Cisco FMC Configuration Guide 7.7
Cisco FMC Configuration Guide 7.7
7.7
First Published: 2025-03-05
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
[Link]
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at [Link]/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
[Link] Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2025 Cisco Systems, Inc. All rights reserved.
CONTENTS
Add a Chassis 55
Register With a New Management Center 58
Resolve Serial Number (Zero-Touch Provisioning) Registration Issues 59
Unregister a Device from the Management Center 61
Shut Down or Restart the Device 62
Download the Managed Device List 63
Migrate Threat Defense Devices 64
Configure Firepower 1010 and Secure Firewall 1210/1220 Switch Ports 808
About Switch Ports 808
Understanding Switch Ports and Interfaces 808
Auto-MDI/MDIX Feature 809
Guidelines and Limitations for Switch Ports 809
Configure Switch Ports and Power Over Ethernet 810
Enable or Disable Switch Port Mode 811
Configure a VLAN Interface 811
Configure Switch Ports as Access Ports 813
Configure Switch Ports as Trunk Ports 815
Configure Power Over Ethernet 817
Configure Loopback Interfaces 818
About Loopback Interfaces 819
Guidelines and Limitations for Loopback Interfaces 819
Configure a Loopback Interface 820
Rate-Limit Traffic to the Loopback Interface 820
Configure VLAN Subinterfaces and 802.1Q Trunking 824
Guidelines and Limitations for VLAN Subinterfaces 824
Maximum Number of VLAN Subinterfaces by Device Model 825
Add a Subinterface 826
Configure VXLAN Interfaces 828
About VXLAN Interfaces 828
Encapsulation 828
VXLAN Tunnel Endpoint 828
VTEP Source Interface 829
VNI Interfaces 829
VXLAN Packet Processing 830
Peer VTEPs 830
VXLAN Use Cases 831
Requirements and Prerequisites for VXLAN Interfaces 836
Guidelines for VXLAN Interfaces 836
Configure VXLAN or Geneve Interfaces 837
Configure VXLAN Interfaces 837
Configure Geneve Interfaces 840
Enabling SNMP and Configuring SNMP Properties for Firepower 1000 917
About Virtual Routers and Virtual Routing and Forwarding (VRF) 1155
About Virtual Routers and Dynamic VTI 1156
Amazon Web Services Security Groups Connector—About User Permissions and Imported Data 1799
Create an AWS User with Minimal Permissions for the Cisco Secure Dynamic Attributes
Connector 1799
Create an AWS Security Groups Connector 1801
Create an AWS Service Tags Connector 1802
Azure Connector—About User Permissions and Imported Data 1802
Create an Azure User with Minimal Permissions for the Cisco Secure Dynamic Attributes
Connector 1803
Create an Azure Connector 1805
Create an Azure Service Tags Connector 1806
Create a Cisco Cyber Vision Connector 1807
Create a Generic Text Connector 1808
Create a GitHub Connector 1809
Google Cloud Connector—About User Permissions and Imported Data 1810
Create a Google Cloud User with Minimal Permissions for the Cisco Secure Dynamic Attributes
Connector 1811
Create a Google Cloud Connector 1812
Create an Office 365 Connector 1813
vCenter Connector—About User Permissions and Imported Data 1814
Create a vCenter User with Minimal Permissions for the Cisco Secure Dynamic Attributes
Connector 1814
Create a vCenter Connector 1815
Create a Webex Connector 1818
Create a Zoom Connector 1819
Create Dynamic Attributes Filters 1819
Dynamic Attribute Filter Examples 1821
Manually Get a Certificate Authority (CA) Chain 1822
Use Dynamic Objects in Access Control Policies 1825
About Dynamic Objects in Access Control Rules 1825
Create Access Control Rules Using Dynamic Attributes Filters 1826
Disable the Cisco Secure Dynamic Attributes Connector 1827
Troubleshoot Using the Command Line 1827
Troubleshoot Using the Management Center 1829
Manually Get a Certificate Authority (CA) Chain 1830
Security Requirements 1832
Guidelines and Limitations for Network Analysis and Intrusion Policies 1999
How Policies Examine Traffic For Intrusions 1999
Decoding, Normalizing, and Preprocessing: Network Analysis Policies 2000
Access Control Rules: Intrusion Policy Selection 2001
Intrusion Inspection: Intrusion Policies, Rules, and Variable Sets 2002
Intrusion Event Generation 2004
Asymmetrical Flow Inspection in Snort 2004
System-Provided and Custom Network Analysis and Intrusion Policies 2005
System-Provided Network Analysis and Intrusion Policies 2006
Benefits of Custom Network Analysis and Intrusion Policies 2007
Benefits of Custom Network Analysis Policies 2008
Benefits of Custom Intrusion Policies 2008
Limitations of Custom Policies 2009
Prerequisites for Network Analysis and Intrusion Policies 2011
Convert all Snort 2 Custom Rules across all Intrusion Policies to Snort 3 2016
Convert all Snort 2 Custom Rules across all Intrusion Policies to Snort 3 2050
CHAPTER 63 Use Case - Migrate from Snort 2 to Snort 3 In Secure Firewall Management Center 2109
Prerequisites 2110
End-to-End Migration Workflow 2110
Enable Snort 3 on Threat Defense 2111
Convert Snort 2 Rules of a Single Intrusion Policy to Snort 3 2112
CHAPTER 64 Use Case - Generate Snort 3 Recommendations In Secure Firewall Management Center 2121
CHAPTER 65 Use Case - Block Traffic Based on the EVE Threat Confidence Score 2129
CHAPTER 67 Mitigate Threats Using MITRE Framework in Snort 3 Intrusion Policies 2147
Configure the Captive Portal Part 4: Create a User Access Control Rule 2485
Captive Portal Example: Create a Decryption Policy with an Outbound Rule 2486
Configure Captive Portal Part 6: Associate Identity and Decryption Policies with the Access Control
Policy 2488
Captive Portal Fields 2489
Exclude Applications from Captive Portal 2490
Troubleshoot the Captive Portal Identity Source 2491
History for Captive Portal 2493
Note If you have a Security Cloud Control-managed device and are using the on-prem management center for
analytics only, then the on-prem management center does not support policy configuration or upgrading.
Chapters and procedures in this guide related to device configuration and other unsupported features do not
apply to devices whose primary manager is Security Cloud Control.
The management center aggregates and correlates intrusion events, network discovery information, and device
performance data, allowing you to monitor the information that your devices are reporting in relation to one
another, and to assess the overall activity occurring on your network.
You can use the management center to manage nearly every aspect of a device’s behavior.
Note Although the management center can manage devices running certain previous releases as specified in the
compatibility matrix available at [Link]
[Link], new features that require the latest version of threat defense software
are not available to these previous-release devices. Some management center features may be available for
earlier versions.
Initiation always originates with eth0 on the management center or with the lowest-numbered management
interface on the device. Additional management interfaces are tried if the connection is not established. Multiple
management interfaces on the management center let you connect to discrete networks or to segregate
management and event traffic. However, the initiator does not choose the best interface based on the routing
table.
Make sure the management connection is stable, without excessive packet loss, with at least 5 Mbps throughput.
By default, the management connection uses TCP port 8305 (this port is configurable). If you place another
threat defense between devices and the management center, to prevent potential management disruption, be
sure to exempt management traffic from deep inspection by applying a prefilter policy for it.
Note The management connection is a secure, TLS-1.3-encrypted communication channel between itself and the
device. You do not need to run this traffic over an additional encrypted tunnel such as Site-to-Site VPN for
security purposes. If the VPN goes down, for example, you will lose your management connection, so we
recommend a simple management path.
Backing Up a Device
You cannot backup a physical managed device from the FTD CLI. To back up configuration data, and,
optionally, unified files, perform a backup of the device using the management center that is managing the
device.
To back up event data, perform a backup of the management center that is managing the device.
Updating Devices
From time to time, Cisco releases updates to the Firepower System, including:
• intrusion rule updates, which may contain new and updated intrusion rules
• vulnerability database (VDB) updates
• geolocation updates
• software patches and updates
You can use the management center to install an update on the devices it manages.
• SSH is not enabled by default for data interfaces, so you will have to enable SSH later using the
management center. Because the Management interface gateway will be changed to be the data interfaces,
you also cannot SSH to the Management interface from a remote network unless you add a static route
for the Management interface using the configure network static-routes command. For threat defense
virtual on Amazon Web Services, a console port is not available, so you should maintain your SSH access
to the Management interface: add a static route for Management before you continue with your
configuration. Alternatively, be sure to finish all CLI configuration (including the configure manager
add command) before you configure the data interface for manager access and you are disconnected.
• You cannot use separate management and event-only interfaces.
• Clustering is not supported. You must use the Management interface in this case.
Note For the Firepower 4100/9300, the MGMT interface is for chassis management, not for threat defense logical
device management. You must configure a separate interface to be of type mgmt (and/or firepower-eventing),
and then assign it to the threat defense logical device.
See the following table for supported management interfaces on each managed device model.
Note The routing for management interfaces is completely separate from routing that you configure for data
interfaces. If you configure a data interface for management instead of using the dedicated Management
interface, traffic is routed over the backplane to use the data routing table. The information in this section
does not apply.
You can configure multiple management interfaces on some platforms (a management interface and an
event-only interface). The default route does not include an egress interface, so the interface chosen depends
on the gateway address you specify, and which interface's network the gateway belongs to. In the case of
multiple interfaces on the default network, the device uses the lower-numbered interface as the egress interface.
At least one static route is recommended per management interface to access remote networks. We recommend
placing each interface on a separate network to avoid potential routing problems, including routing problems
from other devices to the threat defense.
Note The interface used for management connections is not determined by the routing table. Connections are always
tried using the lowest-numbered interface first.
NAT Environments
Network address translation (NAT) is a method of transmitting and receiving network traffic through a router
that involves reassigning the source or destination IP address. The most common use for NAT is to allow
private networks to communicate with the internet. Static NAT performs a 1:1 translation, which does not
pose a problem for management center communication with devices, but port address translation (PAT) is
more common. PAT lets you use a single public IP address and unique ports to access the public network;
these ports are dynamically assigned as needed, so you cannot initiate a connection to a device behind a PAT
router.
Normally, you need both IP addresses (along with a registration key) for both routing purposes and for
authentication: the management center specifies the device IP address when you add a device, and the device
specifies the management center IP address. However, if you only know one of the IP addresses, which is the
minimum requirement for routing purposes, then you must also specify a unique NAT ID on both sides of
the connection to establish trust for the initial communication and to look up the correct registration key. The
management center and device use the registration key and NAT ID (instead of IP addresses) to authenticate
and authorize for initial registration.
For example, you add a device to the management center, and you do not know the device IP address (for
example, the device is behind a PAT router), so you specify only the NAT ID and the registration key on the
management center; leave the IP address blank. On the device, you specify the management center IP address,
the same NAT ID, and the same registration key. The device registers to the management center's IP address.
At this point, the management center uses the NAT ID instead of IP address to authenticate the device.
Although the use of a NAT ID is most common for NAT environments, you might choose to use the NAT
ID to simplify adding many devices to the management center. On the management center, specify a unique
NAT ID for each device you want to add while leaving the IP address blank, and then on each device, specify
both the management center IP address and the NAT ID. Note: The NAT ID must be unique per device.
The following example shows three devices behind a PAT IP address. In this case, specify a unique NAT ID
per device on both the management center and the devices, and specify the management center IP address on
the devices.
The following example shows the management center behind a PAT IP address. In this case, specify a unique
NAT ID per device on both the management center and the devices, and specify the device IP addresses on
the management center.
Figure 2: NAT ID for Management Center Behind PAT
Note If you use a data interface for management on a threat defense, you cannot use separate management and
event interfaces for that device.
The following example shows the management center and managed devices using only the default management
interfaces.
Figure 3: Single Management Interface on the Secure Firewall Management Center
The following example shows the management center using separate management interfaces for devices; and
each managed device using 1 management interface.
Figure 4: Multiple Management Interfaces on the Secure Firewall Management Center
The following example shows the management center and managed devices using a separate event interface.
Figure 5: Separate Event Interface on the Secure Firewall Management Center and Managed Devices
The following example shows a mix of multiple management interfaces and a separate event interface on the
management center and a mix of managed devices using a separate event interface, or using a single
management interface.
Figure 6: Mixed Management and Event Interface Usage
User Roles
• Admin
• Network Admin
Management Connection
Make sure the management connection is stable, without excessive packet loss, with at least 5Mbps throughput.
Note If a user makes three consecutive failed attempts to log into the CLI via SSH, the system terminates the SSH
connection.
Procedure
Step 1 Connect to the threat defense CLI, either from the console port or using SSH.
You can SSH to the management interface of the threat defense device. You can also connect to the address
on a data interface if you open the interface for SSH connections. SSH access to data interfaces is disabled
by default. See SSH Access, on page 954 to allow SSH connections to specific data interfaces.
For physical devices, you can directly connect to the console port on the device. See the hardware guide for
your device for more information about the console cable. Use the following serial settings:
• 9600 baud
• 8 data bits
• No parity
• 1 stop bit
The CLI on the console port is FXOS (with the exception of the ISA 3000, where it is the regular threat defense
CLI). Use the threat defense CLI for basic configuration, monitoring, and normal system troubleshooting.
See the FXOS documentation for information on FXOS commands.
For a chassis in multi-instance mode, you can connect to FXOS on the console port, or you can enable SSH
for the Management interface according to Configure SSH and SSH Access List, on page 389. SSH is disabled
by default.
Password:
Last login: Thu May 16 [Link] UTC 2019 on ttyS0
Successful login attempts for user 'admin' : 1
firepower#
Step 3 If you used the console port, access the threat defense CLI.
connect ftd
Multi-instance mode:
connect ftd name
To view the instance names, enter the command without a name.
Note
This step does not apply to the ISA 3000.
Example:
Step 4 At the CLI prompt (>), use any of the commands allowed by your level of command line access.
To return to FXOS on the console port, enter exit.
To use recovery-config mode, see Access Recovery-Config Mode in the Diagnostic CLI, on page 144.
To return to the regular CLI, type Ctrl-a, d.
Complete the Threat Defense Initial Configuration Using the Device Manager
When you use the device manager for initial setup, the following interfaces are preconfigured in addition to
the Management interface and manager access settings:
• Ethernet 1/1—"outside", IP address from DHCP, IPv6 autoconfiguration
• Ethernet 1/2 (or for the Firepower 1010 and Secure Firewall 1210/1220, the VLAN1 interface)— "inside",
[Link]/24
• Default route—Obtained through DHCP on the outside interface
Note that other settings, such as the DHCP server on inside, access control policy, or security zones, are not
configured.
If you perform additional interface-specific configuration within device manager before registering with the
management center, then that configuration is preserved.
When you use the CLI, only the Management interface and manager access settings are retained (for example,
the default inside interface configuration is not retained).
• The Secure Firewall 4200 does not support the device manager. You need to use the CLI procedure:
Complete the Threat Defense Initial Configuration Using the CLI, on page 19.
• This procedure does not apply for Security Cloud Control-managed devices for which you want to use
an on-prem management center for analytics only. The device manager configuration is meant to configure
the primary manager. See Complete the Threat Defense Initial Configuration Using the CLI, on page 19
for more information about configuring the device for analytics.
• This procedure applies to all other devices except for the Firepower 4100/9300 and the ISA 3000. You
can use the device manager to onboard these devices to the management center, but because they have
different default configurations than other platforms, the details in this procedure may not apply to these
platforms.
Procedure
• Inside—[Link]
• Management—[Link] The Management interface is a DHCP client, so the IP
address depends on your DHCP server. You will have to set the Management IP address to a static
address as part of this procedure, so we recommend that you use the inside interface so you do not
become disconnected.
b) Log in with the username admin, and the default password Admin123.
c) You are prompted to read and accept the End User License Agreement and change the admin password.
Step 2 Use the setup wizard when you first log into the device manager to complete the initial configuration. You
can optionally skip the setup wizard by clicking Skip device setup at the bottom of the page.
After you complete the setup wizard, in addition to the default configuration for the inside interface, you will
have configuration for an outside (Ethernet1/1) interface that will be maintained when you switch to the
management center management.
a) Configure the following options for the outside and management interfaces, and click Next.
1. Outside Interface Address—This interface is typically the internet gateway, and might be used as
your manager access interface. You cannot select an alternative outside interface during initial device
setup. The first data interface is the default outside interface.
If you want to use a different interface from outside (or inside) for manager access, you will have to
configure it manually after completing the setup wizard.
Configure IPv4—The IPv4 address for the outside interface. You can use DHCP or manually enter
a static IP address, subnet mask, and gateway. You can also select Off to not configure an IPv4 address.
You cannot configure PPPoE using the setup wizard. PPPoE may be required if the interface is
connected to a DSL modem, cable modem, or other connection to your ISP, and your ISP uses PPPoE
to provide your IP address. You can configure PPPoE after you complete the wizard.
Configure IPv6—The IPv6 address for the outside interface. You can use DHCP or manually enter
a static IP address, prefix, and gateway. You can also select Off to not configure an IPv6 address.
2. Management Interface
You will not see Management Interface settings if you performed initial setup at the CLI.
The Management interface settings are used even if you enable manager access on a data interface.
For example, the management traffic that is routed over the backplane through the data interface will
resolve FQDNs using the Management interface DNS servers, and not the data interface DNS servers.
DNS Servers—The DNS server for the system's management address. Enter one or more addresses
of DNS servers for name resolution. The default is the OpenDNS public DNS servers. If you edit the
fields and want to return to the default, click Use OpenDNS to reload the appropriate IP addresses
into the fields.
Firewall Hostname—The hostname for the system's management address.
Do not register the threat defense with the Smart Software Manager; all licensing is performed on the
management center.
d) Click Finish.
e) You are prompted to choose Cloud Management or Standalone. For management center management,
choose Standalone, and then Got It.
Step 3 (Might be required) Configure the Management interface.
You may need to change the Management interface configuration, even if you intend to use a data interface
for manager access. You will have to reconnect to the device manager if you were using the Management
interface for the device manager connection.
• Data interface for manager access—The Management interface must have the gateway set to data
interfaces. By default, the Management interface receives an IP address and gateway from DHCP. If you
do not receive a gateway from DHCP (for example, you did not connect this interface to a network), then
the gateway will default to data interfaces, and you do not need to configure anything. If you did receive
a gateway from DHCP, then you need to instead configure this interface with a static IP address and set
the gateway to data interfaces.
• Management interface for manager access—If you want to configure a static IP address, be sure to also
set the default gateway to be a unique gateway instead of the data interfaces. If you use DHCP, then you
do not need to configure anything assuming you successfully get the gateway from DHCP.
Step 4 If you want to configure additional interfaces, including an interface other than outside or inside that you want
to use for manager access, choose Device, and then click the link in the Interfaces summary.
Other device manager configuration will not be retained when you register the device to management center.
Step 5 Choose Device > System Settings > Central Management, and click Proceed to set up the management
center management.
