked as Not-So-Stubby-Area (NSSA) only.
Step 14 You can click ... > Duplicate next to the configure redistribution command to configure redistribution for
another protocol. Configure redistribution for each protocol that makes sense for your network.
Step 15 Click OK.
Note The routers on a given network must have the same values for authentication and for lost neighbor detection
hello and dead intervals.
Procedure
• Click the edit icon ( ) for the object you want to edit. Note that when you edit an object, you might see
lines that you did not directly configure. These lines are exposed to show you the default values that are
being configured.
If you no longer need an interface settings object, click the trash can icon for the object to delete it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
349
Routing
Configure OSPFv2 Interface Settings and OSPF Authentication
• message-digest—Authenticate the OSPF connection using message digest (MD5). MD5 authentication
verifies the integrity of the communication, authenticates the origin, and checks for timeliness. Both
routers must be configured to use the same MD5 key.
When you select this option, two commands are added: ospf authentication message-digest and ospf
message-digest-key key-id md5 key. Click the variables to configure the following:
• key-id—The authentication key ID number, from 1 to 255. You must configure the neighbor router
with the same key ID and associated MD5 key.
• key—Select the secret key object that contains the MD5 key. The key is an alphanumeric password
up to 16 characters. You can include spaces between characters. Spaces at the beginning or end of
the key are ignored. If the object does not yet exist, click Create New Secret Key at the bottom of
the list and create it now.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
350
Routing
Configure OSPFv2 Interface Settings and OSPF Authentication
Step 8 (Optional.) All other settings have default values or they are optional. Change them, or enable them, only if
you need different behavior. Click the Show Disabled link to expose the options.
Following are the additional interface settings. To enable a setting, click the + to the left of the command,
then configure the command (if necessary).
• ospf cost value—The cost (a link-state metric) of sending a packet on an OSPF interface, from 1 to
65535. The value 1 represents a network that is directly connected to the interface. Click the variable
and enter the cost that represents the capability of the interface based on the numbers you are using in
your network.
When deciding on a value, the higher the interface bandwidth, the lower the associated cost to send
packets across that interface should be. In other words, a large cost value represents a low bandwidth
interface and a small cost value represents a high bandwidth interface. The specific number you select
has no inherent meaning: the value is relative to the other values you configure for interface across the
OSPF area. These values then affect the calculation of the best route for a destination.
The OSPF interface default cost on the FTD device is 10. This default differs from Cisco IOS software,
where the default cost is 1 for Fast Ethernet and Gigabit Ethernet and 10 for 10BaseT. This is important
to take into account if you are using ECMP in your network.
• ospf database-filter all out—Filters out all outgoing LSAs to an OSPF interface during synchronization
and flooding.
• ospf mtu-ignore—Disables OSPF maximum transmission unit (MTU) mismatch detection on receiving
database packets. OSPF checks whether neighbors are using the same MTU on a common interface. This
check is performed when neighbors exchange Database Descriptor (DBD) packets. If the receiving MTU
in the DBD packet is higher than the MTU configured on the incoming interface, OSPF adjacency will
not be established. If you cannot fix the MTU values on the interfaces to be the same, you can disable
MTU checking.
• ospf network point-to-point non-broadcast—Configures the OSPF interface as a point-to-point,
non-broadcast network. This lets you transmit OSPF routes over VPN tunnels. If you configure this
option, dynamic discover of neighbors is not possible. You must also:
• Update the OSPF process object to define a single static neighbor for this interface. Also, update
the OSPF process of the neighbor router to define this device as its static neighbor.
• Create static routes (on each router) that point to the neighbor router.
• ospf priority value—The priority of the router relative to the other routers in the network, from 0 to
255. The default priority is 1. When two routers attached to a network both attempt to become the
designated router, the one with the higher router priority takes precedence. If there is a tie, the router
with the higher router ID takes precedence. A router with a router priority set to zero is ineligible to
become the designated router or backup designated router. Click the variable and select the priority based
on the relative numbering system you use in your network.
• ospf lost-neighbor-detection detection-mechanism—Defines how the system determines if a neighbor
router is down. OSPF must recalculate routes whenever an OSPF router is declared down. For detailed
information on configuring lost neighbor detection, see Configure OSPFv2 Lost Neighbor Detection and
Fast Hello Packets (OSPF Interface Settings), on page 352.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
351
Routing
Configure OSPFv2 Lost Neighbor Detection and Fast Hello Packets (OSPF Interface Settings)
Configure OSPFv2 Lost Neighbor Detection and Fast Hello Packets (OSPF
Interface Settings)
The OSPF process regularly sends hello packets to each neighbor router to verify that the neighbor can still
respond. Continued failure to respond indicates that the neighbor router (either entirely or just the adjacent
interface) is not available for routing, and OSPF must recalculate routes and the OSPF system must converge
on the updated routing table.
You can adjust the following values to fine-tune your network. Ideally, you want to minimize how often
neighbors are declared down and routes recalculated. On the other hand, you also want to minimize how long
it takes for the network to reconverge on a good routing table when an OSPF router (or interface) truly is
down.
• Hello interval—This is the time between sending hello packets. The default is every 10 seconds. If
desired, you can configure fast hello packets, where hellos are sent at sub-second intervals. Fast hello
packets provide the quickest detection of a down neighbor and reconvergence of the routing table.
• Dead interval—The length of time during which, if no hello packets are seen from a neighbor, the neighbor
is declared dead. The default is 40 seconds (4 times the default hello interval), unless you are using fast
hello packets, in which case the dead interval is always 1 second. Specifying a smaller dead interval will
give faster detection of a neighbor being down and improve convergence, but might cause more routing
instability. In any case, you must configure the dead interval to be larger than the hello interval. You
must set the same dead interval on all OSPF routers in the network.
You configure lost neighbor detection in the OSPF Interface Settings object.
Procedure
• Click the edit icon ( ) for the object you want to edit. Note that when you edit an object, you might see
lines that you did not directly configure. These lines are exposed to show you the default values that are
being configured.
Step 5 If the ospf lost-neighbor-detection detection-mechanism command is not displayed, click the Show Disabled
link.
Step 6 Click the + to the left of the command to enable it.
Step 7 Click detection-mechanism and select the mechanism that you want to implement:
• dead-interval—To configure a standard hello interval in seconds. The following commands are added;
adjust their values as needed:
• ospf hello-interval 10—The hello interval, from 1 to 8192 seconds. The default is 10. This value
must be less than the dead interval. Click the value to enter the desired number.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
352
Routing
Monitoring OSPF
• ospf dead-interval 40—The dead interval, from 1 to 8192 seconds. The recommended value is 4
times the hello interval, but you can configure a shorter time for faster convergence.
• hello-multiplier—To configure sub-second fast hello packets. The following command is added, you
must configure the value.
• ospf dead-interval minimal hello-multiplier value—Click the variable and enter the number of
hello packets that should be sent each second, from 3 to 20. The dead interval is set to 1 second by
the minimal keyword.
Monitoring OSPF
To monitor and troubleshoot OSPF, open the CLI console or log into the device CLI and use the following
commands. You can also select some of these commands from the Commands menu on the Routing page.
Use show ospf ? to get lists of additional options. For example, you can specify process ID, area ID, and
virtual router to limit the information you see, as well as other options to target just the information you are
looking for. The following list is a summary only.
• show ospf
Displays general information about OSPFv2 routing processes.
• show ospf border-routers
Displays the internal OSPFv2 routing table entries to the ABR and ASBR.
• show ospf database
Displays lists of information related to the OSPFv2 database for a specific router.
• show ospf events
Displays OSPF internal event information.
• show ospf flood-list
Displays a list of LSAs waiting to be flooded over an interface, to observe OSPF v2packet pacing.
OSPFv2 update packets are automatically paced so they are not sent less than 33 milliseconds apart.
Without pacing, some update packets could get lost in situations where the link is slow, a neighbor could
not receive the updates quickly enough, or the router could run out of buffer space.
Pacing is also used between resends to increase efficiency and minimize lost retransmissions. You also
can display the LSAs waiting to be sent out of an interface. Pacing enables OSPFv2 update and
retransmission packets to be sent more efficiently.
• show ospf interface
Displays OSPFv2-related interface information.
• show ospf neighbor
Displays OSPFv2 neighbor information on a per-interface basis.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
353
Routing
Monitoring OSPF
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
354
CHAPTER 16
Border Gateway Protocol (BGP)
BGP is used to exchange routing information for the Internet and is the protocol used between Internet service
providers (ISP). If your system is a gateway to the service provider network, you might need to implement
BGP. You can configure one BGP process on the device, for a single autonomous system.
• About BGP, on page 355
• Configure BGP, on page 358
• Monitoring BGP, on page 378
About BGP
BGP is an inter and intra autonomous system routing protocol. An autonomous system is a network or group
of networks under a common administration and with common routing policies. BGP is used to exchange
routing information for the Internet and is the protocol used between Internet service providers (ISP).
Note AS loop detection is done by scanning the full AS path (as specified in the AS_PATH attribute), and checking
that the AS number of the local system does not appear in the AS path. By default, EBGP advertises the
learned routes to the same peer to prevent additional CPU cycles on the ASA in performing loop checks and
to avoid delays in the existing outgoing update tasks.
Routes learned via BGP have properties that are used to determine the best route to a destination, when multiple
paths exist to a particular destination. These properties are referred to as BGP attributes and are used in the
route selection process:
• Weight—This is a Cisco-defined attribute that is local to a router. The weight attribute is not advertised
to neighboring routers. If the router learns about more than one route to the same destination, the route
with the highest weight is preferred.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
355
Routing
When to Use BGP
• Local preference—The local preference attribute is used to select an exit point from the local AS. Unlike
the weight attribute, the local preference attribute is propagated throughout the local AS. If there are
multiple exit points from the AS, the exit point with the highest local preference attribute is used as an
exit point for a specific route.
• Multi-exit discriminator—The multi-exit discriminator (MED) or metric attribute is used as a suggestion
to an external AS regarding the preferred route into the AS that is advertising the metric. It is referred
to as a suggestion because the external AS that is receiving the MEDs may also be using other BGP
attributes for route selection. The route with the lower MED metric is preferred.
• Origin—The origin attribute indicates how BGP learned about a particular route. The origin attribute
can have one of three possible values and is used in route selection.
• IGP—The route is interior to the originating AS. This value is set when the network router
configuration command is used to inject the route into BGP.
• EGP—The route is learned via the Exterior Border Gateway Protocol (EBGP).
• Incomplete—The origin of the route is unknown or learned in some other way. An origin of
incomplete occurs when a route is redistributed into BGP.
• AS_path—When a route advertisement passes through an autonomous system, the AS number is added
to an ordered list of AS numbers that the route advertisement has traversed. Only the route with the
shortest AS_path list is installed in the IP routing table.
• Next hop—The EBGP next-hop attribute is the IP address that is used to reach the advertising router.
For EBGP peers, the next-hop address is the IP address of the connection between the peers. For IBGP,
the EBGP next-hop address is carried into the local AS.
• Community—The community attribute provides a way of grouping destinations, called communities, to
which routing decisions (such as acceptance, preference, and redistribution) can be applied. Route maps
are used to set the community attribute. The predefined community attributes are as follows:
• no-export—Do not advertise this route to EBGP peers.
• no-advertise—Do not advertise this route to any peer.
• internet—Advertise this route to the Internet community; all routers in the network belong to it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
356
Routing
BGP Multipath
propagates the path to its neighbors. BGP uses the following criteria, in the order presented, to select a path
for a destination:
• If the path specifies a next hop that is inaccessible, drop the update.
• Prefer the path with the largest weight.
• If the weights are the same, prefer the path with the largest local preference.
• If the local preferences are the same, prefer the path that was originated by BGP running on this router.
• If no route was originated, prefer the route that has the shortest AS_path.
• If all paths have the same AS_path length, prefer the path with the lowest origin type (where IGP is lower
than EGP, and EGP is lower than incomplete).
• If the origin codes are the same, prefer the path with the lowest MED attribute.
• If the paths have the same MED, prefer the external path over the internal path.
• If the paths are still the same, prefer the path through the closest IGP neighbor.
• Determine if multiple paths require installation in the routing table for BGP Multipath, on page 357.
• If both paths are external, prefer the path that was received first (the oldest one).
• Prefer the path with the lowest IP address, as specified by the BGP router ID.
• If the originator or router ID is the same for multiple paths, prefer the path with the minimum cluster list
length.
• Prefer the path that comes from the lowest neighbor address.
BGP Multipath
BGP Multipath allows installation into the IP routing table of multiple equal-cost BGP paths to the same
destination prefix. Traffic to the destination prefix is then shared across all installed paths.
These paths are installed in the table together with the best path for load-sharing. BGP Multipath does not
affect best-path selection. For example, a router still designates one of the paths as the best path, according
to the algorithm, and advertises this best path to its BGP peers.
In order to be candidates for multipath, paths to the same destination need to have these characteristics equal
to the best-path characteristics:
• Weight
• Local preference
• AS-PATH length
• Origin code
• Multi Exit Discriminator (MED)
• One of these:
• Neighboring AS or sub-AS (before the addition of the BGP Multipaths)
• AS-PATH (after the addition of the BGP Multipaths)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
357
Routing
Configure BGP
These are the additional requirements for internal BGP (iBGP) multipath candidates:
• The path should be learned from an internal neighbor (iBGP).
• The IGP metric to the BGP next hop should be equal to the best-path IGP metric, unless the router is
configured for unequal-cost iBGP multipath.
BGP inserts up to n most recently received paths from multipath candidates into the IP routing table, where
n is the number of routes to install to the routing table, as specified when you configure BGP Multipath. The
default value, when multipath is disabled, is 1.
For unequal-cost load balancing, you can also use BGP Link Bandwidth.
Note The equivalent next-hop-self is performed on the best path that is selected among eBGP multipaths before it
is forwarded to internal peers.
Configure BGP
The following topics explain how to configure BGP.
Procedure
Step 3 If you have not yet configured the BGP Global Settings object, click Create BGP Global Settings Object.
Step 4 (Optional.) You can change the object name or enter a description for the object. The default object name is
BgpGeneralSettings.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
358
Routing
Configure BGP Global Settings
Step 6 (Optional.) Click the Show Disabled link above the object body to add all other possible configuration lines.
You can enable the following options by clicking the + to the left of the option.
• bgp asnotation dot. Changes the default display and regular expression match format of BGP 4-byte
autonomous system numbers from asplain (decimal values) to asdot (dot notation). The system uses
asplain as the default display format for autonomous system numbers, but you can configure 4-byte
autonomous system numbers in both the asplain and asdot format even if you do not enable this command.
In addition, the default format for matching 4-byte autonomous system numbers in regular expressions
is asplain, so you must ensure that any regular expressions to match 4-byte autonomous system numbers
are written in the asplain format if you do not enable this command.
• bgp scan time 60. Click the number and enter the scanning interval of BGP routers for next hop validation,
from 5 to 60 seconds. The default is 60 seconds.
• configure nexthop trigger state. Click state and select either enable or disable. BGP next-hop address
tracking is event driven. BGP prefixes are automatically tracked as peering sessions are established.
Next-hop changes are rapidly reported to BGP as they are updated in the routing information base (RIB).
This optimization improves overall BGP convergence by reducing the response time to next-hop changes
for routes installed in the RIB. When a best-path calculation is run in between BGP scanner cycles, only
the changes are processed and tracked. If you enable next hop address tracking, the following commands
are added. Note that if you do not configure the general options in a new object, the default is to enable
this feature.
• bgp nexthop trigger enable. BGP next-hop address tracking improves BGP response time
significantly. However, unstable Interior Gateway Protocol (IGP) peers can introduce instability to
BGP. We recommend that you aggressively dampen unstable IGP peering sessions to mitigate the
possible impact to BGP.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
359
Routing
Configure BGP Global Settings
• bgp nexthop trigger delay 5. Click the number to change the delay interval between routing table
walks for BGP next-hop address tracking. You can increase the performance of BGP next-hop
address tracking by tuning the delay interval between full routing table walks to match the tuning
parameters for the IGP. The default delay interval is 5 seconds, which is an optimal value for a
fast-tuned IGP. In the case of an IGP that converges more slowly, you can change the delay interval
to 20 seconds or more, depending on the IGP convergence time. You can set the delay from 0 to
100 seconds.
• bgp aggregate-timer 30. Click the number to set the interval at which BGP routes will be aggregated,
from 6 to 60 seconds. The default is 30 seconds.
• bgp router-id router-id. Click router-id and enter the IPv4 address that should be used as the global
router ID. This ID is used for any BGP process in a virtual router that does not itself specify a router ID.
If you do not enable this command, the router ID is set to the highest IP address on a physical interface
that is assigned to the virtual router. Use this command to ensure that the router ID remains stable.
• bgp maxas-limit value. Click value and enter the maximum number of autonomous system numbers
in the AS-path attribute of the BGP Update message, ranging from 1 to 254. An AS-path attribute is a
sequence of intermediate AS numbers between source and destination routers that form a directed route
for packets to travel. The system discards routes that have a number of autonomous systems in the AS-path
that exceed the specified value. In addition to setting the limit on the number of autonomous system
numbers within the AS-path segment, the command limits the number of AS-path segments to ten. If
you do not enable this command, no routes are discarded.
• bestpath. Configures options that are used in the BGP best path selection algorithm. The bgp default
local-preference command is configured by default, but you can add the other commands by clicking
the + for the command.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
360
Routing
Configure the BGP Process
• bgp default local-preference 100. Click the number and enter a value that indicates the preference
of this system relative to other routers in the BGP AS, from 0 and 4294967295. The default value
is 100. Higher values indicate higher preference. This preference is sent to all routers and access
servers in the local autonomous system. This attribute is exchanged only between iBGP peers and
is used to determine local policy.
• bgp always-compare-med. Allow the comparison of Multi Exit Discriminator (MED) for paths
from neighbors in different autonomous systems. By default, the system does not compare the MED
for paths from neighbors in different autonomous systems.
• bgp bestpath compare-routerid. Use the router ID as the tie breaker for best path selection when
two identical routes are received from two different peers (all the attributes are the same except for
the router ID). When this command is enabled, the lowest router ID will be selected as the best path
when all other attributes are equal. Otherwise, the first route received is used.
• bgp deterministic-med. Select the best MED path advertised from the neighboring AS.
• bgp bestpath med missing-as-worst. Set a path with a missing MED attribute as the least preferred
path. By default, the system considers the route with a missing MED to be the best route.
• graceful-restart. Configure graceful restart for the systems in a high availability or cluster configuration.
• bgp graceful-restart. Enables graceful restart for non-stop forwarding. With graceful restart, the
system can advertise the ability to maintain the forwarding state for an address group during restart.
• bgp graceful-restart restart-time 120. Click the number and enter the maximum time period that
the system will wait for a graceful-restart-capable neighbor to return to normal operation after a
restart event occurs, from 1 to 3600 seconds. The default is 120 seconds.
• bgp graceful-restart stalepath-time 360. Click the number and enter the maximum time period
that the system will hold stale paths for a restarting peer, from 1 to 3600 seconds. All stale paths
are deleted after this timer expires. The default value is 360 seconds.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
361
Routing
Configure the BGP Process
• Click the edit icon ( ) for the object you want to edit. Note that when you edit an object, you might see
lines that you did not directly configure. These lines are exposed to show you the default values that are
being configured.
If you no longer need a process, click the trash can icon for the object to delete it.
Step 7 Click Show Disabled and customize the process to function correctly in your network.
So long as you configure a minimum set of commands, as explained above, you can save the object and
customize the process settings later. The following topics explain the various sets of options. At minimum,
you should configure the network settings to identify the networks for which the process will distribute routes.
Both the general and advanced settings have command defaults that are appropriate in most cases.
• Configure BGP General Settings, on page 363
• Configure BGP Advanced Settings, on page 364
• Configure the Networks for BGP to Advertise, on page 365
• Configure BGP Route Injection, on page 366
• Configure BGP Aggregate Address Settings, on page 367
• Configure BGP Filter Settings for IPv4, on page 369
• Configure BGP Neighbors, on page 370
• Configure BGP Route Redistribution from Other Routing Protocols, on page 377
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
362
Routing
Configure BGP General Settings
• bgp router-id router-id. Click router-id and enter the IPv4 address that should be used as the router ID
for this process. If you do not enable this command, the router ID is set to the global router ID, or to the
highest IP address on a physical interface that is assigned to the virtual router. Use this command to
ensure that the router ID remains stable.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
363
Routing
Configure BGP Advanced Settings
Procedure
Step 6 Configure the following commands. You need to click Show Disabled to see all but the first command when
initially creating the object.
Click + for a command to enable it.
• bgp redistribute-internal. Configure iBGP redistribution into an interior gateway protocol (IGP), such
as EIGRP or OSPF. Exercise caution when redistributing iBGP into an IGP. Use IP prefix-list and
route-map statements to limit the number of prefixes that are redistributed. Redistributing an unfiltered
BGP routing table into an IGP can have a detrimental effect on normal IGP network operation. This
command is enabled by default, so you need to click the - button for it to turn it off.
• bgp suppress-inactive. Prevent routes that are not installed in the RIB (inactive routes) from being
advertised to peers. By default, BGP advertises inactive routes. Note that BGP marks routes that are not
installed into the RIB with a RIB-failure flag. This flag will also appear in the output of the show bgp
command; for example, Rib-Failure (17). This flag does not indicate an error or problem with the route
or the RIB.
• auto-summary. (IPv4 only.) Automatically summarize subnet routes into network-level routes. Route
summarization reduces the amount of routing information in the routing tables. Disable automatic
summarization if you must perform routing between disconnected subnets. When automatic summarization
is disabled, subnets are advertised.
• synchronization. Enable synchronization between BGP and your Interior Gateway Protocol (IGP)
system, such as OSPF. Usually, a BGP speaker does not advertise a route to an external neighbor unless
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
364
Routing
Configure the Networks for BGP to Advertise
that route is local or exists in the IGP. This feature allows routers and access servers within an autonomous
system to have the route before BGP makes it available to other autonomous systems. Use this command
if other routers in the autonomous system do not speak BGP.
• table-map route-map options. (IPv4 only.) Apply a route map that sets metrics, a tag value, or a traffic
index for routes that are updated in the BGP routing table, or controls whether routes are downloaded to
the RIB. Click route-map and select the Smart CLI object that defines the route map. In the route map,
you can use match clauses for IP access list, autonomous system paths, communities, prefix lists, and
next hop.
You can determine how the route map is used by clicking options and choosing either blank or filter:
• If you do not select filter, the system uses the route map to set certain properties of a route before
the route is installed into the RIB. The route is always downloaded, regardless of whether it is
permitted or denied by the route map.
• If you select filter, the route map also controls whether the BGP route is downloaded to the RIB.
Only routes permitted in the route map are downloaded; denied routes are not downloaded.
• default-information originate. Configure BGP to advertise a default route (network 0.0.0.0). The
configuration of the default-information originate command is similar to the configuration of the
network command. The default-information originate command, however, requires explicit
redistribution of the route 0.0.0.0, which you must also configure in this object. The network command
requires only that the route 0.0.0.0 be present in the Interior Gateway Protocol (IGP), such as OSPF,
routing table. For this reason, the network command is preferred for distributing a default route.
• maximum paths 1. Control the maximum number of parallel BGP routes that can be installed in a routing
table, from 1 to 8. Use this command to configure equal-cost or unequal-cost multipath load sharing for
BGP peering sessions. In order for a route to be installed as a multipath in the BGP routing table, the
route cannot have a next hop that is the same as another route that is already installed. The BGP routing
process will still advertise a best path to BGP peers when BGP multipath load sharing is configured. For
equal-cost routes, the path from the neighbor with the lowest router ID is advertised as the best path.
To configure BGP equal-cost multipath load sharing, all path attributes must be the same. The path
attributes include weight, local preference, autonomous system path (the entire attribute and not just the
length), origin code, Multi Exit Discriminator (MED), and Interior Gateway Protocol (IGP) distance.
• maximum paths ibgp 1. Control the maximum number of internal BGP routes that can be installed to
the routing table, from 1 to 8. The considerations for multipath iBGP are the same as described under
the maximum paths command above.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
365
Routing
Configure BGP Route Injection
If the network objects specify large network spaces, you can also create route maps to apply against the
network object to filter out subnets within the larger space that you do not want to advertise. Only routes that
match the route map specifications are advertised. Use Smart CLI to create the route map object.
Procedure
Step 5 Click Show Disabled to expose all commands, then click + to enable the network or network route-map
command, and configure the options:
• network-object. Click the variable and select the network object that defines the networks to advertise:
IPv4 network address and mask or IPv6 network address and prefix.
• route-map map-tag. Click the variable and select the route map that should be applied to the network
object to filter which addresses within the range should be advertised.
• (Optional; IPv6 only.) prefix-name. Click the variable and enter the name of a DHCPv6 prefix to advertise
the prefix. If you configure this option, the network object acts as a subnet for the prefix. To use this
option, you must enable the DHCPv6 Prefix Delegation client, which requires that you use FlexConfig
to add the ipv6 dhcp client pd command to an interface in interface configuration mode.
Step 6 You can click ... > Duplicate next to the network or network route-map command to configure additional
networks to advertise.
Step 7 Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
366
Routing
Configure BGP Aggregate Address Settings
Procedure
Step 5 Click Show Disabled to expose all commands, then click + to enable the bgp inject-map command.
Step 6 Configure the command properties:
• inject-map inject-map. Click the variable and select the route map that defines the prefixes that will be
created and installed into the routing table. Injected prefixes are installed in the local BGP RIB. A valid
parent route must exist; Only prefixes that are equal to or more specific than the aggregate route (existing
prefix) can be injected. The route map must use a prefix list to specify the routes to be injected.
• exist-map exist-map. Click the variable and select the route map that defines the prefix that the BGP
speaker will track. This route map must use prefix lists to specify the aggregate prefix and also the route
source. The route source would be a router, for example, 10.2.1.1/32, rather than a subnet.
• options. Optionally, click the variable and select copy-attributes. This option configures the injected
prefix to inherit the same attributes as the aggregate route. If you do not select this keyword, the injected
prefix will use the default attributes for locally originated routes.
Step 7 You can click ... > Duplicate next to the bgp inject-map command to configure additional route injection
rules.
Step 8 Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
367
Routing
Configure BGP Aggregate Address Settings
Procedure
Step 5 Click Show Disabled to expose all commands, then click + to enable the configure aggregate-address
command.
Step 6 Click the map-type variable and select which types of route map you want to apply to this particular aggregate
route.
This option simply determines which parameters are included on the aggregate-address command that will
be added to the object. You can apply up to 3 separate route maps, to suppress routes from the aggregation,
to advertise routes, and to define attributes to apply to the aggregate route.
• Select no-map if you do not need to apply any route maps.
• Select all if you want to apply route maps for all three options.
• Select the appropriate keyword combinations if you want to apply one or two maps, but not all:
suppress-map, advertise-map, attribute-map, suppress-advertise, suppress-attribute,
advertise-attribute.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
368
Routing
Configure BGP Filter Settings for IPv4
• attribute-map attribute-route-map. Click the variable and select the route map that changes attributes
of the aggregate route. This is useful when one of the routes forming the AS_SET is configured with an
attribute such as the community no-export attribute, which would prevent the aggregate route from being
exported.
• options. Click the variable and select one, all, or none of the following options:
• as-set. Generate autonomous system set path information for the aggregate route. The path advertised
for this route will be an AS_SET consisting of all elements contained in all paths that are being
summarized. Do not use this keyword when aggregating many paths, because this route must be
continually withdrawn and updated as autonomous system path reachability information for the
summarized routes changes.
• summary-only. Suppress advertisements of more-specific routes to all neighbors.
Step 8 You can click ... > Duplicate next to the configure aggregate-address command to configure additional
routes to aggregate.
Step 9 Click OK.
Procedure
Step 5 Click Show Disabled to expose all commands, then click + to enable the configure filter-rules direction
command.
Step 6 Click direction and select in, for filtering incoming updates, or out, for filtering outbound updates.
Step 7 For inbound filters, you can optionally specify the interface on which to filter updates. If you do not specify
an interface, the filter applies to all updates received on any interface.
a) Click + to enable the distribute-list acl-name in interface interface command.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
369
Routing
Configure BGP Neighbors
Step 9 You can click ... > Duplicate next to the configure filter-rules command to define another filter rule. Define
as many as you require.
Step 10 Click OK.
Procedure
Step 5 Click Show Disabled to expose all commands, then click + to enable the configure neighbor command.
Step 6 Configure the basic neighbor parameters on the neighbor command:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
370
Routing
Configure BGP Neighbors
• neighbor neighbor-address. Click the variable and enter the IPv4 or IPv6 address of the BGP neighbor
router, as appropriate for the address group you are configuring.
• remote-as as-number. Click the variable and enter the autonomous system number of the BGP neighbor
router.
• config-options. Click the variable and select properties. The only property that is configured by default
activates the neighbor. You can adjust other options as explained in this procedure.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
371
Routing
Configure BGP Neighbors
• neighbor ebgp-multihop 255. Click the 255 and enter the time-to-live value in number of hops,
from 1-255.
• neighbor disable-connected-check. Click + to enable this command to disable connection
verification to establish an eBGP peering session with a single-hop peer that uses a loopback
interface. Without this command, if the peer is not directly connected to the same network
segment, connection verification will prevent the peering session from being established.
• ttl-security-hop. Secure a BGP peering session and configure the maximum number of hops that
separate two external BGP (eBGP) peers. If you select this option, the following command is added:
neighbor ttl-security hops hop-count. Click the variable and enter the maximum number of hops
that separate the peers, from 1-254.
The neighbor ttl-security command provides a lightweight security mechanism to protect BGP
peering sessions from CPU utilization-based attacks. These types of attacks are typically brute force
Denial of Service (DoS) attacks that attempt to disable the network by flooding the network with IP
packets that contain forged source and destination IP addresses in the packet headers.
This feature leverages designed behavior of IP packets by accepting only IP packets with a TTL
count that is equal to or greater than the locally configured value. Accurately forging the TTL count
in an IP packet is generally considered to be impossible. Accurately forging a packet to match the
TTL count from a trusted peer is not possible without internal access to the source or destination
network.
To maximize the effectiveness of this feature, the hop-count value should be strictly configured to
match the number of hops between the local and external network. However, you should also take
path variation into account when configuring this feature for a multihop peering session. Ensure that
you configure this feature on all routers in the network.
e) On the neighbor version command, click the version-number variable and enter 4 to force the software
to use BGP version 4, or click - to disable the command. The software uses version 4 by default and
negotiates down to version 2 dynamically if necessary. Configuring 4 on this command prevents version
negotiation.
f) On the neighbor transport connection-mode command, click the options variable and select whether
the TCP connection is active or passive, or click - to disable the command and leave the mode to default.
g) On the neighbor transport path-mtu-discovery command, click the options variable and select blank
to enable path MTU discovery, or disable to disable it. Selecting blank is the same as clicking - to disable
the command, as the system performs path MTU discovery by default. Path MTU discovery makes it
possible for the BGP session to take advantage of larger MTU links.
Step 9 (Optional.) Configure the neighbor migration settings.
The migration settings configure the neighbor local-as command. The neighbor local-as command is used
to customize the AS_PATH attribute by adding and removing autonomous system numbers for routes received
from eBGP neighbors. The configuration of this command allows a router to appear to external peers as a
member of another autonomous system for the purpose of autonomous system number migration. This feature
simplifies the process of changing the autonomous system number in a BGP network by allowing the network
operator to migrate customers to new configurations during normal service windows without disrupting
existing peering arrangements.
You can perform this migration for only true eBGP peering sessions. This command does not work for two
peers in different sub-autonomous systems of a confederation.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
372
Routing
Configure BGP Neighbors
Caution BGP prepends the autonomous system number from each BGP network that a route traverses to
maintain network reachability information and to prevent routing loops. Configure this command
only for autonomous system migration, and de-configure it after the transition has been completed.
This procedure should be attempted only by an experienced network operator. You can create routing
loops through improper configuration.
a) If you have already configured it, click ... > Duplicate for the configure neighbor neighbor-address
remote-as settings command, or simply click + to enable it if it is not yet in use. Click Show Disabled
if you cannot see the command.
b) Click settings and select migration. This adds the following command:
configure neighbor-address local-as local-as-number options
c) Click the local-as-number variable and enter the local autonomous system (AS) number to prepend to the
AS_PATH attribute, from 1 to 4294967295 (asplain notation) or from 1.0 to 65535.65535 (asdot notation).
You cannot specify the autonomous system number from the local BGP routing process or from the
network of the remote peer.
d) Click the options variable and select one of the following. Note that selecting an item in this list (other
than none) also selects all options above it in the list. This is expected: the options are not truly independent.
• none. Do not configure any of the following options.
• no-prepend. Do not prepend the local autonomous system number to any routes received from the
eBGP neighbor.
• replace-as. Replace the real autonomous system number with the local autonomous system number
in the eBGP updates. The autonomous system number from the local BGP routing process is not
prepended.
• dual-as. Configure the eBGP neighbor to establish a peering session using the real autonomous
system number (from the local BGP routing process) or by using the local autonomous system
number.
Step 10 (Optional. IPv4 only.) Configure the neighbor high availability (HA) settings.
The HA mode settings configure the neighbor ha-mode graceful-restart command, which enables or disables
the graceful restart capability for an individual BGP neighbor. Use the disable keyword to disable the graceful
restart capability when graceful restart has been previously enabled for the BGP peer.
The graceful restart capability is negotiated between nonstop forwarding (NSF)-capable and NSF-aware peers
in OPEN messages during session establishment. If you enable the graceful restart capability after a BGP
session has been established, you will need to restart the session with a soft or hard reset.
The HA mode setting configures graceful restart for an individual neighbor. Instead, you can use the BGP
global settings to enable graceful restart for all neighbors.
a) If you have already configured it, click ... > Duplicate for the configure neighbor neighbor-address
remote-as settings command, or simply click + to enable it if it is not yet in use. Click Show Disabled
if you cannot see the command.
b) Click settings and select ha-mode.
c) If you want to disable graceful restart, click options on the neighbor ha-mode graceful-restart command
and select disable. Select blank to reverse a previous disable action.
Step 11 (Optional.) Configure neighbor activation options.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
373
Routing
Configure BGP Neighbors
When you configure a new neighbor, it is activated by default. You need to enable the activation settings if
you want the neighbor to be disabled initially, or to configure other activation settings.
a) Click + to enable the configure neighbor neighbor-address activate activate-options command. Click
Show Disabled if you cannot see the command.
b) Click activate-options and select properties.
c) The neighbor neighbor-address activate command is added in the enabled state. Click - to disable the
command and configure the neighbor as initially disabled. You will need to edit this object to enable the
neighbor when you are ready to communicate with it.
Step 12 (Optional.) Configure filtering in the neighbor activation settings.
a) If you have already configured it, click ... > Duplicate for the configure neighbor neighbor-address
activate settings command, or simply click + to enable it if it is not yet in use. Click Show Disabled if
you cannot see the command.
b) Click settings and select filtering.
c) Configure filtering to control the prefixes received from or sent to this neighbor using any combination
of the following neighbor commands. Click - to disable any that you do not want to use. All of these
commands allow filtering in both the inbound and outbound direction: click ... > Duplicate for a command
if you want to configure both directions.
Do not apply both a neighbor distribute-list and a neighbor prefix-list command to a neighbor in the
same direction. These two commands are mutually exclusive, and only one of them can be applied to each
inbound or outbound direction.
• distribute-list acl options. (IPv4 only.) Filter prefixes based on the selected standard access list
(ACL). Then, click options and select whether to apply the filter in the in or out direction.
• route-map route-map options. Filter prefixes based on the selected route map. Then, click options
and select whether to apply the filter in the in or out direction. Within the route map, you can configure
filtering based on access list, AS path, prefix, and distribution lists.
• prefix-list prefix-list options. Filter prefixes based on the selected IPv4 or IPv6 prefix list. Then,
click options and select whether to apply the filter in the in or out direction.
• filter-list as-path options. Filter prefixes based on the selected AS Path filter object. Then, click
options and select whether to apply the filter in the in or out direction.
• restart. Stop the peering session with the neighbor when the limit is reached. Click the restart-interval
variable and configure how long the system should wait before restarting the session, from 1 to 65535
minutes.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
374
Routing
Configure BGP Neighbors
• warning-only. Do not stop the session when the limit is reached. Instead, simply issue a warning
syslog message and continue the session.
e) The neighbor neighbor-address remove-private-as command is added in the enabled state. Click - to
disable the command. This command removes private autonomous system numbers from the eBGP
outbound routing updates. The private AS values are 64512 to 65535.
f) On the configure neighbor default-originate command, either click options and select one of the
following, or click - to disable the command.
• none. Allows the system to send a default route to the neighbor unconditionally.
• route-map. Have the system conditionally send a default route to the neighbor. When used with a
route map, the default route is injected if the route map contains a match IP address clause and there
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
375
Routing
Configure BGP Neighbors
is a route that matches the IP access list exactly. You can use standard or extended access lists in the
route map to define the default routes. You must click the route-map variable in neighbor
default-originate command that is added to the object and select the route map.
Step 16 You can click ... > Duplicate next to the configure neighbor command to define another neighbor. Define
as many as you require.
Step 17 Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
376
Routing
Configure BGP Route Redistribution from Other Routing Protocols
Procedure
Step 5 Click Show Disabled to expose all commands, then click + to enable the configure ipv4/ipv6 redistribution
command.
Step 6 Click the protocol variable and select the source process from which you are redistributing routes. You can
redistribute connected and static routes, or routes generated by eigrp (IPv4 only), isis, ospf, or rip (IPv4
only).
Step 7 If you select a routing process, click the identifier variable and enter the required value:
• eigrp. Enter the autonomous system number.
• ospf. Enter the process ID number.
• connected, static, isis, rip. Enter none. Even if you enter a different value, it will be ignored.
Step 8 (Optional; IS-IS only.) On the redistribute isis level-2 command, click level-2 and select whether you are
redistributing routes learned only within an IS-IS area (level-1), between IS-IS areas (level-2) or both (level-1-2).
Step 9 (Optional; all protocols.) To fine-tune the metrics for redistributed routes, click + to enable the following
command and configure the options:
redistribute protocol metric metric-value
Click the variable and enter the metric value for the routes being distributed, from 0 to 4294967295.
Step 10 (Optional; all protocols.) To fine-tune which routes are redistributed based on a route map, click + to enable
the redistribute route-map command, click the variable, and select the route map that defines your restrictions.
If you do not apply a route map, all routes for the process (that fit the other commands configured for
redistribution), are redistributed.
Step 11 (Optional; OSPF only.) The following commands are enabled by default when you redistribute routes from
an OSPF process. You can click - to disable unwanted commands.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
377
Routing
Monitoring BGP
These commands specify the criteria by which OSPF routes are redistributed into other routing domains.
• redistribute ospf match external 1. Routes that are external to the autonomous system, but are imported
into OSPF as Type 1 external routes.
• redistribute ospf match external 2. Routes that are external to the autonomous system, but are imported
into OSPF as Type 2 external routes.
• redistribute ospf match internal. Routes that are internal to a specific autonomous system.
• redistribute ospf match nssa-external 1. Routes that are external to the autonomous system, but are
imported into OSPF as Type 1 external routes and marked as Not-So-Stubby-Area (NSSA) only.
• redistribute ospf match nssa-external 2. Routes that are external to the autonomous system, but are
imported into OSPF as Type 2external routes and marked as Not-So-Stubby-Area (NSSA) only.
Step 12 You can click ... > Duplicate next to the configure redistribution command to configure redistribution for
another protocol. Configure redistribution for each protocol that makes sense for your network.
Step 13 Click OK.
Monitoring BGP
To monitor and troubleshoot BGP, open the CLI console or log into the device CLI and use the following
commands. You can also select some of these commands from the Commands menu on the Routing page.
Use show bgp ? to get lists of additional options. For example, you can specify autonomous system number,
and virtual router, to limit the information you see, as well as other options to target just the information you
are looking for. The following list is a summary only.
• show bgp
Displays the entries in the BGP routing table.
• show bgp cidr-only
Displays routes with non-natural network masks (that is, classless interdomain routing, or CIDR).
• show bgp community
Displays routes that belong to specified BGP communities.
• show bgp community-list
Displays routes that are permitted by the BGP community list.
• show bgp filter-list access-list-number
Displays routes that conform to a specified filter list.
• show bgp injected-paths
Displays all the injected paths in the BGP routing table.
• show bgp ipv4 unicast
Displays entries in the IP version 4 (IPv4) BGP routing table for unicast sessions.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
378
Routing
Monitoring BGP
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
379
Routing
Monitoring BGP
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
380
PA R T V
Security Policies
• SSL Decryption, on page 383
• Identity Policies, on page 405
• Security Intelligence, on page 417
• Access Control, on page 423
• Intrusion Policies, on page 463
• Network Address Translation (NAT), on page 473
CHAPTER 17
SSL Decryption
Some protocols, such as HTTPS, use Secure Sockets Layer (SSL) or its follow-on version, Transport Layer
Security (TLS), to encrypt traffic for secure transmissions. Because the system cannot inspect encrypted
connections, you must decrypt them if you want to apply access rules that consider higher-layer traffic
characteristics to make access decisions.
• About SSL Decryption, on page 383
• License Requirements for SSL Decryption, on page 386
• Guidelines for SSL Decryption, on page 387
• How to Implement and Maintain the SSL Decryption Policy, on page 387
• Configuring SSL Decryption Policies, on page 389
• Example: Blocking Older SSL/TLS Versions from the Network, on page 401
• Monitoring and Troubleshooting SSL Decryption, on page 402
Note You must enable the SSL decryption policy in order to implement active authentication rules in the identity
policy. If you enable SSL decryption to enable identity policies, but do not otherwise want to implement SSL
decryption, select Do Not Decrypt for the default action and do not create additional SSL decryption rules.
The identity policy automatically generates whatever rules it needs.
The following topics explain encrypted traffic flow management and decryption in more detail.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
383
Security Policies
Actions You Can Apply to Encrypted Traffic
However, users can also hide undesirable traffic within encrypted connections.
By implementing SSL decryption, you can decrypt connections, inspect them to ensure they do not contain
threats or other undesirable traffic, and then re-encrypt them before allowing the connection to proceed. (The
decrypted traffic goes through your access control policy and matches rules based on inspected characteristics
of the decrypted connection, not on the encrypted characteristics.) This balances your need to apply access
control policies with the user’s need to protect sensitive information.
You can also configure SSL decryption rules to block encrypted traffic of types you know you do not want
on your network.
Keep in mind that decrypting and then re-encrypting traffic adds a processing load on the device, which will
reduce overall system performance.
Note Any traffic that passes through the SSL decryption policy must then pass through the access control policy.
Except for traffic you drop in the SSL decryption policy, the ultimate allow or drop decision rests with the
access control policy.
Decrypt Re-Sign
If you elect to decrypt and re-sign traffic, the system acts as a man-in-the-middle.
For example, the user types in https://www.cisco.com in a browser. The traffic reaches the FTD device, the
device then negotiates with the user using the CA certificate specified in the rule and builds an SSL tunnel
between the user and the FTD device. At the same time the device connects to https://www.cisco.com and
creates an SSL tunnel between the server and the FTD device.
Thus, the user sees the CA certificate configured for the SSL decryption rule instead of the certificate from
www.cisco.com. The user must trust the certificate to complete the connection. The FTD device then performs
decryption/re-encryption in both directions for traffic between the user and destination server.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
384
Security Policies
Decrypt Known Key
Note If the client does not trust the CA used to re-sign the server certificate, it warns the user that the certificate
should not be trusted. To prevent this, import the CA certificate into the client trusted CA store. Alternatively,
if your organization has a private PKI, you can issue an intermediate CA certificate signed by the root CA
which is automatically trusted by all clients in the organization, then upload that CA certificate to the device.
If you configure a rule with the Decrypt Re-Sign action, the rule matches traffic based on the referenced
internal CA certificate’s signature algorithm type, in addition to any configured rule conditions. Because you
can select a single re-sign certificate for the SSL decryption policy, this can limit traffic matching for resign
rules.
For example, outgoing traffic encrypted with an elliptic curve (EC) algorithm matches a Decrypt Re-Sign
rule only if the re-sign certificate is an EC-based CA certificate. Similarly, traffic encrypted with an RSA
algorithm matches Decrypt Re-Sign rules only if the global re-sign certificate is RSA; outgoing traffic encrypted
with an EC algorithm does not match the rule, even if all other configured rule conditions match.
Your organization must be the owner of the domain and certificate. For the example of cisco.com the only
possible way to have the end user see Cisco’s certificate would be if you actually own the domain cisco.com
(i.e. you are Cisco Systems) and have ownership of the cisco.com certificate signed by a public CA. You can
only decrypt with known keys for sites that your organization owns.
The main purpose of decrypting with a known key is to decrypt traffic heading to your HTTPS server to
protect your servers from external attacks. For inspecting client side traffic to external HTTPS sites, you must
use decrypt re-sign as you do not own the servers.
Note To use known key decryption, you must upload the server’s certificate and key as an internal identity certificate,
and then add it to the list of known-key certificates in the SSL decryption policy settings. Then, you can write
the rule for known-key decryption with the server’s address as the destination address. For information on
adding the certificate to the SSL decryption policy, see Configure Certificates for Known Key and Re-Sign
Decryption, on page 398.
Do Not Decrypt
If you elect to bypass decryption for certain types of traffic, no processing is done on the traffic. The encrypted
traffic proceeds to the access control policy, where it is allowed or dropped based on the access control rule
it matches.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
385
Security Policies
Block
Block
You can simply block encrypted traffic that matches an SSL decryption rule. Blocking in the SSL decryption
policy prevents the connection from reaching the access control policy.
When you block an HTTPS connection, the user does not see the system default block response page. Instead,
the user sees the browser’s default page for a secure connection failure. The error message does not indicate
the site was blocked due to policy. Instead, errors might indicate that there are no common encryption
algorithms. It will not be obvious from this message that you blocked the connection on purpose.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
386
Security Policies
Guidelines for SSL Decryption
• When using URL category matching, note that there are cases where the login page for a site is in a
different category than the site itself. For example, Gmail is in the “Web based email” category, whereas
the login page is in the “Internet Portals” category. To get connections to these sites decrypted, you must
include both categories in the rule.
• If a Vulnerability Database (VDB) update removes (deprecates) applications, you must make changes
to any SSL decryption rules or application filters that use the application that was deleted. You cannot
deploy changes until you fix these rules. In addition, you cannot install system software updates before
fixing the issue. On the Application Filters object page, or the Application tab of the rule, these applications
say “(Deprecated)” after the application name.
• You cannot disable the SSL decryption policy if you have any active authentication rules. To disable the
SSL decryption policy, you must either disable the identity policy, or delete any identity rules that use
active authentication.
Procedure
Step 1 If you will implement Decrypt Re-sign rules, create the required internal CA certificate.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
387
Security Policies
How to Implement and Maintain the SSL Decryption Policy
You must use an internal Certificate Authority (CA) certificate. You have the following options. Because
users must trust the certificate, either upload a certificate client browsers are already configured to trust, or
ensure that the certificate you upload is added to the browser trust stores.
• Create a self-signed internal CA certificate, which is signed by the device itself. See Generating Self-Signed
Internal and Internal CA Certificates, on page 148.
• Upload an internal CA certificate and key signed by an external trusted CA or by a CA inside your
organization. See Uploading Internal and Internal CA Certificates, on page 147.
Step 2 If you will implement Decrypt Known Key rules, collect the certificate and key from each of the internal
servers.
You can use Decrypt Known Key only with servers that you control, because you must obtain the certificate
and key from the server. Upload these certificates and keys as internal certificates (not internal CA certificates).
See Uploading Internal and Internal CA Certificates, on page 147.
Step 6 If you configure known key decryption, edit the SSL decryption policy settings to include those certificates.
See Configure Certificates for Known Key and Re-Sign Decryption, on page 398.
Step 7 If necessary, download the CA certificate used for Decrypt Re-sign rules and upload it to the browser on client
workstations.
For information on downloading the certificate and distributing it to clients, see Downloading the CA Certificate
for Decrypt Re-Sign Rules, on page 399.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
388
Security Policies
Configuring SSL Decryption Policies
Upload all certificates within a root CA’s chain of trust to the list of trusted CA certificates, including the root
CA certificate and all intermediate CA certificates. Otherwise, it is more difficult to detect trusted certificates
issued by intermediate CAs. Upload certificates on the Objects > Certificates page. See Uploading Trusted
CA Certificates, on page 149.
Note VPN tunnels are decrypted before the SSL decryption policy is evaluated, so the policy never applies to the
tunnel itself. However, any encrypted connections within the tunnel are subject to evaluation by the SSL
decryption policy.
The following procedure explains how to configure the SSL decryption policy. For an explanation of the
end-to-end process of creating and managing SSL decryption, see How to Implement and Maintain the SSL
Decryption Policy, on page 387.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
389
Security Policies
Enable the SSL Decryption Policy
After you configure SSL decryption settings, this page lists all rules in order. Rules are matched against traffic
from top to bottom with the first match determining the action to apply. You can do the following from this
page:
• To disable the policy, click the SSL Decryption Policy toggle. You can re-enable it by clicking Enable
SSL Decryption.
• To edit policy settings, including the list of certificates used in the policy, click the SSL Decryption
Settings button ( ). You can also download the certificate used with decrypt re-sign rules so that you
can distribute it to clients. See the following topics:
• Configure Certificates for Known Key and Re-Sign Decryption, on page 398
• Downloading the CA Certificate for Decrypt Re-Sign Rules, on page 399
• To configure rules:
• To create a new rule, click the + button. See Configure SSL Decryption Rules, on page 392.
• To edit an existing rule, click the edit icon ( ) for the rule (in the Actions column). You can also
selectively edit a rule property by clicking on the property in the table.
• To delete a rule you no longer need, click the delete icon ( ) for the rule (in the Actions column).
• To move a rule, edit it and select the new location from the Order drop-down list.
• If any rules have problems, for example, because of removed or changed URL categories, click the See
Problem Rules link next to the search box to filter the table to show only those rules. Please edit and
correct (or delete) these rules, so that they will provide the service that you require.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
390
Security Policies
Configure the Default SSL Decryption Action
• If you have already configured the policy once and then disabled it, the policy is simply enabled again
with your previous settings and rules. You can click the SSL Decryption Settings button ( ) and
configure settings as described in Configure Certificates for Known Key and Re-Sign Decryption, on
page 398.
Step 3 In Decrypt Re-Sign Certificate, select the internal CA certificate to use for rules that implement decryption
with re-signed certificates.
You can use the pre-defined NGFW-Default-InternalCA certificate, or one that you created or uploaded. If
the certificate does not yet exist, click Create Internal CA to create it.
If you have not already installed the certificate in client browsers, click the download button ( ) to obtain a
copy. See the documentation for each browser for information on how to install the certificate. Also see
Downloading the CA Certificate for Decrypt Re-Sign Rules, on page 399.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
391
Security Policies
Configure SSL Decryption Rules
click Create New Syslog Server and create it. (To disable logging to a syslog server, select Any
from the server list.)
Because event storage on the device is limited, sending events to an external syslog server can
provide more long term storage and enhance your event analysis.
Note Traffic for your VPN connections (both site-to-site and remote access) is decrypted before the SSL decryption
policy evaluates connections. Thus, SSL decryption rules are never applied to VPN connections, and you do
not need to consider VPN connections when creating these rules. However, any use of encrypted connections
within a VPN tunnel are evaluated. For example, an HTTPS connection to an internal server through an RA
VPN connection is evaluated by SSL decryption rules, even though the RA VPN tunnel itself is not (because
it is decrypted already).
Procedure
To delete a rule you no longer need, click the delete icon ( ) for the rule.
Step 3 In Order, select where you want to insert the rule in the ordered list of rules.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
392
Security Policies
Configure SSL Decryption Rules
You can insert rules into the SSL Native Rules section only. The Identity Policy Active Authentication Rules
are automatically generated from your identity policy and are read-only.
Rules are applied on a first-match basis, so you must ensure that rules with highly specific traffic matching
criteria appear above policies that have more general criteria that would otherwise apply to the matching
traffic.
The default is to add the rule to the end of the list. If you want to change a rule's location later, edit this option.
Step 6 Define the traffic matching criteria using any combination of the following tabs:
• Source/Destination—The security zones (interfaces) through which the traffic passes, the IP addresses
or the country or continent (geographical location) for the IP address, or the TCP ports used in the traffic.
The default is any zone, address, geographical location, and TCP port. See Source/Destination Criteria
for SSL Decryption Rules, on page 394.
• Application—The application, or a filter that defines applications by type, category, tag, risk, or business
relevance. The default is any encrypted application. See Application Criteria for SSL Decryption Rules,
on page 395.
• URL—The URL category of a web request. The default is that the URL category and reputation are not
considered for matching purposes. See URL Criteria for SSL Decryption Rules, on page 396.
• Users—The identity source, user or user group. Your identity policies determine whether user and group
information is available for traffic matching. You must configure identity policies to use this criteria.
See User Criteria for SSL Decryption Rules, on page 397.
• Advanced—The characteristics derived from the certificates used in the connection, such as SSL/TLS
version and certificate status. See Advanced Criteria for SSL Decryption Rules, on page 398.
To modify a condition, you click the + button within that condition, select the desired object or element, and
click OK in the popup dialog box. If the criterion requires an object, you can click Create New Object if the
object you require does not exist. Click the x for an object or element to remove it from the policy.
When adding conditions to SSL decryption rules, consider the following tips:
• You can configure multiple conditions per rule. Traffic must match all the conditions in the rule for the
rule to apply to traffic. For example, you can use a single rule to decrypt traffic based on URL category.
• For each condition in a rule, you can add up to 50 criteria. Traffic that matches any of a condition's criteria
satisfies the condition. For example, you can use a single rule to apply application control for up to 50
applications or application filters. Thus, there is an OR relationship among the items in a single condition,
but an AND relationship between condition types (for example, between source/destination and
application).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
393
Security Policies
Source/Destination Criteria for SSL Decryption Rules
Use this criteria when the rule should apply based on where the traffic enters or exits the device. For
example, if you want to ensure that all traffic going from outside hosts to inside hosts gets decrypted,
you would select your outside zone as the Source Zones and your inside zone as the Destination Zones.
Source Networks, Destination Networks
The network objects or geographical locations that define the network addresses or locations of the traffic.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
394
Security Policies
Application Criteria for SSL Decryption Rules
• To match traffic from an IP address or geographical location, configure the Source Networks.
• To match traffic to an IP address or geographical location, configure the Destination Networks.
• If you add both source and destination network conditions to a rule, matching traffic must originate
from one of the specified IP addresses and be destined for one of the destination IP addresses.
When you add this criteria, you select from the following tabs:
• Network—Select the network objects or groups that define the source or destination IP addresses
for the traffic you want to control.
Note For Decrypt Known-Key rules, select an object with the IP address of the
destination server that uses the certificate and key you uploaded.
• Geolocation—Select the geographical location to control traffic based on its source or destination
country or continent. Selecting a continent selects all countries within the continent. Besides selecting
geographical location directly in the rule, you can also select a geolocation object that you created
to define the location. Using geographical location, you could easily restrict access to a particular
country without needing to know all of the potential IP addresses used there.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
395
Security Policies
URL Criteria for SSL Decryption Rules
box. On either tab, you can click Advanced Filter to select filter criteria or to help you search for specific
applications. Click the x for an application, filter, or object to remove it from the policy. Click the Save As
Filter link to save the combined criteria that is not already an object as a new application filter object.
For more information about the application criteria and how to configure advanced filters and select applications,
see Configuring Application Filter Objects, on page 136.
Consider the following tips when using application criteria in SSL decryption rules.
• The system can identify unencrypted applications that become encrypted using StartTLS. This includes
such applications as SMTPS, POPS, FTPS, TelnetS, and IMAPS. In addition, it can identify certain
encrypted applications based on the Server Name Indication in the TLS ClientHello message, or the
server certificate subject distinguished name value.
• The system can identify the application only after the server certificate exchange. If traffic exchanged
during the SSL handshake matches all other conditions in an SSL rule containing an application condition
but the identification is not complete, the SSL policy allows the packet to pass. This behavior allows the
handshake to complete so that applications can be identified. After the system completes its identification,
the system applies the SSL rule action to the remaining session traffic that matches its application
condition.
• If a selected application was removed by a VDB update, “(Deprecated)” appears after the application
name. You must remove these applications from the filter, or subsequent deployments and system software
upgrades will be blocked.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
396
Security Policies
User Criteria for SSL Decryption Rules
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
397
Security Policies
Advanced Criteria for SSL Decryption Rules
Self-Signed
Whether the server certificate contains the same subject and issuer distinguished name. Select one
of the following:
• Self-Signing—The server certificate is self-signed.
• CA-Signing—The server certificate is signed by a Certificate Authority. That is, the issuer
and subject are not the same.
• Any—Do not consider whether the certificate is self-signed as a match criteria.
Supported Version
The SSL/TLS version to match. The rule applies to traffic that uses the any of the selected versions only.
The default is all versions. Select from: SSLv3.0, TLSv1.0, TLSv1.1, TLSv1.2.
For example, if you wanted to permit TLSv1.2 connections only, you could create a block rule for the
non-TLSv1.2 versions.
Traffic that uses any version not listed, such as SSL v2.0, is handled by the default action for the SSL
decryption policy.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
398
Security Policies
Downloading the CA Certificate for Decrypt Re-Sign Rules
Upload a new internal certificate and key whenever you change the certificate or key on the destination server
in a known key rule. Upload them as an internal certificate (not an internal CA certificate). You can upload
the certificate during the following procedure, or go to the Objects > Certificates page and upload it there.
Procedure
If you have not already installed the certificate in client browsers, click the download button ( ) to obtain a
copy. See the documentation for each browser for information on how to install the certificate. Also see
Downloading the CA Certificate for Decrypt Re-Sign Rules, on page 399.
Step 4 For each rule that decrypts using a known key, upload the internal certificate and key for the destination server.
a) Click + under Decrypt Known-Key Certificates.
b) Select the internal identity certificate, or click Create New Internal Certificate to upload it now.
c) Click OK.
Step 5 Click Save.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
399
Security Policies
Downloading the CA Certificate for Decrypt Re-Sign Rules
Note The user needs to accept and trust the CA certificate that created the replacement certificate. If they
instead simply trust the replacement server certificate, they will continue to see warnings for each different
HTTPS site that they visit.
Procedure
Step 2 Install the certificate in the Trusted Root Certificate Authority storage area in web browsers on client systems,
or make it available for clients to install themselves.
The process differs depending on the operating system and type of browser. For example, you can use the
following process for Internet Explorer and Chrome running on Windows. (For Firefox, install through the
Tools > Options > Advanced page.)
a) From the Start menu, select Control Panel > Internet Options.
b) Select the Content tab.
c) Click the Certificates button to open the Certificates dialog box.
d) Select the Trusted Root Certificate Authorities tab.
e) Click Import, and follow the wizard to locate and select the downloaded file (<uuid>_internalCA.crt)
and add it to the Trusted Root Certificate Authorities store.
f) Click Finish.
Messages should indicate that the import was successful. You might see an intermediate dialog box
warning you that Windows could not validate the certificate if you generated a self-signed certificate
rather than obtaining one from a well-known third-party Certificate Authority.
You can now close out the Certificate and Internet Options dialog boxes.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
400
Security Policies
Example: Blocking Older SSL/TLS Versions from the Network
Procedure
Step 4 In Title, enter a name for the rule, for example, Block_SSL3.0_and_TLS1.0.
Step 5 In Action, select Block. This will immediately drop any traffic that matches the rule.
Step 6 Leave the default values for all options on the following tabs: Source/Destination, Applications, URLs,
Users.
Step 7 Click the Advanced tab and under Supported Versions, leave SSL3.0 and TLS1.0 selected, but uncheck
TLS1.1 and TLS1.2.
The policy should look like the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
401
Security Policies
Monitoring and Troubleshooting SSL Decryption
Step 8 (Optional) Click the Logging tab and select At End of Connection if you want to dashboards and events to
reflect blocked connections. You can also select an external syslog server if you are using one.
Step 9 Click OK.
You can now deploy the policy. Once deployed, any SSL 3.0 or TLS 1.0 connection that goes through the
system will be dropped.
Note SSL 2.0 connections are handled by the default action for the policy. If you want to ensure these
are also dropped, change the default action to Block.
What to do next
If you implement this rule, we have the following recommendations:
• For any type of decrypt rule, leave the default settings on the Advanced tab, where all SSL/TLS options
are selected. By applying to all versions, the handshake process is simplified. However, your initial block
rule will still prevent SSL 3.0 and TLS 1.0 connections.
• We normally recommend that you use Do Not Decrypt as the default action for the policy. However,
because SSL 2.0 connections are always handled by the default action, you might want to use Block
instead. However, if you want to apply Do Not Decrypt as the default action for all decryptable traffic,
create a Do Not Decrypt rule at the end of the policy where you accept all default values for traffic
matching criteria. This rule would match any supported TLS connection that does not match an earlier
rule in the table, and act as the default for those TLS versions.
Events
In addition to the dashboard, the event viewer (Monitoring > Events) includes SSL information for encrypted
traffic. Following are some tips in evaluating events:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
402
Security Policies
Handling Web Sites Where Decrypt Re-sign Works for a Browser but not an App (SSL or Certificate Authority Pinning)
• For connections that were dropped because they matched an SSL rule (or default action) that blocked
matching traffic, the Action should be “Block,” and the Reason should indicate “SSL Block.”
• The SSL Actual Action field indicates the actual action that the system applied to the connection. This
can differ from the SSL Expected Action, which indicates the action defined on the matching rule. For
example, a connection might match a rule that applies decryption, but could not be decrypted for some
reason.
Handling Web Sites Where Decrypt Re-sign Works for a Browser but not an
App (SSL or Certificate Authority Pinning)
Some apps for smart phones and other devices use a technique called SSL (or Certificate Authority) pinning.
The SSL pinning technique embeds the hash of the original server certificate inside the app itself. As a result,
when the app receives the resigned certificate from the Firepower Threat Defense device, the hash validation
fails and the connection is aborted.
The primary symptom is that users cannot connect to the web site using the site’s app, but they can connect
using the web browser, even when using the browser on the same device where the app fails. For example,
users cannot use the Facebook iOS or Android app, but they can point Safari or Chrome at
https://www.facebook.com and make a successful connection.
Because SSL pinning is specifically used to avoid man-in-the-middle attacks, there is no workaround. You
must choose between the following options:
• Support app users, in which case you cannot decrypt any traffic to the site. Create a Do Not Decrypt rule
for the site’s application (on the Application tab for the SSL Decryption rule) and ensure that the rule
comes before any Decrypt Re-sign rule that would apply to the connections.
• Force users to use browsers only. If you must decrypt traffic to the site, you will need to inform users
that they cannot use the site’s app when connecting through your network, that they must use their
browsers only.
More Details
If a site works in a browser but not in an app on the same device, you are almost certainly looking at an
instance of SSL pinning. However, if you want to delve deeper, you can use connection events to identify
SSL pinning in addition to the browser test.
There are two ways an app might deal with hash validation failures:
• Group 1 apps, such as Facebook, send an SSL ALERT Message as soon as it receives the SH, CERT,
SHD message from the server. The Alert is usually an “Unknown CA (48)” alert indicating SSL Pinning.
A TCP Reset is sent following the Alert message. You should see the following symptoms in the event
details:
• SSL Flow Flags include ALERT_SEEN.
• SSL Flow Flags do not include APP_DATA_C2S or APP_DATA_S2C.
• SSL Flow Messages typically are: CLIENT_HELLO, SERVER_HELLO, SERVER_CERTIFICATE,
SERVER_KEY_EXCHANGE, SERVER_HELLO_DONE.
• Group 2 apps, such as Dropbox, do not send any alerts. Instead they wait until the handshake is done
and then send a TCP Reset. You should see the following symptoms in the event:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
403
Security Policies
Handling Web Sites Where Decrypt Re-sign Works for a Browser but not an App (SSL or Certificate Authority Pinning)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
404
CHAPTER 18
Identity Policies
You can use identity policies to collect user identity information from connections. You can then view usage
based on user identity in the dashboards, and configure access control based on user or user group.
• Identity Policy Overview, on page 405
• How to Implement the Identity Policy, on page 407
• Configuring Identity Policies, on page 408
• Enabling Transparent User Authentication, on page 413
• Monitoring Identity Policies, on page 416
• Examples for Identity Policies, on page 416
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
405
Security Policies
Establishing User Identity through Active Authentication
You can passively obtain user-to-IP address mappings from the following sources:
• Remote access VPN logins. The following user types are supported for passive identity:
• User accounts defined in an external authentication server.
• Local user accounts that are defined in Firepower Device Manager.
• Cisco Identity Services Engine (ISE); Cisco Identity Services Engine Passive Identity Connector (ISE
PIC).
If a given user is identified through more than one source, the RA VPN identity takes precedence.
Note You can check whether new or deleted user information is on the system by going to Policies > Access
Control, clicking the Add Rule (+) button, and looking at the list of users on the Users tab. If you cannot
find a new user, or you can find a deleted user, then the system has old information.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
406
Security Policies
How to Implement the Identity Policy
Procedure
Step 2 If you want to use passive authentication identity rules, configure the passive identity sources.
You can configure any of the following, based on the services you are implementing in the device and the
services available to you in your network.
• Remote access VPN—If you intend to support remote access VPN connections to the device, user logins
can provide the identity based on the AD server or on local users (those defined within Firepower Device
Manager). For information on configuring RA VPN, see Configuring Remote Access VPN, on page 606.
• Cisco Identity Services Engine (ISE) or Cisco Identity Services Engine Passive Identity Connector (ISE
PIC)—If you use these products, you can configure the device as a pxGrid subscriber, and obtain user
identity from ISE. See Configure Identity Services Engine, on page 162.
Step 3 Choose Policies > Identity, and enable the identity policy. See Configuring Identity Policies, on page 408.
Step 4 Configure Identity Policy Settings, on page 408.
The passive identity sources are automatically selected based on the sources you configured in the system. If
you want to configure active authentication, you must configure the certificates for captive portal and SSL
re-sign decryption (if you have not already enabled the SSL Decryption policy).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
407
Security Policies
Configuring Identity Policies
Procedure
• To change the identity policy settings, click the Identity Policy Configuration button ( ).
• To change the Default Action, click the action and select the desired action. See Configure the Identity
Policy Default Action, on page 410.
• To move a rule, edit it and select the new location from the Order drop-down list.
• To configure rules:
• To create a new rule, click the + button.
• To edit an existing rule, click the edit icon ( ) for the rule (in the Actions column). You can also
selectively edit a rule property by clicking on the property in the table.
• To delete a rule you no longer need, click the delete icon ( ) for the rule (in the Actions column).
For more information on creating and editing identity rules, see Configure Identity Rules, on page 410.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
408
Security Policies
Configure Identity Policy Settings
Procedure
Step 5 (Active authentication only.) In Decrypt Re-Sign Certificate, select the internal CA certificate to use for
rules that implement decryption with re-signed certificates.
You can use the pre-defined NGFW-Default-InternalCA certificate, or one that you created or uploaded. If
the certificate does not yet exist, click Create Internal CA to create it.
If you have not already installed the certificate in client browsers, click the download button ( ) to obtain a
copy. See the documentation for each browser for information on how to install the certificate. Also see
Downloading the CA Certificate for Decrypt Re-Sign Rules, on page 399.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
409
Security Policies
Configure the Identity Policy Default Action
Note You are prompted for SSL Decryption settings only if you have not already configured the SSL
decryption policy. To change these settings after enabling the identity policy, edit the SSL decryption
policy settings.
Procedure
Note Also keep in mind that a failure to authentication has no impact on network access. Identity policies collect
user identity information only. You must use access rules if you want to prevent users who failed to authenticate
from accessing the network.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
410
Security Policies
Configure Identity Rules
To delete a rule you no longer need, click the delete icon ( ) for the rule.
Step 3 In Order, select where you want to insert the rule in the ordered list of rules.
Rules are applied on a first-match basis, so you must ensure that rules with highly specific traffic matching
criteria appear above policies that have more general criteria that would otherwise apply to the matching
traffic.
The default is to add the rule to the end of the list. If you want to change a rule's location later, edit this option.
Step 6 (Active Authentication only.) Select the authentication method (Type) supported by your directory server.
• HTTP Basic—Authenticate users using an unencrypted HTTP Basic Authentication (BA) connection.
Users log in to the network using their browser's default authentication popup window. This is the default.
• NTLM—Authenticate users using an NT LAN Manager (NTLM) connection. This selection is only
available when you select an AD realm. Users log in to the network using their browser's default
authentication popup window, although you can configure IE and Firefox browsers to transparently
authenticate using their Windows domain login (see Enabling Transparent User Authentication, on page
413).
• HTTP Negotiate—Allow the device to negotiate the method between the user agent (the application
the user is using to initiate the traffic flow) and the Active Directory server. Negotiation results in the
strongest commonly supported method being used, in order, NTLM, then basic. Users log in to the
network using their browser's default authentication popup window.
• HTTP Response Page—Prompt users to authenticate using a system-provided web page. This is a form
of HTTP Basic authentication.
Note For the HTTP Basic, HTTP Response Page, and NTLM authentication methods, the user is redirected
to the captive portal using the IP address of the interface. However, for HTTP Negotiate, the user
is redirected using the fully-qualified DNS name firewall-hostname.AD-domain-name. If you want
to use HTTP Negotiate, you must also update your DNS server to map this name to the IP addresses
of all inside interfaces where you are requiring active authentication. Otherwise, the redirection
cannot complete, and users cannot authenticate.
Step 7 (Active authentication only.) Select Fall Back as Guest > On/Off to determine whether users who fail active
authentication are labeled as Guest users.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
411
Security Policies
Configure Identity Rules
Users get 3 chances to successfully authenticate. If they fail, your selection for this option determines how
the user is marked. You can write access rules based on these values.
• Fall Back as Guest > On—Users are marked as Guest.
• Fall Back as Guest > Off—Users are marked as Failed Authentication.
Use this criteria when the rule should apply based on where the traffic enters or exits the device. For example,
if you want to ensure that user identity is collected from all traffic originating from inside networks, select an
inside zone as the Source Zones while leaving the destination zone empty.
Note You cannot mix passive and routed security zones in a single rule. In addition, you can specify
passive security zones as source zones only, you cannot specify them as destination zones.
When you add this criteria, you select from the following tabs:
• Network—Select the network objects or groups that define the source or destination IP addresses for
the traffic you want to control.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
412
Security Policies
Enabling Transparent User Authentication
• Geolocation—Select the geographical location to control traffic based on its source or destination country
or continent. Selecting a continent selects all countries within the continent. Besides selecting geographical
location directly in the rule, you can also select a geolocation object that you created to define the location.
Using geographical location, you could easily restrict access to a particular country without needing to
know all of the potential IP addresses used there.
Note To ensure you are using up-to-date geographical location data to filter your traffic, Cisco
strongly recommends that you regularly update the geolocation database (GeoDB).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
413
Security Policies
Requirements for Transparent Authentication
Note that HTTP Negotiate picks the strongest method supported by both the Active directory server and
the user agent. If negotiation selects HTTP Basic as the authentication method, you will not get transparent
authentication. The order of strength is NTLM, then basic. Negotiation must select NTLM for transparent
authentication to be possible.
You must configure client browsers to support integrated Windows authentication to enable transparent
authentication. The following sections explain the general requirements and basic configuration of integrated
Windows authentication for some commonly used browsers that support it. Users should consult the help for
their browser (or other user agent) for more detailed information, because the techniques can change between
software releases.
Tip Not all browsers support integrated Windows authentication, such as Chrome and Safari (based on the versions
available when this was written). Users will be prompted for username and password. Consult the browser’s
documentation to determine if support is available in the version you use.
Tip Configuring transparent authentication is not a requirement, but a convenience to end users. If you do not
configure transparent authentication, users are presented with a login challenge for all authentication methods.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
414
Security Policies
Configuring Firefox for Transparent Authentication
Procedure
c) Click Advanced to open the Local Intranet Sites dialog box, then paste the URL you want to trust into
the Add Site box and click Add.
Repeat the process if you have more than one URL. Use wildcards to specify a partial URL, such as
http://*.example.com or simply *.example.com.
Close the dialog boxes to return to the Internet Options dialog box.
d) With Local Intranet still selected, click Custom Level to open the Security Settings dialog box. Find
the User Authentication > Logon setting and select Automatic logon only in Intranet zone. Click OK.
Step 3 In the Internet Options dialog box, click the Connections tab, then click LAN Settings.
If Use a proxy server for your LAN is selected, you need to ensure that the Firepower Threat Defense
interface bypasses the proxy. Do any of the following as appropriate:
• Select Bypass proxy server for local addresses.
• Click Advanced and enter the address into the Do not use proxy server for addresses beginning with
box. You can use wildcards, for example, *.example.com.
Procedure
Step 1 Open about:config. Use the filter bar to help you locate the preferences that you need to modify.
Step 2 To support NTLM, modify the following preferences (filter on network.automatic):
• network.automatic-ntlm-auth.trusted-uris—Double-click the preference, enter the URL, and click
OK. You can enter multiple URLs by separating them with commas; including the protocol is optional.
For example:
You can also use partial URLs. Firefox matches the end of the string, not a random substring. Thus, you
could include your entire internal network by specifying just your domain name. For example:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
415
Security Policies
Monitoring Identity Policies
example.com
Step 3 Check the HTTP proxy settings. You can find these by selecting Tools > Options, then click the Network
tab in the Options dialog box. Click the Settings button in the Connection group.
• If No Proxy is selected, there is nothing to configure.
• If Use System Proxy Settings is selected, you need to modify the network.proxy.no_proxies_on
property in about:config to add the trusted URIs you included in
network.automatic-ntlm-auth.trusted-uris.
• If Manual Proxy Configuration is selected, update the No Proxy For list to include these trusted URIs.
• If one of the other options is selected, ensure that the properties used for those configurations exclude
the same trusted URIs.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
416
CHAPTER 19
Security Intelligence
The Security Intelligence policy gives you an early opportunity to drop unwanted traffic based on
source/destination IP address or destination URL. The following topics explain how to implement Security
Intelligence.
• About Security Intelligence, on page 417
• License Requirements for Security Intelligence, on page 419
• Configuring Security Intelligence, on page 419
• Monitoring Security Intelligence, on page 420
• Examples for Security Intelligence, on page 421
Note Talos feeds are updated by default every hour. You can change the update
frequency, and even update the feeds on demand, from the Device > Updates
page.
• Network and URL objects—If you know of specific IP addresses or URLs you want to block, you can
create objects for them and add them to the blocked list or the exception list. Note that you cannot use
network objects with FQDN or range specifications.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
417
Security Policies
Making Exceptions to the Block Lists
Note If an HTTP/HTTPS request is to a URL that uses an IP address instead of a hostname, the system looks up
the IP address reputation in the network address lists. You do not need to duplicate IP addresses in the network
and URL lists.
Banking_fraud Sites that engage in fraudulent activities that relate to electronic banking
Cryptomining Hosts providing remote access to pools and wallets for the purpose of mining
cryptocurrency
Dga Malware algorithms used to generate a large number of domain names acting as
rendezvous points with their command-and-control servers
High_risk Domains and hostnames that match against the OpenDNS predictive security
algorithms from security graph
Ioc Hosts that have been observed to engage in Indicators of Compromise (IOC)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
418
Security Policies
License Requirements for Security Intelligence
Malicious Sites exhibiting malicious behavior that do not necessarily fit into another, more
granular, threat category
Newly_seen Domains that have recently been registered, or not yet seen via telemetry
Open_relay Open mail relays that are known to be used for spam
Response IP addresses and URLs that are actively participating in malicious or suspicious
activity
Spyware Sites that are known to contain, serve, or support spyware and adware activities
Suspicious Files that appear to be suspicious and have characteristics that resemble known
malware
Tor_exit_node Hosts known to offer exit node services for the Tor Anonymizer network
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
419
Security Policies
Monitoring Security Intelligence
c) In the do not block list, click + and select any exceptions to the block list.
The only reason to configure this list is to make exceptions for IP addresses or URLs that are in the block
list. Exempted connections are subsequently evaluated by your access control policy, and might be dropped
anyway.
d) Repeat the process to configure the other block list.
Step 4 (Optional.) Click the Edit Logging Settings button ( ) to configure logging.
If you enable logging, any matches to block list entries are logged. Matches to exception entries are not logged,
although you get log messages if exempted connections match access control rules with logging enabled.
Configure the following settings:
• Connection Events Logging—Click the toggle to enable or disable logging.
• Syslog—If you want to send a copy of the events to an external syslog server, select this option and select
the server object that defines the syslog server. If the required object does not already exist, click Add
Syslog Server and create it.
Because event storage on the device is limited, sending events to an external syslog server can provide
more long term storage and enhance your event analysis.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
420
Security Policies
Examples for Security Intelligence
• The Reason field in a connection event explains why the action shown in the event was applied. For
example, a Block action paired with reasons such as IP Block or URL Block indicates that a connection
was dropped by Security Intelligence.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
421
Security Policies
Examples for Security Intelligence
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
422
CHAPTER 20
Access Control
The following topics explain access control rules. These rules control which traffic is allowed to pass through
the device, and apply advanced services to the traffic, such as intrusion inspection.
• Access Control Overview, on page 423
• License Requirements for Access Control, on page 431
• Guidelines and Limitations for Access Control Policies, on page 432
• Configuring the Access Control Policy, on page 434
• Monitoring Access Control Policies, on page 444
• Examples for Access Control, on page 446
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
423
Security Policies
Application Filtering
For unencrypted traffic that you allow, you can apply IPS inspection to check for threats and block traffic that
appears to be an attack. You can also use file policies to check for prohibited files or malware.
Any traffic that does not match an access rule is handled by the access control Default Action. If you allow
traffic by default, you can apply intrusion inspection to the traffic. However, you cannot perform file or
malware inspection on traffic handled by the default action.
Application Filtering
You can use access control rules to filter traffic based on the application used in the connection. The system
can recognize a wide variety of applications, so that you do not need to figure out how to block one web
application without blocking all web applications.
For some popular applications, you can filter on different aspects of the application. For example, you could
create a rule that blocks Facebook Games without blocking all of Facebook.
You can also create rules based on general application characteristics, blocking or allowing entire groups of
applications by selecting risk or business relevance, type, category, or tag. However, as you select categories
in an application filter, look over the list of matching applications to ensure you are not including
unintended applications. For a detailed explanation of the possible groupings, see Application Criteria, on
page 438.
Filtering on Common Industrial Protocol (CIP) and Modbus Applications (ISA 3000)
You can enable the Common Industrial Protocl (CIP) and Modbus pre-processors on Cisco ISA 3000 devices,
and filter on CIP and Modbus applications in access control rules. All CIP application names start with “CIP,”
such as CIP Write. There is only one application for Modbus.
To enable the pre-processors, you must go into expert mode in a CLI session (SSH or Console) and issue the
following command to enable one or both of these Supervisory Control and Data Acquisition (SCADA)
applications.
sudo /usr/local/sf/bin/enable_scada.sh {cip | modbus | both}
For example, to enable both pre-processors:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
424
Security Policies
Best Practices for Application Filtering
> expert
admin@firepower:~$ sudo /usr/local/sf/bin/enable_scada.sh both
Note You must issue this command after every deployment. These pre-processors are disabled during deployment.
URL Filtering
You can use access control rules to filter traffic based on the URL used in an HTTP or HTTPS connection.
Note that URL filtering for HTTP is more straight-forward than it is for HTTPS, because HTTPS is encrypted.
You can use the following techniques to implement URL filtering.
• Category and reputation-based URL filtering—With a URL Filtering license, you can control access to
web sites based on the URL’s general classification (category) and risk level (reputation). This is by far
the easiest and most effective way to block unwanted sites.
• Manual URL filtering—With any license, you can manually specify individual URLs, and groups of
URLs, to achieve granular, custom control over web traffic. The main purpose of manual filtering is to
create exceptions to category-based block rules, but you can use manual rules for other purposes.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
425
Security Policies
Looking Up the Category and Reputation for a URL
URL categories and reputations help you quickly configure URL filtering. For example, you can use access
control to block untrusted URLs in the Illegal Drugs category.
For a description of the categories, see https://www.talosintelligence.com/categories.
Using category and reputation data also simplifies policy creation and administration. Sites that represent
security threats, or that serve undesirable content, might appear and disappear faster than you can update and
deploy new policies. As Cisco updates the URL database with new sites, changed classifications, and changed
reputations, your rules automatically adjust to the new information. You do not need to edit your rules to
account for new sites.
If you enable regular URL database updates, you can ensure that the system uses up-to-date information for
URL filtering. You can also enable communications with Cisco Collective Security Intelligence (CSI) to
obtain the latest threat intelligence for URLs with unknown category and reputation. For more information,
see Configuring URL Filtering Preferences, on page 694.
Note To see URL category and reputation information in events and application details, you must create at least
one rule with a URL condition.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
426
Security Policies
Filtering HTTPS Traffic
• The system disregards the encryption protocol (HTTP vs HTTPS). In other words, if you block a website,
both HTTP and HTTPS traffic to that website is blocked, unless you use an application condition to
target a specific protocol. When creating a URL object, you do not need to specify the protocol when
creating an object. For example, use example.com rather than http://example.com.
• If you plan to use a URL object to match HTTPS traffic in an access control rule, create the object using
the subject common name in the public key certificate used to encrypt the traffic. Also, the system
disregards subdomains within the subject common name, so do not include subdomain information. For
example, use example.com rather than www.example.com.
However, please understand that the subject common name in the certificate might be completely unrelated
to a web site’s domain name. For example, the subject common name in the certificate for youtube.com
is *.google.com (this of course might change at any time). You will get more consistent results if you
use the SSL Decryption policy to decrypt HTTPS traffic so that URL filtering rules work on decrypted
traffic.
Note URL objects will not match HTTPS traffic if the browser resumes a TLS session
because the certificate information is no longer available. Thus, even if you
carefully configure the URL object, you might get inconsistent results for HTTPS
connections.
Note URL objects will not match HTTPS traffic if the browser resumes a TLS session because the certificate
information is no longer available. Thus, even if you carefully configure the URL object, you might get
inconsistent results for HTTPS connections.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
427
Security Policies
Comparing URL and Application Filtering
To configure a rule that matches only HTTP or HTTPS traffic, but not both, either specify the TCP port in
the Destination condition or add an application condition to the rule. For example, you could allow HTTPS
access to a site while disallowing HTTP access by constructing two access control rules, each with an TCP
port or application, and URL, condition.
The first rule allows HTTPS traffic to the website:
Action: Allow
TCP port or Application: HTTPS (TCP port 443)
URL: example.com
The second rule blocks HTTP access to the same website:
Action: Block
TCP port or Application: HTTP (TCP port 80)
URL: example.com
Because combining application and URL criteria can lead to unexpected results, especially for encrypted
traffic, it is a good policy to create separate rules for URL and application criteria. If you do need to combine
application and URL criteria in a single rule, you should place these rules after straight-forward application-only
or URL-only rules, unless the application+URL rule is acting as an exception to a more general application-only
or URL-only rule. Because URL filtering block rules are more broad than application filtering, you should
place them above application-only rules.
If you do combine application and URL criteria, you might need to monitor your network more carefully to
ensure that you are not allowing access to unwanted sites and applications.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
428
Security Policies
What the User Sees When You Block Web Sites
• When using URL category matching, note that there are cases where the login page for a site is in a
different category than the site itself. For example, Gmail is in the Web-based Email category, whereas
the login page is in the Search Engines and Portals category. If you have different rules with different
actions for the categories, you might get unintended results.
• Use URL objects to target entire web sites and to make exceptions to category blocking rules. That is,
to allow specific sites that would otherwise get blocked in a category rule.
• If you want to manually block a web server (using a URL object), it is much more effective to do so in
the Security Intelligence policy. The Security Intelligence policy drops connections before the access
control rules are evaluated, so you get a faster, more efficient, block.
• For the most effective filtering of HTTPS connections, implement SSL decryption rules to decrypt traffic
for which you are writing an access control rule. Any decrypted HTTPS connections are filtered as HTTP
connections in the access control policy, so you avoid all of the limitations for HTTPS filtering.
• Place URL blocking rules before any application filtering rules, because URL filtering blocks entire web
servers, whereas application filtering targets specific application usage regardless of the web server.
• If you want to block high risk sites whose category is unknown, select the Uncategorized category and
adjust the reputation slider to Questionable or Untrusted.
In addition, web sites might be blocked by other access control rules that are not explicitly URL filtering rules,
or even by the default action. For example, if you block entire networks or geolocations, any web sites on
that network or in that geographic location are also blocked. Users blocked by these rules may, or may not,
get a response page as described in the limitations below.
If you implement URL filtering, consider explaining to end users what they might see when a site is intentionally
blocked, and what types of site you are blocking. Otherwise, they might spend a good deal of time
troubleshooting blocked connections.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
429
Security Policies
Intrusion, File, and Malware Inspection
• The system does not display a response page for encrypted connections blocked by access control rules.
All other traffic handling occurs before network traffic is examined for intrusions, prohibited files, and malware.
By associating an intrusion or file policy with an access control rule, you are telling the system that before it
passes traffic that matches the access control rule's conditions, you first want to inspect the traffic with an
intrusion policy, a file policy, or both.
You can configure intrusion and file policies on rules that allow traffic only. Inspection is not performed on
rules set to trust or block traffic. In addition, if the default action for the access control policy is allow, you
can configure an intrusion policy but not a file policy.
For any single connection handled by an access control rule, file inspection occurs before intrusion inspection.
That is, the system does not inspect files blocked by a file policy for intrusions. Within file inspection, simple
blocking by type takes precedence over malware inspection and blocking. Until a file is detected and blocked
in a session, packets from the session may be subject to intrusion inspection.
Note By default, the system disables intrusion and file inspection of encrypted payloads. This helps reduce false
positives and improve performance when an encrypted connection matches an access control rule that has
intrusion and file inspection configured. Inspection works with unencrypted traffic only.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
430
Security Policies
NAT and Access Rules
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
431
Security Policies
Guidelines and Limitations for Access Control Policies
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
432
Security Policies
Guidelines and Limitations for Access Control Policies
• Some FQDN DNS entries have very short time to live (TTL) values. This can result in frequent
recompliation of the lookup table, which can impact overall system performance.
• If you edit a rule that is actively in use, the changes do not apply to established connections that are no
longer being inspected by Snort. The new rule is used to match against future connections. In addition,
if Snort is actively inspecting a connection, it can apply the changed matching or action criteria to an
existing connection. If you need to ensure that your changes apply to all current connections, you can
log into the device CLI and use the clear conn command to end established connections, on the assumption
that the sources for the connections will then attempt to reestablish the connection and thus be matched
appropriately against the new rule.
• It takes 3 to 5 packets for the system to identify the application or URL in a connection. Thus, the correct
access control rule might not be matched immediately for a given connection. However, once the
application/URL is known, the connection is handled based on the matching rule. For encrypted
connections, this happens after the server certificate exchange in the SSL handshake.
• The system applies the default policy action to packets that do not have a payload in a connection where
an application is identified.
• Leave matching criteria empty whenever possible, especially those for security zones, network objects,
and port objects. For example, the system can more efficiently match traffic for all interfaces if you
simply leave the security zone criteria blank, rather than if you create zones that contain all interfaces.
When you specify multiple criteria, the system must match against every combination of the contents of
the criteria you specify.
• Due to memory limitations, some device models perform most URL filtering with a smaller, less granular,
set of categories and reputations. For example, even if a parent URL's subsites have different URL
categories and reputations, some devices may only store the parent URL's data. For web traffic handled
by these devices, the system may perform cloud lookups to determine category and reputation for sites
not in the local database. Lower-memory devices include the following ASA models: 5508-X, 5516-X,
and 5525-X.
• While operating, the FTD device expands access control rules into multiple access control list entries
based on the contents of any network objects used in the access rule. You can reduce the memory required
to search access control rules by enabling object group search. With object group search enabled, the
system does not expand network objects, but instead searches access rules for matches based on those
group definitions. Object group search does not impact how your access rules are defined or how they
appear in Firepower Device. It impacts only how the device interprets and processes them while matching
connections to access control rules.
Enabling object group search reduces memory requirements for access control policies that include
network objects. However, it is important to note that object group search might also decrease rule lookup
performance and thus increase CPU utilization. You should balance the CPU impact against the reduced
memory requirements for your specific access control policy. In most cases, enabling object group search
provides a net operational improvement.
You can set this option using FlexConfig by issuing the object-group-search access-control command;
use the no form of the command in the negate template.
You can use the object-group-search threshold command (in FlexConfig) to enable a threshold to
help prevent performance degradation. When operating with a threshold, for each connection, both the
source and destination IP addresses are matched against network objects. If the number of objects matched
by the source address times the number matched by the destination address exceeds 10,000, the connection
is dropped. Configure your rules to prevent an excessive number of matches.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
433
Security Policies
Configuring the Access Control Policy
• To move a rule, hover over the rule until you get the move icon ( ), then click, drag, and drop the rule
to the new location. You can also move a rule by editing it and selecting the new location in the Order
list. It is critical that you put the rules in the order that you want them processed. Specific rules should
be near the top, especially for rules that define exceptions to more general rules
• The right-most column contains the action buttons for a rule; mouse over the cell to see the buttons. You
can edit ( ) or delete ( ) a rule.
• Click the Toggle Hit Counts icon ( ) above the table to add or remove the Hit Counts column in the
table. The Hit Count column appears to the right of the Name column with the total hit count for the rule
and the date and time of the last hit. The hit count information is fetched at the time you click the toggle
button. Click the refresh icon ( ) to get the latest information.
• If any rules have problems, for example, because of removed or changed URL categories, click the See
Problem Rules link next to the search box to filter the table to show only those rules. Please edit and
correct (or delete) these rules, so that they will provide the service that you require.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
434
Security Policies
Configuring Access Control Rules
Procedure
To delete a rule you no longer need, click the delete icon ( ) for the rule.
Step 3 In Order, select where you want to insert the rule in the ordered list of rules.
Rules are applied on a first-match basis, so you must ensure that rules with highly specific traffic matching
criteria appear above policies that have more general criteria that would otherwise apply to the matching
traffic.
The default is to add the rule to the end of the list. If you want to change a rule's location later, edit this option.
Step 6 Define the traffic matching criteria using any combination of the following tabs:
• Source/Destination—The security zones (interfaces) through which the traffic passes, the IP addresses
or the country or continent (geographical location) for the IP address, or the protocols and ports used in
the traffic. The default is any zone, address, geographical location, protocol, and port. See
Source/Destination Criteria, on page 436.
• Application—The application, or a filter that defines applications by type, category, tag, risk, or business
relevance. The default is any application. See Application Criteria, on page 438.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
435
Security Policies
Source/Destination Criteria
• URL—The URL or URL category of a web request. The default is any URL. See URL Criteria, on page
439.
• Users—The identity source, user or user group. Your identity policies determine whether user and group
information is available for traffic matching. You must configure identity policies to use this criteria.
See User Criteria, on page 440.
To modify a condition, you click the + button within that condition, select the desired object or element, and
click OK in the popup dialog box. If the criterion requires an object, you can click Create New Object if the
object you require does not exist. Click the x for an object or element to remove it from the policy.
When adding conditions to access control rules, consider the following tips:
• You can configure multiple conditions per rule. Traffic must match all the conditions in the rule for the
rule to apply to traffic. For example, you can use a single rule to perform URL filtering for specific hosts
or networks.
• For each condition in a rule, you can add up to 50 criteria. Traffic that matches any of a condition's criteria
satisfies the condition. For example, you can use a single rule to apply application control for up to 50
applications or application filters. Thus, there is an OR relationship among the items in a single condition,
but an AND relationship between condition types (for example, between source/destination and
application).
• Some features require that you enable the appropriate license.
Step 7 (Optional.) For policies that use the Allow action, you can configure further inspection on unencrypted traffic.
Click one of the following links:
• Intrusion Policy—Select Intrusion Policy > On and select the intrusion inspection policy to inspect
traffic for intrusions and exploits. See Intrusion Policy Settings, on page 441.
• File Policy—Select the file policy to inspect traffic for files that contain malware and for files that should
be blocked. See File Policy Settings, on page 442.
Source/Destination Criteria
The Source/Destination criteria of an access rule define the security zones (interfaces) through which the
traffic passes, the IP addresses or the country or continent (geographical location) for the IP address, or the
protocols and ports used in the traffic. The default is any zone, address, geographical location, protocol, and
port.
To modify a condition, you click the + button within that condition, select the desired object or element, and
click OK. If the criterion requires an object, you can click Create New Object if the object you require does
not exist. Click the x for an object or element to remove it from the policy.
You can use the following criteria to identify the source and destination to match in the rule.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
436
Security Policies
Source/Destination Criteria
Use this criteria when the rule should apply based on where the traffic enters or exits the device. For
example, if you want to ensure that all traffic going to inside hosts gets intrusion inspection, you would
select your inside zone as the Destination Zones while leaving the source zone empty. To implement
intrusion filtering in the rule, the rule action must be Allow, and you must select an intrusion policy in
the rule.
Note You cannot mix passive and routed security zones in a single rule. In addition, you can specify passive
security zones as source zones only, you cannot specify them as destination zones.
When you add this criteria, you select from the following tabs:
• Network—Select the network objects or groups that define the source or destination IP addresses
for the traffic you want to control. You can use objects that define the address using the fully-qualified
domain name (FQDN); the address is determined through a DNS lookup.
• Geolocation—Select the geographical location to control traffic based on its source or destination
country or continent. Selecting a continent selects all countries within the continent. Besides selecting
geographical location directly in the rule, you can also select a geolocation object that you created
to define the location. Using geographical location, you could easily restrict access to a particular
country without needing to know all of the potential IP addresses used there.
Note To ensure that you are using up-to-date geographical location data to filter your
traffic, Cisco strongly recommends that you regularly update the geolocation
database (GeoDB).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
437
Security Policies
Application Criteria
Application Criteria
The Application criteria of an access rule defines the application used in an IP connection, or a filter that
defines applications by type, category, tag, risk, or business relevance. The default is any application.