Step 6 Configure the Management Center/SCC Details.
a) For Do you know the Management Center/SCC hostname or IP address?, click Yes if you can reach
the management center using an IP address or hostname, or No if the management centerSecurity Cloud
Control is behind NAT or does not have a public IP address or hostname.
At least one of the devices, either the management center or the threat defense device, must have a reachable
IP address to establish the two-way, TLS-1.3-encrypted communication channel between the two devices.
b) If you chose Yes, then enter the Management Center/SCC Hostname or IP Address.
c) Specify the Management Center/SCC Registration Key.
This key is a one-time registration key of your choice that you will also specify on the management center
when you register the threat defense device. The registration key must be between 2 and 36 characters.
Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-). This ID can be
used for multiple devices registering to the management center.
If you intend to choose the Management interface for the Management Center/SCC Access InterfaceFMC
Access Interface, then this setting configures the Management DNS server.
c) For the Management Center/SCC Access Interface, choose any configured interface.
You can change the manager interface after you register the threat defense device to the management
center, to either the Management interface or another data interface.
Step 8 (Optional) If you chose a data interface, and it was not the outside interface, then add a default route.
You will see a message telling you to check that you have a default route through the interface. If you chose
outside, you already configured this route as part of the setup wizard. If you chose a different interface, then
you need to manually configure a default route before you connect to the management center.
If you chose the Management interface, then you need to configure the gateway to be a unique gateway before
you can proceed on this screen.
Step 9 (Optional) If you chose a data interface, click Add a Dynamic DNS (DDNS) method.
DDNS ensures the management center can reach the threat defense device at its Fully-Qualified Domain
Name (FQDN) if the IP address changes. See Device > System Settings > DDNS Service to configure DDNS.
If you configure DDNS before you add the threat defense device to the management center, the threat defense
device automatically adds certificates for all of the major CAs from the Cisco Trusted Root CA bundle so
that the threat defense device can validate the DDNS server certificate for the HTTPS connection. Threat
Defense supports any DDNS server that uses the DynDNS Remote API specification
([Link]
DDNS is not supported when using the Management interface for manager access.
Step 10 Click Connect. The Registration Status dialog box shows the current status of the switch to the management
center. After the Saving Management Center/SCC Registration Settings step, go to the management center,
and add the firewall.
If you want to cancel the switch to the management center, click Cancel Registration. Otherwise, do not
close the device manager browser window until after the Saving Management Center/SCC Registration
Settings step. If you do, the process will be paused, and will only resume when you reconnect to the device
manager.
If you remain connected to the device manager after the Saving Management Center/SCC Registration
Settings step, you will eventually see the Successful Connection with Management Center/SCC dialog
box, after which you will be disconnected from the device manager.
Procedure
Step 1 Connect to the threat defense CLI, either from the console port or using SSH to the Management interface,
which obtains an IP address from a DHCP server by default. If you intend to change the network settings, we
recommend using the console port so you do not get disconnected.
(Firepower and Secure Firewall hardware models) The console port connects to the FXOS CLI. The SSH
session connects directly to the threat defense CLI.
Step 2 Log in with the username admin and the password Admin123.
(Firepower and Secure Firewall hardware models) At the console port, you connect to the FXOS CLI. The
first time you log in to FXOS, you are prompted to change the password. This password is also used for the
threat defense login for SSH.
Note
If the password was already changed, and you do not know it, you must reimage the device to reset the
password to the default.
For Firepower and Secure Firewall hardware, see the Reimage Procedures in the Cisco FXOS Troubleshooting
Guide for the Firepower 1000/2100 and Secure Firewall 3100/4200 with Threat Defense .
For the ASA 5500-X and ISA 3000, see the Cisco Secure Firewall ASA and Secure Firewall Threat Defense
Reimage Guide.
Example:
[...]
[...]
firepower#
Step 3 (Firepower and Secure Firewall hardware models) If you connected to FXOS on the console port, connect to
the threat defense CLI.
connect ftd
Example:
Step 4 The first time you log in to the threat defense, you are prompted to accept the End User License Agreement
(EULA) and, if using an SSH connection, to change the admin password. You are then presented with the
CLI setup script.
Note
You cannot repeat the CLI setup wizard unless you clear the configuration; for example, by reimaging.
However, all of these settings can be changed later at the CLI using configure network commands. See the
threat defense command reference.
Defaults or previously entered values appear in brackets. To accept previously entered values, press Enter.
Note
The Management interface settings are used even when you enable manager access on a data interface. For
example, the management traffic that is routed over the backplane through the data interface will resolve
FQDNs using the Management interface DNS servers, and not the data interface DNS servers.
• Enter the IPv4 default gateway for the management interface and/or Enter the IPv6 gateway for
the management interface—If you want to use a data interface for manager access instead of the
Management interface, choose manual. Although you do not plan to use the Management interface, you
must set an IP address, for example, a private address. Make sure this interface is on a different subnet
from the manager access interface to prevent routing issues. You cannot configure a data interface for
management if the management interface is set to DHCP, because the default route, which must be
data-interfaces (see the next bullet), might be overwritten with one received from the DHCP server.
• Enter the IPv4 default gateway for the management interface and/or Configure IPv6 via DHCP,
router, or manually?—If you want to use a data interface for manager access instead of the management
interface, set the gateway to be data-interfaces. This setting forwards management traffic over the
backplane so it can be routed through the manager access data interface. If you want to use the Management
interface for manager access, you should set a gateway IP address on the Management 1/1 network.
• If your networking information has changed, you will need to reconnect—If you are connected with
SSH but you change the IP address at initial setup, you will be disconnected. Reconnect with the new
IP address and password. Console connections are not affected.
• Manage the device locally?—Enter no to use the management center. A yes answer means you will
use Secure Firewall device manager instead.
• Configure firewall mode?—We recommend that you set the firewall mode at initial configuration.
Changing the firewall mode after initial setup erases your running configuration. Note that data interface
manager access is only supported in routed firewall mode.
Example:
You can register the sensor to a Firepower Management Center and use the
Firepower Management Center to manage it. Note that registering the sensor
to a Firepower Management Center disables on-sensor Firepower Services
management capabilities.
However, if the sensor and the Firepower Management Center are separated by a
NAT device, you must enter a unique NAT ID, along with the unique registration
key.
'configure manager add DONTRESOLVE [registration key ] [ NAT ID ]'
Later, using the web interface on the Firepower Management Center, you must
use the same registration key and, if necessary, the same NAT ID when you add
this sensor to the Firepower Management Center.
>
Step 5 Identify the management center that will manage this threat defense.
configure manager add {hostname | IPv4_address | IPv6_address | DONTRESOLVE} reg_key [nat_id]
[display_name]
Note
If you are using Security Cloud Control for management, use the Security Cloud Control-generated configure
manager add command for this step.
of the IP address/NAT ID will the registration key be checked. We recommended that you always use
the NAT ID even when it is optional, but it is required if:
• You set the management center IP address to DONTRESOLVE.
• When adding the device on the management center, you do not specify a reachable device IP address
or hostname.
• You use the data interface for management, even if you specify IP addresses on both sides.
• The management center uses multiple management interfaces.
• display_name—Provide a display name for showing this manager with the show managers command.
This option is useful if you are identifying Security Cloud Control as the primary manager and an on-prem
management center for analytics only. If you don't specify this argument, the firewall auto-generates a
display name using one of the following methods:
• hostname | IP_address (if you don't use the DONTRESOLVE keyword)
• manager-timestamp
Example:
Example:
If the management center is behind a NAT device, enter a unique NAT ID along with the registration key,
and specify DONTRESOLVE instead of the hostname, for example:
Example:
If the threat defense is behind a NAT device, enter a unique NAT ID along with the management center IP
address or hostname, for example:
Step 6 If you are using Security Cloud Control as your primary manager and want to use an on-prem management
center for analytics only, identify the on-prem management center.
configure manager add {hostname | IPv4_address | IPv6_address | DONTRESOLVE} reg_key [nat_id]
[display_name]
Example:
The following example uses the generated command for Security Cloud Control with a Security Cloud
Control-generated display name and then specifies an on-prem management center for analytics only with
the "analytics-FMC" display name.
See the following details for using this command. See also Using the Threat Defense Data Interface for
Management, on page 4.
• The original Management interface cannot use DHCP if you want to use a data interface for management.
If you did not set the IP address manually during initial setup, you can set it now using the configure
network {ipv4 | ipv6} manual command. Make sure this interface is on a different subnet from the
manager access interface to prevent routing issues. If you did not already set the Management interface
gateway to data-interfaces, this command will set it now.
• When you add the threat defense to the management center, the management center discovers and
maintains the interface configuration, including the following settings: interface name and IP address,
static route to the gateway, DNS servers, and DDNS server. For more information about the DNS server
configuration, see below. In the management center, you can later make changes to the manager access
interface configuration, but make sure you don't make changes that can prevent the threat defense or
management center from re-establishing the management connection. If the management connection is
disrupted, the threat defense includes the configure policy rollback command to restore the previous
deployment.
• DDNS ensures the management center can reach the threat defense at its Fully-Qualified Domain Name
(FQDN) if the IP address changes. If you configure a DDNS server update URL, the threat defense
automatically adds certificates for all of the major CAs from the Cisco Trusted Root CA bundle so that
the threat defense can validate the DDNS server certificate for the HTTPS connection. The threat defense
supports any DDNS server that uses the DynDNS Remote API specification
([Link]
• This command sets the data interface DNS server. The Management DNS server that you set with the
setup script (or using the configure network dns servers command) is used for management traffic.
The data DNS server is used for DDNS (if configured) or for security policies applied to this interface.
On the management center, the data interface DNS servers are configured in the Platform Settings policy
that you assign to this threat defense. When you add the threat defense to the management center, the
local setting is maintained, and the DNS servers are not added to a Platform Settings policy. However,
if you later assign a Platform Settings policy to the threat defense that includes a DNS configuration,
then that configuration will overwrite the local setting. We suggest that you actively configure the DNS
Platform Settings to match this setting to bring the management center and the threat defense into sync.
Also, local DNS servers are only retained by the management center if the DNS servers were discovered
at initial registration. For example, if you registered the device using the Management interface, but then
later configure a data interface using the configure network management-data-interface command,
then you must manually configure all of these settings in the management center, including the DNS
servers, to match the FTD configuration.
• You can change the management interface after you register the threat defense to the management center,
to either the Management interface or another data interface.
• The FQDN that you set in the setup wizard will be used for this interface.
• You can clear the entire device configuration as part of the command; you might use this option in a
recovery scenario, but we do not suggest you use it for initial setup or normal operation.
• To disable data management, enter the configure network management-data-interface disable
command.
Example:
Configuration done with option to allow manager access from any network,
if you wish to change the manager access network
use the 'client' option in the command 'configure network management-data-interface'.
>
Example:
Configuration done with option to allow manager access from any network,
if you wish to change the manager access network
use the 'client' option in the command 'configure network management-data-interface'.
>
What to do next
Register your device to a management center.
Procedure
>
>
>
• Manual configuration:
configure network ipv6 manual ip6_address ip6_prefix_length management1
Example:
>
Step 3 Add a static route for the event-only interface if the management center is on a remote network; otherwise,
all traffic will match the default route through the management interface.
configure network static-routes {ipv4 | ipv6}add management1 destination_ip netmask_or_prefix
gateway_ip
For the default route, do not use this command; you can only change the default route gateway IP address
when you use the configure network ipv4 or ipv6 commands (see, Step 2, on page 26).
Example:
> configure network static-routes ipv4 add management1 [Link] [Link] [Link]
Configuration updated successfully
>
To display static routes, enter show network-static-routes (the default route is not shown):
[…]
Manage Devices
The Devices > Device Management page provides you with range of information and options.
Figure 9: Device Management Page
• View By—View devices based on group, licenses, model, version, or access control policy.
• Device State—View devices based on state (Error, Warning, etc.). You can click on a state icon to
view the devices belonging to it. The number of devices belonging to the states are provided within
brackets.
• Search Device—Search for a device by device name, host name, or IP address.
• Add—Add devices and other manageable components.
• Edit—For each device, use the Edit ( ) icon to edit the device settings.
You can also just click on the device name or IP address.
• More—For each device, click the More ( ) icon to execute other actions:
Figure 11: More Menu
Procedure
• The management center must be registered to the Smart Software Manager. A valid evaluation license
is sufficient, but if it expires, you will not be able to add new devices until you successfully register.
• If you registered a device using IPv4 and want to convert it to IPv6, you must delete and reregister the
device.
Procedure
Step 4 In a multi-domain environment, choose the Domain from the drop-down list and click Next.
Figure 13: Domain
Step 5 Click Primary manager for normal management or Analytics-only manager for a device that is managed
by a Cloud-delivered Firewall Management Center. Analytics-only mode does not support a multi-domain
environment, so this step doesn't appear in that case.
Figure 14: Management Center Role
For analytics-only mode, the system hides Initial Device Configuration because these settings are managed
by Security Cloud Control.
a) Choose an initial Access Control Policy to deploy to the device at registration, or create a new policy.
b) Choose Smart Licensing licenses to apply to the device.
You can also apply licenses after you add the device, from the System > Licenses > Smart Licenses
page, including the Secure Client remote access VPN license.
For the threat defense virtual only, you must also select the Performance Tier. It’s important to choose
the tier that matches the license you have in your account. Until you choose a tier, your device defaults
to FTDv50.
c) Click Next.
Step 7 Specify the Device details.
a) For the Host, enter the IP address or the hostname of the device you want to add. Leave this field blank
if you don't know the device IP address (for example, it's behind NAT).
If you leave this field blank, the initial configuration on the device needs to include a reachable management
center IP address or hostname plus the NAT ID. For more information, see NAT Environments, on page
7.
b) For the Display name, enter a name for the device as you want it to display in the management center.
You cannot change this name later.
c) For the Registration Key, enter the same registration key from your initial configuration. The registration
key is a one-time-use shared secret. The key can be up to 37-characters in length and include alphanumerical
characters (A–Z, a–z, 0–9) and the hyphen (-). The registration key does not need to be unique per device.
d) (Optional) Add the device to a Device group
e) For the Unique NAT ID, enter the same ID from your initial configuration.
The Unique NAT ID specifies a unique, one-time string of your choice that you will also specify on the
device during initial configuration. It is required when one side does not specify a reachable IP address
or hostname, for example if you left the Host field blank. Although technically optional, we recommend
always specifying the NAT ID even when you know the IP addresses of both sides because it is required
in certain situations. The ID can be up to 37-characters in length and include alphanumerical characters
(A–Z, a–z, 0–9) and the hyphen (-). This ID cannot be used for any other devices registering to the
management center.
f) Check Transfer Packets so that for each intrusion event, the device transfers the packet to the management
center for inspection.
For each intrusion event, the device sends event information and the packet that triggered the event to the
management center for inspection. If you disable it, only event information will be sent to the management
center; the packet will not be sent.
• The management center must be registered to the Smart Software Manager. A valid evaluation license
is sufficient, but if it expires, you will not be able to add new devices until you successfully register.
• If you registered a device using IPv4 and want to convert it to IPv6, you must unregister and reregister
the device.
Procedure
Step 3 If you want to add a cloud-managed device to your on-prem management center for analytics only, check
Cloud-delivered FMC Managed Device.
The system hides licensing and packet transfer settings because they are managed by Security Cloud Control
(formerly CDO). You can skip those steps.
Figure 18: Add Device for Security Cloud Control
Step 4 For the Host, enter the IP address or the hostname of the device you want to add. Leave this field blank if
you don't know the device IP address (for example, it's behind NAT).
If you leave this field blank, the initial configuration on the device needs to include a reachable management
center IP address or hostname plus the NAT ID. For more information, see NAT Environments, on page 7.
Step 5 For the Display Name, enter a name for the device as you want it to display in the management center. You
cannot change this name later.
Step 6 For the Registration Key, enter the same registration key in your initial configuration. The registration key
is a one-time-use shared secret. The key can be up to 37-characters in length and include alphanumerical
characters (A–Z, a–z, 0–9) and the hyphen (-). The registration key does not need to be unique per device.
Step 7 (Optional) Add the device to a device Group.
Step 8 Choose an initial Access Control Policy to deploy to the device upon registration, or create a new policy.
If the device is incompatible with the policy you choose, deploying will fail. This incompatibility could occur
for multiple reasons, including licensing mismatches, model restrictions, passive vs inline issues, and other
misconfigurations. After you resolve the issue that caused the failure, manually deploy configurations to the
device.
For threat defense virtual, you must also select the Performance Tier. It’s important to choose the tier that
matches the license you have in your account. Until you choose a tier, your device defaults to the FTDv50
selection. For more information about the performance-tiered license entitlements available for threat defense
virtual, see FTDv Licenses in the Cisco Secure Firewall Management Center Administration Guide.
Note
If you are upgrading your threat defense virtual to Version 7.0+, you can choose FTDv - Variable to maintain
your current license compliance.
Step 10 If you specified a NAT ID during initial configuration, in the Advanced section enter the same NAT ID for
the Unique NAT ID.
The Unique NAT ID specifies a unique, one-time string of your choice that you will also specify on the
device during initial configuration. It is required when one side does not specify a reachable IP address or
hostname, for example if you left the Host field blank. Although technically optional, we recommend always
specifying the NAT ID even when you know the IP addresses of both sides because it is required in certain
situations. The ID can be up to 37-characters in length and include alphanumerical characters (A–Z, a–z, 0–9)
and the hyphen (-). This ID cannot be used for any other devices registering to the management center.
Step 11 Check Transfer Packets so that for each intrusion event, the device transfers the packet to the management
center for inspection.
This option is enabled by default. For each intrusion event, the device sends event information and the packet
that triggered the event to the management center for inspection. If you disable it, only event information will
be sent to the management center; the packet will not be sent.
Note If you are adding a device that will be managed by a data interface, ensure that you configure the template to
be compatible with the connectivity parameters of the device. For more information, see Configure a Template
for Threat Defense Devices Managed Using the Data Interface.
Procedure
Step 4 In a multi-domain environment, choose the Domain from the drop-down list and click Next.
Figure 20: Domain
a) For the Host, enter the IP address or the hostname of the device you want to add. Leave this field blank
if you don't know the device IP address (for example, it's behind NAT).
If you leave this field blank, the initial configuration on the device needs to include a reachable management
center IP address or hostname plus the NAT ID. For more information, see NAT Environments, on page
7.
b) For the Display name, enter a name for the device as you want it to display in the management center.
You cannot change this name later.
c) For the Registration Key, enter the same registration key in your initial configuration. The registration
key is a one-time-use shared secret. The key can be up to 37-characters in length and include alphanumerical
characters (A–Z, a–z, 0–9) and the hyphen (-). The registration key does not need to be unique per device.
d) (Optional) Add the device to a Device group
e) If you specified a NAT ID during initial configuration, enter the same NAT ID for the Unique NAT ID.