Although you can specify individual applications in the rule, application filters simplify policy creation and
administration. For example, you could create an access control rule that identifies and blocks all high risk,
low business relevance applications. If a user attempts to use one of those applications, the session is blocked.
In addition, Cisco frequently updates and adds additional application detectors via system and vulnerability
database (VDB) updates. Thus, a rule blocking high risk applications can automatically apply to new
applications without you having to update the rule manually.
You can specify applications and filters directly in the rule, or create application filter objects that define those
characteristics. The specifications are equivalent, although using objects can make it easier to stay within the
50-items-per-criteria system limit if you are creating a complex rule.
To modify the application and filters list, you click the + button within the condition, select the desired
applications or application filter objects, which are listed on separate tabs, and click OK in the popup dialog
box. On either tab, you can click Advanced Filter to select filter criteria or to help you search for specific
applications. Click the x for an application, filter, or object to remove it from the policy. Click the Save As
Filter link to save the combined criteria that is not already an object as a new application filter object.
Note If a selected application was removed by a VDB update, “(Deprecated)” appears after the application name.
You must remove these applications from the filter, or subsequent deployments and system software upgrades
will be blocked.
You can use the following Advanced Filter criteria to identify the application or filter to match in the rule.
These are the same elements used in application filter objects.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
438
Security Policies
URL Criteria
Note Multiple selections within a single filter criteria have an OR relationship. For example, Risk is High OR Very
High. The relationship between filters is AND, so Risk is High OR Very High, AND Business Relevance is
Low OR Very Low. As you select filters, the list of applications in the display updates to show only those
that meet the criteria. You can use these filters to help you find applications that you want to add individually,
or to verify that you are selecting the desired filters to add to the rule.
Risks
The likelihood that the application is used for purposes that might be against your organization's security
policy, from very low to very high.
Business Relevance
The likelihood that the application is used within the context of your organization's business operations,
as opposed to recreationally, from very low to very high.
Types
The type of application:
• Application Protocol—Application protocols such as HTTP and SSH, which represent
communications between hosts.
• Client Protocol—Clients such as web browsers and email clients, which represent software running
on the host.
• Web Application—Web applications such as MPEG video and Facebook, which represent the
content or requested URL for HTTP traffic.
Categories
A general classification for the application that describes its most essential function.
Tags
Additional information about the application, similar to category.
For encrypted traffic, the system can identify and filter traffic using only the applications tagged SSL
Protocol. Applications without this tag can only be detected in unencrypted or decrypted traffic. Also,
the system assigns the decrypted traffic tag to applications that the system can detect in decrypted traffic
only, not encrypted or unencrypted.
Applications List (bottom of the display)
This list updates as you select filters from the options above the list, so you can see the applications that
currently match the filter. Use this list to verify that your filter is targeting the desired applications when
you intend to add filter criteria to the rule. If your intention is to add specific applications, select them
from this list.
URL Criteria
The URL criteria of an access rule defines the URL used in a web request, or the category to which the
requested URL belongs. For category matches, you can also specify the relative reputation of sites to allow
or block. The default is to allow all URLs.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
439
Security Policies
User Criteria
URL categories and reputations allow you to quickly create URL conditions for access control rules. For
example, you could block all Gambling sites, or untrusted Social Networking sites. If a user attempts to browse
to any URL with that category and reputation combination, the session is blocked.
Using category and reputation data also simplifies policy creation and administration. It grants you assurance
that the system will control web traffic as expected. Finally, because Cisco's threat intelligence is continually
updated with new URLs, as well as new categories and risks for existing URLs, you can ensure that the system
uses up-to-date information to filter requested URLs. Malicious sites that represent security threats such as
malware, spam, botnets, and phishing may appear and disappear faster than you can update and deploy new
policies.
To modify the URL list, you click the + button within the condition and select the desired categories or URLs
using one of the following techniques. Click the x for a category or object to remove it from the policy.
URL Tab
Click +, select URL objects or groups, and click OK. You can click Create New URL if the object you
require does not exist.
Note Before configuring URL objects to target specific sites, carefully read the information on manual URL
filtering.
Categories Tab
Click +, select the desired categories, and click OK.
For a description of the categories, see https://www.talosintelligence.com/categories.
The default is to apply the rule to all URLs in each selected category regardless of reputation. To limit
the rule based on reputation, click the down arrow for each category, deselect the Any checkbox, and
then use the Reputation slider to choose the reputation level. The left of the reputation slider indicates
sites that will be allowed, the right side are sites that will be blocked. How reputation is used depends
on the rule action:
• If the rule blocks or monitors web access, selecting a reputation level also selects all reputations
more severe than that level. For example, if you configure a rule to block or monitor Questionable
sites (level 2), it also automatically blocks or monitors Untrusted (level 1) sites.
• If the rule allows web access, selecting a reputation level also selects all reputations less severe than
that level. For example, if you configure a rule to allow Favorable sites (level 4), it also automatically
allows Trusted (level 5) sites.
User Criteria
The User criteria of an access rule defines the user or user group for an IP connection. You must configure
identity policies and the associated directory server to include user or user group criteria in an access rule.
Your identity policies determine whether user identity is collected for a particular connection. If identity is
established, the IP address of the host is associated with the identified user. Thus, traffic whose source IP
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
440
Security Policies
Intrusion Policy Settings
address is mapped to a user is considered to be from that user. IP packets themselves do not include user
identity information, so this IP-address-to-user mapping is the best approximation available.
Because you can add a maximum of 50 users or groups to a rule, selecting groups usually makes more sense
than selecting individual users. For example, you could create a rule allowing the Engineering group access
to a development network, and create a subsequent rule that denies all other access to the network. Then, to
make the rule apply to new engineers, you only need to add the engineer to the Engineering group in the
directory server.
You an also select identity sources to apply to all users within that source. Thus, if you support multiple Active
Directory domains, you can provide differential access to resources based on the domain.
To modify the users list, you click the + button within the condition and select the desired identities using one
of the following techniques. Click the x for an identity to remove it from the policy.
• Identity Sources—Select an identity source, such as an AD realm or the local user database, to apply
the rule to all users obtained from the selected sources. If the realm you need does not yet exist, click
Create New Identity Realm and create it now.
• Groups—Select the desired user groups. Groups are available only if you configure groups in the directory
server. If you select a group, the rule applies to any member of the group, including subgroups. If you
want to treat a sub-group differently, you need to create a separate access rule for the sub-group and
place it above the rule for the parent group in the access control policy.
• Users—Select individual users. The user name is prefixed with the identity source, such as
Realm\username.
There are some built-in users under the Special-Identities-Realm:
• Failed Authentication—The user was prompted to authenticate, but failed to enter a valid
username/password pair within the maximum number of allowed attempts. Failure to authenticate
does not itself prevent the user from accessing the network, but you can write an access rule to limit
network access for these users.
• Guest—Guest users are like Failed Authentication users, except that your identity rule is configured
to call these users Guest. Guest users were prompted to authenticate and failed to do so within the
maximum number of attempts.
• No Authentication Required—The user was not prompted to authentication, because the user's
connections matched identity rules that specified no authentication.
• Unknown—There is no user mapping for the IP address, and there is no record of failed
authentication yet. Typically, this means that no HTTP traffic has yet been seen from that address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
441
Security Policies
File Policy Settings
To enable intrusion inspection, select Intrusion Policy > On and select the desired policy. The policies are
listed from least to most secure.
• Connectivity over Security—This policy is built for organizations where connectivity (being able to
get to all resources) takes precedence over network infrastructure security. The intrusion policy enables
far fewer rules than those enabled in the Security over Connectivity policy. Only the most critical rules
that block traffic are enabled. Select this policy if you want to apply some intrusion protection but you
are fairly confident in the security of your network.
• Balanced Security and Connectivity—This policy is designed to balance overall network performance
with network infrastructure security. This policy is appropriate for most networks. Select this policy for
most situations where you want to apply intrusion prevention.
• Security over Connectivity—This policy is built for organizations where network infrastructure security
takes precedence over user convenience. The intrusion policy enables numerous network anomaly
intrusion rules that could alert on or drop legitimate traffic. Select this policy when security is paramount
or for traffic that is high risk.
• Maximum Detection—This policy is built for organizations where network infrastructure security is
given even more emphasis than is given by the Security Over Connectivity policy, with the potential for
even greater operational impact. For example, the intrusion policy enables rules in a large number of
threat categories including malware, exploit kit, old and common vulnerabilities, and known in-the-wild
exploits. If you select this policy, carefully evaluate whether too much legitimate traffic is being dropped.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
442
Security Policies
Logging Settings
• None—Do not evaluate transmitted files for malware and do no file-specific blocking. Select this option
for rules where file transmissions are trusted or where they are unlikely (or impossible), or for rules
where you are confident your application or URL filtering adequately protects your network.
• Block Malware All—Query the AMP cloud to determine if files traversing your network contain malware,
then block files that represent threats.
• Cloud Lookup All—Query the AMP cloud to obtain and log the disposition of files traversing your
network while still allowing their transmission.
• (Custom File Policy)—You can create your own file policies using the FTD API filepolicies resource,
and the other FileAndMalwarePolicies resources (such as filetypes, filetypecategories, ampcloudconfig,
ampservers, and ampcloudconnections). After you create the policies, and deploy changes, you can select
your policies when editing an access control rule in FDM. The policy description appears below the
policy when you select it.
Logging Settings
The logging settings for an access rule determine whether connection events are issued for traffic that matches
the rule. You must enable logging to see events related to the rule in the Event Viewer. You must also enable
logging for matching traffic to be reflected in the various dashboards you can use to monitor the system.
You should log connections according to the security and compliance needs of your organization. If your goal
is to limit the number of events you generate and improve performance, only enable logging for the connections
critical to your analysis. However, if you want a broad view of your network traffic for profiling purposes,
you can enable logging for additional connections.
Caution Logging blocked TCP connections during a Denial of Service (DoS) attack can affect system performance
and overwhelm the database with multiple similar events. Before you enable logging for a Block rule, consider
whether the rule is for an Internet-facing interface or other interface vulnerable to DoS attack.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
443
Security Policies
Monitoring Access Control Policies
Note When an intrusion policy invoked by an access control rule detects an intrusion and generates an intrusion
event, the system automatically logs the end of the connection where the intrusion occurred, regardless
of the logging configuration of the rule. For connections where an intrusion was blocked, the action for
the connection in the connection log is Block, with a reason of Intrusion Block, even though to perform
intrusion inspection you must use an Allow rule.
File Events
Select Log Files if you want to enable logging of prohibited files or malware events. You must select a
file policy in the rule to configure this option. The option is enabled by default if you select a file policy
for the rule. Cisco recommends you leave this option enabled.
When the system detects a prohibited file, it automatically logs one of the following types of event:
• File events, which represent detected or blocked files, including malware files.
• Malware events, which represent detected or blocked malware files only.
• Retrospective malware events, which are generated when the malware disposition for a previously
detected file changes.
For connections where a file was blocked, the action for the connection in the connection log is Block
even though to perform file and malware inspection you must use an Allow rule. The connection's Reason
is either File Monitor (a file type or malware was detected), or Malware Block or File Block (a file
was blocked).
Send Connection Events To
If you want to send a copy of the events to an external syslog server, select the server object that defines
the syslog server. If the required object does not already exist, click Create New Syslog Server and
create it. (To disable logging to a syslog server, select Any from the server list.)
Because event storage on the device is limited, sending events to an external syslog server can provide
more long term storage and enhance your event analysis.
This setting applies to connection events only. To send intrusion events to syslog, configure the server
in the intrusion policy settings. To send file/malware events to syslog, configure the server on Device >
System Settings > Logging Settings.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
444
Security Policies
Examining Rule Hit Counts
• You can find URL filtering results on the URL Categories and Destinations dashboards. You must
have at least one URL filtering policy to see any information on the URL Categories dashboard.
• You can find application filtering results on the Applications and Web Applications dashboards.
• You can find user-based statistics on the Users dashboard. You must implement identity policies to
collect user information.
• You can find intrusion policy statistics on the Attackers and Targets dashboards. You must apply an
intrusion policy to at least one access control rule to see any information on these dashboards.
• You can find file policy and malware filtering statistics on the File Logs and Malware dashboards. You
must apply a file policy to at least one access control rule to see any information on these dashboards.
• Monitoring > Events also shows events for connections and data related to the access control rules.
Procedure
• Click the Toggle Hit Counts icon ( ) again to remove the hit count column from the table.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
445
Security Policies
Monitoring Syslog Messages for Access Control
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
446
Security Policies
How to Control Network Access Using TrustSec Security Group Tags
• How to Implement an Acceptable Use Policy (URL Filtering), on page 62. This example shows how to
perform URL filtering.
• How to Control Application Usage, on page 67. This example shows how to perform application filtering.
• How to Add a Subnet, on page 70. This example shows how to integrate a new subnet into your overall
network, including the access rules needed to allow traffic flow.
• How to Passively Monitor the Traffic on a Network, on page 75
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
447
Security Policies
Configure Access Control Based on Security Group Tag (SGT)
This ensures that the list of security group tags and mappings stay up-to-date on the device, so that FTD
can effectively enforce the policy defined in ISE.
Procedure
Step 1 Configure Security Groups and SXP Publishing in ISE, on page 448.
Step 2 Configure the ISE Identity Source in FDM, on page 451.
Step 3 Create SGT Dynamic Objects for Downloaded Tags, on page 454.
Step 4 Configure an Access Control Rule Based on SGT, on page 457.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
448
Security Policies
Configure Security Groups and SXP Publishing in ISE
Procedure
Step 1 Choose Work Centers > TrustSec > Settings > SXP Settings, and select the Publish SXP Bindings on
PxGrid option.
This option makes ISE send the SGT mappings out using SXP. You must select this option for the FTD device
to “hear” anything from listing to the SXP topic. This option must be selected for the FTD device to get static
SGT-to-IP address mapping information. It is not necessary if you simply want to use SGT tags defined in
the packets, or SGTs that are assigned to a user session.
Step 2 Choose Work Centers > TrustSec > SXP > SXP Devices, and add a device.
This does not have to be a real device, you can even use the management IP address of the FTD device. The
table simply needs at least one device to induce ISE to publish the static SGT-to-IP address mappings. This
step is not necessary if you simply want to use SGT tags defined in the packets, or SGTs that are assigned to
a user session.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
449
Security Policies
Configure Security Groups and SXP Publishing in ISE
Step 3 Choose Work Centers > TrustSec > Components > Security Groups and verify there are security group
tags defined. Create new ones as necessary.
Step 4 Choose Work Centers > TrustSec > Components > IP SGT Static Mapping and map host and network
IP addresses to the security group tags.
This step is not necessary if you simply want to use SGT tags defined in the packets, or SGTs that are assigned
to a user session.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
450
Security Policies
Configure the ISE Identity Source in FDM
Procedure
Step 1 In FDM, create the ISE identity object as explained in Configure Identity Services Engine, on page 162.
Configuring an AD realm is not required for the SXP configuration, but you need an AD server if you also
want to obtain user identity from ISE.
Step 3 Click the more options button ( ) and choose API Explorer.
The system opens the API Explorer in a separate tab or window, depending on your browser settings.
Step 4 Click IdentityServicesEngine to open the folder and see the available methods.
Step 5 Get the ISE identity object you created in FDM.
a) Click the GET /integration/identityservicesengine method.
b) Click the Try It Out! button at the end of the method explanation.
The system submits the GET call and should successfully retrieve the ISE identity object. The object
appears in the Response Body field, and look for a Return Code of 200. If you get any other result,
examine the response body for error messages, and try creating the ISE identity source again.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
451
Security Policies
Configure the ISE Identity Source in FDM
c) Use click and drag, and Ctrl+C, to copy the object body to the clipboard. Start with the first brace { after
the “items [” bracket, and end with the closing brace } immediately prior to the ending bracket ]. Leave
out the lines including and prior to “items” and the paging attributes at the end. The first attribute in the
object should be “version,” and the last attribute, “self.”
Following is an example, where the attributes you need for the next step are highlighted:
{
"version": "kbpeihi5cbarm",
"name": "ISE",
"description": null,
"ftdCertificate": {
"version": "epnkrwowkuhgk",
"name": "ISE",
"id": "565b03fd-8874-11e9-87fd-29bbc348546c",
"type": "internalcertificate"
},
"pxGridCertificate": {
"version": "pyzuuw7ja6coq",
"name": "ISE_CA",
"id": "5cf3b4b0-8874-11e9-87fd-6b0eb83b0b10",
"type": "externalcacertificate"
},
"mntCertificate": {
"version": "pyzuuw7ja6coq",
"name": "ISE_CA",
"id": "5cf3b4b0-8874-11e9-87fd-6b0eb83b0b10",
"type": "externalcacertificate"
},
"iseNetworkFilters": [],
"enabled": true,
"subscribeToSessionDirectoryTopic": true,
"subscribeToSxpTopic": false,
"secondaryIseServer": null,
"primaryIseServer": "192.168.0.9",
"id": "8252f773-8874-11e9-87fd-67c87c391f4d",
"type": "identityservicesengine",
"links": {
"self": "https://ftd.example.com/api/fdm/v3/integration/
identityservicesengine/8252f773-8874-11e9-87fd-67c87c391f4d"
}
}
Note The subscribeToSessionDirectoryTopic is set to true by default when you create the ISE identity
source. This is the attribute that determines whether the system obtains user session SGT
mappings. If you want to use static SGT-to-IP address mappings only, and do not want user
session SGT information, you can set this option to false.
Step 6 Use PUT to update the object and turn on the option to subscribe to the SXP topic in ISE.
By default, the subscribeToSxpTopic attribute is set to false. You need to set it to true.
a) Click the PUT /integration/identityservicesengine/{objId} method.
b) Paste the current version of the object into the body parameter edit box, and delete the links attribute,
including the self attribute within it.
c) Change the subscribeToSxpTopic attribute value to true.
...
"subscribeToSessionDirectoryTopic": true,
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
452
Security Policies
Configure the ISE Identity Source in FDM
"subscribeToSxpTopic": true,
"secondaryIseServer": null,
...
With this attribute set to true, the system will download SGT-to-IP address mappings. If you do not set
it to true, the system will not get the static SGT-to-IP address mappings defined in ISE. You will not be
able to apply access control based on these mappings.
d) Copy the value of the object id attribute. Note that there are 4 id attributes, one each for the ftdCertificate,
pxGridCertificate, mntCertificate, and ISE object. The id for the object is the last one displayed, right
before the "type": "identityservicesengine" attribute.
e) Paste the object id into the objId parameter, right above the body parameter. Do not include the
opening/closing parentheses.
f) Click the Try It Out! button. A successful call should return a 200 response code and the response body
should show the new object with your changes.
For example:
{
"version": "ll7jndfp2qriq",
"name": "ISE",
"description": null,
"ftdCertificate": {
"version": "epnkrwowkuhgk",
"name": "ISE",
"id": "565b03fd-8874-11e9-87fd-29bbc348546c",
"type": "internalcertificate"
},
"pxGridCertificate": {
"version": "pyzuuw7ja6coq",
"name": "ISE_CA",
"id": "5cf3b4b0-8874-11e9-87fd-6b0eb83b0b10",
"type": "externalcacertificate"
},
"mntCertificate": {
"version": "pyzuuw7ja6coq",
"name": "ISE_CA",
"id": "5cf3b4b0-8874-11e9-87fd-6b0eb83b0b10",
"type": "externalcacertificate"
},
"iseNetworkFilters": [],
"enabled": true,
"subscribeToSessionDirectoryTopic": true,
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
453
Security Policies
Create SGT Dynamic Objects for Downloaded Tags
"subscribeToSxpTopic": true,
"secondaryIseServer": null,
"primaryIseServer": "192.168.0.9",
"id": "8252f773-8874-11e9-87fd-67c87c391f4d",
"type": "identityservicesengine",
"links": {
"self": "https://ftd.example.com/api/fdm/v3/integration/
identityservicesengine/8252f773-8874-11e9-87fd-67c87c391f4d"
}
}
Procedure
Step 1 Click the more options button ( ) and choose API Explorer.
Step 2 View the SGT information downloaded from ISE.
a) Click SecurityGroupTag to open the folder and see the available methods.
b) Click the GET /object/securitygrouptags method.
c) Click the Try It Out! button at the end of the method explanation.
The system submits the GET call and should successfully retrieve the SGT information retrieved from
ISE. This information is a list of tags only, and does not include IP address mappings. The response body
should show the SGT information, and the response code should be 200.
Note that by default, the GET call limits the information to the first 10 objects.
Scroll to the bottom of the response body and look at the paging information. For example:
"paging": {
"prev": [],
"next": [
"https://ftd.example.com/api/fdm/v3/object/
securitygrouptags?limit=10&offset=10"
],
"limit": 10,
"offset": 0,
"count": 119,
"pages": 0
}
This example shows that you are seeing just the first 10 SGTs, but that there are a total of 119 SGTs
downloaded (the count attribute). The total number of SGTs depends on how many are configured in
your ISE server.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
454
Security Policies
Create SGT Dynamic Objects for Downloaded Tags
d) To get a complete list, scroll up and enter 120 in the limit parameter value, then click Try It Out! again.
The paging attributes should now show a 120 limit, 119 count, and no pages.
"paging": {
"prev": [],
"next": [],
"limit": 120,
"offset": 0,
"count": 119,
"pages": 0
}
You might want to copy/paste the response body into a text file to make it easier to examine the list and
plan for the SGT dynamic objects that you will need to implement your access control policies.
{
"tag": 11,
"name": "Production_Servers",
"description": "Production Servers Security Group",
"deleted": false,
"id": "9423aa00-8c01-11e6-996c-525400b48521",
"type": "securitygrouptag",
"links": {
"self": "https://ftd.example.com/api/fdm/v3/object/
securitygrouptags/9423aa00-8c01-11e6-996c-525400b48521"
}
},
{
"tag": 7,
"name": "Production_Users",
"description": "Production User Security Group",
"deleted": false,
"id": "9437a730-8c01-11e6-996c-525400b48521",
"type": "securitygrouptag",
"links": {
"self": "https://ftd.example.com/api/fdm/v3/object/
securitygrouptags/9437a730-8c01-11e6-996c-525400b48521"
}
},
The objective is to allow traffic from the Production_Users security group (SGT 7) to the Production_Servers
security group (SGT 11). Because you need to specify these SGT separately as source and destination criteria,
you need two SGT dynamic objects. Following are the steps to create the objects.
a) Click SGTDynamicObject to open the folder and see the available methods.
b) Click the POST /object/sgtdynamicobjects method.
c) In the Parameters section, click the Example Value edit box on the right, in the Data Type column, to
load the example into the body edit box.
d) Remove the version and id attribute lines, then define the other attributes as follows.
{
"name": "Production_Users_DSGT",
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
455
Security Policies
Create SGT Dynamic Objects for Downloaded Tags
"tags": [
{
"tag": 7,
"externalId": "9437a730-8c01-11e6-996c-525400b48521",
"type": "securitygrouptagentry"
}
],
"type": "sgtdynamicobject"
}
The following graphic shows the relationship between the attributes in the downloaded tags and the SGT
dynamic object.
{
"version": "odswykttumaeo",
"name": "Production_Users_DSGT",
"tags": [
{
"tag": 7,
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
456
Security Policies
Configure an Access Control Rule Based on SGT
"externalId": "9437a730-8c01-11e6-996c-525400b48521",
"type": "securitygrouptagentry"
}
],
"id": "ba09cd90-8959-11e9-87fd-a7644255b0cd",
"type": "sgtdynamicobject",
"links": {
"self": "https://ftd.example.com/api/fdm/v3/object/
sgtdynamicobjects/ba09cd90-8959-11e9-87fd-a7644255b0cd"
}
}
f) Repeat the process to create the SGT dynamic object for the production servers. Simply replace the body
for the POST call with the one needed for the new object, and click Try It Out!.
{
"name": "Production_Servers_DSGT",
"tags": [
{
"tag": 11,
"externalId": "9423aa00-8c01-11e6-996c-525400b48521",
"type": "securitygrouptagentry"
}
],
"type": "sgtdynamicobject"
}
{
"version": "hbfqoryvhz5xj",
"name": "Production_Servers_DSGT",
"tags": [
{
"tag": 11,
"externalId": "9423aa00-8c01-11e6-996c-525400b48521",
"type": "securitygrouptagentry"
}
],
"id": "eeede223-895a-11e9-87fd-31336e1d6199",
"type": "sgtdynamicobject",
"links": {
"self": "https://ftd.example.com/api/fdm/v3/object/
sgtdynamicobjects/eeede223-895a-11e9-87fd-31336e1d6199"
}
}
g) (Optional.) You can use GET /object/sgtdynamicobjects to verify both SGT dynamic objects were
created.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
457
Security Policies
Configure an Access Control Rule Based on SGT
The following procedure explains how to use FDM to create the base rule, then add the SGT dynamic objects
as traffic matching criteria. This rule allows traffic from production users to production servers. The rule
depends completely on SGT; it is not limited by source/destination interface or any other criteria. Thus, the
rule will dynamically apply to traffic as it comes from different interfaces, and as you change security group
membership in ISE. If the packet does not explicitly contain a source SGT tag, source/destination matching
will be based on the packet IP addresses compared to the SGT-to-IP address mappings obtained from user
session information or from SXP-published mappings.
Procedure
Note Do not deploy changes yet! This rule is not complete until you edit it in API Explorer. If you deploy
now, you will get unintended results.
Step 3 Click the more options button ( ) and choose API Explorer.
Step 4 Edit the new rule to add SGT criteria.
a) Click AccessPolicy to open the folder and see the available methods.
b) Click GET /policy/accesspolicies/{parentId}/accessrules, and configure the following parameters:
• parentId—Enter default. Because there can be only one access control policy, you can use default
instead of the actual UUID of the policy object.
• offset, limit—If you have a large list of access rules, it might be a challenge to find the rule object.
One option is to enter the rule order number minus 1 as the offset, and for limit, specify 1. For
example, if the rule order is 2, the offset should be 1 (that is, 2-1=1). That will return the one rule at
that order in the policy. (It is necessary to subtract 1 from the rule order because the offset variable
starts at 0, not 1.)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
458
Security Policies
Configure an Access Control Rule Based on SGT
{
"items": [
{
"version": "bfd2jm5cmv3h2",
"name": "ProductionServers",
"ruleId": 268435458,
"sourceZones": [],
"destinationZones": [],
"sourceNetworks": [],
"destinationNetworks": [],
"sourcePorts": [],
"destinationPorts": [],
"ruleAction": "PERMIT",
"eventLogAction": "LOG_BOTH",
"identitySources": [],
"users": [],
"embeddedAppFilter": null,
"urlFilter": {
"urlObjects": [],
"urlCategories": [],
"type": "embeddedurlfilter"
},
"intrusionPolicy": null,
"filePolicy": null,
"logFiles": false,
"syslogServer": null,
"destinationDynamicObjects": [],
"sourceDynamicObjects": [],
"id": "8d5e1db6-895d-11e9-87fd-894b42e34ebf",
"type": "accessrule",
"links": {
"self": "https://ftd.example.com/api/fdm/v3/policy/
accesspolicies/default/accessrules/8d5e1db6-895d-11e9-87fd-894b42e34ebf"
}
}
],
"paging": {
"prev": [],
"next": [],
"limit": 1,
"offset": 1,
"count": 2,
"pages": 0
}
}
d) Copy/paste the rule object into a text editor (or into the body parameter of the PUT
/policy/accesspolicies/{parentId}/accessrules/{objId} method), and add the SGT dynamic objects as
source and destination criteria.
The fields are destinationDynamicObjects (for destination criteria) and sourceDynamicObjects (for
source criteria). Each attribute can take a comma-separated list of objects, so you can include multiple
SGT dynamic objects in the source or destination criteria.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
459
Security Policies
Configure an Access Control Rule Based on SGT
Each object in the list must have the following attributes, which you can get from the response body to
GET /object/sgtdynamicobjects. These are the attributes that identity the object, but do not define the
object content.
{
"version": "string",
"name": "string",
"id": "string",
"type": "sgtdynamicobject"
}
Using the objects created in Create SGT Dynamic Objects for Downloaded Tags, on page 454, adding
Production_Servers_DSGT to destinationDynamicObjects, and Production_Users_DSGT to
sourceDestinationObjects, would look like the following (changes are highlighted).
{
"version": "bfd2jm5cmv3h2",
"name": "ProductionServers",
"ruleId": 268435458,
"sourceZones": [],
"destinationZones": [],
"sourceNetworks": [],
"destinationNetworks": [],
"sourcePorts": [],
"destinationPorts": [],
"ruleAction": "PERMIT",
"eventLogAction": "LOG_BOTH",
"identitySources": [],
"users": [],
"embeddedAppFilter": null,
"urlFilter": {
"urlObjects": [],
"urlCategories": [],
"type": "embeddedurlfilter"
},
"intrusionPolicy": null,
"filePolicy": null,
"logFiles": false,
"syslogServer": null,
"destinationDynamicObjects": [
{
"version": "hbfqoryvhz5xj",
"name": "Production_Servers_DSGT",
"id": "eeede223-895a-11e9-87fd-31336e1d6199",
"type": "sgtdynamicobject"
}
],
"sourceDynamicObjects": [
{
"version": "odswykttumaeo",
"name": "Production_Users_DSGT",
"id": "ba09cd90-8959-11e9-87fd-a7644255b0cd",
"type": "sgtdynamicobject"
}
],
"id": "8d5e1db6-895d-11e9-87fd-894b42e34ebf",
"type": "accessrule"
}
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
460
Security Policies
Configure an Access Control Rule Based on SGT
• parentID—Enter default.
• objectID—Enter the id value from the new access rule object. In the above example, this is
8d5e1db6-895d-11e9-87fd-894b42e34ebf. This is the id attribute immediate preceding the “type”:
“accessrule” attribute.
• body—Paste in the body with the updated destinationDynamicObject and sourceDynamicObject
properties.
{
"version": "kugnhxghj2ubx",
"name": "ProductionServers",
"ruleId": 268435458,
"sourceZones": [],
"destinationZones": [],
"sourceNetworks": [],
"destinationNetworks": [],
"sourcePorts": [],
"destinationPorts": [],
"ruleAction": "PERMIT",
"eventLogAction": "LOG_BOTH",
"identitySources": [],
"users": [],
"embeddedAppFilter": null,
"urlFilter": {
"urlObjects": [],
"urlCategories": [],
"type": "embeddedurlfilter"
},
"intrusionPolicy": null,
"filePolicy": null,
"logFiles": false,
"syslogServer": null,
"destinationDynamicObjects": [
{
"version": "hbfqoryvhz5xj",
"name": "Production_Servers_DSGT",
"id": "eeede223-895a-11e9-87fd-31336e1d6199",
"type": "sgtdynamicobject"
}
],
"sourceDynamicObjects": [
{
"version": "odswykttumaeo",
"name": "Production_Users_DSGT",
"id": "ba09cd90-8959-11e9-87fd-a7644255b0cd",
"type": "sgtdynamicobject"
}
],
"id": "8d5e1db6-895d-11e9-87fd-894b42e34ebf",
"type": "accessrule",
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
461
Security Policies
Configure an Access Control Rule Based on SGT
"links": {
"self": "https://ftd.example.com/api/fdm/v3/policy/
accesspolicies/default/accessrules/8d5e1db6-895d-11e9-87fd-894b42e34ebf"
}
}
Although the change history shows changes you make through the FTD API, you cannot see the SGT
information when you edit the rule in FDM.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
462
CHAPTER 21
Intrusion Policies
The following topics explain intrusion policies and the closely associated network analysis policies (NAP).
Intrusion policies include rules that check traffic for threats and block traffic that appears to be an attack.
Network analysis policies control traffic preprocessing, which prepares traffic to be further inspected by
normalizing traffic and identifying protocol anomalies.
Because preprocessing and intrusion inspection are so closely related, the network analysis and intrusion
policies examining a single packet must complement each other.
• About Intrusion and Network Analysis Policies, on page 463
• License Requirements for Intrusion Policies, on page 468
• Applying Intrusion Policies in Access Control Rules, on page 468
• Configuring Syslog for Intrusion Events, on page 469
• Managing Intrusion Policies , on page 469
• Monitoring Intrusion Policies, on page 471
• Examples for Intrusion Policies, on page 472
As the system analyzes traffic, the network analysis decoding and preprocessing phase occurs before and
separately from the intrusion prevention phase. Together, network analysis and intrusion policies provide
broad and deep packet inspection. They can help you detect, alert on, and protect against network traffic that
could threaten the availability, integrity, and confidentiality of hosts and their data.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
463
Security Policies
Inspection Mode: Prevention vs. Detection
Cisco Talos Intelligence Group (Talos). For these policies, Talos sets the intrusion and preprocessor rule states
and provides the initial configurations for preprocessors and other advanced settings.
As new vulnerabilities become known, Talos releases intrusion rule updates. These rule updates can modify
any system-provided network analysis or intrusion policy, and can provide new and updated intrusion rules
and preprocessor rules, modified states for existing rules, and modified default policy settings. Rule updates
might also delete rules from system-provided policies and provide new rule categories, as well as modify the
default variable set.
You can manually update the rules database, or configure a regular update schedule. You must deploy an
update for it to take effect. For more information on updating system databases, see Updating System Databases,
on page 698.
The following are the system-provided policies:
Balanced Security and Connectivity network analysis and intrusion policies
These policies are built for both speed and detection. Used together, they serve as a good starting point
for most networks and deployment types. The system uses the Balanced Security and Connectivity
network analysis policy as the default.
Connectivity Over Security network analysis and intrusion policies
These policies are built for networks where connectivity, the ability to get to all resources, takes precedence
over network infrastructure security. The intrusion policy enables far fewer rules than those enabled in
the Security over Connectivity policy. Only the most critical rules that block traffic are enabled.
Security Over Connectivity network analysis and intrusion policies
These policies are built for networks where network infrastructure security takes precedence over user
convenience. The intrusion policy enables numerous network anomaly intrusion rules that could alert
on or drop legitimate traffic.
Maximum Detection network analysis and intrusion policies
These policies are built for networks where network infrastructure security is given even more emphasis
than is given by the Security Over Connectivity policies, with the potential for even greater operational
impact. For example, the intrusion policy enables rules in a large number of threat categories including
malware, exploit kit, old and common vulnerabilities, and known in-the-wild exploits.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
464
Security Policies
Intrusion Rule Attributes
conditions specified in each rule, and triggers the rule if the data packet meets all the conditions specified in
the rule.
The system includes the following types of rules created by Cisco Talos Intelligence Group (Talos):
• Intrusion rules, which are subdivided into shared object rules and standard text rules
• Preprocessor rules, which are rules associated with preprocessors and packet decoder detection options
in the network analysis policy. Most preprocessor rules are disabled by default.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
465
Security Policies
Default Intrusion Variable Set
Status
If you change the default action for a rule, this column shows “Overridden.” Otherwise, the column is
empty.
Message
This is the name of the rule, which also appears in events triggered by the rule. The message typically
identifies the threat that the signature matches. You can search the Internet for more information on each
threat.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
466
Security Policies
Generator Identifiers
Generator Identifiers
The generator identifier (GID) identifies the subsystem that evaluates an intrusion rule and generates events.
Standard text intrusion rules have a generator ID of 1, and shared object intrusion rules have a generator ID
of 3. There are also several sets of rules for various preprocessors. The following table explains the GIDs.
ID Component
2 Tagged Packets.
(Rules for the Tag generator, which generates packets from a tagged session. )
123 IP Defragmentor.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
467
Security Policies
Network Analysis Policies
ID Component
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
468
Security Policies
Configuring Syslog for Intrusion Events
You can also simplify your configuration by using the same policy for all networks. For example, the Balanced
Security and Connectivity policy is design to provide good protection without excessively impacting
connectivity.
Procedure
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
469
Security Policies
Configure the Inspection Mode for an Intrusion Policy
Conversely, if you know you need to protect against a specific attack, but the related rule is disabled in your
chosen intrusion policy, you can enable the rule without changing to a more secure policy.
Use the intrusion related dashboards, and the Event Viewer (both on the Monitoring page), to evaluate how
intrusion rules are impacting traffic. Keep in mind that you will see intrusion events and intrusion data only
for traffic that matches intrusion rules set to alert or drop; disabled rules are not evaluated.
The following topics explain intrusion policies and rule tuning in more detail.
Procedure
Step 3 Click the Edit link next to the inspection mode, change the mode for the policy, and click OK.
The options are:
• Prevention—Intrusion rule actions are always applied. Connections that match a drop rule are blocked.
• Detection—Intrusion rules generate alerts only. A connection that matches a drop rule will generate alert
messages, but the connection will not be blocked.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
470
Security Policies
Monitoring Intrusion Policies
Procedure
Step 4 Click the Action column for the rule and select the required action:
• Alert—Create an event when this rule matches traffic, but do not drop the connection.
• Drop—Create an event when this rule matches traffic, and also drop the connection.
• Disabled—Do not match traffic against this rule. No events are generated.
The default action for the rule is indicated by “(Default)” added to the action. If you change the default, the
status column indicates “Overridden” for that rule.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
471
Security Policies
Examples for Intrusion Policies
To see intrusion events, select Monitoring > Events, then click the Intrusion tab. You can hover over an
event and click the View Details link to get more information. From the details page, you can click the View
IPS Rule to go to the rule in the relevant intrusion policy, where you can change the rule action. This can
help you reduce the impact of false positives, where a rule is blocking too many good connections, by changing
the action from drop to alert. Conversely, you can change an alert rule into a drop rule if you are seeing a lot
of attack traffic for a rule.
If you configure a syslog server for the intrusion policy, intrusion events have the message ID 430001.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
472
CHAPTER 22
Network Address Translation (NAT)
The following topics explain Network Address Translation (NAT) and how to configure it.
• Why Use NAT?, on page 473
• NAT Basics, on page 474
• Guidelines for NAT, on page 480
• Configure NAT, on page 484
• Translating IPv6 Networks, on page 510
• Monitoring NAT, on page 524
• Examples for NAT, on page 525
One of the main functions of NAT is to enable private IP networks to connect to the Internet. NAT replaces
a private IP address with a public IP address, translating the private addresses in the internal private network
into legal, routable addresses that can be used on the public Internet. In this way, NAT conserves public
addresses because it can be configured to advertise at a minimum only one public address for the entire network
to the outside world.
Other functions of NAT include:
• Security—Keeping internal IP addresses hidden discourages direct attacks.
• IP routing solutions—Overlapping IP addresses are not a problem when you use NAT.
• Flexibility—You can change internal IP addressing schemes without affecting the public addresses
available externally; for example, for a server accessible to the Internet, you can maintain a fixed IP
address for Internet use, but internally, you can change the server address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
473
Security Policies
NAT Basics
• Translating between IPv4 and IPv6 (Routed mode only) —If you want to connect an IPv6 network to
an IPv4 network, NAT lets you translate between the two types of addresses.
Note NAT is not required. If you do not configure NAT for a given set of traffic, that traffic will not be translated,
but will have all of the security policies applied as normal.
NAT Basics
The following topics explain some of the basics of NAT.
NAT Terminology
This document uses the following terminology:
• Real address/host/network/interface—The real address is the address that is defined on the host, before
it is translated. In a typical NAT scenario where you want to translate the inside network when it accesses
the outside, the inside network would be the “real” network. Note that you can translate any network
connected to the device, not just an inside network. Therefore if you configure NAT to translate outside
addresses, “real” can refer to the outside network when it accesses the inside network.
• Mapped address/host/network/interface—The mapped address is the address that the real address is
translated to. In a typical NAT scenario where you want to translate the inside network when it accesses
the outside, the outside network would be the “mapped” network.
Note During address translation, IP addresses configured for the device interfaces are
not translated.
NAT Types
You can implement NAT using the following methods:
• Dynamic NAT—A group of real IP addresses are mapped to a (usually smaller) group of mapped IP
addresses, on a first come, first served basis. Only the real host can initiate traffic. See Dynamic NAT,
on page 485.
• Dynamic Port Address Translation (PAT)—A group of real IP addresses are mapped to a single IP address
using a unique source port of that IP address. See Dynamic PAT, on page 490.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
474
Security Policies
NAT in Routed Mode
• Static NAT—A consistent mapping between a real and mapped IP address. Allows bidirectional traffic
initiation. See Static NAT, on page 494.
• Identity NAT—A real address is statically translated to itself, essentially bypassing NAT. You might
want to configure NAT this way when you want to translate a large group of addresses, but then want
to exempt a smaller subset of addresses. See Identity NAT, on page 503.
1. When the inside host at 10.1.2.27 sends a packet to a web server, the real source address of the packet,
10.1.2.27, is translated to a mapped address, 209.165.201.10.
2. When the server responds, it sends the response to the mapped address, 209.165.201.10, and the Firepower
Threat Defense device receives the packet because the Firepower Threat Defense device performs proxy
ARP to claim the packet.
3. The Firepower Threat Defense device then changes the translation of the mapped address, 209.165.201.10,
back to the real address, 10.1.2.27, before sending it to the host.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
475
Security Policies
Auto NAT
Auto NAT
All NAT rules that are configured as a parameter of a network object are considered to be auto NAT rules.
This is a quick and easy way to configure NAT for a network object. You cannot create these rules for a group
object, however.
Although these rules are configured as part of the object itself, you cannot see the NAT configuration in the
object definition through the object manager.
When a packet enters an interface, both the source and destination IP addresses are checked against the auto
NAT rules. The source and destination address in the packet can be translated by separate rules if separate
matches are made. These rules are not tied to each other; different combinations of rules can be used depending
on the traffic.
Because the rules are never paired, you cannot specify that sourceA/destinationA should have a different
translation than sourceA/destinationB. Use manual NAT for that kind of functionality, where you can identify
the source and destination address in a single rule.
Manual NAT
Manual NAT lets you identify both the source and destination address in a single rule. Specifying both the
source and destination addresses lets you specify that sourceA/destinationA can have a different translation
than sourceA/destinationB.
Note For static NAT, the rule is bidirectional, so be aware that “source” and “destination” are used in commands
and descriptions throughout this guide even though a given connection might originate at the “destination”
address. For example, if you configure static NAT with port address translation, and specify the source address
as a Telnet server, and you want all traffic going to that Telnet server to have the port translated from 2323
to 23, then you must specify the source ports to be translated (real: 23, mapped: 2323). You specify the source
ports because you specified the Telnet server address as the source address.
The destination address is optional. If you specify the destination address, you can either map it to itself
(identity NAT), or you can map it to a different address. The destination mapping is always a static mapping.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
476
Security Policies
NAT Rule Order
• Manual NAT—A single rule translates both the source and destination. A packet matches one rule
only, and further rules are not checked. Even if you do not configure the optional destination address,
a matching packet still matches one manual NAT rule only. The source and destination are tied
together, so you can enforce different translations depending on the source/destination combination.
For example, sourceA/destinationA can have a different translation than sourceA/destinationB.
Section 1 Manual NAT Applied on a first match basis, in the order they appear in the
configuration. Because the first match is applied, you must ensure
that specific rules come before more general rules, or the specific
rules might not be applied as desired. By default, manual NAT
rules are added to section 1.
By "specific rules first," we mean:
• Static rules should come before dynamic rules.
• Rules that include destination translation should come before
rules with source translation only.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
477
Security Policies
NAT Rule Order
Section 2 Auto NAT If a match in section 1 is not found, section 2 rules are applied in
the following order:
1. Static rules.
2. Dynamic rules.
Section 3 Manual NAT If a match is still not found, section 3 rules are applied on a first
match basis, in the order they appear in the configuration. This
section should contain your most general rules. You must also
ensure that any specific rules in this section come before general
rules that would otherwise apply.
For section 2 rules, for example, you have the following IP addresses defined within network objects:
• 192.168.1.0/24 (static)
• 192.168.1.0/24 (dynamic)
• 10.1.1.0/24 (static)
• 192.168.1.1/32 (static)
• 172.16.1.0/24 (dynamic) (object def)
• 172.16.1.0/24 (dynamic) (object abc)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
478
Security Policies
NAT Interfaces
NAT Interfaces
Except for bridge group member interfaces, you can configure a NAT rule to apply to any interface (in other
words, all interfaces), or you can identify specific real and mapped interfaces. You can also specify any
interface for the real address, and a specific interface for the mapped address, or vice versa.
For example, you might want to specify any interface for the real address and specify the outside interface
for the mapped address if you use the same private addresses on multiple interfaces, and you want to translate
them all to the same global pool when accessing the outside.
Figure 16: Specifying Any Interface
However, the concept of “any” interface does not apply to bridge group member interfaces. When you specify
“any” interface, all bridge group member interfaces are excluded. Thus, to apply NAT to bridge group members,
you must specify the member interface. This could result in many similar rules where only one interface is
different. You cannot configure NAT for the Bridge Virtual Interface (BVI) itself, you can configure NAT
for member interfaces only.
You cannot configure NAT on passive interfaces.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
479
Security Policies
Addresses on a Unique Network
Interface Guidelines
NAT is supported for standard routed physical or subinterfaces.
However, configuring NAT on bridge group member interfaces (interfaces that are part of a Bridge Virtual
Interface, or BVI) has the following restrictions:
• When configuring NAT for the members of a bridge group, you specify the member interface. You
cannot configure NAT for the bridge group interface (BVI) itself.
• When doing NAT between bridge group member interfaces, you must specify the source and destination
interfaces. You cannot specify “any” as the interface.
• You cannot configure interface PAT when the destination interface is a bridge group member interface,
because there is no IP address attached to the interface.
• You cannot translate between IPv4 and IPv6 networks (NAT64/46) when the source and destination
interfaces are members of the same bridge group. Static NAT/PAT 44/66, dynamic NAT44/66, and
dynamic PAT44 are the only allowed methods; dynamic PAT66 is not supported.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
480
Security Policies
IPv6 NAT Best Practices
• You cannot translate between IPv4 and IPv6 for interfaces that are members of the same bridge group.
You can translate between two IPv6 or two IPv4 networks only. This restriction does not apply between
a bridge group member and a standard routed interface.
• You cannot use dynamic PAT for IPv6 (NAT66) when translating between interfaces in the same bridge
group. This restriction does not apply between a bridge group member and a standard routed interface.
• For static NAT, you can specify an IPv6 subnet up to /64. Larger subnets are not supported.
• When using FTP with NAT46, when an IPv4 FTP client connects to an IPv6 FTP server, the client must
use either the extended passive mode (EPSV) or extended port mode (EPRT); PASV and PORT commands
are not supported with IPv6.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
481
Security Policies
NAT Support for Inspected Protocols
The following table lists the inspected protocols that apply NAT rewrite and their NAT limitations. Keep
these limitations in mind when writing NAT rules that include these protocols. Inspected protocols not listed
here do not apply NAT rewrite. These inspections include GTP, HTTP, IMAP, POP, SMTP, SSH, and SSL.
Note NAT rewrite is supported on the listed ports only. If you use these protocols on non-standard ports, do not
use NAT on the connections.
DNS over UDP UDP/53 No NAT support is available for name resolution No
through WINS.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
482
Security Policies
Additional Guidelines for NAT
Note If you remove a dynamic NAT or PAT rule, and then add a new rule with mapped
addresses that overlap the addresses in the removed rule, then the new rule will
not be used until all connections associated with the removed rule time out or are
cleared using the clear xlate command. This safeguard ensures that the same
address is not assigned to multiple hosts.
• You cannot use an object group with both IPv4 and IPv6 addresses; the object group must include only
one type of address.
• A network object used in NAT cannot include more than 131,838 IP addresses, either explicitly or implied
in a range of addresses or a subnet. Break up the address space into smaller ranges and write separate
rules for the smaller objects.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
483
Security Policies
Configure NAT
• (Manual NAT only.) When using any as the source address in a NAT rule, the definition of “any” traffic
(IPv4 vs. IPv6) depends on the rule. Before the Firepower Threat Defense device performs NAT on a
packet, the packet must be IPv6-to-IPv6 or IPv4-to-IPv4; with this prerequisite, the Firepower Threat
Defense device can determine the value of any in a NAT rule. For example, if you configure a rule from
“any” to an IPv6 server, and that server was mapped from an IPv4 address, then any means “any IPv6
traffic.” If you configure a rule from “any” to “any,” and you map the source to the interface IPv4 address,
then any means “any IPv4 traffic” because the mapped interface address implies that the destination is
also IPv4.
• You can use the same mapped object or group in multiple NAT rules.
• The mapped IP address pool cannot include:
• The mapped interface IP address. If you specify “any” interface for the rule, then all interface IP
addresses are disallowed. For interface PAT (routed mode only), specify the interface name instead
of the interface address.
• The failover interface IP address.
• (Dynamic NAT.) The standby interface IP address when VPN is enabled.
• Avoid using overlapping addresses in static and dynamic NAT policies. For example, with overlapping
addresses, a PPTP connection can fail to get established if the secondary connection for PPTP hits the
static instead of dynamic xlate.
• You cannot use overlapping addresses in the source address of a NAT rule and a remote access VPN
address pool.
• If you specify a destination interface in a rule, then that interface is used as the egress interface rather
than looking up the route in the routing table. However, for identity NAT, you have the option to use a
route lookup instead.
• NAT applies to through traffic only. Traffic generated by the system is not subject to NAT.
Configure NAT
Network address translation can be very complex. We recommend that you keep your rules as simple as
possible to avoid translation problems and difficult troubleshooting situations. Careful planning before you
implement NAT is critical. The following procedure provides the basic approach.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
484
Security Policies
Dynamic NAT
Dynamic NAT
The following topics explain dynamic NAT and how to configure it.
Note For the duration of the translation, a remote host can initiate a connection to the translated host if an access
rule allows it. Because the address is unpredictable, a connection to the host is unlikely. Nevertheless, in this
case you can rely on the security of the access rule.
The following figure shows a typical dynamic NAT scenario. Only real hosts can create a NAT session, and
responding traffic is allowed back.
Figure 17: Dynamic NAT
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
485
Security Policies
Dynamic NAT Disadvantages and Advantages
The following figure shows a remote host attempting to initiate a connection to a mapped address. This address
is not currently in the translation table; therefore, the packet is dropped.
Figure 18: Remote Host Attempts to Initiate a Connection to a Mapped Address
The advantage of dynamic NAT is that some protocols cannot use PAT. PAT does not work with the following:
• IP protocols that do not have a port to overload, such as GRE version 0.
• Some multimedia applications that have a data stream on one port, the control path on another port, and
are not open standard.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
486
Security Policies
Configure Dynamic Auto NAT
• Original Address—This must be a network object (not a group), and it can be a host, range, or subnet.
• Translated Address—This can be a network object or group, but it cannot include a subnet. The group
cannot contain both IPv4 and IPv6 addresses; it must contain one type only. If a group contains both
ranges and host IP addresses, then the ranges are used for dynamic NAT, and then the host IP addresses
are used as a PAT fallback.
Procedure
Step 5 (Optional.) Click the Advanced Options link and select the desired options:
• Translate DNS replies that match this rule—Whether to translate the IP address in DNS replies. For
DNS replies traversing from a mapped interface to a real interface, the Address (the IPv4 A or IPv6
AAAA) record is rewritten from the mapped value to the real value. Conversely, for DNS replies traversing
from a real interface to a mapped interface, the record is rewritten from the real value to the mapped
value. This option is used in specific circumstances, and is sometimes needed for NAT64/46 translation,
where the rewrite also converts between A and AAAA records. For more information, see Rewriting
DNS Queries and Responses Using NAT, on page 545.
• Fallthrough to Interface PAT (Destination Interface)—Whether to use the IP address of the destination
interface as a backup method when the other mapped addresses are already allocated (interface PAT
fallback). This option is available only if you select a destination interface that is not a member of a
bridge group.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
487
Security Policies
Configure Dynamic Manual NAT
You can also create network objects for the Original Destination Address and Translated Destination
Address if you are configuring a static translation for those addresses in the rule.
For dynamic NAT, you can also perform port translation on the destination. In the Object Manager, ensure
that there are port objects you can use for the Original Destination Port and Translated Destination Port.
If you specify the source port, it will be ignored.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
488
Security Policies
Configure Dynamic Manual NAT
Step 5 Identify the original packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear in the
original packet.
See the following figure for an example of the original packet vs. the translated packet.
• Original Source Address—The network object or group that contains the addresses you are translating.
• Original Destination Address—(Optional.) The network object that contains the addresses of the
destinations. If you leave this blank, the source address translation applies regardless of destination. If
you do specify the destination address, you can configure a static translation for that address or just use
identity NAT for it.
You can select Interface to base the original destination on the source interface (which cannot be Any).
If you select this option, you must also select a translated destination object. To implement a static
interface NAT with port translation for the destination addresses, select this option and also select the
appropriate port objects for the destination ports.
Step 6 Identify the translated packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear on
the destination interface network. You can translate between IPv4 and IPv6 if desired.
• Translated Source Address—The network object or group that contains the mapped addresses.
• Translated Destination Address—(Optional.) The network object or group that contains the destination
addresses used in the translated packet. If you selected an object for Original Destination Address, you
can set up identity NAT (that is, no translation) by selecting the same object.
Step 7 (Optional.) Identify the destination service ports for service translation: Original Destination Port, Translated
Destination Port.
Dynamic NAT does not support port translation, so leave the Original Source Port and Translated Source
Port fields empty. However, because the destination translation is always static, you can perform port translation
for the destination port.
NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and mapped service
objects are identical (both TCP or both UDP). For identity NAT, you can use the same service object for both
the real and mapped ports.
Step 8 (Optional.) Click the Advanced Options link and select the desired options:
• Translate DNS replies that match this rule—Whether to translate the IP address in DNS replies. For
DNS replies traversing from a mapped interface to a real interface, the Address (the IPv4 A or IPv6
AAAA) record is rewritten from the mapped value to the real value. Conversely, for DNS replies traversing
from a real interface to a mapped interface, the record is rewritten from the real value to the mapped
value. This option is used in specific circumstances, and is sometimes needed for NAT64/46 translation,
where the rewrite also converts between A and AAAA records. For more information, see Rewriting
DNS Queries and Responses Using NAT, on page 545.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
489
Security Policies
Dynamic PAT
• Fallthrough to Interface PAT (Destination Interface)—Whether to use the IP address of the destination
interface as a backup method when the other mapped addresses are already allocated (interface PAT
fallback). This option is available only if you select a destination interface that is not a member of a
bridge group.
Dynamic PAT
The following topics describe dynamic PAT.
For the duration of the translation, a remote host on the destination network can initiate a connection to the
translated host if an access rule allows it. Because the port address (both real and mapped) is unpredictable,
a connection to the host is unlikely. Nevertheless, in this case you can rely on the security of the access rule.
After the connection expires, the port translation also expires.
Note We recommend that you use different PAT pools for each interface. If you use the same pool for multiple
interfaces, especially if you use it for "any" interface, the pool can be quickly exhausted, with no ports available
for new translations.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
490
Security Policies
Configure Dynamic Auto PAT
You cannot use dynamic PAT for IPv6 (NAT66) when translating between interfaces in the same bridge
group. This restriction does not apply between a bridge group member and a standard routed interface.
Dynamic PAT does not work with some multimedia applications that have a data stream that is different from
the control path. For more information, see NAT Support for Inspected Protocols, on page 481.
Dynamic PAT might also create a large number of connections appearing to come from a single IP address,
and servers might interpret the traffic as a DoS attack.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
491
Security Policies
Configure Dynamic Manual PAT
• (Interface PAT.) To use the IPv4 address of the destination interface, select Interface. You must
also select a specific destination interface, which cannot be a bridge group member interface. You
cannot use interface PAT for IPv6.
• To use a single address other than the destination interface address, select the host network object
you created for this purpose.
Step 5 (Optional.) Click the Advanced Options link and select the desired options:
• Fallthrough to Interface PAT (Destination Interface)—Whether to use the IP address of the destination
interface as a backup method when the other mapped addresses are already allocated (interface PAT
fallback). This option is available only if you select a destination interface that is not a member of a
bridge group. You cannot select this option if you already configured interface PAT as the translated
address. You also cannot use this option with IPv6 networks.
You can also create network objects for the Original Destination Address and Translated Destination
Address if you are configuring a static translation for those addresses in the rule.
For dynamic PAT, you can also perform port translation on the destination. In the Object Manager, ensure
that there are port objects you can use for the Original Destination Port and Translated Destination Port.
If you specify the source port, it will be ignored.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
492
Security Policies
Configure Dynamic Manual PAT
Step 5 Identify the original packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear in the
original packet.
See the following figure for an example of the original packet vs. the translated packet.
• Original Source Address—The network object or group that contains the addresses you are translating.
• Original Destination Address—(Optional.) The network object that contains the addresses of the
destinations. If you leave this blank, the source address translation applies regardless of destination. If
you do specify the destination address, you can configure a static translation for that address or just use
identity NAT for it.
You can select Interface to base the original destination on the source interface (which cannot be Any).
If you select this option, you must also select a translated destination object. To implement a static
interface NAT with port translation for the destination addresses, select this option and also select the
appropriate port objects for the destination ports.
Step 6 Identify the translated packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear on
the destination interface network. You can translate between IPv4 and IPv6 if desired.
• Translated Source Address—One of the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
493
Security Policies
Static NAT
• (Interface PAT.) To use the IPv4 address of the destination interface, select Interface. You must
also select a specific destination interface, which cannot be a bridge group member interface. You
cannot use interface PAT for IPv6.
• To use a single address other than the destination interface address, select the host network object
you created for this purpose.
• Translated Destination Address—(Optional.) The network object or group that contains the destination
addresses used in the translated packet. If you selected an object for Original Destination, you can set
up identity NAT (that is, no translation) by selecting the same object.
Step 7 (Optional.) Identify the destination service ports for service translation: Original Destination Port, Translated
Destination Port.
Dynamic NAT does not support port translation, so leave the Original Source Port and Translated Source
Port fields empty. However, because the destination translation is always static, you can perform port translation
for the destination port.
NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and mapped service
objects are identical (both TCP or both UDP). For identity NAT, you can use the same service object for both
the real and mapped ports.
Step 8 (Optional.) Click the Advanced Options link and select the desired options:
• Fallthrough to Interface PAT (Destination Interface)—Whether to use the IP address of the destination
interface as a backup method when the other mapped addresses are already allocated (interface PAT
fallback). This option is available only if you select a destination interface that is not a member of a
bridge group. You cannot select this option if you already configured interface PAT as the translated
address. You also cannot use this option with IPv6 networks.
Static NAT
The following topics explain static NAT and how to implement it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
494
Security Policies
Static NAT with Port Translation
Static NAT-with-port-translation rules limit access to the destination IP address for the specified port only.
If you try to access the destination IP address on a different port not covered by a NAT rule, then the connection
is blocked. In addition, for manual NAT, traffic that does not match the source IP address of the NAT rule
will be dropped if it matches the destination IP address, regardless of the destination port. Therefore, you
must add additional rules for all other traffic allowed to the destination IP address. For example, you can
configure a static NAT rule for the IP address, without port specification, and place it after the port translation
rule.
Note For applications that require application inspection for secondary channels (for example, FTP and VoIP),
NAT automatically translates the secondary ports.
Following are some other uses of static NAT with port translation.
Static NAT with Identity Port Translation
You can simplify external access to internal resources. For example, if you have three separate servers
that provide services on different ports (such as FTP, HTTP, and SMTP), you can give external users a
single IP address to access those services. You can then configure static NAT with identity port translation
to map the single external IP address to the correct IP addresses of the real servers based on the port they
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
495
Security Policies
One-to-Many Static NAT
are trying to access. You do not need to change the port, because the servers are using the standard ones
(21, 80, and 25 respectively).
Static NAT with Port Translation for Non-Standard Ports
You can also use static NAT with port translation to translate a well-known port to a non-standard port
or vice versa. For example, if inside web servers use port 8080, you can allow outside users to connect
to port 80, and then undo translation to the original port 8080. Similarly, to provide extra security, you
can tell web users to connect to non-standard port 6785, and then undo translation to port 80.
Static Interface NAT with Port Translation
You can configure static NAT to map a real address to an interface address/port combination. For example,
if you want to redirect Telnet access for the device's outside interface to an inside host, then you can map
the inside host IP address/port 23 to the outside interface address/port 23.
For example, you have a load balancer at 10.1.2.27. Depending on the URL requested, it redirects traffic to
the correct web server.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
496
Security Policies
Other Mapping Scenarios (Not Recommended)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
497
Security Policies
Configure Static Auto NAT
For a many-to-few or many-to-one configuration, where you have more real addresses than mapped addresses,
you run out of mapped addresses before you run out of real addresses. Only the mappings between the lowest
real IP addresses and the mapped pool result in bidirectional initiation. The remaining higher real addresses
can initiate traffic, but traffic cannot be initiated to them (returning traffic for a connection is directed to the
correct real address because of the unique 5-tuple (source IP, destination IP, source port, destination port,
protocol) for the connection).
Note Many-to-few or many-to-one NAT is not PAT. If two real hosts use the same source port number and go to
the same outside server and the same TCP destination port, and both hosts are translated to the same IP address,
then both connections will be reset because of an address conflict (the 5-tuple is not unique).
Instead of using a static rule this way, we suggest that you create a one-to-one rule for the traffic that needs
bidirectional initiation, and then create a dynamic rule for the rest of your addresses.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
498
Security Policies
Configure Static Auto NAT
• Destination Interface—To use the destination interface IPv4 address, you do not need a network
object. This configures static interface NAT with port translation: the source address/port is translated
to the interface's address and the same port number. You cannot use interface PAT for IPv6.
• Address—Create a network object or group containing hosts, ranges, or subnets. A group cannot
contain both IPv4 and IPv6 addresses; it must contain one type only. Typically, you configure the
same number of mapped addresses as real addresses for a one-to-one mapping. You can, however,
have a mismatched number of addresses.
Procedure
• (Optional.) Original Port, Translated Port—If you need to translate a TCP or UDP port, select the port
objects that define the original and translated ports. The objects must be for the same protocol. Click the
Create New Object link if the objects do not already exist. For example, you can translate TCP/80 to
TCP/8080 if necessary.
Step 5 (Optional.) Click the Advanced Options link and select the desired options:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
499
Security Policies
Configure Static Manual NAT
• Translate DNS replies that match this rule—Whether to translate the IP address in DNS replies. For
DNS replies traversing from a mapped interface to a real interface, the Address (the IPv4 A or IPv6
AAAA) record is rewritten from the mapped value to the real value. Conversely, for DNS replies traversing
from a real interface to a mapped interface, the record is rewritten from the real value to the mapped
value. This option is used in specific circumstances, and is sometimes needed for NAT64/46 translation,
where the rewrite also converts between A and AAAA records. For more information, see Rewriting
DNS Queries and Responses Using NAT, on page 545. This option is not available if you are doing port
translation.
• Do not proxy ARP on Destination Interface—Disables proxy ARP for incoming packets to the mapped
IP addresses. If you use addresses on the same network as the mapped interface, the system uses proxy
ARP to answer any ARP requests for the mapped addresses, thus intercepting traffic destined for a
mapped address. This solution simplifies routing because the device does not have to be the gateway for
any additional networks. You can disable proxy ARP if desired, in which case you need to be sure to
have proper routes on the upstream router. Normally for identity NAT, proxy ARP is not required, and
in some cases can cause connectivity issues.
You can also create network objects for the Original Destination Address and Translated Destination
Address if you are configuring a static translation for those addresses in the rule. If you want to configure
destination static interface NAT with port translation only, you can skip adding an object for the destination
mapped addresses and specify the interface in the rule.
You can also perform port translation on the source, destination, or both. In the Object Manager, ensure that
there are port objects you can use for the original and translated ports.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
500
Security Policies
Configure Static Manual NAT
Procedure
Step 5 Identify the original packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear in the
original packet.
See the following figure for an example of the original packet vs. the translated packet.
• Original Source Address—The network object or group that contains the addresses you are translating.
• Original Destination Address—(Optional.) The network object that contains the addresses of the
destinations. If you leave this blank, the source address translation applies regardless of destination. If
you do specify the destination address, you can configure a static translation for that address or just use
identity NAT for it.
You can select Interface to base the original destination on the source interface (which cannot be Any).
If you select this option, you must also select a translated destination object. To implement a static
interface NAT with port translation for the destination addresses, select this option and also select the
appropriate port objects for the destination ports.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
501
Security Policies
Configure Static Manual NAT
Step 6 Identify the translated packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear on
the destination interface network. You can translate between IPv4 and IPv6 if desired.
• Translated Source Address—One of the following:
• To use a set group of addresses, select the network object or group that contains the mapped addresses.
Typically, you configure the same number of mapped addresses as real addresses for a one-to-one
mapping. You can, however, have a mismatched number of addresses.
• (Static interface NAT with port translation.) To use the IPv4 address of the destination interface,
select Interface. You must also select a specific destination interface, which cannot be a bridge
group member interface. This configures static interface NAT with port translation: the source
address/port is translated to the interface's address and the same port number. You cannot use
interface PAT for IPv6.
• Translated Destination Address—(Optional.) The network object or group that contains the destination
addresses used in the translated packet. If you selected an object for Original Destination, you can set
up identity NAT (that is, no translation) by selecting the same object.
Step 7 (Optional.) Identify the source or destination service ports for service translation.
If you are configuring static NAT with port translation, you can translate ports for the source, destination, or
both. For example, you can translate between TCP/80 and TCP/8080.
NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and mapped service
objects are identical (both TCP or both UDP). For identity NAT, you can use the same service object for both
the real and mapped ports.
• Original Source Port, Translated Source Port—Defines a port translation for the source address.
• Original Destination Port, Translated Destination Port—Defines a port translation for the destination
address.
Step 8 (Optional.) Click the Advanced Options link and select the desired options:
• Translate DNS replies that match this rule—Whether to translate the IP address in DNS replies. For
DNS replies traversing from a mapped interface to a real interface, the Address (the IPv4 A or IPv6
AAAA) record is rewritten from the mapped value to the real value. Conversely, for DNS replies traversing
from a real interface to a mapped interface, the record is rewritten from the real value to the mapped
value. This option is used in specific circumstances, and is sometimes needed for NAT64/46 translation,
where the rewrite also converts between A and AAAA records. For more information, see Rewriting
DNS Queries and Responses Using NAT, on page 545. This option is not available if you are doing port
translation.
• Do not proxy ARP on Destination Interface—Disables proxy ARP for incoming packets to the mapped
IP addresses. If you use addresses on the same network as the mapped interface, the system uses proxy
ARP to answer any ARP requests for the mapped addresses, thus intercepting traffic destined for a
mapped address. This solution simplifies routing because the device does not have to be the gateway for
any additional networks. You can disable proxy ARP if desired, in which case you need to be sure to
have proper routes on the upstream router. Normally for identity NAT, proxy ARP is not required, and
in some cases can cause connectivity issues.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
502
Security Policies
Identity NAT
Identity NAT
You might have a NAT configuration in which you need to translate an IP address to itself. For example, if
you create a broad rule that applies NAT to every network, but want to exclude one network from NAT, you
can create a static NAT rule to translate an address to itself.
The following figure shows a typical identity NAT scenario.
Figure 26: Identity NAT
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
503
Security Policies
Configure Identity Manual NAT
• Source Interface, Destination Interface—(Required for bridge group member interfaces.) The interfaces
where this NAT rule applies. Source is the real interface, the one through which the traffic enters the
device. Destination is the mapped interface, the one through which traffic exits the device. By default,
the rule applies to all interfaces (Any) except for bridge group member interfaces.
• Original Address—The network object that contains the addresses you are translating.
• Translated Address—The same object as the original source. Optionally, you can select a different
object that has the exact same contents.
Do not configure the Original Port and Translated Port options for identity NAT.
Step 5 (Optional.) Click the Advanced Options link and select the desired options:
• Translate DNS replies that match this rule—Do not configure this option for identity NAT.
• Do not proxy ARP on Destination Interface—Disables proxy ARP for incoming packets to the mapped
IP addresses. If you use addresses on the same network as the mapped interface, the system uses proxy
ARP to answer any ARP requests for the mapped addresses, thus intercepting traffic destined for a
mapped address. This solution simplifies routing because the device does not have to be the gateway for
any additional networks. You can disable proxy ARP if desired, in which case you need to be sure to
have proper routes on the upstream router. Normally for identity NAT, proxy ARP is not required, and
in some cases can cause connectivity issues.
• Perform Route Lookup for Destination Interface— If you select source and destination interfaces
when selecting the same object for original and translated source address, you can select this option to
have the system determine the destination interface based on the routing table rather than using the
destination interface configured in the NAT rule.
You can also create network objects for the Original Destination Address and Translated Destination
Address if you are configuring a static translation for those addresses in the rule. If you want to configure
destination static interface NAT with port translation only, you can skip adding an object for the destination
mapped addresses and specify the interface in the rule.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
504
Security Policies
Configure Identity Manual NAT
You can also perform port translation on the source, destination, or both. In the Object Manager, ensure that
there are port objects you can use for the original and translated ports. You can use the same object for identity
NAT.
Procedure
Step 5 Identify the original packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear in the
original packet.
See the following figure for an example of the original packet vs. the translated packet where you perform
identity NAT on the inside host but translate the outside host.
• Original Source Address—The network object or group that contains the addresses you are translating.
• Original Destination Address—(Optional.) The network object that contains the addresses of the
destinations. If you leave this blank, the source address translation applies regardless of destination. If
you do specify the destination address, you can configure a static translation for that address or just use
identity NAT for it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
505
Security Policies
NAT Rule Properties for Firepower Threat Defense
You can select Interface to base the original destination on the source interface (which cannot be Any).
If you select this option, you must also select a translated destination object. To implement a static
interface NAT with port translation for the destination addresses, select this option and also select the
appropriate port objects for the destination ports.
Step 6 Identify the translated packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear on
the destination interface network. You can translate between IPv4 and IPv6 if desired.
• Translated Source Address—The same object as the original source. Optionally, you can select a
different object that has the exact same contents.
• Translated Destination Address—(Optional.) The network object or group that contains the destination
addresses used in the translated packet. If you selected an object for Original Destination Address, you
can set up identity NAT (that is, no translation) by selecting the same object.
Step 7 (Optional.) Identify the source or destination service ports for service translation.
If you are configuring static NAT with port translation, you can translate ports for the source, destination, or
both. For example, you can translate between TCP/80 and TCP/8080.
NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and mapped service
objects are identical (both TCP or both UDP). For identity NAT, you can use the same service object for both
the real and mapped ports.
• Original Source Port, Translated Source Port—Defines a port translation for the source address.
• Original Destination Port, Translated Destination Port—Defines a port translation for the destination
address.
Step 8 (Optional.) Click the Advanced Options link and select the desired options:
• Translate DNS replies that match this rule—Do not configure this option for identity NAT.
• Do not proxy ARP on Destination Interface—Disables proxy ARP for incoming packets to the mapped
IP addresses. If you use addresses on the same network as the mapped interface, the system uses proxy
ARP to answer any ARP requests for the mapped addresses, thus intercepting traffic destined for a
mapped address. This solution simplifies routing because the device does not have to be the gateway for
any additional networks. You can disable proxy ARP if desired, in which case you need to be sure to
have proper routes on the upstream router. Normally for identity NAT, proxy ARP is not required, and
in some cases can cause connectivity issues.
• Perform route lookup for Destination interface— If you select source and destination interfaces when
selecting the same object for original and translated source address, you can select this option to have
the system determine the destination interface based on the routing table rather than using the destination
interface configured in the NAT rule.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
506
Security Policies
Packet Translation Properties for Auto NAT
NAT rules include the following basic properties. The properties are the same for auto NAT and manual NAT
rules except where indicated.
Title
Enter a name for the rule. The name cannot include spaces.
Create Rule For
Whether the translation rule is Auto NAT or Manual NAT. Auto NAT is simpler than manual NAT,
but manual NAT allows you to create separate translations for a source address based on the destination
address.
Status
Whether you want the rule to be active or disabled.
Placement (Manual NAT only.)
Where you want to add the rule. You can insert it in a category (before or after auto NAT rules), or above
or below the rule you select.
Type
Whether the translation rule is Dynamic or Static. Dynamic translation automatically chooses the mapped
address from a pool of addresses, or an address/port combination when implementing PAT. Use static
translation if you want to precisely define the mapped address/port.
The following topics describe the remaining NAT rules properties.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
507
Security Policies
Packet Translation Properties for Manual NAT
• (Interface PAT.) To use the IPv4 address of the destination interface, select Interface. You
must also select a specific destination interface, which cannot be a bridge group member
interface. You cannot use interface PAT for IPv6.
• To use a single address other than the destination interface address, select the host network
object you created for this purpose.
• Identity NAT—The same object as the original source. Optionally, you can select a different object
that has the exact same contents.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
508
Security Policies
Packet Translation Properties for Manual NAT
• Identity NAT—The same object as the original source. Optionally, you can select a different object
that has the exact same contents.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
509
Security Policies
Advanced NAT Properties
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
510
Security Policies
NAT64/46: Translating IPv6 Addresses to IPv4
• NAT66—Translates IPv6 packets to a different IPv6 address. We recommend using static NAT. Although
you can use dynamic NAT or PAT, IPv6 addresses are in such large supply, you do not have to use
dynamic NAT.
Note NAT64 and NAT 46 are possible on standard routed interfaces only. NAT66 is possible on both routed and
bridge group member interfaces.
You need to define two policies, one for the source IPv6 network, and one for the destination IPv4 network.
Although you can accomplish this with a single manual NAT rule, if the DNS server is on the external network,
you probably need to rewrite the DNS response. Because you cannot enable DNS rewrite on a manual NAT
rule when you specify a destination, creating two auto NAT rules is the better solution.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
511
Security Policies
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet
In this example, you translate the inside IPv6 network to IPv4 using dynamic interface PAT with the IP address
of the outside interface. Outside IPv4 traffic is statically translated to addresses on the 2001:db8::/96 network,
allowing transmission on the inside network.
Procedure
d) Click OK.
Step 2 Create the manual NAT rule to translate the IPv6 network to IPv4 and back again.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = PAT64Rule (or another name of your choosing).
• Create Rule For = Manual NAT.
• Placement = Before Auto NAT Rules
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = outside.
• Original Packet Source Address = inside_v6 network object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
512
Security Policies
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
• Translated Packet Source Address = Interface. This option uses the IPv4 address of the destination
interface as the PAT address.
• Original Packet Destination Address = inside_v6 network object.
• Translated Packet Destination Address = any-ipv4 network object.
d) Click OK.
With this rule, any traffic from the 2001:db8::/96 subnet on the inside interface going to the outside
interface gets a NAT64 PAT translation using the IPv4 address of the outside interface. Conversely, any
IPv4 address on the outside network coming to the inside interface is translated to an address on the
2001:db8::/96 network using the embedded IPv4 address method.
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
Following is a typical example where you have an inside IPv6-only network, but there are some IPv4-only
services on the outside Internet that internal users need.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
513
Security Policies
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
In this example, you translate the inside IPv6 network to IPv4 using dynamic interface PAT with the IP address
of the outside interface. Outside IPv4 traffic is statically translated to addresses on the 2001:db8::/96 network,
allowing transmission on the inside network. You enable DNS rewrite on the NAT46 rule, so that replies from
the external DNS server can be converted from A (IPv4) to AAAA (IPv6) records, and the addresses converted
from IPv4 to IPv6.
Following is a typical sequence for a web request where a client at 2001:DB8::100 on the internal IPv6 network
tries to open www.example.com.
1. The client’s computer sends a DNS request to the DNS server at 2001:DB8::D1A5:CA81. The NAT rules
make the following translations to the source and destination in the DNS request:
• 2001:DB8::100 to a unique port on 209.165.201.1 (The NAT64 interface PAT rule.)
• 2001:DB8::D1A5:CA81 to 209.165.202.129 (The NAT46 rule. D1A5:CA81 is the IPv6 equivalent
of 209.165.202.129.)
2. The DNS server responds with an A record indicating that www.example.com is at 209.165.200.225. The
NAT46 rule, with DNS rewrite enabled, converts the A record to the IPv6-equivalent AAAA record, and
translates 209.165.200.225 to 2001:db8:D1A5:C8E1in the AAAA record. In addition, the source and
destination addresses in the DNS response are untranslated:
• 209.165.202.129 to 2001:DB8::D1A5:CA81
• 209.165.201.1 to 2001:db8::100
3. The IPv6 client now has the IP address of the web server, and makes an HTTP request to www.example.com
at 2001:db8:D1A5:C8E1. (D1A5:C8E1 is the IPv6 equivalent of 209.165.200.225.) The source and
destination of the HTTP request are translated:
• 2001:DB8::100 to a unique port on 209.156.101.54 (The NAT64 interface PAT rule.)
• 2001:db8:D1A5:C8E1 to 209.165.200.225 (The NAT46 rule.)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
514
Security Policies
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
Procedure
Step 1 Create the network objects that define the inside IPv6 and outside IPv4 networks.
a) Choose Objects.
b) Select Network from the table of contents and click +.
c) Define the inside IPv6 network.
Name the network object (for example, inside_v6), select Network, and enter the network address,
2001:db8::/96.
d) Click OK.
e) Click + and define the outside IPv4 network.
Name the network object (for example, outside_v4_any), select Network, and enter the network address
0.0.0.0/0.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
515
Security Policies
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
Step 2 Configure the NAT64 dynamic PAT rule for the inside IPv6 network.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = PAT64Rule (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = inside_v6 network object.
• Translated Address = Interface. This option uses the IPv4 address of the destination interface as
the PAT address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
516
Security Policies
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
d) Click OK.
With this rule, any traffic from the 2001:db8::/96 subnet on the inside interface going to the outside
interface gets a NAT64 PAT translation using the IPv4 address of the outside interface.
Step 3 Configure the static NAT46 rule for the outside IPv4 network.
a) Click the + button.
b) Configure the following properties:
• Title = NAT46Rule (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Static.
• Source Interface = outside.
• Destination Interface = inside.
• Original Address = outside_v4_any network object.
• Translated Address = inside_v6 network object.
• On the Advanced Options tab, select Translate DNS replies that match this rule.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
517
Security Policies
NAT66: Translating IPv6 Addresses to Different IPv6 Addresses
c) Click OK.
With this rule, any IPv4 address on the outside network coming to the inside interface is translated to an
address on the 2001:db8::/96 network using the embedded IPv4 address method. In addition, DNS responses
are converted from A (IPv4) to AAAA (IPv6) records, and the addresses converted from IPv4 to IPv6.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
518
Security Policies
NAT66 Example, Static Translation between Networks
Note This example assumes that the inside interface is not a bridge group interface (BVI) but a standard routed
interface. If the inside interface is a BVI, you need to duplicate the rules for each member interface.
Procedure
Step 1 Create the network objects that define the inside IPv6 and outside IPv6 NAT networks.
a) Choose Objects.
b) Select Network from the table of contents and click +.
c) Define the inside IPv6 network.
Name the network object (for example, inside_v6), select Network, and enter the network address,
2001:db8:122:2091::/96.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
519
Security Policies
NAT66 Example, Static Translation between Networks
d) Click OK.
e) Click + and define the outside IPv6 NAT network.
Name the network object (for example, outside_nat_v6), select Network, and enter the network address
2001:db8:122:2999::/96.
Step 2 Configure the static NAT rule for the inside IPv6 network.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = NAT66Rule (or another name of your choosing).
• Create Rule For = Auto NAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
520
Security Policies
NAT66 Example, Simple IPv6 Interface PAT
• Type = Static.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = inside_v6 network object.
• Translated Address = outside_nat_v6 network object.
d) Click OK.
With this rule, any traffic from the 2001:db8:122:2091::/96 subnet on the inside interface going to the
outside interface gets a static NAT66 translation to an address on the 2001:db8:122:2999::/96 network.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
521
Security Policies
NAT66 Example, Simple IPv6 Interface PAT
Note This example assumes that the inside interface is not a bridge group interface (BVI) but a standard routed
interface. If the inside interface is a BVI, you need to duplicate the rules for each member interface.
Procedure
Step 1 Create the network objects that define the inside IPv6 network and the IPv6 PAT address.
a) Choose Objects.
b) Select Network from the table of contents and click +.
c) Define the inside IPv6 network.
Name the network object (for example, inside_v6), select Network, and enter the network address,
2001:db8:122:2091::/96.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
522
Security Policies
NAT66 Example, Simple IPv6 Interface PAT
d) Click OK.
e) Click + and define the outside IPv6 PAT address.
Name the network object (for example, ipv6_pat), select Host, and enter the host address
2001:db8:122:201b::2.
Step 2 Configure the dynamic PAT rule for the inside IPv6 network.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = PAT66Rule (or another name of your choosing).
• Create Rule For = Auto NAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
523
Security Policies
Monitoring NAT
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = inside_v6 network object.
• Translated Address = ipv6_pat network object.
d) Click OK.
With this rule, any traffic from the 2001:db8:122:2091::/96 subnet on the inside interface going to the
outside interface gets a dynamic PAT66 translation to a port on 2001:db8:122:201b::2.
Monitoring NAT
To monitor and troubleshoot NAT connections, open the CLI console or log into the device CLI and use the
following commands.
• show nat displays the NAT rules and per-rule hit counts. There are additional keywords to show other
aspects of NAT.
• show xlate displays the actual NAT translations that are currently active.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
524
Security Policies
Examples for NAT
• clear xlate lets you remove an active NAT translation. You might need to remove active translations if
you alter NAT rules, because existing connections continue to use the old translation slot until the
connection ends. Clearing a translation allows the system to build a new translation for a client on the
client's next connection attempt based on your new rules. (You cannot use this command in the CLI
console.)
Note This example assumes that the inside interface is not a bridge group interface (BVI) but a standard routed
interface. If the inside interface is a BVI, select the specific bridge group member interface to which the web
server is attached, for example, inside1_3.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
525
Security Policies
Providing Access to an Inside Web Server (Static Auto NAT)
Procedure
Step 1 Create the network objects that define the server’s private and public host addresses.
a) Choose Objects.
b) Select Network from the table of contents and click +.
c) Define the web server’s private address.
Name the network object (for example, WebServerPrivate), select Host, and enter the real host IP address,
10.1.2.27.
d) Click OK.
e) Click + and define the public address.
Name the network object (for example, WebServerPublic), select Host, and enter the host address
209.165.201.10.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
526
Security Policies
Providing Access to an Inside Web Server (Static Auto NAT)
f) Click OK.
Step 2 Configure static NAT for the object.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = WebServer (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Static.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = WebServerPrivate network object.
• Translated Address = WebServerPublic network object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
527
Security Policies
Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation)
d) Click OK.
Note This example assumes that the inside interface is a standard routed interface attached to a switch, with the
servers attached to the switch. If your inside interface is a bridge group interface (BVI), and the servers are
attached to separate bridge group member interfaces, select the specific member interface to which each server
is attached for the corresponding rule. For example, the rules might have inside1_2, inside1_3, and inside1_4
for the source interface rather than inside.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
528
Security Policies
Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation)
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
529
Security Policies
Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation)
d) Click OK.
Step 2 Create a network object for the HTTP server.
a) Click +.
b) Name the network object (for example, HTTPserver), select Host, and enter the host address 10.1.2.28.
c) Click OK.
Step 3 Create a network object for the SMTP server.
a) Click +.
b) Name the network object (for example, SMTPserver), select Host, and enter the host address 10.1.2.29.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
530
Security Policies
Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation)
c) Click OK.
Step 4 Create a network object for the public IP address used for the three servers.
a) Click +.
b) Name the network object (for example, ServerPublicIP), select Host, and enter the host address
209.165.201.3.
c) Click OK.
Step 5 Configure static NAT with port translation for the FTP server, mapping the FTP port to itself.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
531
Security Policies
Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation)
d) Click OK.
Step 6 Configure static NAT with port translation for the HTTP server, mapping the HTTP port to itself.
a) Click the + button.
b) Configure the following properties:
• Title = HTTPServer (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Static.
• Source Interface = inside.
• Destination Interface = outside.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
532
Security Policies
Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation)
c) Click OK.
Step 7 Configure static NAT with port translation for the SMTP server, mapping the SMTP port to itself.
a) Click the + button.
b) Configure the following properties:
• Title = SMTPServer (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Static.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = SMTPserver network object.
• Translated Address = ServerPublicIP network object.
• Original Port = SMTP port object.
• Translated Port = SMTP port object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
533
Security Policies
Different Translation Depending on the Destination (Dynamic Manual PAT)
c) Click OK.
Note This example assumes that the inside interface is a standard routed interface attached to a switch, with the
servers attached to the switch. If your inside interface is a bridge group interface (BVI), and the servers are
attached to separate bridge group member interfaces, select the specific member interface to which each server
is attached for the corresponding rule. For example, the rules might have inside1_2 and inside1_3 for the
source interface rather than inside.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
534
Security Policies
Different Translation Depending on the Destination (Dynamic Manual PAT)
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
535
Security Policies
Different Translation Depending on the Destination (Dynamic Manual PAT)
d) Click OK.
Step 2 Create a network object for the DMZ network 1.
a) Click +.
b) Name the network object (for example, DMZnetwork1), select Network, and enter the network address
209.165.201.0/27 (subnet mask of 255.255.255.224).
c) Click OK.
Step 3 Create a network object for the PAT address for DMZ network 1.
a) Click +.
b) Name the network object (for example, PATaddress1), select Host, and enter the host address
209.165.202.129.
c) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
536
Security Policies
Different Translation Depending on the Destination (Dynamic Manual PAT)
c) Click OK.
Step 5 Create a network object for the PAT address for DMZ network 2.
a) Click +.
b) Name the network object (for example, PATaddress2), select Host, and enter the host address
209.165.202.130.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
537
Security Policies
Different Translation Depending on the Destination (Dynamic Manual PAT)
c) Click OK.
Step 6 Configure dynamic manual PAT for DMZ network 1.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = DMZNetwork1 (or another name of your choosing).
• Create Rule For = Manual NAT.
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = dmz.
• Original Source Address = myInsideNetwork network object.
• Translated Source Address = PATaddress1 network object.
• Original Destination Address = DMZnetwork1 network object.
• Translated Destination Address = DMZnetwork1 network object.
Note Because you do not want to translate the destination address, you need to configure identity
NAT for it by specifying the same address for the original and translated destination
addresses. Leave all of the port fields blank.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
538
Security Policies
Different Translation Depending on the Destination (Dynamic Manual PAT)
d) Click OK.
Step 7 Configure dynamic manual PAT for DMZ network 2.
a) Click the + button.
b) Configure the following properties:
• Title = DMZNetwork2 (or another name of your choosing).
• Create Rule For = Manual NAT.
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = dmz.
• Original Source Address = myInsideNetwork network object.
• Translated Source Address = PATaddress2 network object.
• Original Destination Address = DMZnetwork2 network object.
• Translated Destination Address = DMZnetwork2 network object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
539
Security Policies
Different Translation Depending on the Destination Address and Port (Dynamic Manual PAT)
c) Click OK.
Note This example assumes that the inside interface is a standard routed interface attached to a switch, with the
server attached to the switch. If your inside interface is a bridge group interface (BVI), and the server is
attached to a bridge group member interface, select the specific member interface to which the server is
attached. For example, the rule might have inside1_2 for the source interface rather than inside.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
540
Security Policies
Different Translation Depending on the Destination Address and Port (Dynamic Manual PAT)
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
541
Security Policies
Different Translation Depending on the Destination Address and Port (Dynamic Manual PAT)
d) Click OK.
Step 2 Create a network object for the Telnet/Web server.
a) Click +.
b) Name the network object (for example, TelnetWebServer), select Host, and enter the host address
209.165.201.11.
c) Click OK.
Step 3 Create a network object for the PAT address when using Telnet.
a) Click +.
b) Name the network object (for example, PATaddress1), select Host, and enter the host address
209.165.202.129.
c) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
542
Security Policies
Different Translation Depending on the Destination Address and Port (Dynamic Manual PAT)
Step 4 Create a network object for the PAT address when using HTTP.
a) Click +.
b) Name the network object (for example, PATaddress2), select Host, and enter the host address
209.165.202.130.
c) Click OK.
Step 5 Configure dynamic manual PAT for Telnet access.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = TelnetServer (or another name of your choosing).
• Create Rule For = Manual NAT.
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = dmz.
• Original Source Address = myInsideNetwork network object.
• Translated Source Address= PATaddress1 network object.
• Original Destination Address = TelnetWebServer network object.
• Translated Destination Address = TelnetWebServer network object.
• Original Destination Port = TELNET port object.
• Translated Destination Port = TELNET port object.
Note Because you do not want to translate the destination address or port, you need to configure
identity NAT for them by specifying the same address for the original and translated
destination addresses, and the same port for the original and translated port.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
543
Security Policies
Different Translation Depending on the Destination Address and Port (Dynamic Manual PAT)
d) Click OK.
Step 6 Configure dynamic manual PAT for web access.
a) Click the + button.
b) Configure the following properties:
• Title = WebServer (or another name of your choosing).
• Create Rule For = Manual NAT.
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = dmz.
• Original Source Address = myInsideNetwork network object.
• Translated Source Address = PATaddress2 network object.
• Original Destination Address = TelnetWebServer network object.
• Translated Destination Address = TelnetWebServer network object.
• Original Destination Port = HTTP port object.
• Translated Destination Port = HTTP port object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
544
Security Policies
Rewriting DNS Queries and Responses Using NAT
c) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
545
Security Policies
DNS 64 Reply Modification
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
546
Security Policies
DNS 64 Reply Modification
Note This example assumes that the inside interface is not a bridge group interface (BVI) but a standard routed
interface. If the inside interface is a BVI, you need to duplicate the rules for each member interface.
Procedure
Step 1 Create the network objects for the FTP server, DNS server, inside network, and PAT pool.
a) Choose Objects.
b) Select Network from the table of contents and click +.
c) Define the real FTP server address.
Name the network object (for example, ftp_server), select Host, and enter the real host IP address,
209.165.200.225.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
547
Security Policies
DNS 64 Reply Modification
d) Click OK.
e) Click + and define the DNS server's real address.
Name the network object (for example, dns_server), select Host, and enter the host address 209.165.201.15.
f) Click OK.
g) Click + and define the inside IPv6 network.
Name the network object (for example, inside_v6), select Network, and enter the network address,
2001:DB8::/96.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
548
Security Policies
DNS 64 Reply Modification
h) Click OK.
i) Click + and define the IPv4 PAT address for the inside IPv6 network.
Name the network object (for example, ipv4_pat), select Host, and enter the host address, 209.165.200.230.
j) Click OK.
Step 2 Configure the static NAT rule with DNS modification for the FTP server.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = FTPServer (or another name of your choosing).
• Create Rule For = Auto NAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
549
Security Policies
DNS 64 Reply Modification
• Type = Static.
• Source Interface = outside.
• Destination Interface = inside.
• Original Address = ftp_server network object.
• Translated Address = inside_v6 network object. Because the IPv4 embedded address method is
used when converting IPv4 to IPv6 addresses, 209.165.200.225 is converted to the IPv6 equivalent
D1A5:C8E1 and the network prefix is added to get the full address, 2001:DB8::D1A5:C8E1.
• On the Advanced Options tab, select Translate DNS replies that match this rule.
d) Click OK.
Step 3 Configure the static NAT rule for the DNS server.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = DNSServer (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Static.
• Source Interface = outside.
• Destination Interface = inside.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
550
Security Policies
DNS 64 Reply Modification
d) Click OK.
Step 4 Configure the dynamic PAT rule for the inside IPv6 network.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = PAT64Rule (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = inside_v6 network object.
• Translated Address = ipv4_pat network object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
551
Security Policies
DNS Reply Modification, DNS Server on Outside
d) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
552
Security Policies
DNS Reply Modification, DNS Server on Outside
Note This example assumes that the inside interface is not a bridge group interface (BVI) but a standard routed
interface. If the inside interface is a BVI, you need to duplicate the rules for each member interface.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
553
Security Policies
DNS Reply Modification, DNS Server on Outside
d) Click OK.
e) Click + and define the FTP server's translated address.
Name the network object (for example, ftp_server_outside), select Host, and enter the host address
209.165.201.10.
Step 2 Configure the static NAT rule with DNS modification for the FTP server.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = FTPServer (or another name of your choosing).
• Create Rule For = Auto NAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
554
Security Policies
DNS Reply Modification, DNS Server on Host Network
• Type = Static.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = ftp_server network object.
• Translated Address = ftp_server_outside network object.
• On the Advanced Options tab, select Translate DNS replies that match this rule.
d) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
555
Security Policies
DNS Reply Modification, DNS Server on Host Network
Note This example assumes that the inside interface is not a bridge group interface (BVI) but a standard routed
interface. If the inside interface is a BVI, you need to duplicate the rules for each member interface.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
556
Security Policies
DNS Reply Modification, DNS Server on Host Network
d) Click OK.
e) Click + and define the FTP server's translated address.
Name the network object (for example, ftp_server_translated), select Host, and enter the host address
10.1.2.56.
Step 2 Configure the static NAT rule with DNS modification for the FTP server.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = FTPServer (or another name of your choosing).
• Create Rule For = Auto NAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
557
Security Policies
DNS Reply Modification, DNS Server on Host Network
• Type = Static.
• Source Interface = outside.
• Destination Interface = inside.
• Original Address = ftp_server network object.
• Translated Address = ftp_server_translated network object.
• On the Advanced Options tab, select Translate DNS replies that match this rule.
d) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
558
PA R T VI
Virtual Private Networks (VPN)
• Site-to-Site VPN, on page 561
• Remote Access VPN, on page 599
CHAPTER 23
Site-to-Site VPN
A virtual private network (VPN) is a network connection that establishes a secure tunnel between remote
peers using a public source, such as the Internet or other network. VPNs use tunnels to encapsulate data packets
within normal IP packets for forwarding over IP-based networks. They use encryption to ensure privacy and
authentication to ensure the integrity of data.
• VPN Basics, on page 561
• Managing Site-to-Site VPNs, on page 566
• Monitoring Site-to-Site VPN, on page 580
• Examples for Site-to-Site VPN, on page 580
VPN Basics
Tunneling makes it possible to use a public TCP/IP network, such as the Internet, to create secure connections
between remote users and private corporate networks. Each secure connection is called a tunnel.