The Unique NAT ID specifies a unique, one-time string of your choice that you will also specify on the
device during initial configuration. It is required when one side does not specify a reachable IP address
or hostname, for example if you left the Host field blank. Although technically optional, we recommend
always specifying the NAT ID even when you know the IP addresses of both sides because it is required
in certain situations. The ID can be up to 37-characters in length and include alphanumerical characters
(A–Z, a–z, 0–9) and the hyphen (-). This ID cannot be used for any other devices registering to the
management center.
f) Check Transfer Packets so that for each intrusion event, the device transfers the packet to the management
center for inspection.
For each intrusion event, the device sends event information and the packet that triggered the event to the
management center for inspection. If you disable it, only event information will be sent to the management
center; the packet will not be sent.
g) Enter values for the Variables and Network object overrides.
Step 7 Click Add Device to initiate device registration. The template configurations are applied after the device is
successfully registered with the management center.
Use this procedure to add a single device to the management center using a basic configuration. To add one
or more devices using a template, see Add Devices Using Serial Numbers (Zero-Touch Provisioning)—Device
Template, on page 49.
Zero-Touch Provisioning is not supported with clustering or multi-instance mode.
High availability is only supported when you use the Management interface because zero-touch provisioning
uses DHCP, which is not supported for data interfaces and high availability.
Zero-Touch Provisioning is only supported on the following models using 7.2 and 7.4 or later; prior to 7.2.4,
the management center must be publicly reachable.
• Firepower 1010
• Firepower 1100
• Secure Firewall 1200
• Firepower 2100 (on supported versions)
Procedure
Step 1 The first time you add a device using a serial number, integrate the management center with Cisco Security
Cloud.
Note
For a management center high-availability pair, you also need to integrate the secondary management center
with Cisco Security Cloud.
Step 5 In a multi-domain environment, choose the Domain from the drop-down list and click Next.
Figure 24: Domain
Step 6 For the Initial device configuration, click the Basic radio button.
a) Choose an initial Access Control Policy to deploy to the device upon registration, or create a new policy.
If the device is incompatible with the policy you choose, deploying will fail. This incompatibility could
occur for multiple reasons, including licensing mismatches, model restrictions, passive vs inline issues,
and other misconfigurations. After you resolve the issue that caused the failure, manually deploy
configurations to the device.
b) Choose Smart licensing licenses to apply to the device.
You can also apply licenses after you add the device, from the System > Licenses > Smart Licenses
page.
c) Click Next.
Step 7 Configure the Device details.
If you use zero-touch provisioning on the Management interface, DDNS is not supported. The management
center must be publicly reachable so the device can initiate the management connection.
You can continue to use Security Cloud Control as the DDNS provider, or you can later change the DDNS
configuration in the management center to a different method. See Configure Dynamic DNS, on page 909 for
more information.
If the device fails to register, see Resolve Serial Number (Zero-Touch Provisioning) Registration Issues, on
page 59.
• If you registered a device using IPv4 and want to convert it to IPv6, you must unregister and reregister
the device.
• Create a device template according to Device Management Using Device Templates, on page 87. You
must specify any required variables and network-object overrides for each device and ensure that model
mapping is done for the target device model.
We recommend that you create a checklist to ensure that all configurations in the template have been
entered correctly before applying the template on the device.
A sample checklist is given below.
• Check version, model, operation modes.
• Check list of variables and overrides.
• Check sanity of variable and override values.
• Check if the required Model Mappings exist.
• Check if parallel device template operations are in progress.
Note If you are adding a device that will be managed by a data interface, ensure that
you configure the template to be compatible with the connectivity parameters of
the device. For more information, see Configure a Template for Threat Defense
Devices Managed Using the Data Interface.
Procedure
Step 1 The first time you add a device using a serial number, integrate the management center with Cisco Security
Cloud.
Note
For a management center high-availability pair, you also need to integrate the secondary management center
with Cisco Security Cloud.
viewing its managed devices, viewing objects associated with the management center, and cross-launching
the management center.
c) Make sure Enable Zero-Touch Provisioning is checked.
d) Click Save.
Step 2 Choose Devices > Device Management.
Step 3 From the Add drop-down menu, choose Device (Wizard).
Step 4 Click Use Serial Number, and then click Next.
Figure 27: Device Registration Method
Step 5 In a multi-domain environment, choose the Domain from the drop-down list and click Next.
Figure 28: Domain
Step 6 For the Initial device configuration, click the Device template radio button.
Step 7 Choose the Device template from the drop-down list, and click Next.
Step 8 In Device details, upload a CSV file with the device details required by the template.
a) Download [Link]. This file includes all required headers for values that you need to define
per device. For more information on the CSV template file fields, see CSV Template File for Serial
Number Registration with a Device Template.
b) Drag & drop your CSV template file or Browse to select the CSV template file that you want to upload.
A validation check is done on the file after you upload it.
After the CSV template file has been uploaded successfully, the content of the CSV template file is
displayed in a table format.
When using zero-touch provisioning on the outside interface, Security Cloud Control acts as a DDNS provider
and does the following:
• Enables DDNS on outside using the "fmcOnly" method. This method is only supported for zero-touch
provisioning devices.
• Maps the outside IP address with the following hostname: [Link].
• Provides the IP address/hostname mapping to the management center so it can resolve the hostname to
the correct IP address.
• Informs the management center if the IP address ever changes, for example, if the DHCP lease renews.
If you use zero-touch provisioning on the Management interface, DDNS is not supported. The management
center must be publicly reachable so the device can initiate the management connection.
You can continue to use Security Cloud Control as the DDNS provider, or you can later change the DDNS
configuration in the management center to a different method. See Configure Dynamic DNS, on page 909 for
more information.
If the device fails to register, see Resolve Serial Number (Zero-Touch Provisioning) Registration Issues, on
page 59.
CSV Template File for Serial Number Registration with a Device Template
The CSV template file must be less than 2 MB in size. The filename must satisfy the following criteria:
• Can have a maximum of 64 characters.
• Only alphanumeric characters and special characters such as dash (-), period (.), and underscore (_) are
allowed.
• Must not contain any spaces.
See the following sample CSV template file containing configuration for two devices.
DisplayName,SerialNumber,AdminPassword,$WANLinkIP,Host:gateway
Branch A FTD,JADX345410AB,C15c05n0rt#,[Link]/24,[Link]
Branch B FTD,JADX345670CE,Admin123!,[Link]/24,[Link]
Mandatory Fields
• DisplayName—Name of the device. Type: string. Example: test1
• SerialNumber—Serial number of the device. Type: string, Example: JADX345670EG
• AdminPassword—Password for admin access, Type: string, Example: E28@2OiUrhx
Optional Fields
• DeviceGroup—Name of the device group, Type: string, Example: testgroup
Variables
Use the following format: $varName.
Sample variable: $LAN-Devices-IPv4Address—IPv4 address of the LAN device. Type: string. Example:
[Link]/24.
FQDNs
For serial number registration, DDNS is automatically enabled. If you want to set different values from the
default for the FMC Only type DDNS, then you can configure the settings in the template. In this case, when
you provide the CSV value for the hostaname, be sure to specify it as [Link].
Add a Chassis
You can add a Firepower 4100/9300 chassis to the management center. The management center and the chassis
share a separate management connection using the chassis MGMT interface. The management center offers
chassis-level health alerts. For configuration, you still need to use the Secure Firewall chassis manager or
FXOS CLI.
Note For the Secure Firewall 3100/4200, the chassis is added to the management center as part of the conversion
to multi-instance mode. See Convert a Device to Multi-Instance Mode, on page 364. However, if you used the
CLI to convert to multi-instance mode (Enable Multi-Instance Mode at the CLI, on page 402), skip to Step 3,
on page 56 of this procedure to add the chassis to the management center.
Procedure
Step 1 Connect to the chassis FXOS CLI, either using the console port or SSH.
Step 2 Configure the management center.
create device-manager manager_name [hostname {hostname | ipv4_address | ipv6_address}] [nat-id nat_id]
You are prompted for the registration key.
You can enter this command from any scope. This command is accepted immediately without using
commit-buffer.
• hostname {hostname | ipv4_address | ipv6_address}—Specifies either the FQDN or IP address of the
management center. At least one of the devices, either the management center or the chassis, must have
a reachable IP address to establish the two-way, TLS-1.3-encrypted communication channel between
the two devices. If you do not specify a hostname, then the chassis must have a reachable IP address or
hostname and you must specify the nat-id.
• nat-id nat_id—Specifies a unique, one-time string of your choice that you will also specify on the
management center when you register the chassis when one side does not specify a reachable IP address
or hostname. It is required if you do not specify a hostname, however we recommend that you always
set the NAT ID even when you specify a hostname or IP address. The NAT ID must not exceed 37
characters. Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-). This
ID cannot be used for any other devices registering to the management center.
• Registration Key: reg_key—You will be prompted for a one-time registration key of your choice that
you will also specify on the management center when you register the chassis. The registration key must
not exceed 37 characters. Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the
hyphen (-).
Example:
Step 3 In the management center, add the chassis using the chassis management IP address or hostname.
a) Choose Device > Device Management, and then Add > Chassis.
Figure 31: Add Chassis
b) In the Hostname/IP Address field, enter the IP address or the hostname of the chassis you want to add.
If you don't know the hostname or IP address, you can leave this field blank specify the Unique NAT
ID.
c) In the Chassis Name field, enter a name for the chassis as you want it to display in the management
center.
d) In the Registration Key field, enter the same registration key that you used when you configured the
chassis to be managed by the management center.
The registration key is a one-time-use shared secret. The key can include alphanumeric characters and
hyphens (-).
e) In a multidomain deployment, regardless of your current domain, assign the chassis to a leaf Domain.
If your current domain is a leaf domain, the chassis is automatically added to the current domain. If your
current domain is not a leaf domain, post-registration, you must switch to the leaf domain to configure
the chassis. A chassis can only belong to one domain.
f) (Optional) Add the chassis to a Device Group.
g) If you used a NAT ID during chassis setup, expand enter the same NAT ID in the Unique NAT ID field.
The NAT ID can include alphanumeric characters and hyphens (-).
h) Click Submit.
Procedure
Step 1 On the old management center, if present, unregister the managed device. See Unregister a Device from the
Management Center, on page 61.
You cannot change the management center IP address if you have an active connection with the management
center.
Example:
>
For other requirements for serial number registration, see Add a Device Using the Serial Number (Zero-Touch
Provisioning)—Basic Configuration, on page 44.
To work around a registration failure, do one of the following tasks.
If you do not have access to the CLI and want to make sure your device is unconfigured and ready for zero-touch
provisioning, reset the device to its default state by press the small, recessed Reset button for longer than five
seconds. See your hardware installation guide for more information.
5. Add a Device Using the Serial Number (Zero-Touch Provisioning)—Basic Configuration, on page 44
Note If the serial number was already claimed, see Restart Low-Touch Provisioning at the CLI, on page 60 instead.
1. In the device manager, click Device, then click the System Settings > Cloud Services.
2. Check Auto-enroll with Firewall in Security Cloud Control or Secure Firewall Management Center.
3. Click Register.
4. Add a Device Using the Serial Number (Zero-Touch Provisioning)—Basic Configuration, on page 44
Registering the device again to the same or a different management center causes the configuration to be
removed, so the device will stop processing traffic at that point.
Before you unregister the device, be sure to export the configuration or create a template so you can re-apply
the device-level configuration (interfaces, routing, and so on) when you re-register it. If you do not have a
saved configuration or template, you will have to re-configure device settings.
After you re-add the device and either import a saved configuration, use a template, or re-configure your
settings, you need to deploy the configuration before it starts passing traffic again.
Procedure
Note After restarting your device, you may see an error that the management connection could not be reestablished.
In some cases, the connection is attempted before the Management interface on the device is ready. The
connection will be retried automatically and should come up within 15 minutes.
Procedure
System is stopped.
It is safe to power off now.
Do you want to reboot instead? [y/N]
If you do not have a console connection, wait approximately 3 minutes to ensure the system has shut
down.
For the ISA 3000, when shutdown is complete, the System LED will turn off. Wait at least 10 seconds
before you remove the power.
Procedure
Step 3 You can download the device list in CSV or PDF format. Choose Download CSV or Download PDF to
download the report.
Note Secure Firewall 3110, 3120, 3130, and 3140 devices must be Version 7.1 and later. Cisco Secure Firewall
3105 must be Version 7.3 and later.
The migration wizard copies the following policy configurations from the source device to the target device:
• Health policy
• NAT policy
• QoS policy
• Remote access VPN policy
• FlexConfig policy
• Access control policy
• Prefilter policy
• IPS policy
• DNS policy
• SSL policy
• Malware and File policy
• Identity policy
The migration wizard copies the following routing configurations from the source device to the target device:
• ECMP
• BFD
• OSPFv2/v3
• EIGRP
• RIP
• BGP
• Policy Based Routing
• Static Route
• Multicast Routing
• Virtual Router
The migration wizard copies the following interfaces from the source device to the target device:
• Physical interfaces
• Sub-interfaces
• EtherChannel interfaces
• Bridge group interfaces
• VTI interfaces
• VNI interfaces
• Loopback interfaces
The migration wizard retains the device group of the target device.
Limitations
• Migration does not migrate:
• Site-to-site VPN policies
• SNMP configurations
After the migration, you can configure SNMP using the platform settings for the device.
Procedure
What to do next
After a successful migration, you can deploy the device.
Deployment is not mandatory, you can validate the configurations and deploy as required. However, before
the deployment ensure that you perform the actions mentioned in Best Practices for Migration, on page 68.
• Change the IP addresses of the interfaces if the source device is live, as they are copied to the target
device from the source device.
• Ensure that you update your NAT policies with the modified IP addresses.
• Configure the interface speeds if they are set to default values after migration.
• Re-enroll the device certificates, if any, on the target device.
• For Firepower 1100 and 2100, if you have a HA setup, configure HA parameters such as monitored
interfaces, failover trigger criteria, and interface MAC addresses.
• Configure the diagnostic interface as it gets reset after migration.
• (Optional) Configure SNMP for Firepower 1100 and 2100 using the platform settings for the device.
• (Optional) Configure SNMP for Firepower 1100 and 2100 using the platform settings for the device.
• (Optional) Configure remote branch deployment configurations.
If the source or target device had manager access through a data interface, after the migration, the manager
access will be lost. Update the manager access configuration on the target device. For more information,
see the Change the Manager Access Interface from Management to Data topic in the Cisco Secure
Firewall Management Center Device Configuration Guide or the Online Help.
• Configure site-to-site VPN, if required. These configurations are not migrated from the source device.
• View the deployment preview before the deployment. Choose Deploy > Advanced Deploy and click
the Preview ( ) icon for the device.
Switch Managers
You can change between managers if needed.
Procedure
Step 1 In the device manager, unregister the device from the Cisco Smart Software Manager.
Step 3 Choose Device > System Settings > Central Management, and click Proceed to set up the management
center management.
Step 4 Configure the Management Center/SCC Details.
a) For Do you know the Management Center/SCC hostname or IP address?, click Yes if you can reach
the management center using an IP address or hostname, or No if the management centerSecurity Cloud
Control is behind NAT or does not have a public IP address or hostname.
At least one of the devices, either the management center or the threat defense device, must have a reachable
IP address to establish the two-way, TLS-1.3-encrypted communication channel between the two devices.
b) If you chose Yes, then enter the Management Center/SCC Hostname or IP Address.
c) Specify the Management Center/SCC Registration Key.
This key is a one-time registration key of your choice that you will also specify on the management center
when you register the threat defense device. The registration key must be between 2 and 36 characters.
Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-). This ID can be
used for multiple devices registering to the management center.
If you intend to choose the Management interface for the Management Center/SCC Access InterfaceFMC
Access Interface, then this setting configures the Management DNS server.
c) For the Management Center/SCC Access Interface, choose any configured interface.
You can change the manager interface after you register the threat defense device to the management
center, to either the Management interface or another data interface.
Step 6 (Optional) If you chose a data interface, and it was not the outside interface, then add a default route.
You will see a message telling you to check that you have a default route through the interface. If you chose
outside, you already configured this route as part of the setup wizard. If you chose a different interface, then
you need to manually configure a default route before you connect to the management center.
If you chose the Management interface, then you need to configure the gateway to be a unique gateway before
you can proceed on this screen.
Step 7 (Optional) If you chose a data interface, click Add a Dynamic DNS (DDNS) method.
DDNS ensures the management center can reach the threat defense device at its Fully-Qualified Domain
Name (FQDN) if the IP address changes. See Device > System Settings > DDNS Service to configure DDNS.
If you configure DDNS before you add the threat defense device to the management center, the threat defense
device automatically adds certificates for all of the major CAs from the Cisco Trusted Root CA bundle so
that the threat defense device can validate the DDNS server certificate for the HTTPS connection. Threat
Defense supports any DDNS server that uses the DynDNS Remote API specification
([Link]
DDNS is not supported when using the Management interface for manager access.
Step 8 Click Connect. The Registration Status dialog box shows the current status of the switch to the management
center. After the Saving Management Center/SCC Registration Settings step, go to the management center,
and add the firewall.
If you want to cancel the switch to the management center, click Cancel Registration. Otherwise, do not
close the device manager browser window until after the Saving Management Center/SCC Registration
Settings step. If you do, the process will be paused, and will only resume when you reconnect to the device
manager.
If you remain connected to the device manager after the Saving Management Center/SCC Registration
Settings step, you will eventually see the Successful Connection with Management Center/SCC dialog
box, after which you will be disconnected from the device manager.
Caution Switching to the device manager erases the device configuration and returns the system to the default
configuration. However, the Management IP address and hostname are preserved.
Procedure
Step 1 In the management center, unregister the firewall from the Devices > Device Management page.
Step 2 Connect to the threat defense CLI using SSH or the console port. For SSH, open a connection to the
management IP address, and log into the threat defense CLI with the admin username (or any other user
with admin privileges).
The console port defaults to the FXOS CLI. Connect to the threat defense CLI using the connect ftd command.
The SSH session connects directly to the threat defense CLI.
If you cannot connect to the management IP address, do one of the following:
• Ensure that the Management physical port is wired to a functioning network.
• Ensure that the management IP address and gateway are configured for the management network. Use
the configure network ipv4/ipv6 manual command.
>
> show managers
No managers configured.
• Hot swap one of the SSDs—If an SSD is faulty, you can replace it. Note that if you only have one SSD,
you cannot remove it while the firewall is powered on.
• Remove one of the SSDs—If you have two SSDs, you can remove one.
• Add a second SSD—If you have one SSD, you can add a second SSD and form a RAID.
Caution Do not remove an SSD without first removing it from the RAID using this procedure. You can cause data
loss.
Procedure
b) Monitor the RAID status until the SSD no longer shows in the inventory.
show raid
After the SSD is removed from the RAID, the Operability and Drive State will show as degraded. The
second drive will no longer be listed as a member disk.
Example:
The psid is printed on the label attached to the back of the SSD. Alternatively, you can reboot the system,
and the SSD will be reformatted and added to the RAID.
Guidelines
• Enabling or disabling the USB port requires a reboot.
• If the USB port is disabled and you downgrade to a version that does not support this feature, the port
will remain disabled, and you cannot re-enable it without erasing the NVRAM (the FXOS local-mgmt
erase secure all command).