IPsec-based VPN technologies use the Internet Security Association and Key Management Protocol (ISAKMP,
or IKE) and IPsec tunneling standards to build and manage tunnels. ISAKMP and IPsec accomplish the
following:
• Negotiate tunnel parameters.
• Establish tunnels.
• Authenticate users and data.
• Manage security keys.
• Encrypt and decrypt data.
• Manage data transfer across the tunnel.
• Manage data transfer inbound and outbound as a tunnel endpoint or router.
A device in a VPN functions as a bidirectional tunnel endpoint. It can receive plain packets from the private
network, encapsulate them, create a tunnel, and send them to the other end of the tunnel where they are
unencapsulated and sent to their final destination. It can also receive encapsulated packets from the public
network, unencapsulate them, and send them to their final destination on the private network.
After the site-to-site VPN connection is established, the hosts behind the local gateway can connect to the
hosts behind the remote gateway through the secure VPN tunnel. A connection consists of the IP addresses
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
561
Virtual Private Networks (VPN)
Internet Key Exchange (IKE)
and hostnames of the two gateways, the subnets behind them, and the method the two gateways use to
authenticate to each other.
When IKE negotiation begins, the peer that starts the negotiation sends all of its enabled policies to the remote
peer, and the remote peer searches for a match with its own policies, in priority order. A match between IKE
policies exists if they have the same encryption, hash (integrity and PRF for IKEv2), authentication, and
Diffie-Hellman values, and an SA lifetime less than or equal to the lifetime in the policy sent. If the lifetimes
are not identical, the shorter lifetime, obtained from the remote peer, applies. By default, a simple IKE policy
that uses DES is the only enabled policy. You can enable other IKE policies at higher priorities to negotiate
stronger encryption standards, but the DES policy should ensure a successful negotiation.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
562
Virtual Private Networks (VPN)
Deciding Which Encryption Algorithm to Use
If your device license allows you to apply strong encryption, there is a wide range of encryption and hash
algorithms, and Diffie-Hellman groups, from which to choose. However, as a general rule, the stronger the
encryption that you apply to the tunnel, the worse the system performance. Find a balance between security
and performance that provides sufficient protection without compromising efficiency.
We cannot provide specific guidance on which options to choose. If you operate within a larger corporation
or other organization, there might already be defined standards that you need to meet. If not, take the time to
research the options.
The following topics explain the available options.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
563
Virtual Private Networks (VPN)
Deciding Which Diffie-Hellman Modulus Group to Use
For IKEv2, you can configure multiple hash algorithms. The system orders the settings from the most secure
to the least secure and negotiates with the peer using that order. For IKEv1, you can select a single option
only.
You can choose from the following hash algorithms.
• SHA (Secure Hash Algorithm)—Standard SHA (SHA1) produces a 160-bit digest.
The following SHA-2 options, which are even more secure, are available for IKEv2 configurations.
Choose one of these if you want to implement the NSA Suite B cryptography specification.
• SHA256—Specifies the Secure Hash Algorithm SHA 2 with the 256-bit digest.
• SHA384—Specifies the Secure Hash Algorithm SHA 2 with the 384-bit digest.
• SHA512—Specifies the Secure Hash Algorithm SHA 2 with the 512-bit digest.
• Null or None (NULL, ESP-NONE)—(IPsec Proposals only.) A null Hash Algorithm; this is typically
used for testing purposes only. However, you should choose the null integrity algorithm if you select
one of the AES-GCM options as the encryption algorithm. Even if you choose a non-null option, the
integrity hash is ignored for these encryption standards.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
564
Virtual Private Networks (VPN)
VPN Topologies
Preshared Keys
Preshared keys are secret key strings configured on each peer in the connection. These keys are used by
IKE during the authentication phase. For IKEv1, you must configure the same preshared key on each
peer. For IKEv2, you can configure unique keys on each peer.
Preshared keys do not scale well compared to certificates. If you need to configure a large number of
site-to-site VPN connections, use the certificate method instead of the preshared key method.
Certificates
Digital certificates use RSA key pairs to sign and encrypt IKE key management messages. When you
configure each end of the site-to-site VPN connection, you select the local device’s identity certificate,
so the remote peer can authenticate the local peer.
To use the certificate method, you need to do the following:
1. Enroll your local peer with a Certificate Authority (CA) and obtain a device identity certificate.
Upload this certificate to the device. For more information, see Uploading Internal and Internal CA
Certificates, on page 147.
If you also are responsible for the remote peer, also enroll that peer. Although using the same CA
for the peers is convenient, it is not a requirement.
You cannot use a self-signed certificate to establish a VPN connection. You must enroll the device
with a Certificate Authority.
If you use a Windows Certificate Authority (CA) to create certificates for site-to-site VPN endpoints,
you must use a certificate that specifies IP security end system for the Application Policies extension.
You can find this on the certificate's Properties dialog box on the Extensions tab (on the Windows
CA server). The default for this extension is IP security IKE intermediate, which does not work for
a site-to-site VPN configured using FDM.
2. Upload the trusted CA certificate that was used to sign the local peer’s identity certificate. If you
used an intermediate CA, upload the full chain, including the root and intermediate certificates. For
more information, see Uploading Trusted CA Certificates, on page 149.
3. If the remote peer was enrolled with a different CA, also upload the trusted CA certificate used to
sign the remote peer’s identity certificate. Obtain the certificate from the organization that controls
the remote peer. If they used an intermediate CA, upload the full chain, including the root and
intermediate certificates.
4. When you configure the site-to-site VPN connection, select the certificate method, and then select
the local peer’s identity certificate. Each end of the connection specifies the certificate for the local
end of the connection; you do not specify the certificate for the remote peer.
VPN Topologies
You can configure only point-to-point VPN connections using Firepower Device Manager. Although all
connections are point-to-point, you can link into larger hub-and-spoke or meshed VPNs by defining each of
the tunnels in which your device participates.
The following diagram displays a typical point-to-point VPN topology. In a point-to-point VPN topology,
two endpoints communicate directly with each other. You configure the two endpoints as peer devices, and
either device can start the secured connection.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
565
Virtual Private Networks (VPN)
Establishing Site-to-Site VPN Connections with Dynamically-Addressed Peers
EstablishingSite-to-SiteVPNConnectionswithDynamically-AddressedPeers
You can create site-to-site VPN connections to peers even when you do not know the peer’s IP address. This
can be useful in the following situations:
• If the peer obtains its address using DHCP, you cannot depend on the remote endpoint having a specific
static IP address.
• When you want to allow an indeterminate number of remote peers to establish a connection with the
device, which will serve as a hub in a hub-and-spoke topology.
When you need to establish a secure connection to a dynamically-addressed peer B, you need to ensure that
your end of the connection, A, has a static IP address. Then, when you create the connection on A, specify
that the peer’s address is dynamic. However, when you configure the connection on the peer B, ensure that
you enter the IP address for A as the remote-peer address.
When the system establishes site-to-site VPN connections, any connections where the peer has a dynamic
address will be response-only. That is, the remote peer must be the one that initiates the connection. When
the remote peer attempts to establish the connection, your device validates the connection using the preshared
key or the certificate, whichever method you defined in the connection.
Because the VPN connection is established only after the remote peer initiates the connection, any outbound
traffic that matches access control rules that allow traffic in the VPN tunnel will be dropped until that connection
is established. This ensures that data does not leave your network without the appropriate encryption and VPN
protection.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
566
Virtual Private Networks (VPN)
Configuring a Site-to-Site VPN Connection
the option to allow export-controlled functionality on the device when you registered with Cisco Smart
License Manager. If you are using the evaluation license, or you did not enable export-controlled
functionality, you cannot use strong encryption.
• You can create at most 20 unique IPsec profiles. Uniqueness is determined by the combination of IKEv1/v2
proposals and certificates, connection type, DH group and SA lifetime. You can reuse existing profiles.
Thus, if you use the same settings for all your site-to-site VPN connections, you have one unique IPsec
profile. Once you reach the limit of 20 unique IPsec profiles, you cannot create new site-to-site VPN
connections unless you use the same combination of attributes that you used for an existing connection
profile.
Procedure
Step 1 Click Device, then click View Configuration in the Site-to-Site VPN group.
This opens the Site-to-Site VPN page, which lists all of the connections that you have configured.
• To edit an existing connection, click the edit icon ( ) for the connection. See Configuring a Site-to-Site
VPN Connection, on page 567.
• To copy a summary of the connection configuration to the clipboard, click the copy icon ( ) for the
connection. You can paste this information in a document and send it to the administrator for the remote
device to help configure that end of the connection.
• To delete a connection that you no longer need, click the delete icon ( ) for the connection.
Note You can create a single VPN connection per local network/remote network combination. However, you can
create multiple connections for a local network if the remote network is unique in each connection profile.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
567
Virtual Private Networks (VPN)
Configuring a Site-to-Site VPN Connection
Procedure
Step 1 Click Device, then click View Configuration in the Site-to-Site VPN group.
Step 2 Do any of the following:
• To create a new Site-to-Site VPN connection, click the + button.
If there are no connections yet, you can also click the Create Site-to-Site Connection button.
• To edit an existing connection, click the edit icon ( ) for the connection.
To delete a connection that you no longer need, click the delete icon ( ) for the connection.
Note You can use IPv4 or IPv6 addresses for these networks, but you must have a matching address
type on each side of the connection. For example, the VPN connection for a local IPv4 network
must have at least one remote IPv4 network. You can combine IPv4 and IPv6 on both sides
of a singe connection. The protected networks for the endpoints cannot overlap.
• IKE Version 2, IKE Version 1—Choose the IKE versions to use during Internet Key Exchange (IKE)
negotiations. Select either or both options as appropriate. When the device attempts to negotiate a
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
568
Virtual Private Networks (VPN)
Configuring a Site-to-Site VPN Connection
connection with the other peer, it uses whichever versions you allow and that the other peer accepts. If
you allow both versions, the device automatically falls back to the other version if negotiations are
unsuccessful with the initially chosen version. IKEv2 is always tried first if it is configured. Both peers
must support IKEv2 to use it in a negotiation.
• IKE Policy—Internet Key Exchange (IKE) is a key management protocol that is used to authenticate
IPsec peers, negotiate and distribute IPsec encryption keys, and automatically establish IPsec security
associations (SAs). This is a global policy: the objects you enable are applied to all VPNs. Click Edit to
examine the current globally-enabled policies per IKE version, and to enable and create new policies.
For more information, see Configuring the Global IKE Policy, on page 570.
• IPsec Proposal—The IPsec proposal defines the combination of security protocols and algorithms that
secure traffic in an IPsec tunnel. Click Edit and select the proposals for each IKE version. Select all
proposals that you want to allow. Click Set Default to simply select the system defaults, which differ
based on your export compliance. The system negotiates with the peer, starting from the strongest to the
weakest proposal, until a match is agreed upon. For more information, see Configuring IPsec Proposals,
on page 574.
• Authentication Type—How you want to authenticate the peers in the VPN connection, either Preshared
Manual Key or Certificate. You also need to fill in the following fields based on your selection. For
IKEv1, your selection must match the authentication method selected in the IKEv1 policy object configured
for the connection. For detailed information on the options, see Deciding Which Authentication Method
to Use, on page 564.
• (IKEv2) Local Preshared Key, Remote Peer Preshared Key—The keys defined on this device
and on the remote device for the VPN connection. These keys can be different in IKEv2. The key
can be 1-127 alphanumeric characters.
• (IKEv1) Preshared Key—The key that is defined on both the local and remote device. The key
can be 1-127 alphanumeric characters.
• Certificate—The device identity certificate for the local peer. This must be a certificate obtained
from a Certificate Authority (CA); you cannot use a self-signed certificate. If you have not uploaded
the certificate, click the Create New Object link. You will also need to upload the root and any
intermediate trusted CA certificates used to sign the identity certificate. If you have not already
uploaded them, you can do so after completing this wizard.
• NAT Exempt—Whether to exempt the VPN traffic from NAT policies on the local VPN access interface.
If you do not want NAT rules to apply to the local network, select the interface that hosts the local
network. This option works only if the local network resides behind a single routed interface (not a bridge
group member). If the local network is behind more than one routed interface, or one or more bridge
group members, you must manually create the NAT exempt rules. For information on manually creating
the required rules, see Exempting Site-to-Site VPN Traffic from NAT, on page 580.
• Diffie-Helman Group for Perfect Forward Secrecy—Whether to use Perfect Forward Secrecy (PFS)
to generate and use a unique session key for each encrypted exchange. The unique session key protects
the exchange from subsequent decryption, even if the entire exchange was recorded and the attacker has
obtained the preshared or private keys used by the endpoint devices. To enable Perfect Forward Secrecy,
select the Diffie-Hellman key derivation algorithm to use when generating the PFS session key in the
Modulus Group list. If you enable both IKEv1 and IKEv2, the options are limited to those supported by
IKEv1. For an explanation of the options, see Deciding Which Diffie-Hellman Modulus Group to Use,
on page 564.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
569
Virtual Private Networks (VPN)
Allowing Traffic Through the Site-to-Site VPN
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
570
Virtual Private Networks (VPN)
Configuring IKEv1 Policies
To define the global IKE policy, you select which objects to enable for each IKE version. If the pre-defined
objects do not satisfy your requirements, create new policies to enforce your security policy.
The following procedure explains how to configure the global policy through the Objects page. You can also
enable, disable, and create policies when editing a VPN connection by clicking Edit for the IKE Policy settings.
Procedure
Step 1 Select Objects, then select IKE Policies from the table of contents.
Policies for IKEv1 and IKEv2 are shown in separate lists.
Step 2 Enable the IKE policies you want to allow for each IKE version.
a) Select IKEv1 or IKEv2 above the object table to show the policies for that version.
b) Click the State toggle to enable the appropriate objects and to disable objects that do not meet your
requirements.
If some of your security requirements are not reflected in the existing objects, define new ones to implement
your requirements. For details, see the following topics:
• Configuring IKEv1 Policies, on page 571
• Configuring IKEv2 Policies, on page 573
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
571
Virtual Private Networks (VPN)
Configuring IKEv1 Policies
Procedure
Step 1 Select Objects, then select IKE Policies from the table of contents.
Step 2 Select IKEv1 above the object table to show IKEv1 policies.
Step 3 If any of the system-defined policies meet your requirements, click the State toggle to enable them.
Also use the State toggle to disable unwanted policies. The relative priority determines which of these policies
are tried first, with the lower number being higher priority.
To delete an unreferenced object, click the trash can icon ( ) for the object.
• Encryption—The encryption algorithm used to establish the Phase 1 security association (SA) for
protecting Phase 2 negotiations. For an explanation of the options, see Deciding Which Encryption
Algorithm to Use, on page 563.
• Diffie-Hellman Group—The Diffie-Hellman group to use for deriving a shared secret between the two
IPsec peers without transmitting it to each other. A larger modulus provides higher security but requires
more processing time. The two peers must have a matching modulus group. For an explanation of the
options, see Deciding Which Diffie-Hellman Modulus Group to Use, on page 564.
• Hash—The hash algorithm for creating a message digest, which is used to ensure message integrity. For
an explanation of the options, see Deciding Which Hash Algorithms to Use, on page 563.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
572
Virtual Private Networks (VPN)
Configuring IKEv2 Policies
• Lifetime—The lifetime of the security association (SA), in seconds, from 120 to 2147483647 or blank.
When the lifetime is exceeded, the SA expires and must be renegotiated between the two peers. As a
general rule, the shorter the lifetime (up to a point), the more secure your IKE negotiations will be.
However, with longer lifetimes, future IPsec security associations can be set up more quickly than with
shorter lifetimes. The default is 86400. To specify an unlimited lifetime, enter no value (leave the field
blank).
Procedure
Step 1 Select Objects, then select IKE Policies from the table of contents.
Step 2 Select IKEv2 above the object table to show IKEv2 policies.
Step 3 If any of the system-defined policies meet your requirements, click the State toggle to enable them.
Also use the State toggle to disable unwanted policies. The relative priority determines which of these policies
are tried first, with the lower number being higher priority.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
573
Virtual Private Networks (VPN)
Configuring IPsec Proposals
• State—Whether the IKE policy is enabled or disabled. Click the toggle to change the state. Only enabled
policies are used during IKE negotiations.
• Encryption—The encryption algorithm used to establish the Phase 1 security association (SA) for
protecting Phase 2 negotiations. Select all algorithms that you want to allow, although you cannot include
both mixed-mode (AES-GCM) and normal mode options in the same policy. (Normal mode requires
that you select an integrity hash, whereas mixed mode prohibits a separate integrity hash selection.) The
system negotiates with the peer, starting from the strongest to the weakest algorithm, until a match is
agreed upon. For an explanation of the options, see Deciding Which Encryption Algorithm to Use, on
page 563.
• Diffie-Hellman Group—The Diffie-Hellman group to use for deriving a shared secret between the two
IPsec peers without transmitting it to each other. A larger modulus provides higher security but requires
more processing time. The two peers must have a matching modulus group. Select all algorithms that
you want to allow. The system negotiates with the peer, starting from the strongest to the weakest group,
until a match is agreed upon. For an explanation of the options, see Deciding Which Diffie-Hellman
Modulus Group to Use, on page 564.
• Integrity Hash—The integrity portion of the hash algorithm for creating a message digest, which is used
to ensure message integrity. Select all algorithms that you want to allow. The system negotiates with the
peer, starting from the strongest to the weakest algorithm, until a match is agreed upon. The integrity
hash is not used with the AES-GCM encryption options. For an explanation of the options, see Deciding
Which Hash Algorithms to Use, on page 563.
• Pseudo Random Function (PRF) Hash—The pseudo-random function (PRF) portion of the hash
algorithm, which is used as the algorithm to derive keying material and hashing operations required for
the IKEv2 tunnel encryption. In IKEv1, the Integrity and PRF algorithms are not separated, but in IKEv2,
you can specify different algorithms for these elements. Select all algorithms that you want to allow. The
system negotiates with the peer, starting from the strongest to the weakest algorithm, until a match is
agreed upon. For an explanation of the options, see Deciding Which Hash Algorithms to Use, on page
563.
• Lifetime—The lifetime of the security association (SA), in seconds, from 120 to 2147483647 or blank.
When the lifetime is exceeded, the SA expires and must be renegotiated between the two peers. As a
general rule, the shorter the lifetime (up to a point), the more secure your IKE negotiations will be.
However, with longer lifetimes, future IPsec security associations can be set up more quickly than with
shorter lifetimes. The default is 86400. To specify an unlimited lifetime, enter no value (leave the field
blank).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
574
Virtual Private Networks (VPN)
Configuring IPsec Proposals for IKEv1
• When you create an IKEv1 IPsec proposal, you select the mode in which IPsec operates, and define the
required encryption and authentication types. You can select single options for the algorithms. If you
want to support multiple combinations in a VPN, create and select multiple IKEv1 IPsec Proposal objects.
• When you create an IKEv2 IPsec proposal, you can select all of the encryption and hash algorithms
allowed in a VPN. The system orders the settings from the most secure to the least secure and negotiates
with the peer until a match is found. This allows you to potentially send a single proposal to convey all
the allowed combinations instead of the need to send each allowed combination individually as with
IKEv1.
The Encapsulating Security Protocol (ESP) is used for both IKEv1 and IKEv2 IPsec proposals. It provides
authentication, encryption, and antireplay services. ESP is IP protocol type 50.
The following topics explain how to configure IPsec proposals for each IKE version.
Procedure
Step 1 Select Objects, then select IPsec Proposals from the table of contents.
Step 2 Select IKEv1 above the object table to show IKEv1 IPsec proposals.
Step 3 Do one of the following:
• To create an object, click the + button.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
575
Virtual Private Networks (VPN)
Configuring IPsec Proposals for IKEv2
IPSec is implemented between two firewalls (or other security gateways) that are connected over
an untrusted network, such as the Internet.
• Transport mode encapsulates only the upper-layer protocols of an IP packet. The IPSec header is
inserted between the IP header and the upper-layer protocol header (such as TCP). Transport mode
requires that both the source and destination hosts support IPSec, and can only be used when the
destination peer of the tunnel is the final destination of the IP packet. Transport mode is generally
used only when protecting a Layer 2 or Layer 3 tunneling protocol such as GRE, L2TP, and DLSW.
• ESP Encryption—The Encapsulating Security Protocol (ESP) encryption algorithm for this proposal.
For an explanation of the options, see Deciding Which Encryption Algorithm to Use, on page 563.
• ESP Hash—The hash or integrity algorithm to use for authentication. For an explanation of the options,
see Deciding Which Hash Algorithms to Use, on page 563.
Procedure
Step 1 Select Objects, then select IPsec Proposals from the table of contents.
Step 2 Select IKEv2 above the object table to show IKEv2 IPsec proposals.
Step 3 Do one of the following:
• To create an object, click the + button.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
576
Virtual Private Networks (VPN)
Verifying Site-to-Site VPN Connections
• Integrity Hash—The hash or integrity algorithm to use for authentication. Select all algorithms that you
want to allow. The system negotiates with the peer, starting from the strongest to the weakest algorithm,
until a match is agreed upon. For an explanation of the options, see Deciding Which Hash Algorithms
to Use, on page 563.
Note You should choose the null integrity algorithm if you select one of the AES-GCM/GMAC
options as the encryption algorithm. These encryption standards do not use the integrity hash
even if you select a non-null option.
Procedure
Step 1 Log into the device CLI as explained in Logging Into the Command Line Interface (CLI), on page 10.
Step 2 Use the show ipsec sa command to verify that the IPsec security association is established.
You should see that the VPN connection is established between your device (the local addr) and the remote
peer (current_peer). The packets (pkts) counts should increase as you send traffic through the connection.
The access list should show the local and remote networks for the connection.
For example, the following output shows an IKEv2 connection.
access-list |s2sAcl|0730e31c-1e5f-11e7-899f-27f6e1030344
extended permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
local ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (192.168.3.0/255.255.255.0/0/0)
current_peer: 192.168.4.6
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
577
Virtual Private Networks (VPN)
Verifying Site-to-Site VPN Connections
access-list |s2sAcl|0730e31c-1e5f-11e7-899f-27f6e1030344
extended permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
local ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (192.168.3.0/255.255.255.0/0/0)
current_peer: 192.168.4.6
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
578
Virtual Private Networks (VPN)
Verifying Site-to-Site VPN Connections
Step 3 Use the show isakmp sa command to verify the IKE security associations.
You can use the command without the sa keyword (or use the stats keyword instead) to view IKE statistics.
For example, the following output shows an IKEv2 security association.
IKEv2 SAs:
IKEv1 SAs:
Active SA: 1
Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
579
Virtual Private Networks (VPN)
Monitoring Site-to-Site VPN
Consider the following example, which shows a site-to-site tunnel connecting the Boulder and San Jose offices.
For traffic that you want to go to the Internet (for example from 10.1.1.6 in Boulder to www.example.com),
you need a public IP address provided by NAT to access the Internet. The below example uses interface PAT
rules. However, for traffic that you want to go over the VPN tunnel (for example from 10.1.1.6 in Boulder to
10.2.2.78 in San Jose), you do not want to perform NAT; you need to exempt that traffic by creating an identity
NAT rule. Identity NAT simply translates an address to the same address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
580
Virtual Private Networks (VPN)
Exempting Site-to-Site VPN Traffic from NAT
Figure 31: Interface PAT and Identity NAT for Site-to-Site VPN
The following example explains the configuration for Firewall1 (Boulder). The example assumes that the
inside interface is a bridge group, so you need to write the rules for each member interface. The process is
the same if you have a single or multiple routed inside interfaces.
Note This example assumes IPv4 only. If the VPN also includes IPv6 networks, create parallel rules for IPv6. Note
that you cannot implement IPv6 interface PAT, so you need to create a host object with a unique IPv6 address
to use for PAT.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
581
Virtual Private Networks (VPN)
Exempting Site-to-Site VPN Traffic from NAT
d) Click OK.
e) Click + and define the inside San Jose network.
Name the network object (for example, sanjose-network), select Network, and enter the network address
10.2.2.0/24.
f) Click OK.
Step 2 Configure manual identity NAT for the Boulder network when going over the VPN to San Jose on Firewall1
(Boulder).
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
582
Virtual Private Networks (VPN)
Exempting Site-to-Site VPN Traffic from NAT
• Title = NAT Exempt 1_2 Boulder San Jose VPN (or another name of your choosing).
• Create Rule For = Manual NAT.
• Placement = Above a Specific Rule, and select the first rule in the Manual NAT Before Auto NAT
section. You want to ensure that this rule comes before any general interface PAT rules for the
destination interface. Otherwise, the rule might not be applied to the right traffic.
• Type = Static.
• Source Interface = inside1_2.
• Destination Interface = outside.
• Original Source Address = boulder-network network object.
• Translated Source Address = boulder-network network object.
• Original Destination Address = sanjose-network network object.
• Translated Destination Address = sanjose-network network object.
Note Because you do not want to translate the destination address, you need to configure identity
NAT for it by specifying the same address for the original and translated destination
addresses. Leave all of the port fields blank. This rule configures identity NAT for both
source and destination.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
583
Virtual Private Networks (VPN)
Exempting Site-to-Site VPN Traffic from NAT
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
584
Virtual Private Networks (VPN)
Exempting Site-to-Site VPN Traffic from NAT
c) Click OK.
d) Repeat the process to create equivalent rules for each of the other inside interfaces.
Step 4 Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
Step 5 If you are also managing Firewall2 (San Jose), you can configure similar rules for that device.
• The manual identity NAT rule would be for sanjose-network when the destination is boulder-network.
Create new interface objects for the Firewall2 inside and outside networks.
• The manual dynamic interface PAT rule would be for sanjose-network when the destination is "any."
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
585
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
The following procedure explains how to configure this service. You must configure both endpoints of the
VPN tunnel.
Procedure
Step 1 (Site A, main site.) Configure the site-to-site VPN connection to remote Site B.
a) Click Device, then click View Configuration in the Site-to-Site VPN group.
b) Click + to add a new connection.
c) Define the endpoints as follows, and then click Next:
• Connection Profile Name—Give the connection a meaningful name, for example, Site-A-to-Site-B.
• Local VPN Access Interface—Select the outside interface.
• Local Network—Keep the default, Any.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
586
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
• Remote IP Address—Enter the IP address of the remote peer’s outside interface. In this example,
203.0.113.1.
• Remote Network—Click +, then select the network object that defines the remote peer’s protected
network. In this example, 192.168.2.0/24. You can click Create New Network to create the object
now.
The following graphic shows how the first step should look.
• Diffie Helman Group for Perfect Forward Secrecy—This setting has no impact on hair pinning.
Configure it as you see fit.
e) Click Finish.
The connection summary is copied to the clipboard. You can paste it into a text file or other document to
help you configure the remote peer.
Step 2 (Site A, main site.) Configure the NAT rule to translate all connections going out the outside interface to ports
on the outside IP address (interface PAT).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
587
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
When you complete the initial device configuration, the system creates a NAT rule named
InsideOutsideNatRule. This rule applies interface PAT to IPv4 traffic from any interface that exits the device
through the outside interface. Because the outside interface is included in “Any” source interface, the rule
you need already exists, unless you edited it or deleted it.
The following procedure explains how to create the rule you need.
a) Click Policies > NAT.
b) Do one of the following:
• To edit the InsideOutsideNatRule, mouse over the Action column and click the edit icon ( ).
• To create a new rule, click +.
The following graphic shows the simple case where you select Any for the source address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
588
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
d) Click OK.
Step 3 (Site A, main site.) Configure an access control rule to allow access to the protected network on Site B.
Simply creating a VPN connection does not automatically allow traffic on the VPN. You need to ensure that
your access control policy allows traffic to the remote network.
The following procedure shows how to add a rule specifically for the remote network. Whether you need an
additional rule depends on your existing rules.
a) Click Policies > Access Control.
b) Click + to create a new rule.
c) Configure a rule with the following properties:
• Order—Select a position in the policy before any other rule that might match these connections and
block them. The default is to add the rule to the end of the policy. If you need to reposition the rule
later, you can edit this option or simply drag and drop the rule to the right slot in the table.
• Title—Enter a meaningful name without spaces. For example, Site-B-Network.
• Action—Allow. You can select Trust if you do not want this traffic to be inspected for protocol
violations or intrusions.
• Source/Destination tab—For Destination > Network, select the same object you used in the VPN
connection profile for the remote network. Leave the default, Any, for all other Source and Destination
options.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
589
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
• Application, URL, and Users tabs—Leave the default settings on these tabs, that is, nothing selected.
• Intrusion, File tabs—You can optionally select intrusion or file policies to inspect for threats or
malware.
• Logging tab—You can optionally enable connection logging.
d) Click OK.
Step 4 (Site A, main site.) Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
Step 5 (Site B, remote site.) Log into the remote site’s device, and configure the site-to-site VPN connection to Site
A.
Use the connection summary obtained from the Site A device configuration to help you configure the Site B
side of the connection.
a) Click Device, then click View Configuration in the Site-to-Site VPN group.
b) Click + to add a new connection.
c) Define the endpoints as follows, and then click Next:
• Connection Profile Name—Give the connection a meaningful name, for example, Site-B-to-Site-A.
• Local VPN Access Interface—Select the outside interface.
• Local Network—Click +, then select the network object that defines the local protected network.
In this example, 192.168.2.0/24. You can click Create New Network to create the object now.
• Remote IP Address—Enter the IP address of the main site’s outside interface. In this example,
198.51.100.1.
• Remote Network—Keep the default, Any. Ignore the warning; it is not relevant for this use case.
The following graphic shows how the first step should look.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
590
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
• Diffie Helman Group for Perfect Forward Secrecy—This setting has no impact on hair pinning.
Match the setting used on Site A’s end of the VPN connection.
e) Click Finish.
Step 6 (Site B, remote site.) Delete all NAT rules for the protected network so that all traffic leaving the site must
go through the VPN tunnel.
Performing NAT on this device is unnecessary because the Site A device will do the address translation. But
please examine your specific situation. If you have multiple internal networks and not all of them are
participating in this VPN connection, do not delete NAT rules that you need for those networks.
a) Click Policies > NAT.
b) Do one of the following:
• To delete rules, mouse over the Action column and click the delete icon ( ).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
591
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
• To edit rules so they no longer apply to the protected network, mouse over the Action column and
click the edit icon ( ).
Step 7 (Site B, remote site.) Configure an access control rule to allow access from the protected network to the
Internet.
The following example allows traffic from the protected network to any destination. You can adjust this to
meet your specific requirements. You can also precede the rule with block rules to filter out undesirable traffic.
Another option is to configure the block rules on the Site A device.
a) Click Policies > Access Control.
b) Click + to create a new rule.
c) Configure a rule with the following properties:
• Order—Select a position in the policy before any other rule that might match these connections and
block them. The default is to add the rule to the end of the policy. If you need to reposition the rule
later, you can edit this option or simply drag and drop the rule to the right slot in the table.
• Title—Enter a meaningful name without spaces. For example, Protected-Network-to-Any.
• Action—Allow. You can select Trust if you do not want this traffic to be inspected for protocol
violations or intrusions.
• Source/Destination tab—For Source > Network, select the same object you used in the VPN
connection profile for the local network. Leave the default, Any, for all other Source and Destination
options.
• Application, URL, and Users tabs—Leave the default settings on these tabs, that is, nothing selected.
• Intrusion, File tabs—You can optionally select intrusion or file policies to inspect for threats or
malware.
• Logging tab—You can optionally enable connection logging.
d) Click OK.
Step 8 (Site B, remote site.) Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
b) Click the Deploy Now button and wait for deployment to finish.
You can wait until deployment completes, or click OK and check the task list or deployment history later.
If you leave the window up, it will indicate that there are no pending changes after a successful deployment.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
592
Virtual Private Networks (VPN)
How to Secure Traffic from Networks in Multiple Virtual Routers over a Site-to-Site VPN
Procedure
Step 1 Configure the route leak from the Global virtual router to VR1.
This route allows endpoints protected by the external (remote) end of the site-to-site VPN to access the
192.168.1.0/24 network in the VR1 virtual router.
a) Choose Device > Routing > View Configuration.
b) Click the view icon ( ) for the Global virtual router.
c) On the Static Routing tab for the Global router, click + and configure the route:
• Name—Any name will do, such as s2svpn-leak-vr1.
• Interface—Select vr1-inside.
• Protocol—Select IPv4.
• Networks—Select an object that defines the 192.168.1.0/24 network. Click Create New Network
to create the object now if necessary.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
593
Virtual Private Networks (VPN)
How to Secure Traffic from Networks in Multiple Virtual Routers over a Site-to-Site VPN
• Gateway—Leave this item blank. When leaking a route into another virtual router, you do not select
the gateway address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
594
Virtual Private Networks (VPN)
How to Secure Traffic from Networks in Multiple Virtual Routers over a Site-to-Site VPN
d) Click OK.
Step 2 Configure the route leak from VR1 to the Global virtual router.
This route allows endpoints on the 192.168.1.0/24 network to initiate connections that will traverse the
site-to-site VPN tunnel. For this example, the remote endpoint is protecting the 172.16.20.0/24 network.
a) Choose VR1 from the virtual routers drop-down list to switch to the VR1 configuration.
b) On the Static Routing tab for the VR1 virtual router, click + and configure the route:
• Name—Any name will do, such as s2svpn-traffic.
• Interface—Select outside.
• Protocol—Select IPv4.
• Networks—Select the object you created for the protected networks of the remote endpoint, for
example, external-vpn-network.
• Gateway—Leave this item blank. When leaking a route into another virtual router, you do not select
the gateway address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
595
Virtual Private Networks (VPN)
How to Secure Traffic from Networks in Multiple Virtual Routers over a Site-to-Site VPN
c) Click OK.
Step 3 Add the 192.168.1.0/24 network to the site-to-site VPN connection profile.
a) Choose Device > Site-to-Site VPN > View Configuration.
b) Click the edit icon ( ) for the connection profile.
c) On the first page of the wizard, click + under Local Network and add the object for the 192.168.1.0/24
network.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
596
Virtual Private Networks (VPN)
How to Secure Traffic from Networks in Multiple Virtual Routers over a Site-to-Site VPN
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
597
Virtual Private Networks (VPN)
How to Secure Traffic from Networks in Multiple Virtual Routers over a Site-to-Site VPN
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
598
CHAPTER 24
Remote Access VPN
Remote Access virtual private network (VPN) allows individual users to connect to your network from a
remote location using a computer or other supported iOS or Android device connected to the Internet. This
allows mobile workers to connect from their home networks or a public Wi-Fi network, for example.
The following topics explain how to configure remote access VPN for your network.
• Remote Access VPN Overview, on page 599
• Licensing Requirements for Remote Access VPN, on page 605
• Guidelines and Limitations for Remote Access VPN, on page 605
• Configuring Remote Access VPN, on page 606
• Managing the Remote Access VPN Configuration, on page 610
• Monitoring Remote Access VPN, on page 623
• Troubleshooting Remote Access VPNs, on page 623
• Examples for Remote Access VPN, on page 626
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
599
Virtual Private Networks (VPN)
Downloading the AnyConnect Client Software
Firepower 1010 75
ISA 3000 25
Note You can upload one AnyConnect package per operating system: Windows, Mac, and Linux. You cannot
upload multiple versions for a given OS type.
Obtain the AnyConnect software packages from software.cisco.com in the AnyConnect Secure Mobility
Client category. You need to download the “Full Installation Package” versions of the clients.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
600
Virtual Private Networks (VPN)
Controlling User Permissions and Attributes Using RADIUS and Group Policies
Users must have Administrator rights on their workstations to install the software.
Once the AnyConnect client is installed, if you upload new AnyConnect versions to the system, the AnyConnect
client will detect the new version on the next VPN connection the user makes. The system will automatically
prompt the user to download and install the updated client software. This automation simplifies software
distribution for you and your clients.
If you decide to have users initially install the software from the Firepower Threat Defense device, tell users
to perform the following steps.
Note Android and iOS users should download AnyConnect from the appropriate App Store.
Procedure
Step 1 Using a web browser, open https://ravpn-address, where ravpn-address is the IP address or hostname of the
outside interface on which you are allowing VPN connections.
You identify this interface when you configure the remote access VPN. The system prompts the user to log
in.
Controlling User Permissions and Attributes Using RADIUS and Group Policies
You can apply user authorization attributes (also called user entitlements or permissions) to RA VPN
connections from an external RADIUS server or from a group policy defined on the Firepower Threat Defense
device. If theFirepower Threat Defense device receives attributes from the external AAA server that conflict
with those configured on the group policy, then attributes from the AAA server always take precedence.
The Firepower Threat Defense device applies attributes in the following order:
1. User attributes defined on the external AAA server—The server returns these attributes after successful
user authentication or authorization.
2. Group policy configured on the Firepower Threat Defense device—If a RADIUS server returns the value
of the RADIUS CLASS attribute IETF-Class-25 (OU= group-policy) for the user, the Firepower Threat
Defense device places the user in the group policy of the same name and enforces any attributes in the
group policy that are not returned by the server.
3. Group policy assigned by the connection profile—The connection profile has the preliminary settings for
the connection, and includes a default group policy applied to the user before authentication. All users
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
601
Virtual Private Networks (VPN)
Attributes Sent to the RADIUS Server
connecting to the Firepower Threat Defense device initially belong to this group, which provides any
attributes that are missing from the user attributes returned by the AAA server, or the group policy assigned
to the user.
Firepower Threat Defense devices support RADIUS attributes with vendor ID 3076. If the RADIUS server
you use does not have these attributes defined, you must manually define them. To define an attribute, use
the attribute name or number, type, value, and vendor code (3076).
The following topics explain the supported attributes based on whether the values are defined in the RADIUS
server, or whether they are values the system sends to the RADIUS server.
Attribute Single or
Attribute Number Syntax, Type Multi-valued Description or Value
Client Type 150 Integer Single The type of client that is connecting to the VPN:
2 = AnyConnect Client SSL VPN
Tunnel Group Name 146 String Single The name of the connection profile that was used to
establish the session, as defined on the FTD device. The
name can be 1 - 253 characters.
Attribute Single or
Attribute Number Syntax, Type Multi-valued Description or Value
Access-List-Inbound 86 String Single Both of the Acess-List attributes take the name of an
ACL that is configured on the FTD device. Create these
Access-List-Outbound 87 String Single ACLs using the Smart CLI Extended Access List object
type (select Device > Advanced Configuration >
Smart CLI > Objects).
These ACLs control traffic flow in the inbound (traffic
entering the FTD device) or outbound (traffic leaving
the FTD device) direction.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
602
Virtual Private Networks (VPN)
Two-Factor Authentication
Attribute Single or
Attribute Number Syntax, Type Multi-valued Description or Value
Address-Pools 217 String Single The name of a network object defined on the FTD device
that identifies a subnet, which will be used as the address
pool for clients connecting to the RA VPN. Define the
network object on the Objects page.
Banner1 15 String Single The banner to display when the user logs in.
Banner2 36 String Single The second part of the banner to display when the user
logs in. Banner2 is appended to Banner1.
Group-Policy 25 String Single The group policy to use in the connection. You must
create the group policy on the RA VPN Group Policy
page. You can use one of the following formats:
• group policy name
• OU=group policy name
• OU=group policy name;
VLAN 140 Integer Single The VLAN on which to confine the user's connection,
0 - 4094. You must also configure this VLAN on a
subinterface on the FTD device.
Two-Factor Authentication
You can configure two-factor authentication for the RA VPN. With two-factor authentication, the user must
supply a username and static password, plus an additional item such as an RSA token or a Duo passcode.
Two-factor authentication differs from using a second authentication source in that two-factor is configured
on a single authentication source, with the relationship to the RSA/Duo server tied to the primary authentication
source. The exception is Duo LDAP, where you configure the Duo LDAP server as the secondary authentication
source.
The system has been tested with RSA tokens and Duo passcode pushed to mobile for the second factor in
conjunction with any RADIUS or AD Server as the first factor in the two-factor authentication process.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
603
Virtual Private Networks (VPN)
Duo Two-Factor Authentication Using RADIUS
In this configuration, it is typical to use a separate RADIUS server (such as one supplied in Cisco ISE)
to provide authorization services. You would configure the second RADIUS server as the authorization
and, optionally, accounting server.
• Integrate the RSA server with a RADIUS or AD server that supports direct integration, and configure
the RA VPN to use the non-RSA RADIUS or AD server as the primary authentication source. In this
case, the RADIUS/AD server uses RSA-SDI to delegate and orchestrate the two-factor authentication
between the client and RSA Server.
When using this approach, the user must authenticate using a username that is configured in the non-RSA
RADIUS or AD server, and concatenate the password with the one-time temporary RSA token, separating
the password and token with a comma: password,token.
In this configuration, you would also use the non-RSA RADIUS server as the authorization and, optionally,
accounting server.
If the username/password is authenticated, the Duo Authentication Proxy contacts the Duo Cloud Service,
which validates that the request is from a valid configured proxy device and then pushes a temporary passcode
to the mobile device of the user as directed. When the user accepts this passcode, the session is marked
authenticated by Duo and the RA VPN is established.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
604
Virtual Private Networks (VPN)
Licensing Requirements for Remote Access VPN
Note that the Duo LDAP server provides authentication services only, it does not provide identity services.
Thus, if you use Duo LDAP as a primary authentication source, you will not see usernames associated with
RA VPN connections in any dashboards, and you will not be able to write access control rules for these users.
When using this approach, the user must authenticate using a username that is configured on both the
RADIUS/AD server and the Duo LDAP server. When prompted to log in by AnyConnect, the user provides
the RADIUS/AD password in the primary Password field, and for the Secondary Password, provides one
of the following to authenticate with Duo. For more details, see https://guide.duo.com/anyconnect.
• Duo passcode—Authenticate using a passcode, either generated with Duo Mobile, sent via SMS, generated
by your hardware token, or provided by an administrator. For example, 1234567.
• push—Push a login request to your phone, if you have installed and activated the Duo Mobile app.
Review the request and tap Approve to log in.
• phone—Authenticate using a phone callback.
• sms—Request a Duo passcode in a text message. The login attempt will fail. Log in again using the new
passcode.
For a detailed explanation and example of using Duo LDAP, see How to Configure Two-Factor Authentication
using Duo LDAP, on page 634.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
605
Virtual Private Networks (VPN)
Configuring Remote Access VPN
• You cannot use overlapping addresses in the source address of a NAT rule and a remote access VPN
address pool.
• If you configure two-factor authentication using RADIUS and RSA tokens, the default authentication
timeout of 12 seconds is too quick to allow successful authentication in most cases. You can increase
the authentication timeout value by creating a custom AnyConnect client profile and applying it to the
RA VPN connection profile, as described in Configure and Upload Client Profiles, on page 607. We
recommend an authentication timeout of at least 60 seconds, so that users have enough time to authenticate
and then paste the RSA token, and for the round-trip verification of the token.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
606
Virtual Private Networks (VPN)
Configure and Upload Client Profiles
• LocalIdentitySource (the local user database)—As a primary or fallback source. You can define users
directly on the device and not use an external server. If you use the local database as a fallback source,
ensure that you define the same usernames/passwords as the ones defined in the external server. See
Configure Local Users, on page 165.
• Duo LDAP server—As a primary or secondary authentication source. Although you can use a Duo LDAP
server as the primary source, this is not the normal configuration. You would normally use it as the
secondary source to provide two-factor authentication in conjunction with a primary Active Directory
or RADIUS server. For details, see How to Configure Two-Factor Authentication using Duo LDAP, on
page 634.
Step 9 (Optional.) Enable the identity policy and configure a rule for passive authentication.
If you enable passive user authentication, users who logged in through the remote access VPN will be shown
in the dashboards, and they will also be available as traffic-matching criteria in policies. If you do not enable
passive authentication, RA VPN users will be available only if they match an active authentication policy.
You must enable the identity policy to get any username information in the dashboards or for traffic matching.
Note You must include the Firepower Threat Defense device’s outside interface in the VPN profile’s server list in
order for the AnyConnect client to display all user controllable settings on the first connection. If you do not
add the address or FQDN as a host entry in the profile, then filters do not apply for the session. For example,
if you create a certificate match and the certificate properly matches the criteria, but you do not add the device
as a host entry in that profile, the certificate match is ignored.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
607
Virtual Private Networks (VPN)
Allow Traffic Through the Remote Access VPN
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create AnyConnect client profile objects while editing a profile property by clicking the Create New
AnyConnect Client Profile link shown in the object list.
Procedure
Step 1 Select Objects, then select AnyConnect Client Profile from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
• To download the profile associated with an object, click the download icon ( ) for the object.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
608
Virtual Private Networks (VPN)
Verify the Remote Access VPN Configuration
not be applied to the traffic. This also means that no connection events will be generated for the traffic,
and thus statistical dashboards will not reflect VPN connections.
To configure this command, select the Bypass Access Control policy for decrypted traffic option in
your RA VPN connection profiles.
• Create access control rules to allow connections from the remote access VPN address pool. This method
ensures that VPN traffic is inspected and advanced services can be applied to the connections. The
downside is that it opens the possibility for external users to spoof IP addresses and thus gain access to
your internal network.
Procedure
Step 1 From an external network, establish a VPN connection using the AnyConnect client.
Using a web browser, open https://ravpn-address, where ravpn-address is the IP address or hostname of the
outside interface on which you are allowing VPN connections. If necessary, install the client software and
complete the connection. See How Users Can Install the AnyConnect Software, on page 600.
If you configured group URLs, also try those URLs.
Step 2 Log into the device CLI as explained in Logging Into the Command Line Interface (CLI), on page 10.
Alternatively, open the CLI Console.
Step 3 Use the show vpn-sessiondb command to view summary information about current VPN sessions.
The statistics should show your active AnyConnect Client session, and information on cumulative sessions,
the peak concurrent number of sessions, and inactive sessions. Following is sample output from the command.
---------------------------------------------------------------------------
Tunnels Summary
---------------------------------------------------------------------------
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
609
Virtual Private Networks (VPN)
Managing the Remote Access VPN Configuration
---------------------------------------------------------------------------
IPv6 Usage Summary
---------------------------------------------------------------------------
Active : Cumulative : Peak Concurrent
----------------------------------------------
AnyConnect SSL/TLS/DTLS : : :
Tunneled IPv6 : 1 : 20 : 2
---------------------------------------------------------------------------
Step 4 Use the show vpn-sessiondb anyconnect command to view detailed information about current AnyConnect
VPN sessions.
Detailed information includes encryption used, bytes transmitted and received, and other statistics. If you use
your VPN connection, you should see the bytes transmitted/received numbers change as you re-issue this
command.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
610
Virtual Private Networks (VPN)
Configure an RA VPN Connection Profile
that uses different authentication servers, you can create a profile for the new group that uses those
authentication servers.
Procedure
Step 1 Click View Configuration in the Device > Remote Access VPN group.
The group shows summary information on how many connection profiles and group policies are currently
configured.
Step 2 Click Connection Profiles in the table of contents if it is not already selected.
Step 3 Do any of the following:
• Click the + button to create a new connection profile. For detailed instructions, see Configure an RA
VPN Connection Profile, on page 611.
• Click the view button ( ) to open a summary of the connection profile and connection instructions.
Within the summary, you can click Edit to make changes.
• Click the delete button ( ) to delete a connection profile that you no longer need.
• Select Group Policies in the table of contents to define the user-oriented attributes for the connection
profiles. See Configure Group Policies for RA VPN, on page 618.
Procedure
Step 1 Click View Configuration in the Device > Remote Access VPN group.
The group shows summary information on how many connection profiles and group policies are currently
configured.
Step 2 Click Connection Profiles in the table of contents if it is not already selected.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
611
Virtual Private Networks (VPN)
Configure an RA VPN Connection Profile
• Click the view button ( ) to open a summary of the connection profile and connection instructions.
Within the summary, you can click Edit to make changes.
• Group Alias, Group URL—Aliases contain alternate names or URLs for a specific connection profile.
VPN users can choose an alias name in the AnyConnect client in the list of connections when they connect
to the FTD device. The connection profile name is automatically added as a group alias.
You can also configure the list of group URLs, which your endpoints can select while initiating the
Remote Access VPN connection. If users connect using the group URL, the system will automatically
use the connection profile that matches the URL. This URL would be used by clients who do not yet
have the AnyConnect client installed.
Add as many group aliases and URLs as required. These aliases and URLs must be unique across all
connection profiles defined on the device. Group URLs must start with https://.
For example, you might have the alias Contractor and the group URL
https://ravpn.example.com/contractor. Once the AnyConnect client is installed, the user would simply
select the group alias in the AnyConnect VPN drop-down list of connections.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
612
Virtual Private Networks (VPN)
Configure an RA VPN Connection Profile
When you select a group policy, you are shown a summary of the group characteristics. Click Edit in the
summary to make changes.
If the group policy you need does not yet exist, click Create New Group Policy in the drop-down list.
For detailed information about group policies, see Configure Group Policies for RA VPN, on page 618.
• Bypass Access Control policy for decrypted traffic (sysopt permit-vpn)—Whether to subject VPN
traffic to the access control policy. Decrypted VPN traffic is subjected to access control policy inspection
by default. Enabling the Bypass Access Control policy for decrypted traffic option bypasses the access
control policy, but for remote access VPN, the VPN Filter ACL and the authorization ACL downloaded
from the AAA server are still applied to VPN traffic.
Note that if you select this option, the system configures the sysopt connection permit-vpn command,
which is a global setting. This will also impact the behavior of site-to-site VPN connections. Also, you
cannot make different selections for this option across your connection profiles: the feature is either on
or off for all profiles.
If you do not select this option, it might be possible for external users to spoof IP addresses in your remote
access VPN address pool, and thus gain access to your network. This can happen because you will need
to create access control rules that allow your address pool to have access to internal resources. If you use
access control rules, consider using user specifications to control access, rather than source IP address
alone.
The downside of selecting this option is that the VPN traffic will not be inspected, which means that
intrusion and file protection, URL filtering, or other advanced features will not be applied to the traffic.
This also means that no connection events will be generated for the traffic, and thus statistical dashboards
will not reflect VPN connections.
• NAT Exempt—Enable NAT Exempt to exempt traffic to and from the remote access VPN endpoints
from NAT translation. If you do not exempt VPN traffic from NAT, ensure that the existing NAT rules
for the outside and inside interfaces do not apply to the RA VPN pool of addresses. NAT exempt rules
are manual static identity NAT rules for a given source/destination interface and network combination,
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
613
Virtual Private Networks (VPN)
Configure AAA for a Connection Profile
but they are not reflected in the NAT policy, they are hidden. If you enable NAT Exempt, you must also
configure the following.
Note that this is a global option; it applies to all connection profiles. Thus, simply add interfaces and
inside networks, do not replace them, or you will be changing the NAT exempt settings for all the other
connection profiles that you have already defined.
• Inside Interfaces—Select the interfaces for the internal networks remote users will be accessing.
NAT rules are created for these interfaces.
• Inside Networks—Select the network objects that represent internal networks remote users will be
accessing. The networks list must contain the same IP types as the address pools you are supporting.
• AnyConnect Packages—The AnyConnect full installation software images that you will support on
RA VPN connections. For each package, the filename, including extensions, can be no more than 60
characters. You can upload separate packages for Windows, Mac, and Linux endpoints. However, you
cannot configure different packages for different connection profiles. If you already configured a package
for another profile, the package is pre-selected. Changing it will change it for all profiles.
Download the packages from software.cisco.com. If the endpoint does not already have the right package
installed, the system prompts the user to download and install the package after the user authenticates.
What to do next
Ensure that traffic is allowed in the VPN tunnel, as explained in Allow Traffic Through the Remote Access
VPN, on page 608.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
614
Virtual Private Networks (VPN)
Configure AAA for a Connection Profile
• Fallback Local Identity Source—If the primary source is an external server, you can select the
LocalIdentitySource as a fallback in case the primary server is unavailable. If you use the local database
as a fallback source, ensure that you define the same local usernames/passwords as the ones defined in
the external server.
• Strip options—A realm is an administrative domain. Enabling the following options allows the
authentication to be based on the username alone. You can enable any combination of these options.
However, you must select both check boxes if your server cannot parse delimiters.
• Strip Identity Source Server from Username—Whether to remove the identity source name from
the username before passing the username on to the AAA server. For example, if you select this
option and the user enters domain\username as the username, the domain is stripped off from the
username and sent to AAA server for authentication. By default this option is unchecked.
• Strip Group from Username—Whether to remove the group name from the username before
passing the username on to the AAA server. This option applies to names given in the
username@domain format; the option strips the domain and @ sign. By default this option is
unchecked.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
615
Virtual Private Networks (VPN)
Configure Certificate Authentication for a Connection Profile
select this option, the system prompts for the secondary password only, and uses the same username
for the secondary source that was authenticated against the primary identity source. Select this option
if you configure the same usernames in both the primary and secondary identity sources.
• Username for Session Server—After successful authentication, the username is shown in events
and statistical dashboards, is used to determine matches for user- or group-based SSL decryption
and access control rules, and is used for accounting. Because you are using two authentication
sources, you need to tell the system whether to use the Primary or Secondary username as the user
identity. By default, the primary name is used.
• Password Type—How to obtain the password for the secondary server. The default is Prompt,
which means the user is asked to enter the password.
Select Primary Identity Source Password to automatically use the password entered when the
user authenticated to the primary server.
Select Common Password to use the same password for every user, then enter that password in
the Common Password field.
Additional Options
• Authorization Server—The RADIUS server group that has been configured to authorize remote access
VPN users.
After authentication is complete, authorization controls the services and commands available to each
authenticated user. Authorization works by assembling a set of attributes that describe what the user is
authorized to perform, their actual capabilities, and restrictions. Were you not to use authorization,
authentication alone would provide the same access to all authenticated users. For information on
configuring RADIUS for authorization, see Controlling User Permissions and Attributes Using RADIUS
and Group Policies, on page 601.
Note that if the system obtains authorization attributes from the RADIUS server that overlap those defined
in the group policy, the RADIUS attributes override the group policy attributes.
• Accounting Server—(Optional.) The RADIUS server group to use to account for the remote access
VPN session.
Accounting tracks the services users are accessing as well as the amount of network resources they are
consuming. The FTD device reports user activity to the RADIUS server. Accounting information includes
when sessions start and stop, usernames, the number of bytes that pass through the device for each session,
the service used, and the duration of each session. You can then analyze the data for network management,
client billing, or auditing. You can use accounting alone or together with authentication and authorization.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
616
Virtual Private Networks (VPN)
Configure Client Addressing for RA VPN
• Map Specific Field—Use the certificate elements in the order of Primary Field and Secondary
Field. The defaults are CN (Common Name) and OU (Organizational Unit). Select the options that
work for your organization. The fields are combined to provide the username, and this is the name
used in events, dashboards, and for matching purposes in SSL decryption and access control rules.
• Use entire DN (distinguished name) as username—The system automatically derives the username
from the DN fields.
• Advanced options—Click the Advanced link and configure the following options:
• Prefill username from certificate on user login window—Whether to fill in the username field
with the retrieved username when prompting the user to authenticate.
• Hide username in login window—If you select the Prefill option, you can hide the username,
which means the user cannot edit the username in the password prompt.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
617
Virtual Private Networks (VPN)
Configure Group Policies for RA VPN
Procedure
Step 1 Click View Configuration in the Device > Remote Access VPN group.
The group shows summary information on how many connection profiles and group policies are currently
configured.
• Click the delete button ( ) to delete a group that you no longer need. The group cannot be currently
used in a connection profile.
General Attributes
The general attributes of a group policy define the name of the group and some other basic settings. The Name
attribute is the only required attribute.
• Name—The name of the group policy. The name can be up to 64 characters, spaces are allowed.
• Description—A description of the group policy. The description can be up to 1,024 characters.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
618
Virtual Private Networks (VPN)
Session Settings Attributes
• DNS Server—Select the DNS server group that defines the DNS servers clients should use for domain
name resolution when connected to the VPN. If the group you need is not yet defined, click Create DNS
Group and create it now.
• Banner—The banner text, or welcome message, to present to users at login. The default is no banner.
The length can be up to 496 characters. The AnyConnect client supports partial HTML. To ensure that
the banner displays properly to remote users, use the <BR> tag to indicate line breaks.
• Default Domain—The default domain name for users in the RA VPN. For example, example.com. This
domain is added to hostnames that are not fully-qualified, for example, serverA instead of
serverA.example.com.
• AnyConnect Client Profiles—Click + and select the AnyConnect Client Profiles to use for this group.
If you configure a fully-qualified domain name for the outside interface (in the connection profile), a
default profile will be created for you. Alternatively, you can upload your own client profile. Create these
profiles using the standalone AnyConnect Profile Editor, which you can download and install from
software.cisco.com. If you do not select a client profile, the AnyConnect client uses default values for
all options. The items in this list are AnyConnect Client Profile objects rather than the profiles themselves.
You can create (and upload) new profiles by clicking Create New AnyConnect Client Profile in the
drop-down list.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
619
Virtual Private Networks (VPN)
Split Tunneling Attributes
• IPv4 Address Pool, IPv6 Address Pool—These options define the address pools for the remote endpoints.
Clients are assigned an address from these pools based on the IP version they use to make the VPN
connection. Select a network object that defines a subnet for each IP type you want to support. Leave
the list empty if you do not want to support that IP version. For example, you could define an IPv4 pool
as 10.100.10.0/24. The address pool cannot be on the same subnet as the IP address for the outside
interface.
You can specify a list of up to six address pools to use for local address allocation. The order in which
you specify the pools is significant. The system allocates addresses from these pools in the order in which
the pools appear.
• DHCP Scope—If you configure DHCP servers for the address pool in the connection profile, the DHCP
scope identifies the subnets to use for the pool for this group. The DHCP server must also have addresses
in the same pool identified by the scope. The scope allows you to select a subset of the address pools
defined in the DHCP server to use for this specific group.
If you do not define a network scope, the DHCP server assigns IP addresses in the order of the address
pools configured. It goes through the pools until it identifies an unassigned address.
To specify a scope, select the network object that contains the network number host address. Click Create
New Network if the object does not yet exist. For example, to tell the DHCP server to use addresses
from the 192.168.5.0/24 subnet pool, select an network object that specifies 192.168.5.0 as a host address.
You can use DHCP for IPv4 addressing only.
• Split DNS—You can configure the system to send some DNS requests through the secure connection,
while allowing the client to send other DNS requests to the DNS servers configured on the client. You
can configure the following DNS behavior:
• Send DNS Request as per split tunnel policy—With this option, DNS requests are handled the
same way as the split tunnel options are defined. If you enable split tunneling, DNS requests are
sent based on the destination addresses. If you do not enable split tunneling, all DNS requests go
over the protected connection.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
620
Virtual Private Networks (VPN)
AnyConnect Attributes
• Always send DNS requests over tunnel—Select this option if you enable split tunneling, but you
want all DNS requests sent through the protected connection to the DNS servers defined for the
group.
• Send only specified domains over tunnel—Select this option if you want your protected DNS
servers to resolve addresses for certain domains only. Then, specify those domains, separating
domain names with commas. For example, example.com, example1.com. Use this option if you
want your internal DNS servers to resolve names for internal domains, while external DNS servers
handle all other Internet traffic.
AnyConnect Attributes
The AnyConnect attributes of a group policy define some SSL and connection settings used by the AnyConnect
client for a remote access VPN connection.
SSL Settings
• Enable Datagram Transport Layer Security (DTLS)—Whether to allow the AnyConnect client to
use two simultaneous tunnels: an SSL tunnel and a DTLS tunnel. Using DTLS avoids latency and
bandwidth problems associated with some SSL connections and improves the performance of real-time
applications that are sensitive to packet delays. If you do not enable DTLS, AnyConnect client users
establishing SSL VPN connections connect with an SSL tunnel only.
• DTLS Compression—Whether to compress Datagram Transport Layer Security (DTLS) connections
for this group using LZS. DTLS Compression is disabled by default.
• SSL Compression—Whether to enable data compression, and if so, the method of data compression to
use, Deflate, or LZS. SSL Compression is Disabled by default. Data compression speeds up transmission
rates, but also increases the memory requirement and CPU usage for each user session. Therefore, SSL
compression decreases the overall throughput of the device.
• SSL Rekey Method, SSL Rekey Interval—The client can rekey the VPN connection, renegotiating
the crypto keys and initialization vectors, to increase the security of the connection. Disable rekeying by
selecting None. To enable rekey, select New Tunnel to create a new tunnel each time. (The Existing
Tunnel option results in the same action as New Tunnel.) If you enable rekeying, also set the rekey
interval, which is 4 minutes by default. You can set the interval to 4-10080 minutes (1 week).
Connection Settings
• Ignore the DF (Don't Fragment) bit—Whether to ignore the Don't Fragment (DF) bit in packets that
need fragmentation. Select this option to allow the forced fragmentation of packets that have the DF bit
set, so that these packets can pass through the tunnel.
• Client Bypass Protocol—Allows you to configure how the secure gateway manages IPv4 traffic (when
it is expecting only IPv6 traffic), or how it manages IPv6 traffic (when it is expecting only IPv4 traffic).
When the AnyConnect client makes a VPN connection to the headend, the headend assigns it an IPv4,
IPv6, or both an IPv4 and IPv6 address. If the headend assigns the AnyConnect connection only an IPv4
address or only an IPv6 address, you can configure the Client Bypass Protocol to drop network traffic
for which the headend did not assign an IP address (default, disabled, not checked), or allow that traffic
to bypass the headend and be sent from the client unencrypted or “in the clear” (enabled, checked).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
621
Virtual Private Networks (VPN)
Traffic Filters Attributes
For example, assume that the secure gateway assigns only an IPv4 address to an AnyConnect connection
and the endpoint is dual-stacked. When the endpoint attempts to reach an IPv6 address, if Client Bypass
Protocol is disabled, the IPv6 traffic is dropped; however, if Client Bypass Protocol is enabled, the IPv6
traffic is sent from the client in the clear.
• MTU—The maximum transmission unit (MTU) size for SSL VPN connections established by the Cisco
AnyConnect VPN Client. The default is 1406 bytes. The range is 576 to 1462 bytes.
• Keepalive Messages Between AnyConnect and VPN Gateway—Whether to exchange keepalive
messages between peers to demonstrate that they are available to send and receive data in the tunnel.
Keepalive messages transmit at set intervals. The default interval is 20 seconds, the valid range is 15 to
600 seconds.
• DPD on Gateway Side Interval, DPD on Client Side Interval—Enable Dead Peer Detection (DPD)
to ensure that the VPN gateway or VPN client quickly detects when the peer is no longer responding.
You can separately enable gateway or client DPD. The default interval is 30 seconds for sending DPD
messages. The interval can be 5-3600 seconds.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
622
Virtual Private Networks (VPN)
Monitoring Remote Access VPN
You can select one of the following values for Browser Proxy During VPN Session:
• No change in endpoint settings—Allow the user to configure (or not configure) a browser proxy for
HTTP, and use the proxy if it is configured.
• Disable browser proxy—Do not use the proxy defined for the browser, if any. No browser connections
will go through the proxy.
• Auto detect settings—Enable the use of automatic proxy server detection in the browser for the client
device.
• Use custom settings—Define a proxy that should be used by all client devices for HTTP traffic. Configure
the following settings:
• Proxy Server IP or Hostname, Port—The IP address, or hostname, of the proxy server, and the
port used for proxy connections by the proxy server. The host and port combined cannot exceed
100 characters.
• Browser Exemption List—Connections to the hosts/ports in the exemption list do not go through
the proxy. Add all of the host/port values for destinations that should not use the proxy. For example,
www.example.com port 80. Click the Add link to add items to the list. Click the trash can icon to
delete items. The entire proxy exception list, combining all addresses and ports, cannot be longer
than 255 characters.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
623
Virtual Private Networks (VPN)
Troubleshooting AnyConnect Download and Installation Problems
2. From the client workstation, verify that you can ping the fully-qualified domain name (FQDN) of the
outside interface, the one defined in the remote access (RA) VPN connection profile. If you can ping the
IP address but not the FQDN, then you need to update the DNS servers used by the client and RA VPN
connection profile to add the FQDN-to-IP-address mapping.
3. Verify that the user is accepting the certificate presented by the outside interface. The user should accept
it permanently.
4. Examine the RA VPN connection configuration and verify that you selected the correct outside interface.
A common mistake is to select an inside interface, the one facing the internal networks, rather than the
outside interface, which faces the RA VPN users.
5. If SSL encryption is properly configured, use an external sniffer to verify whether the TCP three-way
handshake is successful.
• If you configured a fully-qualified domain name (FQDN) for the outside interface in the remote access
(RA) VPN connection profile, verify that you can ping the FQDN from the client device. If you can ping
the IP address but not the FQDN, then you need to update the DNS servers used by the client and RA
VPN connection profile to add the FQDN-to-IP-address mapping. If you are using the default AnyConnect
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
624
Virtual Private Networks (VPN)
Troubleshooting RA VPN Traffic Flow Problems
client profile that is generated when you specify an FQDN for the outside interface, the user will need
to edit the server address to use the IP address until DNS is updated.
• Verify that the user is accepting the certificate presented by the outside interface. The user should accept
it permanently.
• If the user’s AnyConnect client includes multiple connection profiles, that they are selecting the right
one.
• If everything seems right on the client end, make an SSH connection to the Firepower Threat Defense
device, and enter the debug webvpn command. Examine the messages issued during a connection
attempt.
3. Make an SSH connection to the Firepower Threat Defense device and verify that traffic is being sent and
received for the remote access VPN. Use the following commands.
• show webvpn anyconnect
• show vpn-sessiondb
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
625
Virtual Private Networks (VPN)
Examples for Remote Access VPN
url-redirect-acl=redirect
• url-redirect=url, where the URL is the one to which traffic should be redirected. For example:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
626
Virtual Private Networks (VPN)
Configure Change of Authorization on the FTD Device
url-redirect=https://ise2.example.com:8443/guestportal/gateway?sessionId=xx&action=cpp
You must configure DNS for data interfaces so that the hostname can be resolved. If you also configure
traffic filtering in the group policy for the connection profile, ensure that the client pool can reach the ISE
server through the port (TCP/8443 in the example).
4. The FTD device sends a RADIUS Accounting-Request start packet and receives a response from ISE.
The accounting request includes all of the details of the session, including the session ID, the external IP
address of the VPN client, and the IP address of the FTD device. ISE uses the session ID to identify that
session. The FTD device also sends periodic interim account information, where the most important
attribute is the Framed-IP-Address with the IP address that is assigned to the client by the FTD device.
5. While in an unknown posture state, the FTD device redirects traffic from the client that matches the
redirect ACL to the redirect URL. ISE determines if the client has the required posture compliance module,
and prompts the user to install it if necessary.
6. After the agent is installed on the client device, it automatically performs the checks that are configured
in the ISE posture policy. The client communicates directly with ISE. It sends a posture report to ISE,
which can include multiple exchanges using the SWISS protocol and ports TCP/UDP 8905.
7. When ISE receives the posture report from the agent, it processes the authorization rules once again. This
time, the posture result is known and a different rule now matches the client. ISE sends a RADIUS CoA
packet, which includes the downloadable ACL (DACL) for either compliant or non-compliant endpoints.
For example, the compliant DACL might permit all access, while the non-compliant DACL denies all
access. The contents of the DACL are up to the ISE administrator.
8. The FTD device removes the redirection. If it does not have the DACLs cached, it must send an
Access-Request in order to download them from ISE. The specific DACL is attached to the VPN session;
it does not become part of the device configuration.
9. The next time that the RA VPN user tries to access the web page, the user can access the resources that
are permitted by the DACL that is installed on the FTD for the session.
Note If the endpoint fails to satisfy any mandatory requirement and if a manual remediation is required, then a
remediation window opens in the AnyConnect client, displaying the items that require action. The remediation
window runs in the background so that the updates on network activity do not pop up and interfere or cause
disruption. A user can click Details in the ISE Posture tile portion of the AnyConnect client to see what has
been detected and what updates are needed before the user can join the network.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
627
Virtual Private Networks (VPN)
Configure Change of Authorization on the FTD Device
Procedure
Step 1 Configure the extended access control list (ACL) for redirecting initial connections to ISE.
The purpose of the redirect ACL is to send initial traffic to ISE so that ISE can assess the client posture. The
ACL should send HTTPS traffic to ISE, but not traffic that is already destined for ISE, or traffic that is directed
to a DNS server for name resolution. A sample redirect ACL might look like the following:
However, note that ACLs have an implicit “deny any any” as the last access control entry (ACE). In this
example, the last ACE, which matches TCP port www (that is, port 80), will not match any traffic that matches
the first 3 ACEs, so those are redundant. You could simply create an ACL with the last ACE and get the same
results.
Note that in a redirect ACL, the permit and deny actions simply determine which traffic matches the ACL,
with permit matching and deny not matching. No traffic is actually dropped, denied traffic is simply not
redirected to ISE.
To create the redirect ACL, you need to configure a Smart CLI object.
a) Choose Device > Advanced Configuration > Smart CLI > Objects.
b) Click + to create a new object.
c) Enter a name for the ACL. For example, redirect.
d) For CLI Template, select Extended Access List.
e) Configure the following in the Template body:
• configure access-list-entry action = permit
• source-network = any-ipv4
• destination-network = any-ipv4
• configure permit port = any-source
• destination-port = HTTP
• configure logging = disabled
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
628
Virtual Private Networks (VPN)
Configure Change of Authorization on the FTD Device
f) Click OK.
This ACL will be configured the next time you deploy changes. You do not need to use the object in any
other policy to force deployment.
Note This ACL applies to IPv4 only. If you also want to support IPv6, simply add a second ACE
with all the same attributes, except select any-ipv6 for the source and destination networks. You
can also add the other ACEs to ensure traffic to the ISE or DNS server is not redirected. You
will first need to create host network objects to hold the IP addresses of those servers.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
629
Virtual Private Networks (VPN)
Configure Change of Authorization in ISE
If you also use this server for FDM administrative access, this interface is ignored. Administrative
access attempts are always authenticated through the management IP address.
The following example shows the options configured for the inside interface.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
630
Virtual Private Networks (VPN)
Configure Change of Authorization in ISE
that the exact command paths, page names, and attribute names can change from release to release. The version
of ISE you are using might use different terminology or organization.
The minimum supported ISE release is 2.2 patch 1.
Procedure
Step 1 Choose Administration > Network Resources > Network Devices > Network Devices, add the FTD device
to the ISE Network Device inventory, and configure the RADIUS settings.
Select the RADIUS Authentication Settings, and configure the same Shared Secret that is configured in
the FTD RADIUS server object. If desired, change the CoA Port number and ensure you configure the same
port in the FTD RADIUS server group object.
Step 2 Choose Policy > Policy Elements > Results > Authorization > Downloadable ACLs.
Create 2 downloadable ACLs (DACL), one for use by compliant endpoints, one for non-compliant endpoints.
For example, you might allow all access for compliant endpoints (permit ip any any), while denying all access
to non-compliant endpoints (deny ip any any). You can make these DACLs as complex as you require, to
provide the exact access users should have based on their compliance state. You will use these DACLs in
authorization profiles.
Step 3 Choose Policy > Policy Elements > Results > Authorization > Authorization Profile and configure the
required profiles.
You need profiles for the following states. Minimum attributes for each are listed.
• Unknown—The unknown posture profile is the default posture profile. Every endpoint is matched to
this policy when they initially establish the RA VPN connection. The point of this rule is to apply the
redirect ACL and URL, and to download the posture agent if it is not already on the endpoint. Endpoints
can remain attached to this profile if the agent is not installed, or if installation fails. Otherwise, after
assessing the posture, endpoints move to the compliant or non-compliant profiles.
Minimum attributes include the following:
• Name—For example, PRE_POSTURE.
• Access Type—Select ACCESS_ACCEPT.
• Common Tasks—Select Web Redirection (CWA, MDM, NSP, CPP), then select Client
Provisioning (Posture), and enter the name of the redirect ACL you configured on the FTD device.
In Value, select Client Provisioning Portal if it is not already selected.
• The Attribute Details should show two cisco-av-pair values, for url-redirect-acl and url-redirect.
ISE will send this data to the FTD device, which will apply the criteria to the RA VPN user session.
• Compliant—After the posture assessment completes, if the endpoint meets all requirements configured
for the endpoint, the client is considered compliant and gets this profile. You would typically give this
client full access.
Minimum attributes include the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
631
Virtual Private Networks (VPN)
Configure Change of Authorization in ISE
• Non-compliant—If the posture assessment determines that the endpoint does not meet all requirements,
there is a countdown during which the client can bring the endpoint into compliance, for example, by
installing required updates. The AnyConnect client informs the user of the compliance issues. During
the countdown, the endpoint remains in the unknown compliance state. If the endpoint remains
non-compliant after the countdown expires, the session is marked non-compliant and it gets the
non-compliant profile. You would typically prevent all access for this endpoint, or at least restrict access
in some way.
Minimum attributes include the following:
• Name—For example, Non_Compliant.
• Access Type—Select ACCESS_ACCEPT.
• Common Tasks—Select DACL Name, and select the downloadable ACL for non-compliant users,
for example, DENY_ALL_TRAFFIC. ISE will send the ACL to the FTD device, which will apply
it to the user session. This DACL will replace the initial redirect ACL for the user session.
Step 4 Choose Policy > Policy Elements > Results > Client Provisioning > Resources and configure the following
resources:
• AnyConnect package—The head end package file, which you download from software.cisco.com. You
need separate packages for the client platforms you support, so you might need to configure multiple
types, such as AnyConnectDesktopWindows.
• ISE Posture Configuration File (Type: AnyConnectProfile)—This configuration file defines the
settings that the compliance module uses to evaluate the end user’s device. This file also defines the
length of time the user has to bring a non-compliant device into compliance.
• Compliance Module Package (Type: ComplianceModule)—The AnyConnect Compliance Module
file is the file which will be pushed down to the installed AnyConnect package to check endpoint
compliance. Download this file using the Add Resource from Cisco Site command. Ensure that you
download the correct module based on the AnyConnect packages you have configured, or users will get
download failures. You can also find these files on software.cisco.com in the AnyConnect listings in the
ISEComplianceModule folder.
• AnyConnect Configuration File (Type: AnyConnectConfig)—These AnyConnect release-specific
settings define the AnyConnect Package, Compliance Module, and ISE Posture to apply. Because
the packages are OS-specific, create separate configuration files for each client OS you will support (for
example, Windows, MAC, Linux).
Step 5 Choose Policy > Client Provisioning and configure the client provisioning policy.
Create new rules, for example, with names like CoA_ClientProvisionWin, for each operating system that
should implement CoA. Select the appropriate operating system for the rule, and in Results, select the
AnyConnect configuration file you created for the OS as the Agent.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
632
Virtual Private Networks (VPN)
Configure Change of Authorization in ISE
Step 7 Choose Policy > Policy Sets > Default > Authorization Policy and create the policy.
Add rules for each of the compliant conditions. These sample values are based on the examples in previous
steps.
• Unknown, for pre-posture and posture download.
• Name—For example, PRE_POSTURE
• Conditions—”Session-PostureStatus EQUALS Unknown” AND “Radius-NAS-Port-Type EQUALS
Virtual”
• Profiles—For example, PRE_POSTURE
Step 8 (Optional.) Choose Administration > Settings > Posture > Reassessments and enable posture reassessment.
By default, posture is assessed at connection time only. You can enable posture reassessment to periodically
check the posture of connected endpoints. You can set the reassessment interval to determine how often this
occurs.
If the system fails reassessment, you can define how the system should respond. You can allow the user to
continue (remain connected), log the user off, or ask the user to remediate the system.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
633
Virtual Private Networks (VPN)
How to Configure Two-Factor Authentication using Duo LDAP
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
634
Virtual Private Networks (VPN)
Configure Duo LDAP Secondary Authentication
Procedure
Step 1 Create a Duo account and obtain the integration key, secret key, and API hostname.
Following is an overview of the process. For details, please see the Duo web site, https://duo.com.
a) Sign up for a Duo account.
b) Log in to the Duo Admin Panel and navigate to Applications.
c) Click Protect an Application and locate Cisco SSL VPN in the applications list. Click Protect this
Application to get your integration key, secret key, and API hostname. For help, see the Duo Getting
Started guide, https://duo.com/docs/getting-started.
Step 2 Create a Duo LDAP identity source for the Duo LDAP server.
You must use the FTD API to create the Duo LDAP object; you cannot create it using FDM. You can either
use the API Explorer, or write your own client application, to create the object. The following procedure
explains how to create the object using API Explorer.
a) Log into FDM, click the more options button ( ), and choose API Explorer.
The system opens the API Explorer in a separate tab or window, depending on your browser settings.
b) (Optional.) Obtain the values needed to identify the interface the system should use to connect to the Duo
LDAP server.
If you do not specify an interface, the system uses the routing table. If necessary, you can create a static
route for the Duo LDAP server. Alternatively, you can specify the interface to use in the Duo LDAP
object. If you want to specify the interface, use the various GET methods in the Interfaces group to obtain
the needed values. You can use physical, subinterface, EtherChannel, or VLAN interfaces. For example,
to get the values for a physical interface, use the GET /devices/default/interfaces method and find the
object for the interface you need to use. You need the following values from the interface object:
• id
• type
• version
• name
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
635
Virtual Private Networks (VPN)
Configure Duo LDAP Secondary Authentication
• For apiHostname, enter the API Hostname that you obtained from your Duo account. The hostname
should look like the following, with the X’s replaced with your unique value:
API-XXXXXXXX.DUOSECURITY.COM. Uppercase is not required.
• For port, enter the TCP port to use for LDAPS. This should be 636 unless you have been told by
Duo to use a different port. Note that you must ensure that your access control list allows traffic to
the Duo LDAP server through this port.
• For timeout, enter the timeout, in seconds, to connect to the Duo server. The value can be 1-300
seconds. The default is 120. To use the default, either enter 120 or delete the attribute line.
• For integrationKey, enter the integration key that you obtained from your Duo account.
• For secretKey, enter the secret key that you obtained from your Duo account. This key will
subsequently be masked.
• For interface, either enter the id, type, version, and name values of the interface to use to connect
to the Duo LDAP server, or delete the 6 lines used to define the interface attribute, including the
trailing closing brace.
• For type, leave the value as duoldapidentitysource.
For example, the object body might look like the following, where the apiHostname and integrationKey
are obfuscated, but the intentionally faked secret key is shown:
{
"name": "Duo-LDAP-server",
"description": "Duo LDAP server for RA VPN",
"apiHostname": "API-XXXXXXXX.DUOSECURITY.COM",
"port": 636,
"timeout": 120,
"integrationKey": "XXXXXXXXXXXXXXXXXXXX",
"secretKey": "123456789",
"type": "duoldapidentitysource"
}
Step 3 Upload the trusted CA certificate for the Duo web site to FDM.
The FTD system must have the certificate needed to validate the connection to the Duo LDAP server. You
can obtain and upload the certificate using this procedure, which was done with the Google Chrome browser.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
636
Virtual Private Networks (VPN)
Configure Duo LDAP Secondary Authentication
The exact steps for your browser might differ. Alternatively, you can go directly to
https://www.digicert.com/digicert-root-certificates.htm and download the certificate, but the following
procedure is generic and you can use it to obtain root trusted CA certificates for any site.
a) Open https://duo.com in your browser.
b) Click the site information link in the browser’s URL field, then click the Certificate link. This action
opens the certificate information dialog box.
c) Click the Certificate Path tab, and select the root (top) level of the path. In this case, DigiCert.
d) With DigiCert selected, click View Certificate. This action will open a new Certificate dialog box, and
the General tab should indicate that it was issued to DigiCert High Assurance EV Root CA. This is the
root CA certificate that you need to upload to FDM.
e) Click the Details tab, then click the Copy to File button to start the certificate download wizard.
f) Use the wizard to download the certificate to your workstation. Download using the default DER format.
g) In FDM, choose to Objects > Certificates.
h) Click + > Add Trusted CA Certificate.
i) Enter a name for the certificate, for example, DigiCert_High_Assurance_EV_Root_CA. (Spaces are not
allowed.)
j) Click Upload Certificate and select the file you downloaded.
k) Click OK.
Step 4 Use the AnyConnect Profile Editor to create a profile that specifies 60 seconds or more for authentication
timeout.
You need to give users extra time to obtain the Duo passcode and complete the secondary authentication. We
recommend at least 60 seconds.
For details on creating AnyConnect profiles and uploading them, see Configure and Upload Client Profiles,
on page 607. The following procedure explains how to configure the authentication timeout only, and then
upload the profile to FTD. If you want to change other settings, you can do so now.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
637
Virtual Private Networks (VPN)
Configure Duo LDAP Secondary Authentication
a) If you have not already done so, download and install the AnyConnect profile editor package. You can
find this in the Cisco Software center (software.cisco.com) in the folder for your AnyConnect version.
The base path at the time of this writing is Downloads Home > Security > VPN and Endpoint Security
Clients > Cisco VPN Clients > AnyConnect Secure Mobility Client.
b) Open the AnyConnect VPN Profile Editor.
c) Select Preferences (Part 2) in the table of contents, scroll to the end of the page, and change
Authentication Timeout to 60 (or more). The following image is from the AnyConnect 4.7 VPN Profile
Editor; previous or subsequent versions might be different.
d) Choose File > Save, and save the profile XML file to your workstation with an appropriate name, for
example, duo-ldap-profile.xml.
You can now close the VPN Profile Editor application.
e) In FDM, choose Objects > AnyConnect Client Profiles.
f) Click + to create a new profile object.
g) Enter a Name for the object. For example, Duo-LDAP-profile.
h) Click Upload, and select the XML file you created.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
638
Virtual Private Networks (VPN)
Configure Duo LDAP Secondary Authentication
i) Click OK.
Step 5 Create a group policy and select the AnyConnect profile in the policy.
The group policy that you assign to a user controls many aspects of the connection. The following procedure
explains how to assign the profile XML file to the group. For more details about what you can do with group
policies, see Configure Group Policies for RA VPN, on page 618.
a) Click View Configuration in Device > Remote Access VPN.
b) Choose Group Policies in the table of contents.
c) Either edit DfltGrpPolicy, or click + and create a new group policy. For example, if you need a single
remote access VPN connection profile for all users, editing the default group policy is appropriate.
d) On the General page, configure the following properties:
• Name—For a new profile, enter a name. For example, Duo-LDAP-group.
• AnyConnect Client Profiles—Click + and select the AnyConnect client profile object you created.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
639
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for Remote Access VPN Users (Hair Pinning)
d) Click Next.
e) On the Remote User Experience page, select the Group Policy you created or edited.
f) Click Next on this page and the next page, Global Settings.
g) Click Finish to save your changes to the connection profile.
Step 7 Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
How to Provide Internet Access on the Outside Interface for Remote Access
VPN Users (Hair Pinning)
In remote access VPN, you might want users on the remote networks to access the Internet through your
device. However, because the remote users are entering your device on the same interface that faces the
Internet (the outside interface), you need to bounce Internet traffic right back out of the outside interface. This
technique is sometimes called hair pinning.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
640
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for Remote Access VPN Users (Hair Pinning)
The following graphic shows an example. There is a remote access VPN configured on the outside interface,
198.51.100.1. You want to split the remote user’s VPN tunnel, so that Internet-bound traffic goes back out
the outside interface, while traffic to your internal networks continue through the device. Thus, when a remote
user wants to go to a server on the Internet, such as www.example.com, the connection first goes through the
VPN, then gets routed back out to the Internet from the 198.51.100.1 interface.
Procedure
• On the Split Tunneling page, for both IPv4 and IPv6 Split Tunneling, select the Allow all traffic
over tunnel option. This is the default setting, so it might already be configured correctly.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
641
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for Remote Access VPN Users (Hair Pinning)
Note This is a critical setting to enable hair-pinning. You want all traffic to go to the VPN
gateway, whereas split tunneling is a way to allow remote clients to directly access local
or Internet sites outside of the VPN.
• NAT Exempt, in step 3. Enable this feature. Select the inside interface, then select a network object
that defines the internal networks. In this example, the object should specify 192.168.1.0/24. RA
VPN traffic going to the internal network will not get address translation. However, because
hair-pinned traffic is going out the outside interface, it will still be NAT’ed because the NAT
exemption applies to the inside interface only. Note that if you have other connection profiles defined,
you need to add to the existing settings, as the configuration applies to all connection profiles.
Note The NAT Exempt option is the other critical setting for the hair pin configuration.
g) (Optional.) In the Global Settings step, select the Bypass Access Control policy for decrypted traffic
(sysopt permit-vpn) option.
By selecting this option, you remove the need to configure access control rules to allow traffic from RA
VPN pool addresses. This option provides improved security (external users cannot spoof addresses in
the pool), but it means that RA VPN traffic is exempt from inspection, including URL filtering and
intrusion protection. Consider the pros and cons before deciding on this option.
h) Review the RA VPN configuration, then click Finish.
Step 2 Configure the NAT rule to translate all connections going out the outside interface to ports on the outside IP
address (interface PAT).
When you complete the initial device configuration, the system creates a NAT rule named
InsideOutsideNatRule. This rule applies interface PAT to IPv4 traffic from any interface that exits the device
through the outside interface. Because the outside interface is included in “Any” source interface, the rule
you need already exists, unless you edited it or deleted it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
642
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for Remote Access VPN Users (Hair Pinning)
The following procedure explains how to create the rule you need.
a) Click Policies > NAT.
b) Do one of the following:
• To edit the InsideOutsideNatRule, mouse over the Action column and click the edit icon ( ).
• To create a new rule, click +.
The following graphic shows the simple case where you select Any for the source address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
643
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for Remote Access VPN Users (Hair Pinning)
d) Click OK.
Step 3 (If you do not configure Bypass Access Control policy for decrypted traffic (sysopt permit-vpn) in the
connection profile.) Configure an access control rule to allow access from the remote access VPN address
pool.
If you select the Bypass Access Control policy for decrypted traffic (sysopt permit-vpn) in the connection
profile, traffic from RA VPN pool addresses bypasses the access control policy. You cannot write access
control rules that will apply to the traffic. You need to write rules only if you disable the option.
The following example allows traffic from the address pool to any destination. You can adjust this to meet
your specific requirements. You can also precede the rule with block rules to filter out undesirable traffic.
a) Click Policies > Access Control.
b) Click + to create a new rule.
c) Configure a rule with the following properties:
• Order—Select a position in the policy before any other rule that might match these connections and
block them. The default is to add the rule to the end of the policy. If you need to reposition the rule
later, you can edit this option or simply drag and drop the rule to the right slot in the table.
• Title—Enter a meaningful name without spaces. For example, RAVPN-address-pool.
• Action—Allow. You can select Trust if you do not want this traffic to be inspected for protocol
violations or intrusions.
• Source/Destination tab—For Source > Network, select the same object you used in the RA VPN
connection profile for the address pool. Leave the default, Any, for all other Source and Destination
options.
• Application, URL, and Users tabs—Leave the default settings on these tabs, that is, nothing selected.
• Intrusion, File tabs—You can optionally select intrusion or file policies to inspect for threats or
malware.
• Logging tab—You can optionally enable connection logging.
d) Click OK.
Step 4 Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
644
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
Note If you use the data interfaces as a gateway for the virtual management interface, this configuration also enables
usage of the directory for identity policies. If you do not use data-interfaces as the management gateway,
ensure that there is a route from the management network to the inside network that participates in the site-to-site
VPN connection.
1 Remote access host that makes a VPN connection to 192.168.4.6. Clients will get an
address in the 172.18.1.0/24 address pool.
3 The site-to-site VPN tunnel between the outside interfaces of the Site A and Site B
FTD devices.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
645
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
Procedure
Step 1 Configure the site-to-site VPN connection on Site B, which hosts the directory server.
a) Click Device, then click View Configuration in the Site-to-Site VPN group.
b) Click the + button.
c) Configure the following options for Endpoint Settings.
• Connection Profile Name—Enter a name, for example, SiteA (to indicate that the connection is to
Site A).
• Local Site—These options define the local endpoint.
• Local VPN Access Interface—Select the outside interface (the one with the 192.168.2.1 address
in the diagram).
• Local Network—Click + and select the network object that identifies the local network that
should participate in the VPN connection. Because the directory server is on this network, it
can participate in the site-to-site VPN. Assuming that the object does not already exist, click
Create New Network and configure an object for the 192.168.1.0/24 network. After saving
the object, select it in the drop-down list and click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
646
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
647
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
2. SiteAInterface, Host, 192.168.4.6. This is key: you must include the remote access VPN
connection point address as part of the remote network for the site-to-site VPN
connection so that the RA VPN hosted on that interface can use the directory server.
When you are finished, the endpoint settings should look like the following:
d) Click Next.
e) Define the privacy configuration for the VPN.
For this use case, we assume you qualify for export controlled features, which allows the use of strong
encryption. Adjust these example settings to meet your needs and your license compliance.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
648
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
• IKE Version 2, IKE Version 1—Keep the defaults, IKE Version 2 enabled, IKE Version 1 disabled.
• IKE Policy—Click Edit and enable AES-GCM-NULL-SHA and AES-SHA-SHA, and disable
DES-SHA-SHA.
• IPsec Proposal—Click Edit. In the Select IPSec Proposals dialog box, click +, then click Set Default
to choose the default AES-GCM proposals.
• Local Preshared Key, Remote Peer Preshared Key—Enter the keys defined on this device and
on the remote device for the VPN connection. These keys can be different in IKEv2. The key can
be 1-127 alphanumeric characters. Remember these keys, because you must configure the same
strings when creating the site-to-site VPN connection on the Site A device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
649
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
g) Click Next.
h) Review the summary and click Finish.
The summary information is copied to the clipboard. You can paste the information in a document and
use it to help you configure the remote peer, or to send it to the party responsible for configuring the peer.
i) Click the Deploy Changes icon in the upper right of the web page.
j) Click the Deploy Now button and wait for deployment to complete successfully.
Now the Site B device is ready to host one end of the site-to-site VPN connection.
Step 2 Log out of the Site B device and log into the Site A device.
Step 3 Configure the site-to-site VPN connection on Site A, which will host the remote access VPN.
a) Click Device, then click View Configuration in the Site-to-Site VPN group.
b) Click the + button.
c) Configure the following options for Endpoint Settings.
• Connection Profile Name—Enter a name, for example, SiteB (to indicate that the connection is to
Site B).
• Local Site—These options define the local endpoint.
• Local VPN Access Interface—Select the outside interface (the one with the 192.168.4.6 address
in the diagram).
• Local Network—Click + and select the network objects that identify the local networks that
should participate in the VPN connection. Click Create New Network, configure the following
objects, then select them in the list. Note that you created the same objects in the Site B
device, but you have to create them again in the Site A device.
1. SiteAInside, Network, 192.168.3.0/24.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
650
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
2. SiteAInterface, Host, 192.168.4.6. This is key: you must include the remote access VPN
connection point address as part of the inside network for the site-to-site VPN
connection so that the RA VPN hosted on that interface can use the directory server
on the remote network.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
651
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
• Remote Network—Click + and select the network object that identifies the remote network
that should participate in the VPN connection, the one that includes the directory server. Click
Create New Network and configure an object for the 192.168.1.0/24 network. After saving
the object, select it in the drop-down list and click OK. Note that you created the same object
in the Site B device, but you have to create it again in the Site A device.
When you are finished, the endpoint settings should look like the following. Notice that the local/remote
networks are flipped compared to the Site B settings. This is how the two ends of a point-to-point connection
should always look.
d) Click Next.
e) Define the privacy configuration for the VPN.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
652
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
Configure the same IKE version, policy, and IPsec proposal, and the same preshared keys, as you did for
the Site B connection, but make sure that you reverse the Local and Remote preshared keys.
The IKE policy should look like the following:
g) Click Next.
h) Review the summary and click Finish.
i) Click the Deploy Changes icon in the upper right of the web page.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
653
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
j) Click the Deploy Now button and wait for deployment to complete successfully.
Now the Site A device is ready to host the other end of the site-to-site VPN connection. Because Site B
is already configured with compatible settings, the two devices should negotiate a VPN connection.
You can confirm the connection by logging into the device CLI and pinging the directory server. You can
also use the show ipsec sa command to view the session information.
Step 4 Configure the directory server on Site A. Click Test to verify that there is a connection.
a) Select Objects, then select Identity Sources from the table of contents.
b) Click + > AD.
c) Configure the basic realm properties.
• Name—A name for the directory realm. For example, AD.
• Type—The type of directory server. Active Directory is the only supported type, and you cannot
change this field.
• Directory Username, Directory Password—The distinguished username and password for a user
with appropriate rights to the user information you want to retrieve. For Active Directory, the user
does not need elevated privileges. You can specify any user in the domain. The username must be
fully qualified; for example, Administrator@example.com (not simply Administrator).
Note The system generates ldap-login-dn and ldap-login-password from this information. For
example, Administrator@example.com is translated as
cn=adminisntrator,cn=users,dc=example,dc=com. Note that cn=users is always part of this
translation, so you must configure the user you specify here under the common name
“users” folder.
• Base DN—The directory tree for searching or querying user and group information, that is, the
common parent for users and groups. For example, cn=users,dc=example,dc=com. For information
on finding the base DN, see Determining the Directory Base DN, on page 153.
• AD Primary Domain— The fully qualified Active Directory domain name that the device should
join. For example, example.com.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
654
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
• Hostname/IP Address—The hostname or IP address of the directory server. If you use an encrypted
connection to the server, you must enter the fully-qualified domain name, not the IP address. For
this example, enter 192.168.1.175.
• Port—The port number used for communications with the server. The default is 389. Use port 636
if you select LDAPS as the encryption method. For this example, keep 389.
• Encryption—To use an encrypted connection for downloading user and group information. The
default is None, which means that user and group information is downloaded in clear text. For RA
VPN, you can use LDAPS, which is LDAP over SSL. Use port 636 if you select this option. RA
VPN does not support STARTTLS. For this example, select None.