• If you perform a ROMMON factory-reset or FXOS local-mgmt erase secure, the USB port will be
re-enabled.
• For high availability or clustering, you must disable or re-enable the port individually on each unit.
Note This feature does not affect the USB console port, if present.
Procedure
>reboot
This command will reboot the system. Continue?
Please enter 'YES' or 'NO': YES
Procedure
Step 1 Disable the USB port and reboot for the change to take effect.
a) Disable the USB port.
scope fabric-interconnect
disable usb-port
commit buffer
b) Reboot the chassis.
connect local-mgmt
reboot
Example:
Step 2 Enable the USB port and reboot for the change to take effect.
a) Enable the USB port.
scope fabric-interconnect
enable usb-port
commit buffer
b) Reboot the chassis.
connect local-mgmt
reboot
Example:
Add device by 7.7.0 Any You can now use the Device (Wizard) to add a device using a registration key
registration key using with a basic initial configuration. This functionality is still present on the Add >
basic initial configuration Device screen as well.
added to the Device
New/modified screens: Devices > Device Management > Add > Device
(Wizard)
(Wizard)
Serial-number 7.6.0 Mgmt. You can now register a device using its serial number from an on-prem
registration (zero-touch center must management center. With templates (requires threat defense 7.4.1+ on the
provisioning) supported be publicly device), you can register multiple devices at once. This feature was previously
from an on-prem reachable: known as low-touch provisioning.
management center. 7.2.0
Requires Cisco Security Cloud. For upgraded management centers, your existing
Restriction Security Cloud Control integration continues to work until you enable Cisco
removed: Security Cloud.
7.2.4/7.4.0
New/modified screens: Devices > Device Management > Add > Device
(Wizard)
Supported platforms: Firepower 1000/2100, Secure Firewall 1200/3100. Note
that Firepower 2100 support is for threat defense 7.4.1–7.4.x only; those devices
cannot run Version 7.6.0.
Delete menu item 7.6.0 Any The Delete menu choice was renamed to Unregister to better indicate that the
renamed to Unregister device, high-availability pair, or cluster is being unregistered from the
management center and not deleted from the high availability pair or cluster
or having its configuration erased. The device, high-availability pair, or cluster
continues to pass traffic until it is re-registered.
New/modified screens: Devices > Device Management > More ( )
Add devices using 7.6.0 7.4 The Devices > Device Management > Add > Device (Wizard) screen lets
templates you add devices using a template.
New/modified screens: Devices > Device Management > Add > Device
(Wizard)
Disable the front panel 7.6.0 7.6.0 You can now disable the front panel USB-A port on the Firepower 1000 and
USB-A port on the Secure Firewall 3100/4200. By default, the port is enabled.
Firepower 1000 and
New/modified threat defense CLI commands: system support usb show,
Secure Firewall
system support usb port disable, system support usb port enable
3100/4200.
New/modified FXOS CLI commands for the Secure Firewall 3100/4200 in
multi-instance mode: show usb-port, disable USB port, enable usb-port
See: Cisco Secure Firewall Threat Defense Command Reference and Cisco
Firepower 4100/9300 FXOS Command Reference
Chassis-level health 7.4.1 7.4.1 You can now view chassis-level health alerts for Firepower 4100/9300 by
alerts for the Firepower registering the chassis to the management center as a read-only device. You
4100/9300. must also enable the Firewall Threat Defense Platform Faults health module
and apply the health policy. The alerts appear in the Message Center, the health
monitor (in the left pane, under Devices, select the chassis), and in the health
events view.
You can also add a chassis (and view health alerts for) the Secure Firewall
3100 in multi-instance mode. For those devices, you use the management center
to manage the chassis. But for the Firepower 4100/9300 chassis, you still must
use the chassis manager or the FXOS CLI.
New/modified screens: Devices > Device Management > Add > Chassis
Zero-Touch Provisioning 7.4.0 Mgmt. Zero-Touch Provisioning (also called low-touch provisioning) lets you register
to register the Firepower center is Firepower 1000/2100 and Secure Firewall 3100 devices to the management
1000/2100 and Secure publicly center by serial number without having to perform any initial setup on the
Firewall 3100 to the reachable: device. The management center integrates with SecureX and Security Cloud
management center using 7.2.0 Control for this functionality.
a serial number.
Mgmt. New/modified screens: Devices > Device Management > Add > Device >
center is Serial Number
not publicly
Version restrictions: This feature is not supported on Version 7.3.x or 7.4.0
reachable:
threat defense devices when the management center is not publicly reachable.
7.2.4/7.4.0
Support returns in Version 7.4.1.
Merged management and 7.4.0 7.4.0 Upgrade impact. Merge interfaces after upgrade.
diagnostic interfaces.
For new devices using 7.4 and later, you cannot use the legacy diagnostic
interface. Only the merged management interface is available.
If you upgraded to 7.4 or later and:
• You did not have any configuration for the diagnostic interface, then the
interfaces will merge automatically.
• You have configuration for the diagnostic interface, then you have the
choice to merge the interfaces manually, or you can continue to use the
separate diagnostic interface. Note that support for the diagnostic interface
will be removed in a later release, so you should plan to merge the
interfaces as soon as possible.
Merged mode also changes the behavior of AAA traffic to use the data routing
table by default. The management-only routing table can now only be used if
you specify the management-only interface (including Management) in the
configuration.
For platform settings, this means:
• You can no longer enable HTTP, ICMP, or SMTP for diagnostic.
• For SNMP, you can allow hosts on management instead of diagnostic.
• For Syslog servers, you can reach them on management instead of
diagnostic.
• If Platform Settings for syslog servers or SNMP hosts specify the
diagnostic interface by name, then you must use separate Platform Settings
policies for merged and non-merged devices.
• DNS lookups no longer fall back to the management-only routing table
if you do not specify interfaces.
Migrate from Firepower 7.4.0 Any You can now easily migrate configurations from the Firepower 1000/2100 to
1000/2100 to Secure the Secure Firewall 3100.
Firewall 3100.
New/modified screens: Devices > Device Management > Migrate
Platform restrictions: Migration not supported from the Firepower 1010 or
1010E.
Download a report of all 7.4.0 Any You can now download a report of all registered devices. On Devices > Device
registered devices. Management, click the new Download Device List Report link, at the top
right of the page.
Manage threat defense 7.4.0 7.4.0 Threat defense high availability now supports using a regular data interface
high availability pairs for communication with the management center. Previously, only standalone
using a data interface. devices supported this feature.
See: Device Management
ISA 3000 System LED 7.0.5/7.3.0 7.0.5/7.3.0 When you shut down the ISA 3000, the System LED will turn off. You should
support for shutting wait at least 10 seconds before removing the power.
down.
ISA 3000 support for 7.0.2/7.2.0 7.0.2/7.2.0 You can now shut down the ISA 3000; previously, you could only reboot the
shutting down. device.
Multi-manager support. 7.2.0 7.2.0 We introduced the cloud-delivered management center. The cloud-delivered
management center uses the Firewall in Security Cloud Control (Security Cloud
Control) platform and unites management across multiple Cisco security
solutions. We take care of manager updates.
Hardware or virtual management centers running Version 7.2+ can "co-manage"
cloud-managed devices, but for event logging and analytics purposes only.
You cannot deploy policy to these devices from the hardware or virtual
management center.
New/modified commands: configure manager add, configure manager
delete, configure manager edit, show managers
New/modified screens:
• When you add a cloud-managed device to a hardware or virtual
management center, use the new Security Cloud Control Managed
Device check box to specify that it is analytics-only.
• View which devices are analytics-only on Devices > Device Management.
RAID support for SSDs 7.1.0 7.1.0 The SSDs are self-encrypting drives (SEDs), and if you have 2 SSDs, they
on the Secure Firewall form a software RAID.
3100.
New/modified commands: configure raid, show raid, show ssd
Support for TLS 1.3 for 7.1.0 7.1.0 The FMC-device management connection now uses TLS 1.3. Previously, TLS
the management 1.2 was supported.
connection.
Use FDM to configure 7.1.0 7.1.0 When you perform initial setup using FDM, all interface configuration
FTD for management by completed in FDM is retained when you switch to FMC for management, in
the FMC. addition to the Management and manager access settings. Note that other default
configuration settings, such as the access control policy or security zones, are
not retained. When you use the FMC CLI, only the Management and manager
access settings are retained (for example, the default inside interface
configuration is not retained).
After you switch to FMC, you can no longer use FDM to manage FTD.
New/modified FDM screens: System Settings > Management Center
Filter devices by upgrade 6.7.0 6.7.0 The Device Management page now provides upgrade information about your
status. managed devices, including whether a device is upgrading (and what its upgrade
path is), and whether its last upgrade succeeded or failed.
New/modified screens: Devices > Device Management
One-click access to the 6.4.0 6.4.0 For Firepower 4100/9300 series devices, the Device Management page provides
Firepower Chassis a link to the Firepower Chassis Manager web interface.
Manager.
New/modified screens: Devices > Device Management
Filter devices by health 6.2.3 6.2.3 The Device Management page now provides version information for managed
and deployment status; devices, as well as the ability to filter devices by health and deployment status.
view version information.
New/modified screens: Devices > Device Management
device, such as IP addresses, can be defined using variables and network object overrides that you define at
registration.
You can also configure site-to-site VPN connections in a device template. These configurations define the
site-to-site VPN topologies that a device should be a part of. The VPN configurations along with the other
device template policies and configurations enable easy deployment of the branch device to your network.
Device templates support the configuration of a device only as a spoke. A device can be part of multiple hub
and spoke site-to-site VPN topologies.
After the configured device template is applied to a device, the variables are resolved, the protected network
overrides are configured, and the device is added as a spoke in the specified VPN topology.
Model Mapping
As interface configurations vary for different device models, the interface configurations in the template have
to be copied to the target interfaces on the device. Model mapping enables you to define mapping of interfaces
defined in the template to the interfaces of the required threat defense model. During application of the template
on the device, the variables in the interface configurations are replaced with the values that you provide and
copied to the mapped interfaces on the device. Note that you have to create the model mappings in the template
before initiating application of the template on the device. For more information on setting up model mapping,
see Add Model Mapping.
Supported Domains
Any
User Roles
• To create, modify, or delete templates:
• Admin
• Network Admin
• Assign appropriate logical names and IP addresses to the interfaces of the threat defense devices. For
example, use inside for the interface connected to the LAN, and outside for the interface connected to
the internet or WAN.
Device with Secure Client Template with Secure Client Secure Client License after
License License Device Template Application
• Templates that are created and configured for devices that are managed through the data interface cannot
be used to register and apply to devices that are managed through the management interface.
• Device registration and application of template does not come under the Change Management workflow.
Only approved data, such as access policies, templates, template variables, network overrides declared
in template, and template configurations used in the template application operation are used.
• Device registration with serial number and access control policy is supported for only one device at a
time.
• Devices with IPv6 DHCP discoverability are not supported when you add devices using serial numbers.
• When you apply a template to a device that is already registered, the configuration in the template is only
copied to the target device. You can then choose to manually deploy the configuration on the device or
let the copied configuration stay on the device and deploy later. However, if you apply the template
during device onboarding, the configuration in the template is copied to the target device and, as per
existing behavior, automatically deployed on the device after device registration.
• Any change in model mapping causes the device to be marked as ‘Out of Sync’. Consider reapplying
the template to the devices if you have made changes to the interface mapping in the corresponding
model mapping or if you have made any configuration changes after the previous application of the
template.
• Device templates are only supported on merged management and diagnostic interfaces. For more
information, see Merge the Management and Diagnostic Interfaces.
• Template configuration updates are supported by change management. Creation and application of device
templates is not supported by change management.
• You cannot sync configuration changes from a device to the template. A few sample scenarios during
which you may want to make changes to the device configuration using a template along with
recommended solutions are given below:
• If you want to test the new configuration changes on one device before propagating the changes to
multiple devices, we recommend that you make the changes in the template and apply the template
to one device. Validate the changes on that device and then apply the template to the other devices.
• If you want to make a large number of changes resulting in a signification deviation from the current
configuration on a device, and then propagate those changes to other devices, you may choose one
of the following options:
• Export the current template to get a copy of the template. You can then make the required
changes in the template and apply to a single device. Validate the changes on that device and
then apply the template to the other devices.
• You can also make the required changes on the device and create a template from that device.
You can then apply and validate the changes on the other devices. However, we do not
recommend this as template parameters such as variables and network object overrides will
not be present in the created template.
• If the configuration on a particular device starts to differ significantly from the configuration in the
template, you may also choose to not use the template for this device and delete the device-template
association from the Associated Devices window.
• Subinterfaces
• Redundant interfaces
• Etherchannel interfaces
• VLAN interfaces
• When you apply a template on a device that is part of a VPN topology, you must ensure that the template
includes interface configurations for all interfaces used in the topology.
• When you apply a template with VPN connections to multiple devices, note the following:
A template is applied to multiple devices in the order in which you have selected the devices. If the
template has VPN connections, the corresponding VPN topology is locked.
• For SD-WAN topology VPN connections: Ensure that IP address subnet of the interface does not conflict
with the subnet of the IP address pool of the SD-WAN hub.
• Domain:
• You can define a template in a global or leaf domain. However, you can define a VPN topology
only in a leaf domain.
• You can configure VPN connections in a template for all domains. During template application,
VPN connections are applied to the device only if the device is in the same domain as the VPN
topology.
• Transparent mode
• HA failover configurations
• Chassis configurations
• Logical devices
• Variables for nested objects
• Override support for network groups and other object types
Template Management
Choose Devices > Template Management to bring up the Template Management window. This window
provides you with a range of information and options to manage templates. All the created device templates
are listed on this window.
Information on each template is provided under the following columns:
• Name - Displays the name of the template.
• Domain - Displays the domain in which the template is present.
• Variables - Displays the variables and network object overrides in the template.
• Access Control Policy - Click the link in the Access Control Policy column to view the policy that is
deployed on the device.
• Model Interface Mapping – Displays the device model interfaces that are mapped to the template
interfaces.
Against each template, there is an Edit ( ) icon and a More ( ) icon. When you click the Edit ( ) icon, the
Device Management window appears with several tabs. You can use the tabs to configure interfaces, inline
sets, routing, DHCP, VPN, and template settings.
Procedure
Procedure
Step 6 Click OK. You can view the status of template creation in the Notifications > Tasks window.
Step 7 Choose Devices > Template Management to view the newly created template.
When you import a template into a domain, any objects that are part of the configuration are either newly
created or reused if the objects with the same name are visible in the domain into which the template is
imported. Any object with matching names that is not visible, due to domain hierarchy, is imported as a new
object with the name suffixed with a _x.
If there is a mismatch in the variable names when you want to onboard devices in a domain using the cloned
template from another domain, you must specify the new variable names in the .csv file to onboard the devices.
Perform the procedure given below to import a device template into the management center from your local
system.
Procedure
Step 4 View the status of the import task in the Notifications > Tasks window.
Step 5 Choose the template SFO file on your local system and click Open. This template SFO file that you import
can be newly created, generated from a device, or cloned from an existing template.
Step 6 View the status of the import task in the Notifications > Tasks window. You will see a notification informing
you that the import or export task is successfully completed. If you are exporting a template, click Download
Export Package in the Notifications > Tasks window to download the template configuration as an SFO
file.
Note
Alternatively, you can also go to the Template Management window and click the Edit ( ) icon of the
template. Then, go to Template Settings > General, and click Import or Export in the General tile to import
or export the template.
Procedure
Procedure
For more information, see Interface overview and Regular Firewall Interfaces.
Edit an Interface
You can edit an interface in the same way as you do on the management center without using the template.
Use template variables to set up the IPv4 and IPv6 addresses. The device template supports the configurations
that are supported on Firepower 1000,Secure Firewall 1200, Firepower 2100, and Secure Firewall 3100 Threat
Defense devices. Perform the procedure given below to edit an interface.
Procedure
Note
Use variables to configure IPv4 and IPv6 addresses. For more information on templatizing variables, see
Configure Template Parameters.
For more information on editing the settings mentioned above, see Interface overview and Regular Firewall
Interfaces.
Procedure
• Template Settings
• Template Parameters
• Add a Variable
• Add a Network Object Override
Perform the procedure given below to edit the name of the device, and to enable or disable packet transfer.
Procedure
Step 3 Check the Transfer Packets checkbox to allow packet data to be stored with events on the management
center.
Step 4 Click Save.
Edit Licenses
In the License tile, you can see the License types that are required based on the configurations used in the
template. Choosing a license here does not consume that license on the device. The license is consumed only
when you apply the template to a device.
Perform the procedure given below to edit the license types as per your requirement.
Procedure
Procedure
Field Description
Field Description
Object Group Search The state of object group search on the device. While operating, the threat
defense device expands access control rules into multiple access control
list entries based on the contents of any network or interface objects used
in the access rule. You can reduce the memory required to search access
control rules by enabling object group search. With object group search
enabled, the system does not expand network or interface objects, but instead
searches access rules for matches based on those group definitions. Object
group search does not impact how your access rules are defined or how
they appear in the management center. It impacts only how the device
interprets and processes them while matching connections to access control
rules.
Note
By default, the Object Group Search is enabled when you add threat
defense for the first time in the management center.
Interface Object Optimization The state of interface object optimization on the device. During deployment,
interface groups and security zones used in the access control and prefilter
policies generate separate rules for each source/destination interface pair.
If you enable interface object optimization, the system will instead deploy
a single rule per access control/prefilter rule, which can simplify the device
configuration and improve deployment performance. If you select this
option, also select the Object Group Search option to reduce memory
usage on the device.
Procedure
Field Description
Connectivity Monitor Interval (in Shows the amount of time to wait before rolling back the configuration.
Minutes)
Deployment settings include enabling auto rollback of the deployment if the management connection fails as
a result of the deployment; specifically if you use data for management center access, and then you misconfigure
the data interface. You can alternatively manually roll back the configuration using the configure policy
rollback command.
Perform the procedure given below to edit the deployment settings.
Procedure
Supported Variables
The following variable types are supported in device templates.
Add a Variable
Perform the procedure given below to add a variable.
Procedure
Procedure
Step 4 In the Network Object Overrides section, click Add or Remove Network Object Overrides.
Step 5 In the Add or Remove Network Object Overrides window, choose the network objects for which you want
to create network object overrides from the Available Networks window and click the > button.
Step 6 Click Save.
Procedure
Step 6 Click Save. The interface mappings are listed along with the device model and mapping status on the Model
Mapping window.
Note
Some configurations in the template may not be supported on all device models. Unsupported configurations,
if any, are not applied to the device. The Device Template Apply Report provides details about such
configurations.
• Interfaces mapped to incompatible models, versions, or interfaces. See Requirements and Prerequisites
for Device Management using Device Templates for more information.
• Number of interfaces exceeds the model limit.
• Deleted an interface that was mapped.
• Newly added physical interfaces are not mapped to a compatible model interface.
• Model mapping is not done for a named interface.
• Model mapping is not done for an interface related to other logical interfaces, such as sub-interfaces, PC
interfaces, and so on.
• Making policy or configuration changes that are unsupported on some device models. For example,
enabling switch port configuration on interfaces.
You can also save a template with invalid model mappings. However, you must review and fix the model
mapping before initiating application of the template on the device.
You can hover over Invalid under Mapping Status to view the errors that caused the invalid mapping status.
Fix the errors before initiating application of the template on the device.
Procedure
What to do next
1. Configure the routing policy for the spoke in the device template.
2. Map the device interfaces to the template interfaces (Model Mapping).
3. Apply the template to a device.
Procedure
a) From the Virtual Tunnel Interface (VTI) drop-down list, choose a VTI interface or click ( ) to create
a new VTI.
VTI is a virtual interface used to establish a route-based VPN tunnel. You must configure routing policies
for a VTI to set up a VPN tunnel. This list contains all the VTIs configured on the device template. For
more information on creating a VTI, see Add a VTI Interface, on page 1516.
b) Check the Use Public IP Address check box to override the tunnel source IP address and configure a
public IP address variable for the VTI. Click ( ) to create a new public IP address variable.
This IP address is the source IP address for the VPN tunnel. By default, this is the IP address of the VPN
interface. However, if the device is behind NAT, the VPN interface has a private address, but the post-NAT
public IP address should be configured.
c) Check the Local Tunnel (IKE) Identity check box to enable a unique and configurable identity for the
VPN tunnel from the spoke to a remote peer.
d) Identity Type: Key ID is the only supported identity type. Choose a key ID variable from the drop-down
list or click ( ) to create a new key ID variable.
e) (Optional) Check the Enable Secondary VPN Tunnel check box to configure the parameters for the
secondary VPN tunnel.
f) Click OK.
You can view the VPN connection in the Site-to-Site VPN Connections table.
What to do next
1. Configure the routing policy for the spoke in the device template.
2. Map the device interfaces to the template interfaces (Model Mapping).
3. Apply the template to a device.
Procedure
Choose an IP address variable from the drop-down list or click ( ) to add an IP address variable.
b) Check the Local Tunnel (IKE) Identity check box to enable a unique and configurable identity for the
VPN tunnel from the spoke to a remote peer.
c) Identity Type: Key ID is the only supported identity type. Choose a key ID variable from the drop-down
list or click ( ) to add a new key ID variable.
d) Protected Networks: Click ( ) to configure a protected network for the VPN connection.
Do one of the following:
• Choose a protected network and click OK.
• Click Add to configure a network object and click Save.
When you create a protected network object, note the following:
e) Click OK.
You can view the VPN connection in the Site-to-Site VPN Connections table.
What to do next
1. Note that before you apply a template to a device, to configure device-specific values for the protected
networks, add these objects in Template Settings > Template Parameters > Add Network Objects
Overrides.
2. Map the device interfaces to the template interfaces (Model Mapping).
3. Apply the template to a device.
5 Add a model mapping for the device Devices > Add Model Mapping, on
model in the template. Template page 105
Management >
Template
Settings > Model
Mapping
6 Register the device using a device Devices > Device Add a Device Using a
template. Management > Registration Key—Device
Add > Device Template, on page 39
(Wizard)
2 Add a physical interface in the template. Devices > Add a Physical Interface, on
Template page 96
By default, a template has only one
Management >
outside interface. Rename the outside
Interfaces > Add
interfaces, for example, ISP1, ISP2.
Physical
Interface
7 Configure the network object overrides. Devices > Add a Network Object
Template Override, on page 104
Management >
Template
Settings >
Template
Parameters >
Add Network
Objects
Overrides
8 Map the template interfaces to the Devices > Add Model Mapping, on
device model interfaces (Model Template page 105
Mapping). Management >
Template
Settings > Model
Mapping
For more information about dual ISP deployment using the SD-WAN wizard, see Sample Configurations for
Dual ISP Deployment Using SD-WAN Wizard, on page 1984.
Note Any change management tickets related to template configurations must be approved for the corresponding
changes to be incorporated into the template application workflow. Only approved template configurations
are used during template application.
Apply a Template
You can apply a template to devices that are already registered with the management center. Application of
a template on a device clears existing configurations and applies configurations from the template. However,
the threat defense HA failover configurations are not cleared.
Application of a template changes device configurations only on the management center. You must explicitly
deploy these device configuration changes to the threat defense device. You cannot roll back the applied
configuration changes. However, you can apply another template with the required configurations.
Note Any change management tickets related to template configurations must be approved for the corresponding
changes to be incorporated into the template application workflow. Only approved template configurations
are used during template application.
Perform the procedure given below to apply the template on existing devices.
Procedure
Step 1 To apply the template from the Template Management window, choose Devices > Template Management.
a) Click the More ( ) icon next to the template that you want to apply, and click Apply.
b) From the Device dropdown list, choose the Device on which you want to apply the template.
c) Click Confirm to initiate application of template on the device.
Step 2 (Optional) To apply the template from the Associated Devices window, choose Devices > Template
Management.
a) Click the Edit ( ) icon of the template that you want to apply to a device.
b) Click Associated Devices.
c) In the Associated Devices window, click Apply Template.
d) From the Device drop-down list, choose the Device on which you want to apply the template.
e) Enter values for the Variables and Network object overrides fields.
Reapply a Template
If you make any changes to the device or template that results in the configuration being out-of-sync, you can
reapply the template to make the configuration in sync with the template.
Perform the procedure given below to reapply the template on a device.
Procedure
Step 5 On the Reapply template window, you can reuse the autopopulated Variables and Network object overrides
values or enter new values.
Step 6 Click Confirm to initiate reapplication of the template on the device.
The following validation checks are performed at the end of the task to apply the template on the device to
ensure that the applied configurations are valid:
• Interface configuration validation. For example, variables used for the IP address fields of two or more
interfaces must not have the same IP address values.
• Routing policy validation. For example, the IPv4 address in BGP neighbor configurations must not
overlap with the IP address of any interface.
If the validation checks that are done at the end of the task to apply the template on the device fail, any applied
configurations are rolled back and the device is restored to it’s original state.
The table below shows the Sync and Out-of-Sync scenarios that may occur.
No No In Sync
Yes No Out of Sync
No Yes Out of Sync
Yes Yes Out of Sync
There may be some configurations on the template that are not applied to the device due to incompatible
device model or version. The report also contains details about such configurations. The report also contains
any errors that are encountered when the application of the template fails. Application of a template on a
device may fail due to any of the following reasons:
• Model mapping does not exist for the device model that is used.
• Values used for variables and network object overrides do not conform to routing policy or interface
configuration rules. For example, the same IPv4 address has been used for two IPv4 address interface
variables.
• Device or template is locked due to some other task that is being executed, such as application or
modification of the template.
Procedure
If the connectivity parameters on the template do not match with the ones on the device, the template validation
checks that are done to ensure that the template is successfully applied on the device will fail. The template
is then not applied on the device. The template validation checks do not enforce an exact match for some
parameters such as IP address or DDNS hostname. However, ensure that you configure such parameters to
maintain connectivity between the threat defense device and the management center after deployment.
The following is a list of template validation checks done to ensure sanity of configurations that are required
to manage the threat defense device using the data interface:
• You cannot apply a template in which manager access to the device is configured with the management
interface to a device in which manager access to the device is configured with the data interface.
• You cannot apply a template in which manager access to the device is configured with the data interface
to a device in which manager access to the device is configured with the management interface.
• You cannot apply a template in which manager access to the device is configured with the single WAN
data interface to a device in which manager access to the device is configured with the dual WAN data
interface.
• If any of the connectivity parameters do not match, you cannot apply a template in which manager access
to the device is configured with the data interface to a device in which manager access to the device is
configured with the data interface.
Perform the procedure given below to configure the template to manage threat defense devices using the data
interface.
Procedure
Step 2 Click the Edit ( ) icon of the template that you want to configure to manage threat defense devices using
the data interface.
Step 3 Click the Template Settings tab.
Step 4 In the General tile, toggle the Manage device by Data Interface button.
Step 5 You will see a popup asking you to pick a data interface for manager access. Click OK.
Step 6 Click the Interfaces tab.
Step 7 Click the Edit icon of the data interface that you want to use for manager access. The first data interface –
Ethernet1/1 (outside interface), is the data interface that is most commonly used for manager access.
Step 8 In the Edit Physical Interface window, click the Manager Access tab.
Step 9 Check the Enable management access checkbox.
Step 10 Click OK. You will see that the interface that you selected for manager access has been marked with Manager
Access.
Step 11 Click the DHCP tab.
Step 12 Click the DDNS Update Methods tab.
Step 13 Click +Add to add a DDNS update method.
Step 14 In the Add DDNS Update Method window, enter a Method Name and choose FMC only.
Step 15 Set the Update Interval as per your requirement.
Step 16 Click OK. You will see the method that you created in the DDNS Update Methods table.
Step 17 Click the DDNS Interface Settings tab.
Step 18 Click +Add to add dynamic DNS configuration.
Step 19 In the Add Dynamic DNS configuration window, choose values for the following fields:
• Interface – Choose the interface enabled for manager access
• Method Name – Choose the method that you created.
• Host Name – Choose a variable for the hostname.
Step 20 Click OK. The DDNS Interface Settings table is populated with the entry that you created.
Step 21 To configure the model mapping to ensure that the data interface set for manager access in the template
matches the data interface selected for manager access on the device, click the Template Settings tab and
click Model Mapping.
Step 22 Click Add Model Mapping.
Step 23 Choose the Device Model from the drop-down list.
Step 24 Map the date interface that is set for manager access in the template to the appropriate data interface on the
device by choosing the interface from the Model Interface drop-down list.
Step 25 Click Save. The interface mappings are listed along with the device model and mapping status on the Model
Mapping window. You can now apply the template on a device that is managed using the data interface.
Audit Logs
Logs related to application of the device template, configuration updates, device template creation, and deletion,
are logged under audit logs. The device template audit logs are added to the log both at the start and at the
end of the task to apply the template on the device.
An audit diff file is also generated that enables you to view configuration changes that have been done during
application of the template on the device. Perform the procedure given below to view the diff file.
Procedure
A domain hierarchy sample is given below along with a table displaying the supported device template
application and generation scenarios.
Consider the following scenario:
A VPN A A1 Yes
B VPN B A1 No
B VPN B B Yes
A1 VPN A A1 Yes
Consider the following error scenario. In a device template, the inside interface is configured with a static
IPv4 variable - $insideIPv4.
The BGP IPv4 address is configured with an IPv4 BGP neighbor.
An overlapping IPv4 address is configured for the BGP neighbor and an interface.
Due to the issues mentioned above, the application of the device template fails and an error is displayed.
To troubleshoot this error, identify the error from the notification displayed on the UI.
IP Address [Link] same as ip address of interface - 'inside'(Ethernet1/1)
Enter correct values for the variables and apply the template again to ensure successful application of the
template on the device.
Workaround: You can see logs for these errors in the VMS Shared and USM Shared log files. Fix the
errors and initiate registration again.
• Issue: Device provisioning fails in Security Cloud Control due to some generic errors, such as
communication with the device fails
Workaround: Click Retry in the Provision Error to trigger the onboarding in Security Cloud Control
again. You can also see the Security Cloud Control workflows for more information on the error and
troubleshooting information.
3. Check model mappings to ensure if the correct model mappings exist. Delete or add mappings accordingly.
4. See the management center audit logs to find any other issues and resolve them.
Device management 7.6.0 7.4.1 Device templates enable deployment of multiple branch devices with
using device templates pre-provisioned initial device configurations. You can use device templates to
perform bulk zero-touch provisioning of multiple devices, apply day 2
configuration changes to multiple devices with different interface configurations,
and clone configuration parameters from existing devices.
New/modified screens:
• Devices > Device Management > Add > Device (Wizard)
• Devices > Template Management > Add Device Template
• Devices > Template Management > Add Model Mapping
• Devices > Template Management > Edit a template > Template
Settings
• Integration > Cisco Security Cloud
Field Description
Transfer Packets This displays whether or not the managed device sends packet data with the
events to the management center.
Troubleshoot Lets you generate and download troubleshooting files and also see CLI
command output. See Generate Troubleshooting Files, on page 127 and View
CLI Output, on page 130.
Mode The displays the mode of the management interface for the device: routed or
transparent.
Compliance Mode This displays the security certifications compliance for a device. Valid values
are CC, UCAPL and None.
Performance Profile This displays the core allocation performance profile for the device, as
configured in the platform settings policy.
TLS Crypto Acceleration: Shows whether TLS crypto acceleration is enabled or disabled.
Device Configuration Lets you copy, export, or import a configuration. See Copy a Configuration
to Another Device, on page 132 and Export and Import the Device
Configuration, on page 134.
OnBoarding Method Shows whether the device was registered using a registration key or using the
serial number (zero-touch provisioning).
Procedure
Step 5 For Troubleshoot actions, see Generate Troubleshooting Files, on page 127 and View CLI Output, on page
130.
Step 6 For Device Configuration actions, see Copy a Configuration to Another Device, on page 132 and Export and
Import the Device Configuration, on page 134.
Step 7 Click Deploy.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Procedure
b) You are prompted to choose the logs you want to include. For a cluster, under Device, you can choose
All Devices or an individual node. A cluster also has the Cluster Logs available.
c) Click Generate.
Step 5 To download the generated logs, on the General > Troubleshoot section, click Download.
• show version
• show asp drop
• show counters
• show arp
• show int ip brief
• show blocks
• show cpu detailed
• show interface ccl_interface
• ping ccl_ip size ccl_mtu repeat 2
Procedure
The CLI Troubleshoot dialog box appears with the pre-defined CLIs executed.
Step 5 On the CLI Troubleshoot dialog box, you can perform the following tasks.
• Enter a show command in the Command field, and click Execute. The new command output will be
added to the window.
• Click Refresh to re-run the predefined CLIs.
• Click Copy to copy the output to your clipboard.
• For a cluster, choose a different node from the Device drop down list.
• The source and destination threat defense devices are in the same firewall mode - routed or transparent.
• The source and destination threat defense devices are in the same security certifications compliance
mode.
• The source and destination threat defense devices are in the same domain.
• Configuration deployment is not in progress on either the source or the destination threat defense devices.
Procedure
Step 5 (Optional) Check Include shared policies configuration check box to copy policies.
Shared policies like AC policy, NAT, Platform Settings and FlexConfig policies can be shared across multiple
devices.
When the copy device configuration task is initiated, it erases the configuration on the target device and copies
the configuration of the source device to the destination device.
Warning When you have completed the copy device configuration task, you cannot revert the target device to its original
configuration.
Note • Export and import of device configuration between on-prem management center and Cloud-delivered
Firewall Management Center (cdFMC) is not supported for shared policy and device policy.
• Export and import for cdFMC is not supported for drop versions if underlying models are changed for
policy in different drops.
• Export and import of device configuration is supported only if the device UUID, model and version are
same.
You can export all of the the device-specific configuration configurable on the Device pages, including:
• Interfaces
• Inline Sets
• Routing
• DHCP
• VTEP
• Associated objects
You can then import the saved configuration for the same device in the following use cases:
• Moving the device to a different management center—First unregister the device from the original
management center, then add the device to the new management center. Then you can import the saved
configuration.
• Moving the device between domains—When you move a device between domains, some device-specific
configuration is not retained because supporting objects (such as interface groups for security zones) do
not exist in the new domain. By importing the configuration after the domain move, any necessary objects
are created for that domain, and the device configuration is restored.
• Restore an old configuration—If you deployed changes that negatively impacted the operation of the
device, you can import a backup copy of a known working configuration to restore a previous operational
state.
• Reregistering a device—If you unregister a device from the management center, but then want to add it
back, you can import the saved configuration.
Object exists with the Network and Port objects: Create object overrides for this device. See Object
same name but different Overrides, on page 1341.
value.
Interface objects: Create new objects. For example, if both the type (security
zone or interface group) and the interface type (routed or switched, for
example) do not match, then a new object is created.
All other objects: Reuse existing objects even though the values are different.
Procedure
You are prompted to download the package; click Click here to download the package to save the file
locally, and then click OK to exit the dialog box.
Figure 45: Download Package
You are prompted to acknowledge that the current configuration will be replace. Click Yes, and then
navigate to the configuration package (with the suffix .sfo; note that this file is different from the
Backup/Restore files).
Figure 47: Import Package
The Device Configuration Import Reports page provides links to available reports.
Procedure
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Field Description
Shut Down Device ( ) Shuts down the device. See Shut Down or Restart the Device, on page 62.
Restart Device ( ) Restarts the device. See Shut Down or Restart the Device, on page 62.
Model The model name and number for the managed device.
Field Description
Version The version of the software currently installed on the managed device.
Time Zone setting for The current system time of the device, in the time zone specified in device
time-based rules platform settings.
Inventory Link to view the device inventory: Fans, Memory, CPU, Power Supply, Storage,
and Network Modules.
Field Description
Status An icon that represents the current health status of the device. Clicking the
icon displays the Health Monitor for the appliance.
Policy A link to a read-only version of the health policy currently deployed at the
device.
Excluded A link to the Health Exclude page, where you can enable and disable health
exclusion modules.
Field Description
Out of Band Status A link to the Out-of-Band configuration details dialog box where you can
view out-of-band configuration changes made at the device CLI. You must
acknowledge the configuration differences and manually match any changes
you want to keep in the management center before the next deployment. See
Out-of-Band Configuration Detection, on page 141.
Caution You are expected to know the commands that are required for recovery or emergency use. Do not use this
feature to experiment with configuration changes. If you do not know which commands are required or are
unsure about the effect of a command, we recommend that you contact Cisco TAC for guidance.
After the management connection is restored, the management center will detect the configuration changes
on the device. It does not automatically update the device configuration in the management center; you must
view the configuration differences, acknowledge that the device configuration is different, and then manually
make the same changes in the management center before you deploy.
Caution When you deploy after acknowledgment, any configurations not present in the management center configuration
will be overwritten on the device.
Like other diagnostic CLI commands, refer to the ASA command reference for more information about each
command.
Unsupported Features
• Not supported in multi-instance mode.
• You cannot add or delete EtherChannels.
• Some platform-dependent interface commands such as speed, duplex, and shutdown are not supported.
Additional Guidelines
• To modify an existing rule or route, you should delete the existing command using the no form of the
command and then re-add the modified rule. This method avoids conflicts and errors. For example:
Incorrect:
CAUTION: The config CLI is for emergency use only. Use the config CLI if the management
center is
unreachable, and use it only under exceptional circumstances, such as loss of connectivity
or
to restore manager access. Do not change management center's auto-generated
configurations.
After your management center is reachable, manually make the same configuration changes
in the
management center. The management center cannot implement them automatically. When you
deploy
from the management center, out-of-band configuration changes will be overwritten. Also,
node join
will be blocked till config CLI session is active, so make sure to exit from the config
CLI after
changes are made.
Unsaved changes are not kept if you [Link] changes to memory ? [Y]es/[N]o: y
Cryptochecksum: ccfc11a8 4e46d55e 0c99b5ae 3b18a8f1
In this case, a second route is added instead of replacing the first route.