• Trusted CA Certificate—If you select an encryption method, upload a Certificate Authority (CA)
certificate to enable a trusted connection between the system and the directory server. If you are
using a certificate to authenticate, the name of the server in the certificate must match the server
Hostname / IP Address. For example, if you use 192.168.1.175 as the IP address but ad.example.com
in the certificate, the connection fails.
e) Click the Test button to verify the system can contact the server.
The system uses separate processes to access the server, so you might get errors indicating that the
connection works for one type of use but not another, for example, available for Identity policies but not
for remote access VPN. If the server cannot be reached, verify that you have the right IP address and host
name, that the DNS server has an entry for the hostname, and so forth. Also, verify that the site-to-site
VPN connection is working and that you included Site A's outside interface address in the VPN, and that
NAT is not translating traffic for the directory server. You might also need to configure a static route for
the server.
f) Click OK.
Step 5 Click Device > Smart License > View Configuration, and enable the RA VPN license.
When enabling the RA VPN license, select the type of license you purchased: Plus, Apex (or both), or VPN
Only. For more information, see Licensing Requirements for Remote Access VPN, on page 605.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
655
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
656
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
657
Virtual Private Networks (VPN)
How to Control RA VPN Access By Group
Step 8 Click the Deploy Now button and wait for deployment to complete successfully.
Now the Site A device is ready to accept RA VPN connections. Have an external user install the AnyConnect
client and complete a VPN connection.
You can confirm the connection by logging into the device CLI and using the show vpn-sessiondb anyconnect
command to view the session information.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
658
Virtual Private Networks (VPN)
How to Control RA VPN Access By Group
does not have a traffic filter defined for the VPN. You can edit the default group policy if you want to apply
restrictions to these users, and apply an ACL constructed as described below.
Procedure
Step 1 Configure the extended access control list (ACL) for restricting RA VPN traffic.
You need to first configure the network object that defines the target 192.168.2.0/24, then create the Smart
CLI object that defines the access list. Because the ACL has an implicit deny at the end, you need only permit
access to the subnet, and traffic directed to any IP address outside the subnet will be denied. This example
applies to IPv4 only; you can also configure objects for restricting IPv6 access to particular subnets. Simply
create the network object and add an IPv6-based ACE to the same ACL.
a) Choose Objects > Networks, and create the required object.
For example, name the object ContractNetwork. The object should look similar to the following:
b) Choose Device > Advanced Configuration > Smart CLI > Objects.
c) Click + to create a new object.
d) Enter a name for the ACL. For example, ContractACL.
e) For CLI Template, select Extended Access List.
f) Configure the following in the Template body:
• configure access-list-entry action = permit
• source-network = any-ipv4
• destination-network = ContractNetwork object
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
659
Virtual Private Networks (VPN)
How to Control RA VPN Access By Group
g) Click OK.
This ACL will be configured the next time you deploy changes. You do not need to use the object in any
other policy to force deployment.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
660
Virtual Private Networks (VPN)
How to Control RA VPN Access By Group
e) In the global settings, select the Bypass Access Control policy for decrypted traffic (sysopt permit-vpn)
option, and configure the NAT Exempt options.
For NAT Exempt, you need to configure the following options. Note that if you have other connection
profiles defined, you need to add to the existing settings, as the configuration applies to all connection
profiles.
• Inside Interfaces—Select the inside2 interface. These are the interfaces for the internal networks
remote users will be accessing. NAT rules are created for these interfaces.
• Inside Networks—Select the ContractNetwork network object. These are the network objects that
represent internal networks remote users will be accessing.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
661
Virtual Private Networks (VPN)
How to Allow RA VPN Access to Internal Networks in Different Virtual Routers
h) Click Finish.
Procedure
Step 1 Configure the route leak from the Global virtual router to VR1.
This route allows AnyConnect Clients assigned IP addresses in the VPN pool to access the 192.168.1.0/24
network in the VR1 virtual router.
a) Choose Device > Routing > View Configuration.
b) Click the view icon ( ) for the Global virtual router.
c) On the Static Routing tab for the Global router, click + and configure the route:
• Name—Any name will do, such as ravpn-leak-vr1.
• Interface—Select vr1-inside.
• Protocol—Select IPv4.
• Networks—Select an object that defines the 192.168.1.0/24 network. Click Create New Network
to create the object now if necessary.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
662
Virtual Private Networks (VPN)
How to Allow RA VPN Access to Internal Networks in Different Virtual Routers
• Gateway—Leave this item blank. When leaking a route into another virtual router, you do not select
the gateway address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
663
Virtual Private Networks (VPN)
How to Allow RA VPN Access to Internal Networks in Different Virtual Routers
d) Click OK.
Step 2 Configure the route leak from VR1 to the Global virtual router.
This route allows endpoints on the 192.168.1.0/24 network to initiate connections to AnyConnect Clients
assigned IP addresses in the VPN pool.
a) Choose VR1 from the virtual routers drop-down list to switch to the VR1 configuration.
b) On the Static Routing tab for the VR1 virtual router, click + and configure the route:
• Name—Any name will do, such as ravpn-traffic.
• Interface—Select outside.
• Protocol—Select IPv4.
• Networks—Select the object you created for the VPN pool, for example, vpn-pool.
• Gateway—Leave this item blank. When leaking a route into another virtual router, you do not select
the gateway address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
664
Virtual Private Networks (VPN)
How to Customize the AnyConnect Icon and Logo
c) Click OK.
What to do next
If there is overlap between the RA VPN address pool and the IP addresses in the custom virtual router, you
must also use static NAT rules on the IP addresses to enable proper routing. However, it is far easier to simply
change your RA VPN address pool so that there is no overlap.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
665
Virtual Private Networks (VPN)
How to Customize the AnyConnect Icon and Logo
Although you can use any filename if you deploy your own executable to customize the GUI, this example
assumes you are simply swapping icons and logos without deploying a fully-customized framework.
There are a number of images you can replace, and their file names differ based on platform. For complete
information on customization options, file names, types, and sizes, please see the chapter on customizing and
localizing the AnyConnect client and installer in the Cisco AnyConnect Secure Mobility Client Administrator
Guide. For example, the chapter for the 4.8 client is available at:
https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect48/administration/guide/
b_AnyConnect_Administrator_Guide_4-8/customize-localize-anyconnect.html
To upload these files, you must place them on a server that the FTD device can access. You can use a TFTP,
FTP, HTTP, HTTPS, or SCP server. The URLs to get images from these files can include paths and
uesrname/password, as required by your server setup. This example will use TFTP.
Procedure
Step 1 Upload the image files to each FTD device that is acting as an RA VPN headend that should use the customized
icons and logos.
a) Log into the device CLI using an SSH client.
b) In the CLI, enter the system support diagnostic-cli command to enter diagnostic CLI mode.
ftdv1>
Note Read the message! You must press Ctrl+a, then d, to get out of the diagnostic CLI and back
into the normal FTD CLI mode.
c) Note the command prompt. The normal CLI uses > only, whereas the diagnostic CLI’s user EXEC mode
uses the hostname plus >. In this example, ftdv1>. You need to get into privileged EXEC mode, which
uses # as the ending character, for example, ftdv1#. If your prompt already has #, skip this step. Otherwise,
enter the enable command, and simply press Enter at the password prompt without entering a password.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
666
Virtual Private Networks (VPN)
How to Customize the AnyConnect Icon and Logo
ftdv1> enable
Password:
ftdv1#
d) Use the copy command to copy each file from the hosting server to the FTD device’s disk0. You can
place them in a subdirectory, such as disk0:/anyconnect-images/. You can create a new folder using the
mkdir command.
For example, if the TFTP server’s IP address is 10.7.0.80, and you want to create a new directory, the
commands would be similar to the following. Note that responses to the copy command are omitted after
the first example.
Accessing tftp://10.7.0.80/app_logo.png...!!!!!!
Writing file disk0:/anyconnect-images/app_logo.png...
!!!!!!
12288 bytes copied in 1.000 secs (12288 bytes/sec)
Step 2 Use the import webvpn command in the diagnostic CLI to instruct AnyConnect to download these images
when installing itself on client machines.
import webvpn AnyConnect-customization type resource platform win name filename
disk0:/directoryname/filename
This command is for Windows. For Linux, replace the win keyword with linux or linux-64, as appropriate
for your clients.
For example, to import the files uploaded in the previous step, and assuming we are still in the diagnostic
CLI:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
667
Virtual Private Networks (VPN)
How to Customize the AnyConnect Icon and Logo
• To verify that the images were downloaded to a client, they should appear when the user runs the client.
You can also check the following folder on Windows clients, where %PROGRAMFILES% typically
resolves to c:\Program Files.
%PROGRAMFILES%\Cisco\Cisco AnyConnect Secure Mobility Client\res
What to do next
If you want to return to the default images, use the revert webvpn command (in the diagnostic CLI privileged
EXEC mode) for each image you customized. The command is:
revert webvpn AnyConnect-customization type resource platform win name filename
As with import webvpn, replace win with linux or linux-64 if you customized those client platforms, and
issue the command separately for each image filename you imported. For example:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
668
PA R T VII
System Administration
• System Settings, on page 671
• System Management, on page 697
CHAPTER 25
System Settings
The following topics explain how to configure the various system settings that are grouped together on the
System Settings page. The settings cover overall system function.
• Configuring Management Access, on page 671
• Configuring System Logging Settings, on page 674
• Configuring DHCP Server, on page 678
• Configuring DNS, on page 680
• Configuring the Management Interface, on page 684
• Configuring the Device Hostname, on page 685
• Configuring Time Services (NTP, PTP), on page 686
• Configuring HTTP Proxy for Management Connections, on page 689
• Configuring Cloud Services, on page 690
• Enabling or Disabling Web Analytics, on page 694
• Configuring URL Filtering Preferences, on page 694
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
671
System Administration
Configuring the Management Access List
Caution If you constrain access to specific addresses, you can easily lock yourself out of the system. If you delete
access for the IP address that you are currently using, and there is no entry for “any” address, you will lose
access to the system when you deploy the policy. Be very careful if you decide to configure the access list.
Procedure
Step 1 Click Device, then click the System Settings > Management Access link.
If you are already on the System Settings page, simply click Management Access in the table of contents.
You can also configure AAA on this page to allow management access for users defined in an external AAA
server. For details, see Managing FDM and FTD User Access, on page 713.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
672
System Administration
Configuring the Firepower Device Manager Web Server Certificate
• Protocol—Select whether the rule is for HTTPS (port 443) or SSH (port 22).
• IP Address—Select the network object that defines the IPv4 or IPv6 network or host that should be
able to access the system. To specify "any" address, select any-ipv4 (0.0.0.0/0) and any-ipv6 (::/0).
c) Click OK.
Step 3 To create rules for data interfaces:
a) Select the Data Interfaces tab.
The list of rules defines which addresses are allowed access to the indicated port on the interface: 443 for
Firepower Device Manager (the HTTPS web interface), 22 for the SSH CLI.
The rules are not an ordered list. If an IP address matches any rule for the requested port, the user is
allowed to attempt logging into the device.
Note
To delete a rule, click the trash can icon ( ) for the rule. If you delete all of the rules for a
protocol, no one can access the device on that interface using the protocol.
c) Click OK.
Procedure
Step 1 Click Device, then click the System Settings > Management Access link.
If you are already on the System Settings page, simply click Management Access in the table of contents.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
673
System Administration
Configuring System Logging Settings
If you have not uploaded or created the certificate, click the Create New Internal Certificate link at the
bottom of the list and create it now.
The default is the pre-defined DefaultWebserverCertificate object.
Step 4 If the certificate is not self-signed, add all intermediate and root certificates in the full trust chain to the Trusted
Chain list.
You can add up to 10 certificates in the chain. Click + to add each intermediate certificate, and finally, the
root certificate. When you click Save (and then Proceed on the dialog that warns you that the web server will
restart), if a certificate is missing, you will get an error message with the common name of the next certificate
in the chain that is missing. You will also get an error if you add a certificate that is not in the chain. Examine
these messages carefully to identify the certificate you need to add or remove.
You can upload the certificates from here by clicking Create New Trusted CA Certificate after clicking +.
Severity Levels
The following table lists the syslog message severity levels.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
674
System Administration
Configure Logging to a Remote Syslog Server
Note Firepower Threat Defense does not generate syslog messages with a severity level of zero (emergencies).
Procedure
Step 1 Click Device, then click the System Settings > Logging Settings link.
If you are already on the System Settings page, simply click Logging Settings in the table of contents
Step 2 Under Remote Server, turn the Data Logging slider to On to enable logging diagnostic data-plane-generated
messages to an external syslog server. Then, configure the following options:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
675
System Administration
Configure Logging to the Internal Buffer
• Syslog Server—Click + and select one or more syslog server object and click OK. If the objects do not
exist, click the Add Syslog Server link and create them now. For more information, see Configuring
Syslog Servers, on page 140.
• Severity Level for Filtering FXOS Chassis Syslogs—For certain device models that use FXOS, the
severity level for syslog messages generated by the base FXOS platform. This option appears only if it
is relevant for your device. Select the severity level. Messages at this level or higher are sent to the syslog
server.
• Message Filtering for Firepower Threat Defense—Select one of the following options to control the
messages generated for the Firepower Threat Defense operating system.
• Severity Level for Filtering All Events—Select the severity level. Messages at this level or higher
are sent to the syslog server.
• Custom Logging Filter—If you want to do additional message filtering, so you get only those
messages that interest you, select the event list filter that defines the messages you want to generate.
If the filter does not already exist, click Create New Event List Filter and create it now. For more
information, see Configure Event List Filters, on page 677.
Step 3 Turn the File/Malware slider to On to enable logging to an external syslog server for file and malware events.
Then, configure the options for file/malware logging:
• Syslog Server—Select the syslog server object. If the object does not exist, click the Add Syslog Server
link and create it now.
• Log at Severity Level—Select a severity level that should be assigned to the file/malware events. Because
all file/malware events are generated at the same severity, no filtering is performed; you will see all
events no matter which level you pick. This will be the level shown in the severity field of the message
(that is, the x in FTD-x-<message_ID>). File events are message ID 430004, malware events are 430005.
Procedure
Step 1 Click Device, then click the System Settings > Logging Settings link.
If you are already on the System Settings page, simply click Logging Settings in the table of contents
Step 2 Turn the Internal Buffer slider to On to enable the buffer as a logging destination.
Step 3 Configure the options for internal buffer logging:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
676
System Administration
Configure Logging to the Console
• Severity Level for Filtering All Events—Select the severity level. Messages at this level or higher are
sent to the internal buffer.
• Custom Logging Filter—(Optional.) If you want to do additional message filtering, so you get only
those messages that interest you, select the event list filter that defines the messages you want to generate.
If the filter does not already exist, click Create New Event List Filter and create it now. For more
information, see Configure Event List Filters, on page 677.
• Buffer Size—The size of the internal buffer to which syslog messages are saved. When the buffer fills
up, it is overwritten. The default is 4096 bytes. The range is 4096 to 52428800.
Procedure
Step 1 Click Device, then click the System Settings > Logging Settings link.
If you are already on the System Settings page, simply click Logging Settings in the table of contents
Step 2 Turn the Console Filter slider to On to enable the console as a logging destination.
Step 3 Select the Severity level. Messages at this level or higher are sent to the console.
Step 4 Click Save.
Procedure
Step 1 Select Objects, then select Event List Filters from the table of contents.
Step 2 Do one of the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
677
System Administration
Configuring DHCP Server
To delete an unreferenced object, click the trash can icon ( ) for the object.
Note Do not configure a DHCP server on a network that already has a DHCP server operating on it. The two servers
will conflict and results will be unpredictable.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
678
System Administration
Configuring DHCP Server
Procedure
Step 1 Click Device, then click the System Settings > DHCP Server link.
If you are already on the System Settings page, simply click DHCP Server in the table of contents.
The page has two tabs. Initially, the Configuration tab shows the global parameters.
The DHCP Servers tab shows the interfaces on which you have configured DHCP server, whether the server
is enabled, and the address pool for the server.
c) Click Save.
Step 3 Click the DHCP Servers tab and configure the servers.
a) Do one of the following:
• To configure DHCP server for an interface that is not already listed, click +.
• To edit an existing DHCP server, click the edit icon ( ) for the server.
To delete a server, click the trash can icon ( ) for the server.
b) Configure the server properties:
• Enable DHCP Server—Whether to enable the server. You can configure a server but keep it disabled
until you are ready to use it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
679
System Administration
Configuring DNS
• Interface—Select the interface on which you will provide DHCP addresses to clients. The interface
must have a static IP address; you cannot be using DHCP to obtain the interface address if you want
to run a DHCP server on the interface. For bridge groups, you configure the DHCP server on the
Bridge Virtual Interface (BVI), not the member interfaces, and the server operates on all member
interfaces.
You cannot configure DHCP server on the Diagnostic interface, configure it on the Management
interface instead, on the Device > System Settings > Management Interface page.
• Address Pool—The range of IP addresses from lowest to highest that the server is allowed to provide
to clients that request an address. Specify the start and end address for the pool, separated by a hyphen.
For example, 10.100.10.12-10.100.10.250.
The range of IP addresses must be on the same subnet as the selected interface and cannot include:
the IP address of the interface itself, the broadcast address, or the subnet network address.
The size of the address pool is limited to 256 addresses per pool on the FTD device. If the address
pool range is larger than 253 addresses, the netmask of the FTD interface cannot be a Class C address
(for example, 255.255.255.0) and needs to be something larger, for example, 255.255.254.0.
c) Click OK.
Configuring DNS
The Domain Name System (DNS) servers are used to resolve hostnames to IP addresses. You configure DNS
servers during initial system setup, and these servers are applied to the data and management interfaces. You
can change them after setup, and use separate sets of servers for the data and management interfaces.
At minimum, you must configure DNS for the management interface. You must also configure DNS for the
data interfaces if you want to use FQDN-based access control rules, or if you want to use hostnames in CLI
commands such as ping.
Configuring DNS is a two-step process: you configure DNS groups, then you configure DNS on the interfaces.
The following topics explain the process in more detail.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
680
System Administration
Configuring DNS for Data and Management Interfaces
Procedure
Step 1 Select Objects, then select DNS Groups from the table of contents.
Step 2 Do one of the following:
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
681
System Administration
Configuring DNS for Data and Management Interfaces
Procedure
Step 1 Click Device, then click the System Settings > DNS Server link.
If you are already on the System Settings page, click DNS Server in the table of contents.
d) Click Save. You must also deploy the configuration to apply the changes to the device.
Step 3 Configure DNS for the management interface.
a) Select the DNS Group that defines the servers to use on the management interface. If the group does not
exist yet, click Create New DNS Group and create it now.
b) Click Save. Your changes are immediately applied to the device. You do not run a deployment job to
apply this change.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
682
System Administration
Troubleshooting General DNS Problems
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
683
System Administration
Configuring the Management Interface
Use the show dns-hosts and show dns commands to check the local cache. If the IP addresses for an FQDN
are wrong, you can use the dns update [host hostname] command to force the system to refresh the information.
If you use the command without specifying a host, all hostnames are refreshed.
You can remove cached information using the clear dns [host fqdn] and clear dns-hosts cache commands.
If you use the CLI setup wizard, you configure the management address and gateway for the device during
initial system configuration. If you use the Firepower Device Manager setup wizard, the management address
and gateway remain the defaults.
If necessary, you can change these addresses through Firepower Device Manager. You can also change the
management address and gateway in the CLI using the configure network ipv4 manual and configure
network ipv6 manual commands. To restore the default management interface settings, use the configure
network {ipv4 | ipv6} dhcp-dp-route command.
You can define static addresses, or obtain an address through DHCP if another device on the management
network is acting as a DHCP server. For most platforms, the Management interface obtains an IP address
from DHCP by default.
Caution If you change the address to which you are currently connected, you will lose access to Firepower Device
Manager (or the CLI) when you save the changes, as they are applied immediately. You will need to reconnect
to the device. Ensure that the new address is valid and available on the management network.
Procedure
Step 1 Click Device, then click the System Settings > Management Interface link.
If you are already on the System Settings page, click Management Interface in the table of contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
684
System Administration
Configuring the Device Hostname
table, typically going through the outside interface. This option is not supported on Firepower Threat
Defense Virtual devices.
• Use Unique Gateways for the Management Interface—Specify unique gateways (below) for IPv4
and IPv6 if you have a separate management network connected to the Management interface.
DHCP IP Options:
• Use Unique Gateways for the Management Interface with Fallback to Data Interfaces—If the DHCP
server provides a gateway, the system routes management traffic through the Management interface to
the gateway. If the DHCP server does not provide a gateway, then the system routes management traffic
based on the data interface routing table, typically sending traffic through the outside interface. This
option is not supported on Firepower Threat Defense Virtual devices.
• Use Unique Gateways for the Management Interface (no Fallback)—The system routes management
traffic through the Management interface to the gateway provided by the DHCP server. If the DHCP
server does not provide a gateway, the system will only be able to reach local hosts on the Management
interface. To route through data interfaces, choose the Fallback option.
Step 3 Configure the management address, subnet mask or IPv6 prefix, and gateway (if necessary) for IPv4, IPv6,
or both.
You must configure at least one set of properties. Leave one set blank to disable that addressing method.
Select Type > DHCP to obtain the address and gateway through DHCP or IPv6 auto configuration.
Step 4 (Optional.) If you configure a static IPv4 address, configure a DHCP server on the interface.
If you configure a DHCP server on the management interface, clients on the management network can obtain
their address from the DHCP pool. This option is not supported on Firepower Threat Defense Virtual devices.
a) Click Enable DHCP Server > On.
b) Enter the Address Pool for the server.
The address pool is the range of IP addresses from lowest to highest that the server is allowed to provide
to clients that request an address. The range of IP addresses must be on the same subnet as the management
address and cannot include: the IP address of the interface itself, the broadcast address, or the subnet
network address. Specify the start and end address for the pool, separated by a hyphen. For example,
192.168.45.46-192.168.45.254.
Caution If you change the hostname when connected to the system using the hostname, you will lose access to Firepower
Device Manager when you save the changes, as they are applied immediately. You will need to reconnect to
the device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
685
System Administration
Configuring Time Services (NTP, PTP)
Procedure
Step 1 Click Device, then click the System Settings > Hostname link.
If you are already on the System Settings page, simply click Hostname in the table of contents
Note For the Firepower 4100/9300, you do not set NTP through FDM. Configure NTP in FXOS.
Procedure
Step 1 Click Device, then click the System Settings > Time Services link.
If you are already on the System Settings page, simply click Time Services in the table of contents
Step 2 In NTP Time Server, select whether you want to use your own or Cisco's time servers.
• Default NTP Servers—If you select this option, the server list shows the server names that are used for
NTP.
• User-Defined NTP Servers—If you select this option, enter the fully qualified domain name or IPv4
or IPv6 address of the NTP server you want to use. For example, ntp1.example.com or 10.100.10.10.
You can add up to 3 NTP servers.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
686
System Administration
Configuring Precision Time Protocol (ISA 3000)
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
687
System Administration
Configuring Precision Time Protocol (ISA 3000)
The default configuration places all interfaces in the same bridge group, but you can remove interfaces from
the bridge group. It is important that you determine whether the interfaces are routed, or bridge group members,
because you must configure them differently with respect to multicast IGMP groups.
The following procedure explains how to determine which interfaces are part of the bridge group. Check
whether the interfaces you are configuring for PTP are bridge group members.
a) Click View All Interfaces in Device > Interfaces.
b) Find the interfaces in the list, and check the Mode column. BridgeGroupMember means it is part of a
bridge group, otherwise it should be Routed.
Step 2 Click Device, then click the System Settings > Time Services link.
If you are already on the System Settings page, simply click Time Services in the table of contents
multicast-routing
interface GigabitEthernet1/2
igmp join-group 224.0.1.129
no multicast-routing
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
688
System Administration
Configuring HTTP Proxy for Management Connections
interface GigabitEthernet1/2
no igmp join-group 224.0.1.129
d) Click FlexConfig Policy in the table of contents, add this object to the FlexConfig policy, and click Save.
Verify that the preview shows the expected commands from your object.
What to do next
After you deploy changes, you can verify the PTP settings. From the FDM CLI Console, or an SSH or Console
session, issue the various show ptp commands. For example, if you configured PTP for domain 10 for
GigabitEthernet1/2 only, the output might look like the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
689
System Administration
Configuring Cloud Services
Procedure
Step 1 Click Device, then click the System Settings > HTTP Proxy link.
If you are already on the System Settings page, simply click HTTP Proxy in the table of contents
Step 2 Click the toggle to enable the proxy, then configure the proxy settings:
• HTTP Proxy—The IP address of the proxy server.
• Port—The port number the proxy server is configured to listen to for HTTP connections.
• Use Proxy Authentication—Select this option if the server is configured to require authentication for
proxied connections. If you select this option, also enter the Username and Password of an account that
can log into the proxy server.
Step 3 Click Save, then confirm that you want to make the change.
Your changes are applied immediately. A deployment job is not needed.
Because you are changing how the system completes management connections, you will lose your connection
to FDM. Wait a few minutes for the change to be complete, then refresh your browser window and log in
again.
Procedure
Step 1 Click Device, then click the System Settings > Cloud Services link.
If you are already on the System Settings page, simply click Cloud Services in the table of contents.
In evaluation mode, there is a single group on the page, for Cloud Services. Once you have registered for
Smart Licensing, or for Cloud Services, you will also see groups for the other available cloud services.
Step 2 To register for cloud services when in evaluation mode or after unregistering from Smart Licensing, select
one of the following options:
• Security Account—(Recommended.) Log into your Cisco Defense Orchestrator or security account and
generate a registration key. Then return to this page, select your Cloud Services Region, and paste in
your Registration Key.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
690
System Administration
Enabling or Disabling Cisco Defense Orchestrator
• Smart License—(Only if you will not use Cisco Defense Orchestrator.) Click the link to go to the Smart
Licensing page and register with CSSM. Registering with CSSM also registers the device with Cloud
Services if you enable Cisco Success Network during the registration process.
Note If you have unregistered from cloud services, or you did not select to enroll in Cisco Success
Network when you registered for Smart Licensing, the Smart License approach to registration
has some additional steps. In this case, select your Cloud Services Region, then click Register.
Read the disclosure and click Accept.
Step 3 Once you have registered for cloud services, you can enable or disable features as needed. Please see the
following topics:
• Enabling or Disabling Cisco Defense Orchestrator, on page 691
• Connecting to the Cisco Success Network, on page 692
• Sending Events to the Cisco Cloud, on page 693
• Unregistering from Cloud Services, on page 693
Procedure
Step 1 Click Device, then click the System Settings > Cloud Services link.
If you are already on the System Settings page, simply click Cloud Services in the table of contents.
Step 2 Click the Enable/Disable button for the Cisco Defense Orchestrator feature to change the setting as appropriate.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
691
System Administration
Connecting to the Cisco Success Network
Note When the system sends data to Cisco, the task list shows a Telemetry Job.
Note If you enable Cisco Success Network on the active unit in a high availability group, you are also enabling the
connection on the standby unit.
Procedure
Step 1 Click Device, then click the System Settings > Cloud Services link.
If you are already on the System Settings page, simply click Cloud Services in the table of contents.
Step 2 Click the Enable/Disable control for the Cisco Success Network feature to change the setting as appropriate.
You can click the sample data link to see the type of information that is sent to Cisco.
When enabling the connection, read the disclosure and click Accept.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
692
System Administration
Sending Events to the Cisco Cloud
Procedure
Step 1 Click Device, then click the System Settings > Cloud Services link.
If you are already on the System Settings page, simply click Cloud Services in the table of contents.
Step 2 Click the Enable/Disable control for the Send Events to the Cisco Cloud option to change the setting as
appropriate.
Step 3 When you are enabling the service, you are prompted to select the events to send to the cloud. Later, you can
change these selections by clicking Edit next to the list of selected events. Select the types of events to send
and click OK.
• File/Malware—For any file policies you have applied in any access control rule.
• Intrusion—For any intrusion policies you have applied in any access control rule.
• Connection—For access control rules where you have enabled logging. When you select this option,
you can also elect to send All Connection Events, or only send the High Priority connection events.
High-priority connection events are those related to connections that trigger intrusion, file, or malware
events, or that match Security Intelligence blocking policies.
Procedure
Step 1 Click Device, then click the System Settings > Cloud Services link.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
693
System Administration
Enabling or Disabling Web Analytics
If you are already on the System Settings page, simply click Cloud Services in the table of contents.
Step 2 Select Unregister Cloud Services from the gear ( ) drop-down list.
Step 3 Read the warning and click Unregister.
Any cloud services you had enabled will be automatically disabled, and your ability to enable them again will
be removed. However, you will now see the controls for registering with the cloud, and you can re-register.
Procedure
Step 1 Click Device, then click the System Settings > Web Analytics link.
If you are already on the System Settings page, simply click Web Analytics in the table of contents.
Step 2 Click the Enable/Disable control for the Web Analytics feature to change the setting as appropriate.
Procedure
Step 1 Click Device, then click the System Settings > URL Filtering Preferences link.
If you are already on the System Settings page, simply click URL Filtering Preferences in the table of
contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
694
System Administration
Configuring URL Filtering Preferences
deselect this option, and you are using category and reputation filtering, periodically enable it to get new
URL data.
• Query Cisco CSI for Unknown URLs—Whether to check with Cisco CSI for updated information for
URLs that do not have category and reputation data in the local URL filtering database. If the lookup
returns this information within a reasonable time limit, it is used when selecting access rules based on
URL conditions. Otherwise, the URL matches the Uncategorized category. Selecting this option is
important for lower-end systems, which install a smaller URL database due to memory limitations.
• URL Time to Live (available if you select Query Cisco CSI for Unknown URLs)—How long to cache
the category and reputation lookup values for a given URL. When the time to live expires, the next
attempted access of the URL results in a fresh category/reputation lookup. A shorter time results in more
accurate URL filtering, a longer time results in better performance for unknown URLs. You can set the
TTL to 2, 4, 8, 12, 24, or 48 hours, one week, or Never (the default).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
695
System Administration
Configuring URL Filtering Preferences
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
696
CHAPTER 26
System Management
The following topics explain how to perform system management tasks such as updating system databases
and backing up and restoring the system.
• Installing Software Updates, on page 697
• Backing Up and Restoring the System, on page 703
• Auditing and Change Management, on page 708
• Exporting the Device Configuration, on page 713
• Managing FDM and FTD User Access, on page 713
• Rebooting or Shutting Down the System, on page 719
• Troubleshooting the System, on page 720
• Uncommon Management Tasks, on page 731
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
697
System Administration
Updating System Databases
Intrusion rule updates may be large, so import rules during periods of low network use. On slow networks,
an update attempt might fail, and you will need to retry.
Geolocation database (GeoDB)
The Cisco Geolocation Database (GeoDB) is a database of geographical data (such as country, city,
coordinates) and connection-related data (such as Internet service provider, domain name, connection
type) associated with routable IP addresses.
GeoDB updates provide updated information on physical locations, connection types, and so on that
your system can associate with detected routable IP addresses. You can use geolocation data as a condition
in access control rules.
The time needed to update the GeoDB depends on your appliance; the installation usually takes 30 to
40 minutes. Although a GeoDB update does not interrupt any other system functions (including the
ongoing collection of geolocation information), the update does consume system resources while it
completes. Consider this when planning your updates.
Vulnerability database (VDB)
The Cisco Vulnerability Database (VDB) is a database of known vulnerabilities to which hosts may be
susceptible, as well as fingerprints for operating systems, clients, and applications. The Firepower System
correlates the fingerprints with the vulnerabilities to help you determine whether a particular host increases
your risk of network compromise. The Cisco Talos Intelligence Group (Talos) issues periodic updates
to the VDB.
The time it takes to update vulnerability mappings depends on the number of hosts in your network map.
You may want to schedule the update during low system usage times to minimize the impact of any
system downtime. As a rule of thumb, divide the number of hosts on your network by 1000 to determine
the approximate number of minutes to perform the update.
After you update the VDB, you must redeploy configurations before updated application detectors and
operating system fingerprints can take effect.
Cisco Talos Intelligence Group (Talos) Security Intelligence Feeds
Talos provides access to regularly updated intelligence feeds for use in Security Intelligence policies.
Sites representing security threats such as malware, spam, botnets, and phishing appear and disappear
faster than you can update and deploy custom configurations. These feeds contain addresses and URLs
for known threats. When the system updates a feed, you do not have to redeploy. The new lists are used
for evaluating subsequent connections.
URL Category/Reputation Database
The system obtains the URL category and reputation database from Cisco Collective Security Intelligence
(CSI). If you configure URL filtering access control rules that filter on category and reputation, requested
URLs are matched against the database. You can configure database updates and some other URL filtering
preferences on System Settings > URL Filtering Preferences. You cannot manage URL
category/reputation database updates the same way you manage updates for the other system databases.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
698
System Administration
Updating System Databases
for retrieving the updates from the Cisco Cloud. Download the updates from software.cisco.com from the
same folders where you would download system software upgrades.
You can also set up a regular schedule to retrieve and apply database updates. Because these updates can be
large, schedule them for times of low network activity.
Note While a database update is in progress, you might find that the user interface is sluggish to respond to your
actions.
Procedure
Step 1 Click Device, then click View Configuration in the Updates summary.
This opens the Updates page. Information on the page shows the current version for each database and the
last date and time each database was updated.
Step 2 To manually update a database, click one of the following options in the section for that database:
• Update from Cloud—To have FDM retrieve the update package from the Cisco Cloud. This is the
easiest and most reliable method, but there must be a path to the internet to use it.
• (down arrow) > Select File—To select the update package from your workstation or a drive connected
to your workstation.
Rule and VDB updates require a configuration deployment to make them active. When you update from the
cloud, you are asked whether you want to deploy now; click Yes. If you click No, remember to initiate a
deployment job at your earliest convenience.
If you upload your own file, you must always deploy the changes manually.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
699
System Administration
Updating Cisco Security Intelligence Feeds
c) For Rule or VDB updates, select the Automatically Deploy the Update checkbox if you want the system
to deploy the configuration whenever the database is updated.
The update is not effective until it is deployed. The automatic deployment also deploys any other
configuration changes that are not yet deployed.
d) Click Save.
Note If you want to remove a recurring schedule, click the Edit link to open the scheduling dialog box,
then click the Remove button.
Procedure
Step 1 Click Device, then click View Configuration in the Updates summary.
This opens the Updates page. Information on the page shows the current version for the Security Intelligence
Feeds and the last date and time the feeds were updated.
Step 2 To manually update the feeds, click Update Now in the Security Intelligence Feeds group.
If you manually update the feeds on one unit in a high availability group, you need to also manually update
them on the other unit to ensure consistency.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
700
System Administration
Upgrading Firepower Threat Defense Software
Note Before installing an update, make sure that you deploy any pending changes. You should also run a backup
and download the backup copy. Note that all upgrades except hot fixes will delete all backup files retained
on the system.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
701
System Administration
Reimaging the Device
Procedure
Step 1 Select Device, then click View Configuration in the Updates summary.
The System Upgrade section shows the currently running software version and any update that you have
already uploaded.
What to do next
You can check on the upgrade from the device CLI using the show upgrade status command. If the upgrade
does not complete and you run into problems, you can cancel the upgrade using the upgrade cancel command.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
702
System Administration
Backing Up and Restoring the System
For information on how to reimage a device, see Reimage the Cisco ASA or Firepower Threat Defense Device
or the Firepower Threat Defense Quick Start guide for your device model. These guides are available at
http://www.cisco.com/c/en/us/support/security/firepower-ngfw/products-installation-guides-list.html.
Note The backup does not include the management IP address configuration. Thus, when you recover a backup
file, the management address is not replaced from the backup copy. This ensures that any changes you made
to the address are preserved, and also makes it possible to restore the configuration on a different device on
a different network segment.
Backups include the configuration only, and not the system software. If you need to completely reimage the
device, you need to reinstall the software, then you can upload a backup and recover the configuration.
The configuration database is locked during backup. You cannot make configuration changes during a backup,
although you can view policies, dashboards, and so forth. During a restore, the system is completely unavailable.
The table on the Backup and Restore page lists all existing backup copies that are available on the system,
including the file name of the backup, the date and time it was created, and the file size. The type of backup
(manual, scheduled, or recurring) is based on how you directed the system to create that backup copy.
Tip Backup copies are created on the system itself. You must manually download backup copies and store them
on secure servers to ensure that you have the backup copies you need for disaster recovery.
The following topics explain how to manage backup and restore operations.
Procedure
Step 1 Click Device, then click View Configuration in the Backup and Restore summary.
This opens the Backup and Restore page. The table lists all existing backup copies that are available on the
system.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
703
System Administration
Backing Up the System at a Scheduled Time
Step 4 (Optional.) Select the Encrypt File option to encrypt the backup file.
If you select the option, you must enter the Password (and Confirm Password) that will be required to restore
the backup file.
Note If you want to delete the schedule for a future backup, edit the schedule and click Remove.
Procedure
Step 1 Click Device, then click View Configuration in the Backup and Restore summary.
Step 2 Click Scheduled Backup > Schedule a Backup.
If you already have a scheduled backup, click Scheduled Backup > Edit .
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
704
System Administration
Setting Up a Recurring Backup Schedule
You can create the backup on the Local Hard Disk or on the SD Card. The benefit of using the SD card is
that you can use the card to recover the configuration to a replacement device.
Note If you want to delete a recurring schedule, edit the schedule and click Remove.
Procedure
Step 1 Click Device, then click View Configuration in the Backup and Restore summary.
Step 2 Click Recurring Backup > Configure.
If you already have a recurring backup configured, click Recurring Backup > Edit.
Step 5 (Optional.) Select the Encrypt File option to encrypt the backup file.
If you select the option, you must enter the Password (and Confirm Password) that will be required to restore
the backup file.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
705
System Administration
Restoring a Backup
When the selected dates and times arrive, the system takes a backup. When completed, the backup copy is
listed in the table of backups.
The recurring schedule continues to take backups until you change or remove it.
Restoring a Backup
You can restore backups as needed so long as the device is running the same software version (including build
number) as it was running when you took the backup. You can restore a backup onto a replacement device
only if the two devices are the same model and are running the same version of the software (including build
number).
However, you cannot restore a backup if the device is part of a high availability pair. You must first break
HA from the Device > High Availability page, then you can restore the backup. If the backup includes the
HA configuration, the device will rejoin the HA group. Do not restore the same backup on both units, because
they would then both go active. Instead, restore the backup on the unit you want to go active first, then restore
the equivalent backup on the other unit.
If the backup copy you want to restore is not already on the device, you must upload the backup first before
restoring it.
During a restore, the system is completely unavailable.
Note The backup does not include the management IP address configuration. Thus, when you recover a backup
file, the management address is not replaced from the backup copy. This ensures that any changes you made
to the address are preserved, and also makes it possible to restore the configuration on a different device on
a different network segment.
Procedure
Step 1 Click Device, then click View Configuration in the Backup and Restore summary.
This opens the Backup and Restore page. The table lists all existing backup copies that are available on the
system.
Step 2 If the backup copy that you want to restore is not in the list of available backups, click Upload > Browse and
upload the backup copy.
Step 3 Click the restore icon ( ) for the file.
You are asked to confirm the restore. By default, the backup copy will be deleted after the restore, but you
can select Do not remove the backup after restoring to keep it before proceeding with the restore.
If the backup file was encrypted, you must enter the Password that is required to open the file and unencrypt
it.
The system will reboot after restore completes.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
706
System Administration
Replacing an ISA 3000 Device
Note After the system reboots, it automatically checks for Vulnerability Database (VDB), Geolocation,
and Rules database updates, and downloads them if needed. Because these updates can be large,
the initial attempt might fail. Please check the task list, and if a download failed, manually download
an update as described in Updating System Databases, on page 698. The system also redeploys
policies. Any subsequent deployment will fail until the update is successful.
Step 4 If necessary, click Device > Smart License > View Configuration, re-register the device, and re-enable the
required optional licenses.
If you restore the backup to the same device from which it was taken, the license states are returned to those
that existed at the time of the backup. If you made subsequent changes, such as enabling or disabling a license,
you must redo those changes.
If you restore the backup on a different device, for example, because you are replacing a device, the new
device is unregistered. You must re-register the device and enable the optional licenses that you require. If
the restore includes an HA configuration, the device will not attempt to join the HA group. You must first
register the device, and then manually deploy the configuration.
If you are using Permanent License Reservation, and there is a mismatch between the license state on the
device and in CSSM, in most cases you need to contact Cisco TAC to resolve the problem.
Note Uploaded files may be renamed to match the original filename. Also, if there are
more than 10 backup copies already on the system, the oldest one will be deleted
to make room for the uploaded file. You cannot upload files that were created by
an older software version.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
707
System Administration
Auditing and Change Management
• Restore a backup—To restore a backup copy, click the restore icon ( ) for the file. The system is
unavailable during restore, and will reboot after restore completes. You should deploy the configuration
after the system is up and running.
• Delete a backup file—If you no longer want a particular backup, click the delete icon ( ) for the file.
You are asked to confirm the deletion. Once deleted, you cannot recover the backup file.
Audit Events
The audit log can include the following types of event:
Custom Feed Update Event, Custom Feed Update Failed
These events indicate a successfully completed or failed update to a custom Security Intelligence feed.
The details include who started the update and information about the feed that was being updated.
Deployment Completed, Deployment Failed: job name or entity name
These events indicate a successfully completed or failed deployment job. The details include who started
the job and information about the job entity. Failed jobs include the error message related to the failure.
The details also include a Differences View tab, which shows the changes that were deployed to the
device in the job. This is the combination of all the Entity change events for the deployed entities.
To filter on these events, simply click the Deployment History pre-defined filter. Note that the event
type for these events is Deployment Event, you cannot filter on completed or failed events only.
The event name includes the user-defined job name (if you configure one), or “User (username) Triggered
Deployment.” There are also “Device Setup Automatic Deployment” and “Device Setup Automatic
Deployment (Final Step)” jobs that occur during the device setup wizard.
Entity Created, Entity Updated, Entity Deleted: entity name (entity type)
These events indicate that a change was made to the identified entity or object. The entity details include
who made the change, as well as the entity name, type, and ID. You can filter on these items. The details
also include a Differences View tab, which shows the changes that were made to the object.
HA Action Event
These events relate to actions on the high availability configuration, either actions that you initiated, or
actions that the system initiated. HA Action Event is the event type, but the event names are one of the
following:
• HA Suspended—You intentionally suspended HA on the system.
• HA Resumed—You intentionally resumed HA on the system.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
708
System Administration
Viewing and Analyzing the Audit Log
Tasks include actions such as deployment jobs and manual or scheduled database updates. Any item in
the task list will correspond to two task events in the audit log, an indication of the start of the task, and
either a successful completion or a failure.
User Logged In, User Logged Out: username
These events show the time and source IP address for the user logging into and out of Firepower Device
Manager. The User Logged Out event occurs for both active log outs and automatic log outs due to idle
time being exceeded.
These events do not relate to RA VPN users establishing connections with the device. They also do not
include log in/log out to the device CLI.
Procedure
Step 1 Click Device, then click the Device Administration > View Configuration link.
Step 2 Click Audit Log in the table of contents if it is not already selected.
Events are grouped by date, and within a day, by time, with the most recent date/time at the top of the list.
Initially, each event is collapsed, so you see only the time, event name, user who initiated the event, and source
IP address of the user. “System” for user and IP address means that the device itself initiated the event.
You can do the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
709
System Administration
Filtering the Audit Log
• Click > next to the event name to open it and see the event details. Click the icon again to close the event.
Many events have a simple list of event attributes, such as event type, user name, source IP address, and
so forth. However, Entity and Deployment events have two tabs:
• Summary shows the basic event attributes.
• Differences View shows a comparison of the existing “deployed” configuration with the changes
made as part of the event. For deployment jobs, this view can be long and require scrolling. It sums
up all differences from the Entity event changes that were part of the deployment job.
• Select a different time range from the drop-down list to the right of the filter field. The default is to view
events from the past 2 weeks, but you can change that to the last 24 hours, 7 days, month, or 6 months.
Click Custom to specify an exact range by entering the start and end date and time.
• Click any link in the log to add a search filter for that item. The list updates so that only those events that
include the item are shown. You can also simply click in the Filter box and build a filter directly. There
are some pre-defined filters beneath the filter box that you can click to load the related filter criteria. For
detailed information on filtering the events, see Filtering the Audit Log, on page 710.
• Reload the browser page to refresh the log with the latest events.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
710
System Administration
Examining Deployment and Entity Change History
• User—The name of the user who initiated the event. The system user is spelled in all capitals:
SYSTEM.
• Source IP—The IP address from which the user initiated the event. The source IP address for
system-initiated events is SYSTEM.
• Entity ID—The UUID for the entity or object, which is a long unreadable string such as
8e7021b4-2e1e-11e8-9e5d-0fc002c5f931. Normally, to use this filter you either need to click an
entity ID in an event’s details, or retrieve the necessary ID through a relevant GET call using the
REST API.
• Entity Name—The name of the entity or object. For user-created entities, this is typically the name
you gave the object, for example, InsideNetwork for a network object. For system-generated entities,
or in some cases user-defined entities, this is a predefined but intelligible name, for example, “User
(admin) Triggered Deployment” for deployment jobs you do not explicitly name.
• Entity Type—The kind of entity or object. These are predefined but intelligible names, such as
Network Object. You can find entity types in the API Explorer by looking at the relevant object
model for the “type” value. The API types are normally all lower-case with no spaces. If you type
them in exactly as shown in the model, the string changes to a more readable format when you press
Enter. Typing in either form works. To open API Explorer, click the more options button ( ) and
choose API Explorer.
Procedure
Step 1 Click Device, then click the Device Administration > View Configuration link.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
711
System Administration
Discarding All Pending Changes
Step 2 Click Audit Log in the table of contents if it is not already selected.
Step 3 (Optional.) Filter the messages:
• Deployment events—Click the Deployment History predefined filter under the filter box.
• Entity change events—Manually create a filter using the Event Type element for the type of change that
interests you. To see all entity changes, include three specifications for Entity Created, Entity Updated,
and Entity Deleted. The filter would look like the following:
Step 4 Open the event and click the Differences View tab.
The changes are color coded, and the heading indicates the type of object and whether it was Added (Created),
Removed (Deleted), or Edited (Updated). Edited objects show only those attributes that were changed or
deleted from the object. In deployment jobs, there are separate headings for each entity changed. The heading
indicates the entity type for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
712
System Administration
Exporting the Device Configuration
Procedure
Step 1 Click the Deploy Changes icon in the upper right of the web page.
The icon is highlighted with a dot when there are pending changes.
Procedure
Step 1 Choose Device, then click View Configuration in the Device Administration group.
Step 2 Click Download Configuration in the table of contents.
Step 3 Click Get Device Configuration to start a job that creates the file.
If you have previously created a file, you will see a download button and the message File is ready to
download, with the creation date for the file.
Depending on the size of the configuration, it can take several minutes to generate the file. Check the task list
or audit log, or return to this page periodically, until the Export Config job completes and the file is generated.
Step 4 When the file is generated, return to this page and click the Download the Configuration File button ( )
to save the file to your workstation.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
713
System Administration
Configuring External Authorization (AAA) for FDM (HTTPS) Users
and the system-defined admin user. Note that you cannot create additional local user accounts for FDM
access.