Correct:
CAUTION: The config CLI is for emergency use only. Use the config CLI if the management
center is
unreachable, and use it only under exceptional circumstances, such as loss of connectivity
or
to restore manager access. Do not change management center's auto-generated
configurations.
After your management center is reachable, manually make the same configuration changes
in the
management center. The management center cannot implement them automatically. When you
deploy
from the management center, out-of-band configuration changes will be overwritten. Also,
node join
will be blocked till config CLI session is active, so make sure to exit from the config
CLI after
changes are made.
• If you have auto rollback enabled (see Edit Deployment Settings, on page 195), and you lose management
connectivity because of a deployment, you should not start an out-of-band configuration. Instead, either
wait 20 minutes for auto rollback to the previous deployment to occur or manually roll back at the CLI
using the configure policy rollback command (see Manually Roll Back the Configuration if the
Management Center Loses Connectivity, on page 182). Auto rollback will overwrite out-of-band
configuration changes if the management connection is still down.
• For prefilter rules, we don't recommend adding completely new rules (the access-control advanced
command); integration of prefilter rules with the intrusion policy and logging requires the management
center, which generates the rule ID and integrates it with other policies.
• All recovery-config-mode sessions will be logged in syslog with the username “enable_15”.
Procedure
Step 1 Connect to the device CLI using either the console port or SSH.
See Log Into the Command-Line Interface on the Device, on page 11.
CAUTION: The config CLI is for emergency use only. Use the config CLI if the management
center is
unreachable, and use it only under exceptional circumstances, such as loss of connectivity
or
to restore manager access. Do not change management center's auto-generated configurations.
After your management center is reachable, manually make the same configuration changes
in the
management center. The management center cannot implement them automatically. When you
deploy
from the management center, out-of-band configuration changes will be overwritten. Also,
node join
will be blocked till config CLI session is active, so make sure to exit from the config CLI
after
changes are made.
Example:
firepower(recovery-config)# ?
Step 6 Exit recovery-config mode to be prompted to save your changes. Enter exit to exit each submode until you
return to enable mode.
You can choose to save your changes to the startup configuration or keep changes only in the running
configuration by not saving. Running configuration changes won't be retained after a reboot. If you make
additional changes later and decide to save the configuration, all of your previous changes are also saved,
since the entire running configuration is saved.
Deployment will be blocked while the recovery-config-mode session is open.
Example:
Unsaved changes are not kept if you reboot. Save changes to memory ? [Y]es/[N]o:
Step 7 Return to the threat defense CLI by typing Ctrl+a, then d, or you can enter exit to exit each mode.
Note
If you type Ctrl+a, then d to return to the threat defense CLI without first exiting recovery-config mode, the
recovery-config-mode session will remain open, and deployment will be blocked.
Example:
firepower# exit
Logoff
Procedure
Note
Some commands, when set to a default setting, don't appear in the command output. However, the non-default
command will show on either side as green (added) or red (removed). For example, if you add no shutdown
to an interface in recovery-config mode, the shutdown command will show in red on the left Last-deployed
configuration pane while no shutdown will not appear in the right Configuration on device pane. In this
case, although the default setting for an interface is shutdown, the parser considers no shutdown to be the
default and doesn't show it.
You can open the dialog box from multiple locations. For example, on the Devices > Device Management
page, your device will have a warning. Click View Details.
Or, from the Devices > Device Management > Device > Health tile, you can click View Details.
Figure 56: Health Out-of-Band Status
Note
If the out-of-band notification hasn't yet reached the management center, you can check for changes using
the Out of Band Status > Check Latest Status link.
Step 2 Click Download PDF Report so you can refer to the configuration changes you need to make after you close
the dialog box.
Or you can bring up the dialog box at any time to review the changes.
If you want to prevent an accidental deployment until after you've made your configuration changes, you can
instead make the changes and then come back and click Acknowledge.
Step 5 Make the configuration changes that you made at the CLI.
You'll need to match the configuration CLI to management center screens; there aren't links from the CLI
changes directly to screens.
If you don't want to keep your changes, you can simply deploy and overwrite the device configuration. You
should make all necessary changes to maintain the management connection as well as any other changes you
want to keep. For example, if you changed the IP address at the CLI, you need to go to the Interfaces page,
edit the interface, and set that IP address to match:
Figure 59: Match the IP Address Change
There is no checking mechanism that you made the same change; you could set the IP address differently if
you want.
Step 6 Deploy configuration changes; see Deploy Configuration Changes, on page 251.
After you deploy, you can view the configuration differential—whether you made the changes or not—on
the System ( ) > Monitoring > Audit page. Check for the subsystem called Device > Device Management
> Out of band changes.
Procedure
Disabling management blocks the connection between the management center and the device, but does not
unregister the device from the management center.
Step 5 Edit the Remote Host Address IP address and optional Secondary Address (when using a redundant data
interface) or hostname by clicking Edit ( ).
Figure 61: Edit Management Address
Step 6 In the Management dialog box, modify the name or IP address in the Remote Host Address field and the
optional Secondary Address field, and click Save.
For information about using a secondary manager access data interface, see Configure a Redundant Manager
Access Data Interface, on page 164.
Figure 62: Management IP Address
Procedure
Step 2 Change the device IP address in the management center to the new device IP address.
You will change the IP address on the device later.
For a high-availability pair or cluster, perform these steps on all units.
a) Edit the Remote Host Address IP address and optional Secondary Address (when using a redundant
data interface) or hostname by clicking Edit ( ).
Figure 65: Edit Management Address
b) In the Management dialog box, modify the name or IP address in the Remote Host Address field and
the optional Secondary Address field, and click Save.
Figure 66: Management IP Address
Caution
Be careful when making changes to the management center interface to which you are connected; if you
cannot re-connect because of a configuration error, you need to access the management center console port
to re-configure the network settings in the Linux shell. You must contact Cisco TAC to guide you in this
operation.
Step 5 Change the IP address of the manager access interface at the console port.
For a high-availability pair or cluster, perform these steps on all units.
If you use the dedicated Management interface:
configure network ipv4
configure network ipv6
If you use the dedicated Management interface:
configure network management-data-interface disable
configure network management-data-interface
Step 7 (If using a data interface for manager access) Refresh the data interface settings in the management center.
For a high-availability pair, perform this step on both units.
a) Choose Devices > Device Management > Device > Management > Manager Access - Configuration
Details, and click Refresh.
b) Choose Devices > Device Management > Interfaces, and set the IP address to match the new address.
c) Return to the Manager Access - Configuration Details dialog box, and click Acknowledge to remove
the deployment block.
Step 8 Ensure the management connection is reestablished.
In the management center, check the management connection status on the Devices > Device Management >
Device > Management > Manager Access - Configuration Details > Connection Status page.
At the threat defense CLI, enter the sftunnel-status-brief command to view the management connection
status.
The following status shows a successful connection for a data interface, showing the internal "tap_nlp"
interface.
Step 9 (For a high-availability management center pair) Repeat configuration changes on the secondary management
center.
a) Change the secondary management center IP address.
b) Specify the new peer addresses on both units.
c) Make the secondary unit the active unit.
d) Disable the device management connection.
e) Change the device IP address in the management center.
f) Reenable the management connection.
Procedure
You must now complete the remaining steps in this procedure to enable manager access on the data
interface. The Management area now shows Manager Access Interface: Data Interface, and Manager
Access Details: Configuration.
Figure 70: Manager Access
If you click Configuration, the Manager Access - Configuration Details dialog box opens. The Manager
Access Mode shows a Deploy pending state.
Step 2 Enable manager access on a data interface on the Devices > Device Management > Interfaces > Edit Physical
Interface > Manager Access page.
Check Enable management access and click OK. By default, all networks are allowed, but you can limit
access as long as the management center address is allowed.
If the manager access interface uses a static IP address, you are reminded to configure routing for it.
Click Save on the Interfaces page. See Configure Routed Mode Interfaces, on page 846 for more information
about interface settings. You can enable manager access on one routed data interface, plus an optional secondary
interface. Make sure these interfaces are fully configured with a name and IP address and that they are enabled.
If you use a secondary interface for redundancy, see Configure a Redundant Manager Access Data Interface,
on page 164 for additional required configuration.
Step 3 (Optional) If you use DHCP for the interface, enable the web type DDNS method on the Devices > Device
Management > DHCP > DDNS page.
See Configure Dynamic DNS, on page 909. DDNS ensures the management center can reach the threat defense
at its Fully-Qualified Domain Name (FQDN) if the FTD's IP address changes.
Step 4 Make sure the threat defense can route to the management center through the data interface; add a static route
if necessary on Devices > Device Management > Routing > Static Route.
See Add a Static Route, on page 1142.
Step 5 (Optional) Configure DNS in a Platform Settings policy, and apply it to this device at Devices > Platform
Settings > DNS.
See DNS, on page 939. DNS is required if you use DDNS. You may also use DNS for FQDNs in your security
policies.
Step 6 (Optional) Enable SSH for the data interface in a Platform Settings policy, and apply it to this device at
Devices > Platform Settings > Secure Shell.
See SSH Access, on page 954. SSH is not enabled by default on the data interfaces, so if you want to manage
the threat defense using SSH, you need to explicitly allow it.
Step 7 Deploy configuration changes; see Deploy Configuration Changes, on page 251.
You will see a validation error to confirm that you are changing the manager access interface. Check Ignore
warnings and deploy again.
The management center will deploy the configuration changes over the current Management interface. After
the deployment, the data interface is now ready for use, but the original management connection to Management
is still active.
Step 8 At the threat defense CLI (preferably from the console port), set the Management interface to use a static IP
address and set the gateway to use the data interfaces. For high availability, perform this step on both units.
configure network {ipv4 | ipv6} manual ip_address netmask data-interfaces
• ip_address netmask—Although you do not plan to use the Management interface, you must set a static
IP address, for example, a private address so that you can set the gateway to data-interfaces (see the
next bullet). You cannot use DHCP because the default route, which must be data-interfaces, might be
overwritten with one received from the DHCP server.
• data-interfaces—This setting forwards management traffic over the backplane so it can be routed through
the manager access data interface.
We recommend that you use the console port instead of an SSH connection because when you change the
Management interface network settings, your SSH session will be disconnected.
Step 9 If necessary, re-cable the threat defense so it can reach the management center on the data interface. For high
availability, perform this step on both units.
Step 10 In the management center, disable the management connection, update the Remote Host Address IP address
and optional Secondary Address for the threat defense in the Devices > Device Management > Device >
Management section, and reenable the connection.
See Update the Hostname or IP Address in the Management Center, on page 150. If you used the threat defense
hostname or just the NAT ID when you added the threat defense to the management center, you do not need
to update the value; however, you need to disable and reenable the management connection to restart the
connection.
The following status shows a successful connection for a data interface, showing the internal "tap_nlp"
interface.
Figure 71: Connection Status
If it takes more than 10 minutes to reestablish the connection, you should troubleshoot the connection. See
Troubleshoot Management Connectivity on a Data Interface, on page 184.
Procedure
c) Click Save.
Step 2 Disable manager access on the data interface(s) on the Devices > Device Management > Interfaces > Edit
Physical Interface > Manager Access page.
Uncheck Enable management access and click OK. Click Save on the Interfaces page. This step removes
the block on deployment.
Step 3 If you have not already done so, configure DNS settings for the data interface in a Platform Setting policy,
and apply it to this device at Devices > Platform Settings > DNS.
See DNS, on page 939. The management center deployment that disables manager access on the data interface
will remove any local DNS configuration. If that DNS server is used in any security policy, such as an FQDN
in an Access Rule, then you must re-apply the DNS configuration using the management center.
Step 4 Deploy configuration changes; see Deploy Configuration Changes, on page 251.
The management center will deploy the configuration changes over the current data interface.
Step 5 If necessary, re-cable the threat defense so it can reach the management center on the Management interface.
For High Availability, perform this step on both units.
Step 6 At the threat defense CLI, configure the Management interface IP address and gateway using a static IP address
or DHCP. For high availability, perform this step on both units.
When you originally configured the data interface for manager access, the Management gateway was set to
data-interfaces, which forwarded management traffic over the backplane so it could be routed through the
manager access data interface. You now need to set an IP address for the gateway on the management network.
Static IP address:
configure network {ipv4 | ipv6} manual ip_address netmask gateway_ip
DHCP:
configure network{ipv4 | ipv6} dhcp
Step 7 In the management center, disable the management connection, update the Remote Host Address IP address
and optional Secondary Address for the threat defense in the Devices > Device Management > Device >
Management section, and reenable the connection.
See Update the Hostname or IP Address in the Management Center, on page 150. If you used the threat defense
hostname or just the NAT ID when you added the threat defense to the management center, you do not need
to update the value; however, you need to disable and reenable the management connection to restart the
connection.
Procedure
Step 1 On the Devices > Device Management page, click Edit ( ) for the device.
Step 2 Enable manager access for the secondary interface.
This setting is in addition to standard interface settings such as enabling the interface, setting the name, setting
the security zone, and setting a static IPv4 address.
a) Choose Interfaces > Edit Physical Interface > Manager Access.
b) Check Enable management on this interface for the Manager.
c) Click OK.
Both interfaces show (Manager Access) in the interface listing.
Figure 74: Interface Listing
c) In the Management dialog box, modify the name or IP address in the Secondary Address field
Figure 76: Management IP Address
d) Click Save.
Step 4 Create an ECMP zone with both interfaces.
a) Click Routing.
b) From the virtual router drop-down, choose the virtual router in which the primary and secondary interfaces
reside.
c) Click ECMP, and then click Add.
d) Enter a Name for the ECMP zone.
e) Select the primary and secondary interfaces under the Available Interfaces box, and then click Add.
h) Click Save, then choose the SLA object you just created in the Route Tracking drop-down list.
i) Click OK, and then Save.
j) Repeat for the default route for the other management interface.
Step 6 Deploy configuration changes; see Deploy Configuration Changes, on page 251.
As part of the deployment for this feature, the management center enables the secondary interface for
management traffic, including auto-generated policy-based routing configuration for management traffic to
get to the right data interface. The management center also deploys a second instance of the configure network
management-data-interface command. Note that if you edit the secondary interface at the CLI, you cannot
configure the gateway or otherwise alter the default route, because the static route for this interface can only
be edited in the management center.
To remove the block, you must go to the Manager Access - Configuration Details dialog box and click
Acknowledge. The next time you deploy, the management center configuration will overwrite any remaining
conflicting settings on the threat defense. It is your responsibility to manually fix the configuration in the
management center before you re-deploy.
See the following pages on this dialog box.
Configuration
View the configuration comparison of the manager access data interface on the management center and the
threat defense.
The following example shows the configuration details of the threat defense where the configure network
management-data-interface command was entered on the threat defense. The pink highlights show that if
you Acknowledge the differences but do not match the configuration in the management center, then the
threat defense configuration will be removed. The blue highlights show configurations that will be modified
on the threat defense. The green highlights show configurations that will be added to the threat defense.
The following example shows this page after configuring the interface in the management center; the interface
settings match, and the pink highlight was removed.
CLI Output
View the CLI configuration of the manager access data interface, which is useful if you are familiar with the
underlying CLI.
Figure 80: CLI Output
Connection Status
View management connection status. The following example shows that the management connection is still
using the Management "management0" interface.
The following status shows a successful connection for a data interface, showing the internal "tap_nlp"
interface.
Figure 82: Connection Status
See the following sample output for a connection that is down; there is no peer channel "connected to"
information, nor heartbeat information shown:
> sftunnel-status-brief
PEER:[Link]
Registration: Completed.
Connection to peer '[Link]' Attempted at Mon Jun 15 [Link] 2020 UTC
Last disconnect time : Mon Jun 15 [Link] 2020 UTC
Last disconnect reason : Both control and event channel connections with peer went down
See the following sample output for a connection that is up, with peer channel and heartbeat information
shown:
> sftunnel-status-brief
PEER:[Link]
Peer channel Channel-A is valid type (CONTROL), using 'eth0', connected to '[Link]'
via '[Link]'
Peer channel Channel-B is valid type (EVENT), using 'eth0', connected to '[Link]' via
'[Link]'
Registration: Completed.
IPv4 Connection to peer '[Link]' Start Time: Wed Jun 10 [Link] 2020 UTC
Heartbeat Send Time: Mon Jun 15 [Link] 2020 UTC
Heartbeat Received Time: Mon Jun 15 [Link] 2020 UTC
Note This topic applies to the dedicated Management interface. You can alternatively configure a data interface
for management. If you want to change network settings for that interface, you should do so within management
center and not at the CLI. If you need to troubleshoot a disrupted management connection, and need to make
changes directly on the threat defense, see Modify the Threat Defense Data Interface Used for Management
at the CLI, on page 179.
For information about the threat defense CLI, see the Cisco Secure Firewall Threat Defense Command
Reference.
Note When using SSH, be careful when making changes to the management interface; if you cannot re-connect
because of a configuration error, you will need to access the device console port.
Note If you change the device management IP address, then see the following tasks for management center
connectivity depending on how you identified the management center during initial device setup using the
configure manager add command (see Register With a New Management Center, on page 58):
• IP address—No action. If you identified the management center using a reachable IP address, then the
management connection will be reestablished automatically after several minutes. We recommend that
you also change the device IP address shown in management center to keep the information in sync; see
Update the Hostname or IP Address in the Management Center, on page 150. This action can help the
connection reestablish faster. Note: If you specified an unreachable management center IP address, then
see the procedure for NAT ID below.
• NAT ID only—Manually reestablish the connection. If you identified the management center using
only the NAT ID, then the connection cannot be automatically reestablished. In this case, change the
device management IP address in management center according to Update the Hostname or IP Address
in the Management Center, on page 150.
Note In a High Availability management center configuration, when you modify the management IP address from
the device CLI or from the management center, the secondary management center does not reflect the changes
even after an HA synchronization. To ensure that the secondary management center is also updated, switch
roles between the two management centers, making the secondary management center the active unit. Modify
the management IP address of the registered device on the device management page of the now active
management center.
Procedure
Step 1 Connect to the device CLI, either from the console port or using SSH.
See Log Into the Command-Line Interface on the Device, on page 11.
Step 2 Log in with the Admin username and password.
Step 3 (Firepower 4100/9300/Secure Firewall 4200 only) Enable the second management interface as an event-only
interface.
configure network management-interface enable management1
configure network management-interface disable-management-channel management1
You always need a management interface for management traffic. If your device has a second management
interface, you can enable it for event-only traffic.
You can optionally disable events for the main management interface using the configure network
management-interface disable-events-channel command. In either case, the device will try to send events
on the event-only interface, and if that interface is down, it will send events on the management interface even
if you disable the event channel.
You cannot disable both event and management channels on an interface.
To use a separate event interface, you also need to enable an event interface on the management center. See
the Cisco Secure Firewall Management Center Administration Guide.
Example:
>
Step 4 Configure the IP address of the management interface and/or event interface:
If you do not specify the management_interface argument, then you change the network settings for the default
management interface. When configuring an event interface, be sure to specify the management_interface
argument. The event interface can be on a separate network from the management interface, or on the same
network. If you are connected to the interface you are configuring, you will be disconnected. You can re-connect
to the new IP address.
a) Configure the IPv4 address:
• Manual configuration:
configure network ipv4 manual ip_address netmask gateway_ip [management_interface]
Note that the gateway_ip in this command is used to create the default route for the device. If you
configure an event-only interface, then you must enter the gateway_ip as part of the command;
however, this entry just configures the default route to the value you specify and does not create a
separate static route for the eventing interface. If you are using an event-only interface on a different
network from the management interface, we recommend that you set the gateway_ip for use with
the management interface, and then create a static route separately for the event-only interface using
the configure network static-routes command.
Example:
>
>
• Manual configuration:
configure network ipv6 manual ip6_address ip6_prefix_length [ip6_gateway_ip]
[management_interface]
Note that the ipv6_gateway_ip in this command is used to create the default route for the device. If
you configure an event-only interface, then you must enter the ipv6_gateway_ip as part of the
command; however, this entry just configures the default route to the value you specify and does not
create a separate static route for the eventing interface. If you are using an event-only interface on a
different network from the management interface, we recommend that you set the ipv6_gateway_ip
for use with the management interface, and then create a static route separately for the event-only
interface using the configure network static-routes command.
Example:
>
Step 5 For IPv6, enable or disable ICMPv6 Echo Replies and Destination Unreachable messages. These messages
are enabled by default.
configure network ipv6 destination-unreachable {enable | disable}
configure network ipv6 echo-reply {enable | disable}
You might want to disable these packets to guard against potential denial of service attacks. Disabling Echo
Reply packets means you cannot use IPv6 ping to the device management interfaces for testing purposes.
Example:
Step 6 Enable a DHCP server on the default management interface to provide IP addresses to connected hosts:
configure network ipv4 dhcp-server-enable start_ip_address end_ip_address
Example:
>
You can only configure a DHCP server when you set the management interface IP address manually. This
command is not supported on the management center virtual. To display the status of the DHCP server, enter
show network-dhcp-server:
Step 7 Add a static route for the event-only interface if the management center is on a remote network; otherwise,
all traffic will match the default route through the management interface.
configure network static-routes {ipv4 | ipv6}add management_interface destination_ip netmask_or_prefix
gateway_ip
For the default route, do not use this command; you can only change the default route gateway IP address
when you use the configure network ipv4 or ipv6 commands (see Step 4, on page 174).
Example:
> configure network static-routes ipv4 add management1 [Link] [Link] [Link]
Configuration updated successfully
>
To display static routes, enter show network-static-routes (the default route is not shown):
Set the search domain(s) for the device, separated by commas. These domains are added to hostnames when
you do not specify a fully-qualified domain name in a command, for example, ping system. The domains are
used only on the management interface, or for commands that go through the management interface.
Step 11 Set the remote management port for communication with the management center:
The management center and managed devices communicate using a two-way, TLS-1.3-encrypted
communication channel, which by default is on port 8305.
Note
Cisco strongly recommends that you keep the default settings for the remote management port, but if the
management port conflicts with other communications on your network, you can choose a different port. If
you change the management port, you must change it for all devices in your deployment that need to
communicate with each other.
Step 12 (Threat Defense only) Set the management or eventing interface MTU. The MTU is 1500 bytes by default.
configure network mtu [bytes] [interface_id]
• bytes—Sets the MTU in bytes. For the management interface, the value can be between 64 and 1500 if
you enable IPv4, and 1280 to 1500 if you enable IPv6. For the eventing interface, the value can be
between 64 and 9000 if you enable IPv4, and 1280 to 9000 if you enable IPv6. If you enable both IPv4
and IPv6, then the minimum is 1280. If you do not enter the bytes, you are prompted for a value.
• interface_id—Specifies the interface ID on which to set the MTU. Use the show network command to
see available interface IDs, for example management0, management1, br1, and eth0, depending on the
platform. If you do not specify an interface, then the management interface is used.
Example:
> configure network mtu 8192 management1
MTU set successfully to 1500 from 8192 for management1
Refreshing Network Config...
NetworkSettings::refreshNetworkConfig MTU value at start 8192
Step 13 Configure an HTTP proxy. The device is configured to directly-connect to the internet on ports TCP/443
(HTTPS) and TCP/80 (HTTP). You can use a proxy server, to which you can authenticate via HTTP Digest.
After issuing the command, you are prompted for the HTTP proxy address and port, whether proxy
authentication is required, and if it is required, the proxy username, proxy password, and confirmation of the
proxy password.
Note
For proxy password on threat defense, you can use A-Z, a-z, and 0-9 characters only.
configure network http-proxy
Example:
Step 14 If you change the device management IP address, then see the following tasks for management center
connectivity depending on how you identified the management center during initial device setup using the
configure manager add command (see Register With a New Management Center, on page 58):
• IP address—No action. If you identified the management center using a reachable IP address, then the
management connection will be reestablished automatically after several minutes. We recommend that
you also change the device IP address shown in management center to keep the information in sync; see
Update the Hostname or IP Address in the Management Center, on page 150. This action can help the
connection reestablish faster. Note: If you specified an unreachable management center IP address, then
you must manually reestablish the connection using Update the Hostname or IP Address in the
Management Center, on page 150.
• NAT ID only—Manually reestablish the connection. If you identified the management center using
only the NAT ID, then the connection cannot be automatically reestablished. In this case, change the
device management IP address in management center according to Update the Hostname or IP Address
in the Management Center, on page 150.
Modify the Threat Defense Data Interface Used for Management at the CLI
If the management connection between the threat defense and the management center was disrupted, and you
want to specify a new data interface to replace the old interface, use the threat defense CLI to configure the
new interface. This procedure assumes you want to replace the old interface with a new interface on the same
network. If the management connection is active, then you should make any changes to an existing data
interface using the management center. For initial setup of the data management interface, see the configure
network management-data-interface command in Complete the Threat Defense Initial Configuration Using
the CLI, on page 19.
For high-availability pairs, perform all CLI steps on both units. Within the management center, perform steps
only on the active unit. Once the configuration changes are deployed, the standby unit synchronizes
configuration and other state information from the active unit.
Note This topic applies to the data interface that you configured for Management, not the dedicated Management
interface. If you want to change network settings for the Management interface, see Modify Threat Defense
Management Interfaces at the CLI, on page 173.
For information about the threat defense CLI, see the Cisco Secure Firewall Threat Defense Command
Reference.
Procedure
Step 1 If you are changing the data management interface to a new interface, move the current interface cable to the
new interface.
Step 2 Connect to the device CLI.
You should use the console port when using these commands. If you are performing initial setup, then you
may be disconnected from the Management interface. If you are editing the configuration due to a disrupted
management connection, and you have SSH access to the dedicated Management interface, then you can use
that SSH connection.
See Log Into the Command-Line Interface on the Device, on page 11.
Configuration disable was successful, please update the default route to point to a gateway
on management interface using the command 'configure network'
Configuration done with option to allow manager access from any network, if you wish to
change the manager access network
use the 'client' option in the command 'configure network management-data-interface'.
>
Step 6 (Optional) Limit data interface access to the management center on a specific network.
configure network management-data-interface client ip_address netmask
By default, all networks are allowed.
Step 7 The connection will be reestablished automatically, but disabling and reenabling the connection in the
management center will help the connection reestablish faster. See Update the Hostname or IP Address in the
Management Center, on page 150.
Step 8 Check that the management connection was reestablished.
sftunnel-status-brief
See the following sample output for a connection that is up, with peer channel and heartbeat information
shown:
> sftunnel-status-brief
PEER:[Link]
Peer channel Channel-A is valid type (CONTROL), using 'eth0', connected to '[Link]'
via '[Link]'
Peer channel Channel-B is valid type (EVENT), using 'eth0', connected to '[Link]' via
'[Link]'
Registration: Completed.
IPv4 Connection to peer '[Link]' Start Time: Wed Jun 10 [Link] 2020 UTC
Heartbeat Send Time: Mon Jun 15 [Link] 2020 UTC
Heartbeat Received Time: Mon Jun 15 [Link] 2020 UTC
Step 9 In the management center, choose Devices > Device Management > Device > Management > Manager
Access - Configuration Details, and click Refresh.
The management center detects the interface and default route configuration changes, and blocks deployment
to the threat defense. When you change the data interface settings locally on the device, you must reconcile
those changes in the management center manually. You can view the discrepancies between the management
center and the threat defense on the Configuration tab.
Step 10 Choose Devices > Device Management > Interfaces, and make the following changes.
a) Remove the IP address and name from the old data management interface, and disable manager access
for this interface.
b) Configure the new data management interface with the settings of the old interface (the ones you used at
the CLI), and enable manager access for it.
Step 11 Choose Devices > Device Management > Routing > Static Route and change the default route from the old
data management interface to the new one.
Step 12 Return to the Manager Access - Configuration Details dialog box, and click Acknowledge to remove the
deployment block.
The next time you deploy, the management center configuration will overwrite any remaining conflicting
settings on the threat defense. It is your responsibility to manually fix the configuration in the management
center before you re-deploy.
You will see expected messages of "Config was cleared” and “Manager access changed and acknowledged.”
Procedure
Step 1 At the threat defense CLI, view the management center identifier.
show managers
Example:
Step 2 At the threat defense CLI, edit the management center IP address or hostname.
configure manager edit identifier {hostname {ip_address | hostname} | displayname display_name}
If the management center was originally identified by DONTRESOLVE and a NAT ID, you can change the
value to a hostname or IP address using this command. You cannot change an IP address or hostname to
DONTRESOLVE.
The management connection will go down, and then reestablish. You can monitor the state of the connection
using the sftunnel-status command.
Example:
Alternatively, you can enable auto rollback of the configuration if you lose connectivity after a deployment;
see Edit Deployment Settings, on page 195.
See the following guidelines:
• Only the previous deployment is available locally on the threat defense; you cannot roll back to any
earlier deployments.
• Rollback is supported for high availability but not supported for clustering deployments.
• The rollback only affects configurations that you can set in the management center. For example, the
rollback does not affect any local configuration related to the dedicated Management interface, which
you can only configure at the threat defense CLI. Note that if you changed data interface settings after
the last management center deployment using the configure network management-data-interface
command, and then you use the rollback command, those settings will not be preserved; they will roll
back to the last-deployed management center settings.
• UCAPL/CC mode cannot be rolled back.
• Out-of-band SCEP certificate data that was updated during the previous deployment cannot be rolled
back.
• During the rollback, connections will drop because the current configuration will be cleared.
Procedure
Step 1 At the threat defense CLI, roll back to the previous configuration.
configure policy rollback
After the rollback, the threat defense notifies the management center that the rollback was completed
successfully. In the management center, the deployment screen will show a banner stating that the configuration
was rolled back.
Note
If the rollback failed and the management center management is restored, refer to [Link]
en/us/support/docs/security/firepower-ngfw-virtual/[Link]
for common deployment problems. In some cases, the rollback can fail after the management center management
access is restored; in this case, you can resolve the management center configuration issues, and redeploy
from the management center.
Example:
For the threat defense that uses a data interface for manager access:
The last deployment to this FTD was on June 1, 2020 and its status was Successful.
Do you want to continue [Y/N]?
Rolling back complete configuration on the FTD. This will take time.
.....................
Policy rollback was successful on the FTD.
Configuration has been reverted back to transaction id:
> sftunnel-status-brief
PEER:[Link]
Registration: Completed.
Connection to peer '[Link]' Attempted at Mon Jun 15 [Link] 2020 UTC
Last disconnect time : Mon Jun 15 [Link] 2020 UTC
Last disconnect reason : Both control and event channel connections with peer went down
See the following sample output for a connection that is up, with peer channel and heartbeat information
shown:
> sftunnel-status-brief
PEER:[Link]
Peer channel Channel-A is valid type (CONTROL), using 'eth0', connected to '[Link]'
via '[Link]'
Peer channel Channel-B is valid type (EVENT), using 'eth0', connected to '[Link]'
via '[Link]'
Registration: Completed.
IPv4 Connection to peer '[Link]' Start Time: Wed Jun 10 [Link] 2020 UTC
Heartbeat Send Time: Mon Jun 15 [Link] 2020 UTC
Heartbeat Received Time: Mon Jun 15 [Link] 2020 UTC
Check that the threat defense registered with the management center
At the threat defense CLI, check that the management center registration was completed. Note that this
command will not show the current status of the management connection.
show managers
>
show nat
If the update failed, use the debug http and debug ssl commands. For certificate validation failures,
check that the root certificates are installed on the device:
show crypto ca certificates trustpoint_name
To check the DDNS operation:
show ddns update interface fmc_access_ifc_name
IP addresses : [Link]
For policies with links, you can click the link to view the policy.
For the Access Control Policy, view the Access Policy Information for Troubleshooting dialog box by
clicking the Exclamation ( ) icon. This dialog box shows how access rules are expanded into access control
entries (ACEs).
Figure 85: Access Policy Information for Troubleshooting
You can assign policies to an individual device from the Device Management page.
Procedure
Step 5 For each policy type, choose a policy from the drop-down menu. Only existing policies are listed.
Step 6 Click Save.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Field Description
Field Description
Object Group Search The state of object group search on the device. While operating, the FTD
device expands access control rules into multiple access control list entries
based on the contents of any network or interface objects used in the access
rule. You can reduce the memory required to search access control rules
by enabling object group search. With object group search enabled, the
system does not expand network or interface objects, but instead searches
access rules for matches based on those group definitions. Object group
search does not impact how your access rules are defined or how they appear
in Firepower Management Center. It impacts only how the device interprets
and processes them while matching connections to access control rules.
Note
By default, the Object Group Search is enabled when you add threat
defense for the first time in the management center.
Interface Object Optimization The state of interface object optimization on the device. During deployment,
interface groups and security zones used in the access control and prefilter
policies generate separate rules for each source/destination interface pair.
If you enable interface object optimization, the system will instead deploy
a single rule per access control/prefilter rule, which can simplify the device
configuration and improve deployment performance. If you select this
option, also select the Object Group Search option to reduce memory
usage on the device.
The following topics explain how to edit the advanced device settings.
Note For information about the Transfer Packets setting, see Edit General Settings, on page 125.
Caution AAB activation partially restarts the Snort process, which temporarily interrupts the inspection of a few
packets. Whether traffic drops during this interruption or passes without further inspection depends on how
the target device handles traffic. See Snort Restart Traffic Behavior, on page 246 for more information.
The feature functions with any deployment; however, it is most valuable in inline deployments.
Typically, you use Rule Latency Thresholding in the intrusion policy to fast-path packets after the latency
threshold value is exceeded. Rule Latency Thresholding does not shut down the engine or generate
troubleshooting data.
If detection is bypassed, the device generates a health monitoring alert.
By default the AAB is disabled; to enable AAB follow the steps described.
Procedure
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Note If you enable object group search and then configure and operate the device for a while, be aware that
subsequently disabling the feature might lead to undesirable results. When you disable object group search,
your existing access control rules will be expanded in the device’s running configuration. If the expansion
requires more memory than is available on the device, your device can be left in an inconsistent state and you
might see a performance impact. If your device is operating normally, you should not disable object group
search once you have enabled it.
Procedure
Interface object optimization is disabled by default. You can enable it on one device at a time; you cannot
enable it globally.
Note If you disable interface object optimization, your existing access control rules will be deployed without using
interface objects, which might make deployment take longer. In addition, if object group search is enabled,
its benefits will not apply to interface objects, and you might see expansion in the access control rules in the
device’s running configuration. If the expansion requires more memory than is available on the device, your
device can be left in an inconsistent state and you might see a performance impact.
Procedure
Field Description
Connectivity Monitor Interval (in Shows the amount of time to wait before rolling back the configuration.
Minutes)
You can set deployment settings from the Device Management page. Deployment settings include enabling
auto rollback of the deployment if the management connection fails as a result of the deployment; specifically
if you use data for management center access, and then you misconfigure the data interface. You can
alternatively manually roll back the configuration using the configure policy rollback command (see Manually
Roll Back the Configuration if the Management Center Loses Connectivity, on page 182).
See the following guidelines:
• Only the previous deployment is available locally on the threat defense; you cannot roll back to any
earlier deployments.
• Rollback is supported for high availability but not supported for clustering deployments.
• The rollback only affects configurations that you can set in the management center. For example, the
rollback does not affect any local configuration related to the dedicated Management interface, which
you can only configure at the threat defense CLI. Note that if you changed data interface settings after
the last management center deployment using the configure network management-data-interface
command, and then you use the rollback command, those settings will not be preserved; they will roll
back to the last-deployed management center settings.
• UCAPL/CC mode cannot be rolled back.
• Out-of-band SCEP certificate data that was updated during the previous deployment cannot be rolled
back.
• During the rollback, connections will drop because the current configuration will be cleared.
Procedure
Step 5 Check Auto Rollback Deployment if Connectivity Fails to enable auto rollback.
Step 6 Set the Connectivity Monitor Interval (in Minutes) to set the amount of time to wait before rolling back
the configuration. The default is 20 minutes.
Step 7 If a rollback occurs, see the following for next steps.
• If the auto rollback was successful, you see a success message instructing you to do a full deployment.
• You can also go to the Deploy > Advanced Deploy screen and click the Preview ( ) icon to view the
parts of the configuration that were rolled back (see Deploy Configuration Changes, on page 251). Click
Show Rollback Changes to view the changes, and Hide Rollback Changes to hide the changes.
Figure 89: Rollback Changes
• In the Deployment History Preview, you can view the rollback changes. See View Deployment History,
on page 259.
Field Description
Timeouts
Hold Time Between .3 and 45 seconds; The default is 3 seconds. To determine node system
health, the cluster nodes send heartbeat messages on the cluster control link
to other nodes. If a node does not receive any heartbeat messages from a peer
node within the hold time period, the peer node is considered unresponsive or
dead.
Interface Debounce Time Between 300 and 9000 ms. The default is 500 ms. The interface debounce time
is the amount of time before the node considers an interface to be failed, and
the node is removed from the cluster.
Field Description
Monitored Interfaces The interface health check monitors for link failures. If all physical ports for
a given logical interface fail on a particular node, but there are active ports
under the same logical interface on other nodes, then the node is removed from
the cluster. The amount of time before the node removes a member from the
cluster depends on the type of interface and whether the node is an established
node or is joining the cluster.
Service Application Shows whether the Snort and disk-full processes are monitored.
Auto-Rejoin Settings
Cluster Interface Shows the auto-rejoin settings after a cluster control link failure.
Attempts Between -1 and 65535. The default is -1 (unlimited). Sets the number of rejoin
attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 1x the interval duration. Defines if the interval
duration increases at each attempt.
Data Interfaces Shows the auto-rejoin settings after a data interface failure.
Attempts Between -1 and 65535. The default is 3. Sets the number of rejoin attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 2x the interval duration. Defines if the interval
duration increases at each attempt.
System Shows the auto-rejoin settings after internal errors. Internal failures include:
application sync timeout; inconsistent application statuses; and so on.