Although you can have multiple external FDM user accounts that can change the configuration, these changes
are not tracked by user. When one user deploys changes, changes made by all users are deployed. There is
no locking: that is, more than one user might attempt to update the same object at the same time, which will
result in only one user successfully saving the change. You also cannot discard changes based on user.
Firepower Device Manager allows 5 concurrent user sessions. If a sixth user logs in, the oldest user session
is automatically logged off. There is also an idle timeout, which logs inactive users out after 20 minutes.
You can also configure external authentication and authorization for SSH access to the FTD CLI. The local
database is always checked before using the external source, so you can create additional local users for failsafe
access. Do not create duplicate users in both the local and external source. Except for the admin user, there
is no crossover between CLI and Firepower Device Manager users: the user accounts are completely separate.
Note When using external servers, you can control access by user to subsets of your devices by either setting up
separate RADIUS server groups, or by creating authentication/authorization policies within the RADIUS
servers that allow the user access to certain FTD device IP addresses only.
The following topics explain how to configure and manage Firepower Device Manager user access and CLI
user access.
When a user logs into Firepower Device Manager, the username and role are shown in the upper right of the
page: Administrator, Read-Write User, or Read-Only User.
After you set up the accounts correctly on the RADIUS server, you can enable it for administrative access
using this procedure.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
714
System Administration
Configuring External Authorization (AAA) for FTD CLI (SSH) Users
Procedure
Step 1 Click Device, then click the System Settings > Management Access link.
If you are already on the System Settings page, simply click Management Access in the table of contents.
Caution If you select Never, you will not be able to log into Firepower Device Manager using the
admin account. You will be locked out of the system if the RADIUS server becomes
unavailable, or if you miss-configure the accounts in the RADIUS server.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
715
System Administration
Configuring External Authorization (AAA) for FTD CLI (SSH) Users
• Administrative (6)—Provides config access authorization to the CLI. These users can use all commands
in the CLI.
• NAS Prompt (7) or any level other than 6—Provides basic access authorization to the CLI. These users
can use read-only commands, such as show commands, for monitoring and troubleshooting purposes.
After you set up the accounts correctly on the RADIUS server, you can enable it for SSH administrative access
using this procedure.
Note Do not create duplicate users in both the local and external source. If you do create duplicate usernames,
ensure that they have the same authorization rights. You cannot log in using the password of the external
version of the user account when the authorization rights differ in the local user account; you can log in using
the local password only. If the rights are the same, the password you use determines if you are logged in as
the external or the local user, assuming the passwords are different. Even though the local database is checked
first, if a username exists in the local database but the password is incorrect, the external server is checked
and if the password is correct for the external source, the login will succeed.
Procedure
Step 1 Click Device, then click the System Settings > Management Access link.
If you are already on the System Settings page, simply click Management Access in the table of contents.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
716
System Administration
Managing Firepower Device Manager User Sessions
• Authentication with LOCAL—If you select an external server group, you can specify how to use the
local identity source. For SSH access, the local database is always checked before the external server.
If necessary, you can end a user session by clicking the delete icon ( ) for the session. If you delete your
own session, you are also logged out. There is no lockout period if you end a session: the user can immediately
log back in.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
717
System Administration
Creating Local User Accounts for the FTD CLI
Procedure
Step 1 Log into the device CLI using an account with config privileges.
The admin user account has the required privileges, but any account with config privileges will work. You
can use an SSH session or the Console port.
For certain device models, the Console port puts you into the FXOS CLI. Use the connect ftd command to
get to the FTD CLI.
Example:
The following example adds a user account named joecool with config access rights. The password is not
shown as you type it.
Note Tell users they can change their passwords using the configure password command.
Step 3 (Optional.) Adjust the characteristics of the account to meet your security requirements.
You can use the following commands to change the default account behavior.
• configure user aging username max_days warn_days
Sets an expiration date for the user's password. Specify the maximum number of days for the password
to be valid followed by the number of days before expiration the user will be warned about the upcoming
expiration. Both values are 1 to 9999, but the warning days must be less than the maximum days. When
you create the account, there is no expiration date for the password.
• configure user forcereset username
Forces the user to change the password on the next login.
• configure user maxfailedlogins username number
Sets the maximum number of consecutive failed logins you will allow before locking the account, from
1 to 9999. Use the configure user unlock command to unlock accounts. The default for new accounts
is 5 consecutive failed logins.
• configure user minpasswdlen username number
Sets a minimum password length, which can be from 1 to 127.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
718
System Administration
Rebooting or Shutting Down the System
Procedure
Step 1 Click Device, then click the System Settings > Reboot/Shutdown > link.
If you are already on the System Settings page, simply click Reboot/Shutdown in the table of contents
Step 2 Click the button that performs the function you need.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
719
System Administration
Troubleshooting the System
• Reboot—If you believe the system is not performing correctly and other efforts to resolve the problem
have failed, you can reboot the device. In addition, there might be a few procedures that ask you to reboot
the device to reload the system software.
• Shut Down—Shut down the system to turn off power in a controlled fashion. Use shutdown when you
intend to remove the device from the network, for example, to replace it. After shutting down the device,
you can turn it back on only from the hardware On/Off switch.
Note Because the system has multiple interfaces, you can control the interface used for pinging an address. You
must ensure that you are using the right command, so that you are testing the connectivity that matters. For
example, the system must be able to reach the Cisco license server through the virtual management interface,
so you must use the ping system command to test the connection. If you use ping, you are testing whether
an address can be reached through the data interfaces, which might not give you the same result.
The normal ping uses ICMP packets to test the connection. If your network prohibits ICMP, you can use a
TCP ping instead (for data interface pings only).
Following are the main options for pinging network addresses.
Pinging an address through the virtual management interface
Use the ping system command.
ping system host
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
720
System Administration
Pinging Addresses to Test Connectivity
The host can be an IP address or fully-qualified domain name (FQDN), such as www.example.com.
Unlike pings through the data interfaces, there is no default count for system pings. The ping continues
until you stop it using Ctrl+c. For example:
Note You can specify the timeout, repeat count, packet size, and even the data pattern to send. Use the help
indicator, ?, in the CLI to see the available options.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
721
System Administration
Tracing Routes to Hosts
Note You can also specify the timeout, repeat count, and the source address for the TCP ping. Use the help
indicator, ?, in the CLI to see the available options.
Note There are separate commands for tracing a route through a data interface (traceroute) or through the virtual
management interface (traceroute system). Ensure that you use the right command.
The following table describes the possible result per packet as displayed in the output.
* No response was received for the probe within the timeout period.
nn msec For each node, the round-trip time (in milliseconds) for the specified number of
probes.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
722
System Administration
Tracing Routes to Hosts
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
723
System Administration
Making the Firepower Threat Defense Device Appear on Traceroutes
Note You can specify the timeout, time to live, number of packets per node, and even the IP address or interface
to use as the source of the traceroute. Use the help indicator, ?, in the CLI to see the available options.
Note If you decrement time to live, packets with a TTL of 1 will be dropped, but a connection will be opened for
the session on the assumption that the connection might contain packets with a greater TTL. Note that some
packets, such as OSPF hello packets, are sent with TTL = 1, so decrementing time to live can have unexpected
consequences. Keep these considerations in mind when defining your traffic class.
Procedure
d) In the Negate Template editor, enter the lines required to undo this configuration.
Just as you need to include the parent commands to enter the correct sub-mode for a command to enable
it, you also need to include those commands in the negate template.
The negate template will be applied if you remove this object from the FlexConfig policy (after having
deployed it successfully), and also during an unsuccessful deployment (to reset the configuration to its
previous condition).
Thus, for this example, the negate template would be the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
724
System Administration
Troubleshooting NTP
policy-map global_policy
class class-default
no set connection decrement-ttl
Troubleshooting NTP
The system relies on accurate and consistent time to function correctly and to ensure that events and other
data points are handled accurately. You must configure at least one, but ideally three, Network Time Protocol
(NTP) servers to ensure the system always has reliable time information.
The device summary connection diagram (click Device in the main menu) shows the status of the connection
to the NTP server. If the status is yellow or orange, then there is an issue with the connection to the configured
servers. If the connection problem persists (it is not just a momentary issue), try the following.
• First, ensure that you have at least three NTP servers configured on Device > System Settings > NTP.
Although this is not a requirement, reliability is greatly enhanced if you have at least three NTP servers.
• Ensure that there is a network path between the management interface IP address (defined on Device >
System Settings > Management Interface) and the NTP servers.
• If the management interface gateway is the data interfaces, you can configure static routes to the
NTP servers on Device > Routing if the default route is not adequate.
• If you set an explicit management interface gateway, log into the device CLI and use the ping system
command to test whether there is a network path to each NTP server.
• Log into the device CLI and check the status of the NTP servers with the following commands.
• show ntp—This command shows basic information about the NTP servers and their availability.
However, the connectivity status in Firepower Device Manager uses additional information to
indicate the status, so there can be inconsistency in what this command shows and what the
connectivity status diagram shows. You can also issue this command from the CLI console.
• system support ntp—This command includes the output of show ntp plus the output of the standard
NTP command ntpq, which is documented with the NTP protocol. Use this command if you need
to confirm NTP synchronization.
Look for the section “Results of ‘ntpq -pn.’ For example, you might see something like the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
725
System Administration
Troubleshooting DNS for the Management Interface
In this example, the + before the NTP server address indicates that it is a potential candidate. An
asterisk here, *, indicates the current time source peer.
The NTP daemon (NTPD) uses a sliding window of eight samples from each one of the peers and
picks out one sample, then the clock selection determines the true chimers and the false tickers.
NTPD then determines the round-trip distance (the offset of a candidate must not be over one-half
the round trip delay). If connection delays, packet loss, or server issues cause one or all the candidates
to be rejected, you would see long delays in the synchronization. The adjustment also occurs over
a very long period of time: the clock offset and oscillator errors must be resolved by the clock
discipline algorithm and this can take hours.
Note If the refid is .LOCL., this indicates the peer is an undisciplined local clock, that
is, it is using its local clock only to set the time. Firepower Device Manager
always marks the NTP connection yellow (not synchronized) if the selected peer
is .LOCL. Normally, NTP does not select a .LOCL. candidate if a better one is
available, which is why you should configure at least three servers.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
726
System Administration
Troubleshooting DNS for the Management Interface
b) Enter ping system www.cisco.com. If you get an “unknown host” message like the following, then the
system could not resolve the domain name. If the ping is successful, then you are done: DNS is working.
(Press Ctrl+C to stop the ping.)
Note It is critical that you include the system keyword in the ping command. The system keyword
sends the ping through the management IP address, which is the only interface that uses the
management DNS server. Pinging www.cisco.com is also a good option, because you need a
route to that server for smart licensing and updates.
b) Click Device > System Settings > DNS Server and verify that the right DNS servers are configured.
If you are deploying the device on your network edge, your service provider might have specific
requirements about the DNS server you can use.
c) If you are using the data interfaces as the gateway, verify that you have the required routes.
You need a default route for 0.0.0.0. You might need additional routes if the DNS server is not available
through the gateway for the default route. There are two basic situations:
• If you are using DHCP to obtain an address for the outside interface, and you selected the Obtain
Default Route using DHCP option, the default route is not visible in Firepower Device Manager.
From SSH, enter show route and verify that there is a route for 0.0.0.0. Because this is the default
configuration for the outside interface, this is a likely situation that you might encounter. (Go to
Device > Interfaces to view the configuration of the outside interface.)
• If you are using a static IP address on the outside interface, or you are not obtaining the default route
from DHCP, then open Device > Routing. Verify that the correct gateway is being used for the
default route.
If the DNS server cannot be reached through the default route, you must define a static route to it on the
Routing page. Note that you should not add routes for directly connected networks, that is, networks that
are connected directly to any of the system’s data interfaces, as the system can route to those networks
automatically.
Also verify that there are no static routes that are miss-directing traffic to the server out the wrong interface.
d) If the deployment button indicates that there are undeployed changes, deploy them now and wait for
deployment to complete.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
727
System Administration
Troubleshooting DNS for the Management Interface
e) Retest ping system www.cisco.com. If you still have problems, continue with the next step.
Step 3 In the SSH session, enter nslookup www.cisco.com.
• If nslookup indicates that it got a response from the DNS server, but the server could not find the name,
it means that DNS is configured correctly, but the DNS server you are using does not have an address
for the FQDN. The response would look similar to the following:
Resolution: In this case, you need to configure a different DNS server, or get the one you have updated
so it can resolve the FQDNs you need resolved. Work with your network administrator or ISP to get the
IP address of a DNS server that will work for your network.
• If you get a “connection timed out” message, then the system cannot reach your DNS servers, or all of
the DNS servers are currently down and not responding (which is less likely). Continue with the next
step.
Step 4 Use the traceroute system DNS_server_ip_address command to trace the route to the DNS server.
For example, if the DNS server is 10.100.10.1, enter:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
728
System Administration
Analyzing CPU and Memory Usage
Resolution: In this case, the routing problem is within your system. Try doing a ping system for the
gateway IP address. Re-verify the configuration of the management interface as mentioned in earlier
steps, and ensure that you have the required gateways and routes configured.
• The traceroute makes it through a few nodes before it can no longer resolve the route, which would look
like the following:
Resolution: In this case, routing breaks down at the last node. You might need to work with the system
administrator to get correct routes installed in that node. However, if there is intentionally no route to
the DNS server through the node, you need to change your gateway, or create your own static route, to
point to a router that can route traffic to the DNS server.
Note Some of the keywords (not mentioned above) require that you first set up profiling or other features using the
cpu or memory commands. Use these features at the direction of TAC only.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
729
System Administration
Viewing Logs
Viewing Logs
The system logs information for a wide variety of actions. You can use the system support view-files command
to open a system log. Use this command while working with the Cisco Technical Assistance Center (TAC)
so that they can help you interpret the output and to select the appropriate log to view.
The command presents a menu for selecting a log. Use the following commands to navigate the wizard:
• To change to a sub-directory, type in the name of the directory and press Enter.
• To select a file to view, enter s at the prompt. You are then prompted for a file name. You must type the
complete name, and capitalization matters. The file list shows you the size of the log, which you might
consider before opening very large logs.
• Press the space bar when you see --More-- to see the next page of log entries; press Enter to see just the
next log entry. When you reach the end of the log, you are taken to the main menu. The --More-- line
shows you the size of the log and how much of it you have viewed. Use Ctrl+C to close the log and
exit the command if you do not want to page through the entire log.
• Type b to go up one level in the structure to the menu.
If you want to leave the log open so you can see new messages as they are added, use the tail-logs command
instead of system support view-files.
The following example shows how view the cisco/audit.log file, which tracks attempts to log into the system.
The file listing starts with directories at the top, then a list of files in the current directory.
===View Logs===
============================
Directory: /ngfw/var/log
----------sub-dirs----------
cisco
mojo
removed_packages
setup
connector
sf
scripts
packages
removed_scripts
httpd
-----------files------------
2016-10-14 18:12:04.514783 | 5371 | SMART_STATUS_sda.log
2016-10-14 18:12:04.524783 | 353 | SMART_STATUS_sdb.log
2016-10-11 21:32:23.848733 | 326517 | action_queue.log
2016-10-06 16:00:56.620019 | 1018 | br1.down.log
<list abbreviated>
============================
Directory: /ngfw/var/log/cisco
-----------files------------
2017-02-13 22:44:42.394907 | 472 | audit.log
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
730
System Administration
Creating a Troubleshooting File
Type the name of the file to view ([b] to go back, [Ctrl+C] to exit)
> audit.log
2017-02-09 18:59:26 - SubSystem:LOGIN, User:admin, IP:10.24.42.205, Message:Login successful,
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
731
System Administration
Switching Between Local and Remote Management
Caution Switching managers erases the device configuration and returns the system to the default configuration.
However, management IP address and hostname are preserved.
Procedure
Step 1 Use an SSH client to open a connection to the management IP address and log into the device CLI with a
username that has configuration CLI access. For example, the admin username.
It is important that you follow this process while connected to the management IP address. When using
Firepower Device Manager, you have the option to manage the device through the IP address on a data
interface. However, you must use the Management physical port and management IP address to manage the
device remotely.
If you cannot connect to the management IP address, address the following:
• Ensure that the Management physical port is wired to a functioning network.
• Ensure that the management IP address and gateway are configured for the management network. From
Firepower Device Manager, configure the address and gateway on Device > System Settings >
Management Interface. (In the CLI, use the configure network ipv4/ipv6 manual command.)
Note Ensure that you are using an external gateway for the management IP address. You cannot use
the data interfaces as a gateway when using a remote manager.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
732
System Administration
Switching Between Local and Remote Management
For example, to use the manager at 192.168.0.123 with the registration key secret, enter the following:
Note While registration is still pending, you can use configure manager delete to cancel the
registration and then configure manager local to return to local management.
c) Log into the Firepower Management Center and add the device.
See the Firepower Management Center online help for details.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
733
System Administration
Changing the Firewall Mode
You cannot go directly from remote management to local management. Use the configure manager
delete command to remove the manager.
>
> show managers
No managers configured.
You can now use a web browser to open the local manager at https://management-IP-address.
Caution Changing firewall mode erases the device configuration and returns the system to the default configuration.
However, management IP address and hostname are preserved.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
734
System Administration
Changing the Firewall Mode
If you enabled any feature licenses, you must disable them in Firepower Device Manager before deleting the
local manager and switching to remote management. Otherwise, those licenses remain assigned to the device
in Cisco Smart Software Manager. See Enabling or Disabling Optional Licenses, on page 88.
If the device is configured for high availability, you must first break the high availability configuration using
the device manager (if possible) or the configure high-availability disable command. Ideally, break HA
from the active unit.
Procedure
Step 1 Use an SSH client to open a connection to the management IP address and log into the device CLI with a
username that has configuration CLI access. For example, the admin username.
It is important that you follow this process while connected to the management IP address. When using
Firepower Device Manager, you have the option to manage the device through the IP address on a data
interface. However, you must use the Management physical port and management IP address to manage the
device remotely.
If you cannot connect to the management IP address, address the following:
• Ensure that the Management physical port is wired to a functioning network.
• Ensure that the management IP address and gateway are configured for the management network. From
Firepower Device Manager, configure the address and gateway on Device > System Settings >
Management Interface. (In the CLI, use the configure network ipv4/ipv6 manual command.)
Note Ensure that you are using an external gateway for the management IP address. You cannot use
the data interfaces as a gateway when using a remote manager.
Step 2 To change the mode from routed to transparent and use remote management:
a) Disable local management and enter no manager mode.
You cannot change the firewall mode while there is an active manager. Use the configure manager delete
command to remove the manager.
>
> show managers
No managers configured.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
735
System Administration
Changing the Firewall Mode
For example, to use the manager at 192.168.0.123 with the registration key secret, enter the following:
d) Log into the Firepower Management Center and add the device.
See the Firepower Management Center online help for details.
Step 3 To change the mode from transparent to routed and convert to local management:
a) Deregister the device from the FMC.
b) Access the FTD device CLI, preferably from the console port.
Because changing the mode erases your configuration, the management IP address will revert to the
default, so you might lose an SSH connection to the management IP address after changing modes.
c) Change the firewall mode to routed.
configure firewall routed
Example:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
736
System Administration
Resetting the Configuration
You can now use a web browser to open the local manager at https://management-IP-address.
Procedure
Step 1 Use an SSH client to open a connection to the management IP address and log into the device CLI with a
username that has configuration CLI access. For example, the admin username.
Step 2 Use the configure manager delete command to remove the manager.
>
> show managers
No managers configured.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
737
System Administration
Resetting the Configuration
You can now use a web browser to open the local manager at https://management-IP-address. By clearing
the configuration, you will be prompted to complete the device setup wizard.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
738
APPENDIX A
Advanced Configuration
Some device features are configured using ASA configuration commands. Although Firepower Device
Manager can configure many command-based features, it does not support all of them. If you need to use
some of these ASA features that are not otherwise supported in Firepower Device Manager, you can use Smart
CLI or FlexConfig to manually configure the features.
The following topics explain this type of advanced configuration in more detail.
• About Smart CLI and FlexConfig, on page 739
• Guidelines and Limitations for Smart CLI and FlexConfig, on page 747
• Configuring Smart CLI Objects, on page 748
• Configuring the FlexConfig Policy, on page 749
• Troubleshooting the FlexConfig Policy, on page 760
• Examples for FlexConfig, on page 761
The point of Smart CLI and FlexConfig is to allow you to configure features that are not directly supported
through Firepower Device Manager policies and settings.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
739
Advanced Configuration
Recommended Usage for Smart CLI and FlexConfig
Caution Cisco strongly recommends using Smart CLI and FlexConfig only if you are an advanced user with a strong
ASA background and at your own risk. You may configure any commands that are not prohibited. Enabling
features through Smart CLI and FlexConfig may cause unintended results with other configured features.
You may contact the Cisco Technical Assistance Center for support concerning Smart CLI and FlexConfig
objects that you have configured. The Cisco Technical Assistance Center does not design or write custom
configurations on any customer's behalf. Cisco expresses no guarantees for correct operation or interoperability
with other Firepower Threat Defense features. Smart CLI and FlexConfig features may become deprecated
at any time. For fully guaranteed feature support, you must wait for Firepower Device Manager support. When
in doubt, do not use Smart CLI or FlexConfig.
Before trying to recreate an ASA configuration, first determine if you can configure an equivalent feature in
standard policies. For example, the access control policy includes intrusion detection and prevention, HTTP
and other types of protocol inspection, URL filtering, application filtering, and access control, which the ASA
implements using separate features. Because many features are not configured using CLI commands, you will
not see every policy represented within the output of show running-config.
Note At all times, keep in mind that there is not a one-to-one overlap between ASA and FTD. Do not attempt to
completely recreate an ASA configuration on a FTD device. You must carefully test any feature that you
configure using FlexConfig.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
740
Advanced Configuration
How Software Upgrades Affect the FlexConfig Policy
• ASA CLI configuration guides explain how to configure a feature. Find the guides at
http://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-firewalls/
products-installation-and-configuration-guides-list.html
• ASA command references provide additional information sorted by command name. Find the references
at http://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-firewalls/
products-command-reference-list.html
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
741
Advanced Configuration
Prohibited CLI Commands
as-path Create Smart CLI AS Path objects and use them in a Smart CLI BGP
object to configure an autonomous system path filter.
attribute —
boot —
call-home —
captive-portal Use Policies > Identity to configure the captive portal used for active
authentication.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
742
Advanced Configuration
Advanced Configuration
clear —
client-update —
clock Use Device > System Settings > NTP to configure system time.
cluster —
command-alias —
compression —
configure —
crypto On the Objects page, use Certificates, IKE Policies, and IPSec
Proposals.
dhcp-client —
dns Configure DNS groups using Objects > DNS Groups, and assign the
groups using Device > System Settings > DNS Server.
dns-group Configure DNS groups using Objects > DNS Groups, and assign the
groups using Device > System Settings > DNS Server.
domain-name Configure DNS groups using Objects > DNS Groups, and assign the
groups using Device > System Settings > DNS Server.
dynamic-access-policy-config —
dynamic-access-policy-record
enable —
event —
failover —
fips —
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
743
Advanced Configuration
Advanced Configuration
http Use the Data Interfaces tab on Device > System Settings >
Management Access.
inline-set —
interface for vni, redundant, Configure interfaces on the Device > Interfaces page. Firepower Device
tunnel Manager does not support these types of interface.
ip audit This feature does not apply to a FTD system. Instead, apply intrusion
policies using access control rules.
ip local pool Use Device > Remote Access VPN to configure address pools.
ipsec —
ipv6 You can configure ipv6 ospf and ipv6 router ospf commands, but all
other ipv6 commands are prohibited.
Create Smart CLI IPv6 Prefix List objects and use them in a Smart CLI
BGP object to configure prefix list filtering for IPv6.
ipv6-vpn-addr-assign Use Device > Remote Access VPN to configure address pools.
jumbo-frame The system automatically enables jumbo frame support if you increase
the MTU of any interface over the default 1500.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
744
Advanced Configuration
Advanced Configuration
ldap —
logging Use Objects > Syslog Servers and Device > System Settings > Logging
Settings.
However, you can configure the logging history command in
FlexConfig.
management-access —
migrate Use Device > Remote Access VPN and Device > Site-to-Site VPN to
enable IKEv2 support.
mount —
ngips —
object service |natorigsvc The object service command is allowed in general, but you cannot edit
the internal objects named |natorigsvc or |natmappedsvc. In these names,
object service |natmappedsvc
the vertical bar is intentional and it is the first character of the restricted
object names.
passwd —
password
password-policy —
policy-list Create Smart CLI Policy List objects and use them in a Smart CLI BGP
object to configure a policy list.
policy-map sub-commands You cannot configure the following commands in a policy map.
priority
police
match tunnel-group
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
745
Advanced Configuration
Advanced Configuration
prefix-list Create Smart CLI IPv4 Prefix List objects and use them in a Smart CLI
OSPF or BGP object to configure prefix list filtering for IPv4.
priority-queue —
privilege —
reload You cannot schedule reloads. The system does not use the reload
command to restart the system, it uses the reboot command.
rest-api This feature does not apply to a FTD system. The REST API is always
installed and enabled.
route-map Create Smart CLI Route Map objects and use them in a Smart CLI OSPF
or BGP object to configure route maps.
scansafe This feature does not apply to a FTD system. Instead, configure URL
filtering in access control rules.
sla —
ssh Use the Data Interfaces tab on Device > System Settings >
Management Access.
ssl —
telnet FTD does not support Telnet connections. Use SSH instead of Telnet
to access the device CLI.
time-range —
tunnel-group Use Device > Remote Access VPN and Device > Site-to-Site VPN.
tunnel-group-map Use Device > Remote Access VPN and Device > Site-to-Site VPN.
username To create CLI users, open an SSH or console session to the device and
use the configure user commands.
vpdn —
vpn —
vpn-addr-assign —
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
746
Advanced Configuration
Smart CLI Templates
vpnclient —
vpn-sessiondb —
vpnsetup —
webvpn —
zone —
Note You also configure OSPF and BGP using Smart CLI templates. However, those templates are available through
the Device > Routing page rather than the Advanced Configuration page.
Objects: AS Path ASPath Create ASPath objects for use with routing protocol objects.
Objects: Access List Extended Access Create extended or standard ACLs for use with routing objects.
List You can also refer to these objects by name from FlexConfig
objects that configure permitted commands that use ACLs.
Standard Access
List
Objects: Community Expanded Create expanded or standard community lists for use with routing
List Community List objects.
Standard
Community List
Objects: Prefix List IPV4 Prefix List Create IPv4 or IPv6 prefix lists for use with routing objects.
IPV6 Prefix List
Objects: Policy List Policy List Create policy lists for use with routing objects.
Objects: Route Map Route Map Create route maps for use with routing objects.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
747
Advanced Configuration
Configuring Smart CLI Objects
• The commands defined in FlexConfig objects are deployed after all commands for features defined
through Firepower Device Manager, including Smart CLI. Thus, you can depend on objects, interfaces,
and so forth being configured before these commands are issued to the device. If you need to use a
FlexConfig-deployed item in a Smart CLI template, create and deploy the FlexConfig before creating
and deploying the Smart CLI template. For example, if you want to use the OSPF Smart CLI template
to redistribute EIGRP routes, first use FlexConfig to configure EIGRP, then create the OSPF Smart CLI
template.
• If you want to remove a feature or part of a feature that you configured through FlexConfig, but a Smart
CLI template refers to that feature, you must first remove the commands in the Smart CLI template that
use the feature. Then, deploy the configuration so that the Smart-CLI configured feature no longer refers
to it. You can then remove the feature from FlexConfig and redeploy the configuration to finally eliminate
it altogether.
Note All Smart CLI objects that you define are deployed. Unlike FlexConfig, you cannot create several Smart CLI
objects and then select which of them to deploy. Create Smart CLI objects only for those features you want
to configure.
Procedure
To delete an object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
748
Advanced Configuration
Configuring the FlexConfig Policy
The system loads the command template into the Template window. Initially, only the required commands
are shown. These represent the minimum configuration required for the template.
Step 6 Fill in the variables and add commands as needed in the template.
Ideally, you are working with an existing configuration from an ASA or Firepower Threat Defense device
(one that is managed by Firepower Management Center). With a configuration in hand, you simply need to
make the template conform to it, changing variables such as IP addresses and interface names as appropriate
for the location of this specific device in your network.
Following are some tips for filling in the template:
• To select a value for a variable, click the variable and either type in the appropriate value, or select it
from a list (in the case of enumerated values). Mousing over variables that require typing shows the valid
values for the option, such as a range of numbers. In some cases, the recommended value is mentioned.
For example, in the OSPF template, the required command router ospf process-id shows “Process ID
(1-65535)” on mouse-over, and when you click process-id, the field is highlighted. Simply type in the
number you want.
• When you select an option for a variable, if there are additional possible commands to configure the
option, these are automatically exposed and disabled or enabled as appropriate. Watch for these additional
commands.
• Use the Show/Hide Disabled link above the template to control your view. Disabled commands will not
be configured, but you must display them to configure them. To see the full template, click the Show
Disabled link above the template. To see only those commands that will be configured, click the Hide
Disabled link above the table.
• To clear all of your edits since you last saved the object, click the Reset link above the template.
• To enable an optional command, click the + button to the left of the line number.
• To disable an optional command, click the - button to the left of the line number. If you edited the line,
your edits are not deleted.
• To duplicate a command, click the Options ... button and select Duplicate. You are allowed to duplicate
commands only if it is valid to enter the command more than once.
• To delete a duplicated command, click the Options ... button and select Delete. You cannot delete the
commands that are a part of the base template.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
749
Advanced Configuration
Advanced Configuration
template. For example, if you want to use the OSPF Smart CLI template to redistribute EIGRP routes, first
use FlexConfig to configure EIGRP, then create the OSPF Smart CLI template.
Note If there is a Smart CLI template for a feature, you cannot configure it using FlexConfig. You must use the
Smart CLI object.
Procedure
Note We recommend that each object be completely self-contained and not depend on the configuration
defined in any other FlexConfig object. This ensures that you can add or remove objects without
affecting other objects.
What to do next
After editing the FlexConfig policy, carefully examine the results of the next deployment. If there are errors,
correct the CLI in the object. See Troubleshooting the FlexConfig Policy, on page 760.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
750
Advanced Configuration
Configuring FlexConfig Objects
Note Do not include the enable and configure terminal commands. The system enters the right mode for
configuration commands automatically.
Procedure
To delete an unreferenced object, click the trash can icon ( ) for the object.
Step 6 In the Template section, type in the ASA commands required to configure the feature.
You must enter commands in the right order for configuring the feature. Use the ASA CLI configuration
guides to learn how to enter the commands. Ideally, you should have a pre-tested configuration file from an
ASA or another FTD device that you can use as a reference.
You can also use Mustache notation to refer to and process variables. For detailed information, see Referring
to FlexConfig Variables and Retrieving Values, on page 754.
Following are some tips for creating the object body:
• To add lines, put the cursor at the end of a line and press Enter.
• To use a variable, type the variable name between double-braces: {{variable_name}}. For variables that
refer to objects, you must include the attribute whose value you are retrieving:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
751
Advanced Configuration
Advanced Configuration
{{variable_name.attribute}}. The available attributes differ based on object type. For complete
information, see Variable References: {{variable}} or {{{variable}}}, on page 754.
• To use a Smart CLI object, type the name of the object. If you need to refer to a routing process configured
in Smart CLI, enter the process identifier. See Referring to Smart CLI Objects in a FlexConfig Object,
on page 758.
• Click the Expand/Collapse link above the template body to make the body larger or smaller.
• Click the Reset link to erase any changes you made since you last saved the object.
Step 7 In the Negate Template section, enter the commands needed to remove or reverse the commands configured
in the object body.
The Negate section is very important and serves two purposes:
• It simplifies deployment. Before re-deploying the commands in the body, the system uses these commands
to first erase or undo the configuration. This ensures a clean deployment.
• If you decide to remove the feature by removing the object from the FlexConfig Policy, the system uses
these commands to remove the commands from the device.
If you do not supply the commands needed to negate or reverse the CLI in the object body, the deployment
might need to clear the entire device configuration and redeploy all policies, not just the commands within
the object. This will make deployment take longer and also disrupt traffic. Ensure that you have all, and only,
those commands needed to undo the configuration defined in the object body. Although negate commands
are typically the no or clear form of the commands in the template, if you are actually turning off a feature
that was already enabled, the “negate” command is actually the positive form of the command, the one that
enables the feature.
Use the ASA configuration guides and command reference to determine the appropriate commands. Sometimes,
you can undo a configuration with a single command. For example, in an object that configures RIP, a simple
no router rip command removes the entire router rip configuration, including subcommands.
Likewise, if you entered several banner login commands to create a multi-line banner, a single no banner
login command negates the entire login banner.
If your template creates several nested objects, the negate template needs to remove the objects in reverse
order, to first remove references to the objects before deleting the objects. For example, if you first create an
ACL, then refer to it in a traffic class, then refer to the traffic class in a policy map, and finally enable the
policy map using a service policy, the negate template must undo the configuration by first removing the
service policy, then the policy map, then the traffic class, and finally the ACL.
What to do next
Simply creating a FlexConfig object is not enough to get it deployed. You must add the object to the FlexConfig
Policy. Only those objects in the FlexConfig policy get deployed. This makes it possible for you to refine
your FlexConfig objects, and have some ready for special uses, without having all of them automatically
deployed. See Configuring the FlexConfig Policy, on page 749.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
752
Advanced Configuration
Creating Variables in a FlexConfig Object
Procedure
Step 1 Edit or create a FlexConfig object from the Device > Advanced Configuration page.
See Configuring FlexConfig Objects, on page 751.
To delete a variable, click the trash can ( ) icon for the variable. Make sure you remove any references to
it from the template body.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
753
Advanced Configuration
Referring to FlexConfig Variables and Retrieving Values
Note
To open API Explorer, click the more options button ( ) and choose API Explorer.
The following table lists the variable types, how to refer to them, and for objects, the name of the API model
and the most likely references that you might use.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
754
Advanced Configuration
Advanced Configuration
Boolean Variable: A logical true/false. The main purpose for Boolean variables is
for sections or inverse sections. You can edit the value of a
(simple variable) {{variable_name}}
Boolean variable to turn a section of commands on or off, for
Section: example, if you need to enable a feature periodically or under
special circumstances only.
{{#variable_name}}
Some objects also have Boolean attributes in their models, which
commands
{{/variable_name}} you can use to provide optional processing of a section.
Inverse Section:
{{^variable_name}}
commands
{{/variable_name}}
Interface Variable: A named interface defined on the Device > Interfaces page. You
cannot point to unnamed interfaces.
(object variable: API {{variable_name.attribute}}
model is Interface) There is a wide variety of attributes available in the interface
Section:
model. Also, the interface model includes sub-objects, for
example, for IP addresses.
{{#variable_name.attribute}}
commands Following are some of the main attributes that you might find
{{/variable_name.attribute}} useful:
• variable_name.name returns the logical name of the
Inverse Section:
interface.
{{^variable_name.attribute}} • variable_name.hardwareName returns the interface port
commands name, such as GigabitEthernet1/8.
{{/variable_name.attribute}}
• variable_name.managementOnly is a Boolean value. TRUE
means that the interface is defined as management only.
FALSE means the interface is for through-the-device traffic.
You could use this option as a section key.
• variable_name.ipv4.ipAddress.ipAddress returns the IPv4
address for the interface.
• variable_name.ipv4.ipAddress.netmask returns the subnet
mask for the IPv4 address for the interface.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
755
Advanced Configuration
Sections {{#key}} {{/key}} and Inverse Sections {{^key}} {{/key}}
Network Variable (Network Objects): A network object or group defined on the Objects page. You can
use sections to process network groups.
(object variable: API {{variable_name.attribute}}
model is Following are the main attributes that you might find useful:
Section (Group Objects):
NetworkObject)
• {{variable_name.name}} returns the name of the network
{{#variable_name.networkObjects}} object or group.
commands referring to one of
{{value}} • {{variable_name.value}} returns the IP address contents of
{{name}} a network object (but not a network group). Ensure that you
{{/variable_name.networkObjects}} use a network object that has the right type of contents for a
given command, for example, a host address rather than a
subnet address.
• {{variable_name.groups}} returns the list of network objects
contained within a network group. Use this only with
variables that point to network groups, and use it on a section
tag to iteratively process the contents of the group. Use either
{{value}} or {{name}} to retrieve the contents of each
network object in turn.
Numeric Variable: An integer number. Do not include commas, decimals, signs (such
as negative), or hexadecimal notation. For non-integer numbers,
(simple variable) {{variable_name}}
use a string variable.
Port Variable: A TCP or UDP port object defined on the Objects page. This must
be a port object, not a port group.
(object variable: API {{variable_name.attribute}}
model is PortObject, Following are the main attributes that you might find useful:
tcpports or udpports)
• {{variable_name.port}} returns the port number. The
protocol is not included.
• {{variable_name.name}} returns the name of the port object.
String Variable: A text string. For example, hostnames, usernames, and so forth.
(simple variable) {{variable_name}}
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
756
Advanced Configuration
How to Process Multiple-Value Variables
• A regular section (or simply, a section) is processed if the key is TRUE or has non-empty contents. If
the key is FALSE or the object has no content, the commands in the section are not configured. The
section is bypassed.
The following is the syntax for a regular section.
{{#key}}
one or more commands
{{/key}}
• An inverse section is the opposite of a section. It is processed if the key is FALSE or the object has no
contents. If the key is TRUE or the object has contents, the inverse section is bypassed.
The following is the syntax for an inverse section. The only difference is that a caret replaces the hash
tag.
{{^key}}
one or more commands
{{/key}}
The following topics explain the main uses for sections and inverse sections.
router rip
{{#net-group.networkObjects}}
network {{value}}
{{/net-group.networkObjects}}
router rip
network 192.168.10.0
network 192.168.20.0
network 192.168.30.0
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
757
Advanced Configuration
Referring to Smart CLI Objects in a FlexConfig Object
The main use here is for Boolean values. For example, you could create a Boolean variable, and put commands
within a section covered by the variable. Then, if you need to enable or disable a section of the commands in
the FlexConfig object, you merely need to change the value of the Boolean variable, you do not need to delete
those lines from the code. This makes it easy to turn features on or off.
For example, you might want to be able to turn off SNMP traps if you use FlexConfig to enable SNMP. You
could create a Boolean variable named enable-traps, and initially set it to TRUE. Then, if you need to turn
off traps, you simply edit the variable, change it to FALSE, save the object and then redeploy the configuration.
The command sequence could look like the following:
snmp-server enable
snmp-server host inside 192.168.1.5
snmp-server community clearTextString
{{#enable-traps}}
snmp-server enable traps all
{{/enable-traps}}
You can also do this type of processing based on Boolean values within an object. For example, you could
check whether an interface is management-only before configuring some characteristic on it. In the following
example, int-inside is an interface variable that points to the interface named inside. The FlexConfig configures
the EIGRP-related interface options on the interface only if the interface is not set to management only. You
would use an inverse section so that the commands are configured only if the Boolean value is FALSE.
router eigrp 2
network 192.168.1.0 255.255.255.0
{{^int-inside.managementOnly}}
interface {{int-inside.hardwareName}}
hello interval eigrp 2 60
delay 200
{{/int-inside.managementOnly}}
Procedure
Step 1 Create separate network objects for the two networks. For example, InsideNetwork and dmz-network.
Step 2 Use these objects in a Smart CLI extended access list object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
758
Advanced Configuration
Configuring Secret Key Objects
Step 3 Create a FlexConfig object that points to the Smart CLI object by name.
For example, if the object is named “dcerpc_class,” your FlexConfig object might look like the following.
Note that in the negate template, you do not negate the access list created through the Smart CLI object, as
that object is not actually created through FlexConfig.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
759
Advanced Configuration
Troubleshooting the FlexConfig Policy
Procedure
Step 1 Select Objects, then select Secret Keys from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
To delete an unreferenced object, click the trash can icon ( ) for the object.
What to do next
• If this is a new object, to use it in FlexConfig, edit a FlexConfig object, create a variable of the secret
key type, and select the object. Then, refer to the variable within the object body. For more information,
see Creating Variables in a FlexConfig Object, on page 753.
• If you are editing an existing object that is used in a FlexConfig object that is part of the FlexConfig
policy, you need to deploy the configuration to update the device with the new string.
• In Smart CLI templates, if a command requires a secret key, you will see a list of these objects when
editing the relevant property. Select the right key for the purpose.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
760
Advanced Configuration
Examples for FlexConfig
it only if a significant percentage of your traffic is over VPN and you are getting excessive fragmentation. In
that case, you might set TCP MSS to MTU minus 120 (for IPv4) or 140 (for IPv6), and use the same MTU
for all interfaces.
For purposes of illustration, suppose you want to set TCP MSS to 3 bytes. The command takes 48 bytes as
the minimum value, so you will get a deployment error similar to the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
761
Advanced Configuration
Advanced Configuration
using a service-policy command that is not shown in the output. For example, ICMP inspection is done on
all ICMP traffic that passes through the device.
Note For a detailed discussion of each inspection, see the Cisco ASA Series Firewall Configuration Guide available
from https://www.cisco.com/c/en/us/support/security/asa-firepower-services/
products-installation-and-configuration-guides-list.html.
The following procedure shows you how to enable, or disable, inspections in this globally-applied default
inspection class. For purposes of illustration, the example:
• Enables PPTP (Point-to-Point Tunneling Protocol). This protocol is used for tunneling a point-to-point
connection between to endpoints.
• Disables SIP (Session Initiation Protocol). You would typically disable SIP only if the inspection is
causing problems in the network. However, if you disable SIP, you must ensure that your access control
policies allow the SIP traffic (UDP/TCP 5060) and any dynamically allocated ports, and that you do not
need NAT support for SIP connections. Adjust the access control and NAT policies accordingly through
the standard pages, not through FlexConfig.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
762
Advanced Configuration
Advanced Configuration
Procedure
policy-map global_policy
class inspection_default
inspect pptp
d) In the Negate Template editor, enter the lines required to undo this configuration.
Just as you need to include the parent commands to enter the correct sub-mode for a command to enable
it, you also need to include those commands in the negate template.
The negate template will be applied if you remove this object from the FlexConfig policy (after having
deployed it successfully), and also during an unsuccessful deployment (to reset the configuration to its
previous condition).
Thus, for this example, the negate template would be the following:
policy-map global_policy
class inspection_default
no inspect pptp
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
763
Advanced Configuration
Advanced Configuration
Note Because the inspection_default class has other inspection commands enabled, you do not want
to negate the entire class. Similarly, the global_policy policy map includes these other inspections,
and you do not want to negate the policy map either.
policy-map global_policy
class inspection_default
no inspect sip
d) In the Negate Template editor, enter the lines required to undo this configuration.
The “negate” command for a disabling “no” command is the command that enables the feature. Thus, the
“negate” template is not just the commands to disable a feature, it is the commands to reverse whatever
you do in the “positive” template. The point of the negate template is to undo your changes.
Thus, for this example, the negate template would be the following:
policy-map global_policy
class inspection_default
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
764
Advanced Configuration
Advanced Configuration
inspect sip
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
765
Advanced Configuration
Advanced Configuration
The preview should update with the commands in the template. Verify you are seeing the expected
commands.
d) Click Save.
You can now deploy the policy.
Step 7 In CLI Console or an SSH session, use the show running-config policy-map command and verify that the
running configuration has the correct changes.
In the following output, note that inspect pptp is added to the bottom of the inspection_default class, and that
inspect sip is no longer in the class. This confirms that the changes defined in the FlexConfig object were
successfully deployed.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
766
Advanced Configuration
How to Undo Your FlexConfig Changes
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect netbios
inspect tftp
inspect ip-options
inspect icmp
inspect icmp error
inspect pptp
!
Procedure
The commands from the object are removed from the preview. The negate commands are not added to the
preview, these will be executed behind the scenes.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
767
Advanced Configuration
How to Enable Inspections for Unique Traffic Classes
Step 6 In CLI Console or an SSH session, use the show running-config policy-map command and verify that the
running configuration has the correct changes.
In the following output, note that inspect sip is added to the bottom of the inspection_default class. This
confirms that the changes defined in the FlexConfig object were successfully deployed. (Order is not important
in this class, so it does not matter that inspect sip is at the end and not in its original location.)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
768
Advanced Configuration
Advanced Configuration
4. A service policy that applies the policy map to the desired interface. This is the step that actually activates
the policy and enables the inspection.
Note For a detailed discussion of service policies related to inspections, see the Cisco ASA Series Firewall
Configuration Guide available from https://www.cisco.com/c/en/us/support/security/asa-firepower-services/
products-installation-and-configuration-guides-list.html.
Procedure
e) Click Add.
Step 6 In the Template editor, enter the following lines, including indentations.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
769
Advanced Configuration
Advanced Configuration
Note that to use the variable, you type the variable name between double braces. You also need to use dot
notation to pick out the attribute you want to retrieve, because the object that defines an interface has many
attributes. Because the interface name is held in the “name” attribute, entering {{pptp-if.name}} retrieves the
value of the name attribute for the interface assigned to the variable. If you need to change the interface for
PPTP inspection, you simply need to select a different interface in the variable definition.
Step 7 In the Negate Template editor, enter the lines required to undo this configuration.
For this example, we will assume that the class map, policy map, and service policy exist for the sole purpose
of applying PPTP inspection. Thus, in the negate template, we want to remove all of these.
If, however, you are actually adding PPTP inspection to an existing service policy on an interface, you would
not negate the policy map or service policy. You would either negate the class from the policy map, or simply
turn off inspection within the class within the policy map. You need to have a clear understanding of what
you are implementing in other FlexConfig objects to ensure that your negate template does not have unintended
consequences.
When deleting nested items, you need to do it in the reverse order in which you created them. Thus, you start
by deleting the service policy, and end by deleting the access list. Otherwise, you would be trying to delete
objects that are in use, and the system will return errors and not let you do that.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
770
Advanced Configuration
Advanced Configuration
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
771
Advanced Configuration
Advanced Configuration
The preview should update with the commands in the template. Verify you are seeing the expected
commands, as shown in the following graphic. Notice that the interface variable resolves to the name
“inside” in the preview. Pay special attention to variables: if they do not resolve correctly in the preview,
they will not deploy correctly. Edit the FlexConfig object until you get the correct variable translation in
the preview.
d) Click Save.
You can now deploy the policy.
Step 11 In CLI Console or an SSH session, use variations of the show running-config command and verify that the
running configuration has the correct changes.
You can enter show running-config and examine the entire CLI configuration, or you can use the following
commands to verify each part of this configuration:
• show running-config access-list MATCH_ACL to verify the ACL.
• show running-config class to verify the class map. This command will show all of the class maps.
• show running-config policy-map PPTP_POLICY to verify the class and policy map configuration.
• show running-config service-policy to verify that the policy map was applied to the interface. This will
show all service policies.
The following output shows this sequence of commands, and you can see that configuration is correctly
applied.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
772
Advanced Configuration
Advanced Configuration
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
773
Advanced Configuration
Advanced Configuration
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.6.0
774