Attempts Between -1 and 65535. The default is 3. Sets the number of rejoin attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 2x the interval duration. Defines if the interval
duration increases at each attempt.
Note If you disable the system health check, fields that do not apply when the system health check is disabled will
not show.
You can monitor any port-channel ID, single physical interface ID, as well as the Snort and disk-full processes.
Health monitoring is not performed on VLAN subinterfaces or virtual interfaces such as VNIs or BVIs. You
cannot configure monitoring for the cluster control link; it is always monitored.
Procedure
When any topology changes occur (such as adding or removing a data interface, enabling or disabling an
interface on the node or the switch, or adding an additional switch to form a VSS or vPC or VNet) you should
disable the system health check feature and also disable interface monitoring for the disabled interfaces. When
the topology change is complete, and the configuration change is synced to all nodes, you can re-enable the
system health check feature and monitored interfaces.
Step 7 Customize the auto-rejoin cluster settings after a health check failure.
Figure 92: Configure Auto-Rejoin Settings
Set the following values for the Cluster Interface, Data Interface, and System (internal failures include:
application sync timeout; inconsistent application statuses; and so on):
• Attempts—Sets the number of rejoin attempts, between -1 and 65535. 0 disables auto-rejoining. The
default for the Cluster Interface is -1 (unlimited). The default for the Data Interface and System is 3.
• Interval Between Attempts—Defines the interval duration in minutes between rejoin attempts, between
2 and 60. The default value is 5 minutes. The maximum total time that the node attempts to rejoin the
cluster is limited to 14400 minutes (10 days) from the time of last failure.
• Interval Variation—Defines if the interval duration increases. Set the value between 1 and 3: 1 (no
change); 2 (2 x the previous duration), or 3 (3 x the previous duration). For example, if you set the interval
duration to 5 minutes, and set the variation to 2, then the first attempt is after 5 minutes; the 2nd attempt
is 10 minutes (2 x 5); the 3rd attempt 20 minutes (2 x 10), and so on. The default value is 1 for the Cluster
Interface and 2 for the Data Interface and System.
Step 8 Configure monitored interfaces by moving interfaces in the Monitored Interfaces or Unmonitored Interfaces
window. You can also check or uncheck Enable Service Application Monitoring to enable or disable
monitoring of the Snort and disk-full processes.
The interface health check monitors for link failures. If all physical ports for a given logical interface fail on
a particular node, but there are active ports under the same logical interface on other nodes, then the node is
removed from the cluster. The amount of time before the node removes a member from the cluster depends
on the type of interface and whether the node is an established node or is joining the cluster. Health check is
enabled by default for all interfaces and for the Snort and disk-full processes.
You might want to disable health monitoring of non-essential interfaces.
When any topology changes occur (such as adding or removing a data interface, enabling or disabling an
interface on the node or the switch, or adding an additional switch to form a VSS or vPC or VNet) you should
disable the system health check feature and also disable interface monitoring for the disabled interfaces. When
the topology change is complete, and the configuration change is synced to all nodes, you can re-enable the
system health check feature and monitored interfaces.
Recovery-config mode 7.7.0 7.7.0 If you lose the management connection to your device, you can make select
for emergency on-device configuration changes directly at the device CLI to:
configuration and
• Restore the management connection if you are using a data interface for
out-of-band configuration
manager access
detection on the
management center • Make select policy changes that can't wait until the connection is restored
High availability is 7.7.0 7.7.0 You can now use redundant manager access data interfaces with high
supported with redundant availability.
manager access data
interfaces
View CLI output for a 7.4.1 Any You can view a set of pre-defined CLI outputs that can help you troubleshoot
device or device cluster. the device or cluster. You can also enter any show command and see the output.
New/modified screens: Devices > Device Management > Cluster > General
Troubleshooting file 7.4.1 7.4.1 You can generate and download troubleshooting files for each device on the
generation and download Device page and also for all cluster nodes on the Cluster page. For a cluster,
available from Device you can download all files as a single compressed file. You can also include
and Cluster pages. cluster logs for the cluster for cluster nodes. You can alternatively trigger file
generation from the Devices > Device Management > More( ) > Troubleshoot
Files menu.
New/modified screens:
• Devices > Device Management > Device > General
• Devices > Device Management > Cluster > General
Cluster health monitor 7.3.0 Any You can now edit cluster health monitor settings.
settings.
New/modified screens: Devices > Device Management > Cluster > Cluster
Health Monitor Settings
Note
If you previously configured these settings using FlexConfig, be sure to remove
the FlexConfig configuration before you deploy. Otherwise the FlexConfig
configuration will overwrite the management center configuration.
Redundant manager 7.3.0 7.3.0 When you use a data interface for manager access, you can configure a
access data interface. secondary data interface to take over management functions if the primary
interface goes down. The device uses SLA monitoring to track the viability of
the static routes and an ECMP zone that contains both interfaces so management
traffic can use both interfaces.
New/modified screens:
• Devices > Device Management > Device > Management
• Devices > Device Management > Device > Interfaces > Manager
Access
Policy rollback support 7.2.0 7.2.0 The configure policy rollback command is supported for high availability
for high availability devices.
devices.
Auto rollback of a 7.2.0 7.2.0 You can now enable auto rollback of the configuration if a deployment causes
deployment that causes a the management connection between the management center and the threat
loss of management defense to go down. Previously, you could only manually rollback a
connectivity. configuration using the configure policy rollback command.
New/modified screens:
• Devices > Device Management > Device > Deployment Settings
• Deploy > Advanced Deploy > Preview
• Deploy > Deployment History > Preview
Object group search is 7.2.0 7.2.0 The Object Group Search setting is enabled by default for managed devices
enabled by default for starting with Version 7.2.0. This option is in the Advanced Settings section
access control rules. when editing device settings on the Device Management page.
Import and export device 7.1.0 7.1.0 You can export the device-specific configuration, and you can then import the
configurations. saved configuration for the same device in the following use cases:
• Moving the device to a different FMC.
• Restore an old configuration.
• Reregistering a device.
New/modified screens: Devices > Device Management > Device > General
Update the FMC IP 6.7.0 6.7.0 If you change the FMC IP address, you can now use the FTD CLI to update
address on FTD. the device.
New/modified commands: configure manager edit
About Users
You can add custom user accounts on managed devices, either as internal users or as external users on a LDAP
or RADIUS server. Each managed device maintains separate user accounts. For example, when you add a
user to the management center, that user only has access to the management center; you cannot then use that
username to log directly into a managed device. You must separately add a user on the managed device.
CLI Access
Firepower devices include a Firepower CLI that runs on top of Linux. You can create internal users on devices
using the CLI. You can establish external users on threat defense devices using the management center.
Caution Users with CLI Config level access can access the Linux shell using the expert command, and obtain sudoers
privileges in the Linux shell, which can present a security risk. For system security reasons, we strongly
recommend:
• Only use the Linux shell under TAC supervision or when explicitly instructed by Firepower user
documentation.
• Make sure that you restrict the list of users with CLI access appropriately.
• When granting CLI access privileges, restrict the list of users with Config level access.
• Do not add users directly in the Linux shell; only use the procedures in this chapter.
• Do not access Firepower devices using CLI expert mode unless directed by Cisco TAC or by explicit
instructions in the Firepower user documentation.
Supported Domains
Any
User Roles
Configure external users—Admin FMC user
Configure internal users—Config CLI user
Defaults
All devices include an admin user as a local user account; you cannot delete the admin user. The default
initial password is Admin123; the system forces you to change this during the initialization process. The
agent stores the modified credentials in the Windows registry and uses the same encryption as the management
center, which is Cipher Block Chaining (CBC). See the getting started guide for your model for more
information about system initialization.
Procedure
Step 1 Log into the device CLI using an account with Config privileges.
The admin user account has the required privileges, but any account with Config privileges will work. You
can use an SSH session or the Console port.
For certain threat defense models, the Console port puts you into the FXOS CLI. Use the connect ftd command
to get to the threat defense CLI.
• All lowercase
• Cannot start with hyphen (-); cannot be all numbers; cannot include a period (.), at sign (@), or
slash (/)
• basic—Gives the user basic access. This role does not allow the user to enter configuration commands.
Allowed commands are dig, ping, and traceroute.
• config—Gives the user configuration access. This role gives the user full administrator rights to all
commands.
Example:
The following example adds a user account named johncrichton with Config access rights. The password is
not shown as you type it.
Note
Tell users they can change their own passwords using the configure password command.
Step 3 (Optional) Adjust the characteristics of the account to meet your security requirements.
You can use the following commands to change the default account behavior.
• configure user aging username max_days warn_days
Sets an expiration date for the user's password. Specify the maximum number of days for the password
to be valid followed by the number of days before expiration the user will be warned about the upcoming
expiration. Both values are 1 to 9999, but the warning days must be less than the maximum days. When
you create the account, there is no expiration date for the password.
• configure user forcereset username
Forces the user to change the password on the next login.
• configure user maxfailedlogins username number
Sets the maximum number of consecutive failed logins you will allow before locking the account, from
1 to 9999. Use the configure user unlock command to unlock accounts. The default for new accounts
is 5 consecutive failed logins.
• configure user minpasswdlen username number
Sets a minimum password length, which can be from 1 to 127.
• configure user strengthcheck username {enable | disable}
Enables or disables password strength checking, which requires a user to meet specific password criteria
when changing their password. When a user’s password expires or if the configure user forcereset
command is used, this requirement is automatically enabled the next time the user logs in.
Note The timeout range is different for the threat defense and the management center, so if you share an object, be
sure not to exceed the threat defense's smaller timeout range (1-30 seconds for LDAP, and 1-300 seconds for
RADIUS). If you set the timeout to a higher value, the threat defense external authentication configuration
will not work.
Only a subset of fields in the external authentication object are used for threat defense SSH access. If you fill
in additional fields, they are ignored. If you also use this object for other device types, those fields will be
used.
LDAP users always have Config privileges. RADIUS users can be defined as either Config or Basic users.
You can either define users on the RADIUS server (with the Service-Type attribute), or you can pre-define
the user list in the external authentication object. For LDAP, you can specify a filter to match CLI users on
the LDAP server.
Note Users with CLI access can gain Linux shell access with the expert command. Linux shell users can obtain
root privileges, which can present a security risk. Make sure that you:
• Restrict the list of users with Linux shell access.
• Do not create Linux shell users.
About LDAP
The Lightweight Directory Access Protocol (LDAP) allows you to set up a directory on your network that
organizes objects, such as user credentials, in a centralized location. Multiple applications can then access
those credentials and the information used to describe them. If you ever need to change a user's credentials,
you can change them in one place.
Microsoft has announced that Active Directory servers will start enforcing LDAP binding and LDAP signing
in 2020. Microsoft is making these a requirement because when using default settings, an elevation of privilege
vulnerability exists in Microsoft Windows that could allow a man-in-the-middle attacker to successfully
forward an authentication request to a Windows LDAP server. For more information, see 2020 LDAP channel
binding and LDAP signing requirement for Windows on the Microsoft support site.
If you have not done so already, we recommend you start using TLS/SSL encryption to authenticate with an
Active Directory server.
About RADIUS
Remote Authentication Dial In User Service (RADIUS) is an authentication protocol used to authenticate,
authorize, and account for user access to network resources. You can create an authentication object for any
RADIUS server that conforms to RFC 2865.
Secure Firewall devices support the use of SecurID tokens. When you configure authentication by a server
using SecurID, users authenticated against that server append the SecurID token to the end of their SecurID
PIN and use that as their password when they log in. You do not need to configure anything extra on the
Secure Firewall device to support SecurID.
Note For LDAP, the timeout range is different for the threat defense and the management center, so if you share
an object, be sure not to exceed the threat defense's smaller timeout range (1-30 seconds). If you set the timeout
to a higher value, the deployment to the threat defense will fail.
Procedure
The timeout range is different for the threat defense and the management center, so if you share an
object, be sure not to exceed the threat defense's smaller timeout range (1-30 seconds). If you set the
timeout to a higher value, the threat defense LDAP configuration will not work.
Note
Deploying an external authentication object that allows a large number of users with CLI access may
cause deployments to time out and fail while waiting for the users to be created.
Note
If you previously configured the same username for an internal user, the threat defense first checks the password
against the internal user, and if that fails, it checks the LDAP server. Note that you cannot later add an internal
user with the same name as an external user; only pre-existing internal users are supported.
Step 15 If you later add or delete users on the LDAP server, you must redeploy the Platform Settings on managed
devices. The management center redownloads the user list and deploys it to the device. See Deploy
Configuration Changes, on page 251.
Examples
Basic Example
The following figures illustrate a basic configuration of an LDAP login authentication object for a
Microsoft Active Directory Server. The LDAP server in this example has an IP address of [Link].
The connection uses port 389 for access.
The connection to the server is encrypted using SSL and a certificate named [Link] is
used for the connection. In addition, connections to the server time out after 60 seconds because of
the Timeout (Seconds) setting.
Because this server is a Microsoft Active Directory server, it uses the sAMAccountName attribute to
store user names rather than the uid attribute.
The CLI Access Attribute of sAMAccountName causes each sAMAccountName attribute to be checked
for all objects in the directory for matches when a user logs into the threat defense.
In the following example, the CLI access filter is set to be the same as the base filter.
Note The timeout range is different for the threat defense and the management center, so if you share an object, be
sure not to exceed the threat defense's smaller timeout range (1-300 seconds). If you set the timeout to a higher
value, the threat defense RADIUS configuration will not work.
Procedure
Step 1 Define users on the RADIUS server using the Service-Type attribute.
The following are supported values for the Service-Type attribute:
• Administrator (6)—Provides Config access authorization to the CLI. These users can use all commands
in the CLI.
• NAS Prompt (7) or any level other than 6—Provides Basic access authorization to the CLI. These users
can use read-only commands, such as show commands, for monitoring and troubleshooting purposes.
Alternatively, you can predefine users in the external authentication object (see, Step 12, on page 220). To use
the same RADIUS server for the threat defense and management center while using the Service-Type attribute
method for the threat defense, create two external authentication objects that identify the same RADIUS
server: one object includes the predefined CLI Access Filter users (for use with the management center), and
the other object leaves the CLI Access Filter empty (for use with threat defenses).
b) Enter the Retries before rolling over to the backup server. The default is 3.
Step 12 (Optional) Instead of using RADIUS-defined users (see, Step 1, on page 219), in the CLI Access Filter area
Administrator CLI Access User List field, enter the user names that should have CLI access, separated by
commas. For example, enter jchrichton, aerynsun, rygel.
You may want to use the CLI Access Filter method for threat defense so you can use the same external
authentication object with threat defense and other platform types.
Note
If you want to use RADIUS-defined users, you must leave the CLI Access Filter empty.
Make sure that these usernames match usernames on the RADIUS server. The names must be Linux-valid
usernames:
• Maximum 32 alphanumeric characters, plus hyphen (-) and underscore (_)
• All lowercase
• Cannot start with hyphen (-); cannot be all numbers; cannot include a period (.), at sign (@), or slash (/)
Note
Users with CLI access can gain Linux shell access with the expert command. Linux shell users can obtain
root privileges, which can present a security risk. Make sure that you restrict the list of users with CLI or
Linux shell access.
Note
Deploying an external authentication object that allows a large number of users with CLI access may cause
deployments to time out and fail while waiting for the users to be created.
Step 13 (Optional) Click Test to test management center connectivity to the RADIUS server.
This function can only test management center connectivity to the RADIUS server; there is no test function
for managed device connectivity to the RADIUS server.
Step 14 (Optional) You can also enter Additional Test Parameters to test user credentials for a user who should be
able to authenticate: enter a User Name and Password, and then click Test.
Tip
If you mistype the name or password of the test user, the test fails even if the server configuration is correct.
To verify that the server configuration is correct, click Test without entering user information in the Additional
Test Parameters field first. If that succeeds, supply a user name and password to test with the specific user.
Example:
To test if you can retrieve the JSmith user credentials at the Example company, enter JSmith and the correct
password.
Examples
Simple User Role Assignments
The following figure illustrates a sample RADIUS login authentication object for a server running
Cisco Identity Services Engine (ISE) with an IP address of [Link] on port 1812. No backup
server is defined.
The following example shows RADIUS-specific parameters, including the timeout (30 seconds) and
number of failed retries before the system attempts to contact the backup server, if any.
This example illustrates important aspects of RADIUS user role configuration:
Users ewharton and gsand are granted web interface Administrative access.
The user cbronte is granted web interface Maintenance User access.
The user jausten is granted web interface Security Analyst access.
The user ewharton can log into the device using a CLI account.
The following graphic depicts the role configuration for the example:
Roles for Users Matching an Attribute-Value Pair
You can use an attribute-value pair to identify users who should receive a particular user role. If the
attribute you use is a custom attribute, you must define the custom attribute.
The following figure illustrates the role configuration and custom attribute definition in a sample
RADIUS login authentication object for the same ISE server as in the previous example.
In this example, however, the MS-RAS-Version custom attribute is returned for one or more of the
users because a Microsoft remote access server is in use. Note the MS-RAS-Version custom attribute
is a string. In this example, all users logging in to RADIUS through a Microsoft v. 5.00 remote access
server should receive the Security Analyst (Read Only) role, so you enter the attribute-value pair of
MS-RAS-Version=MSRASV5.00 in the Security Analyst (Read Only) field.
• If you typed in your base-distinguished name, click Fetch DNs to retrieve all the available base
distinguished names on the server, and select the name from the list.
• If you are using any filters, access attributes, or advanced settings, check that each is valid and typed
correctly.
• If you are using any filters, access attributes, or advanced settings, try removing each setting and testing
the object without it.
• If you are using a base filter or a CLI access filter, make sure that the filter is enclosed in parentheses
and that you are using a valid comparison operator (maximum 450 characters, including the enclosing
parentheses).
• To test a more restricted base filter, try setting it to the base distinguished name for the user to retrieve
just that user.
• If you are using an encrypted connection:
• Check that the name of the LDAP server in the certificate matches the host name that you use to
connect.
• Check that you have not used an IPv6 address with an encrypted server connection.
• If you are using a test user, make sure that the user name and password are typed correctly.
• If you are using a test user, remove the user credentials and test the object.
• Test the query that you are using by connecting to the LDAP server and using this syntax:
ldapsearch -x -b 'base_distinguished_name'
-h LDAPserver_ip_address -p port -v -D
'user_distinguished_name' -W 'base_filter'
For example, if you are trying to connect to the security domain on [Link] using the
domainadmin@[Link] user and a base filter of (cn=*), you could test the connection using
this statement:
ldapsearch -x -b 'CN=security,DC=myrtle,DC=example,DC=com'
-h [Link] -p 389 -v -D
'domainadmin@[Link]' -W '(cn=*)'
If you can test your connection successfully but authentication does not work after you deploy a platform
settings policy, check that authentication and the object you want to use are both enabled in the platform
settings policy that is applied to the device.
If you connect successfully but want to adjust the list of users retrieved by your connection, you can add or
change a base filter or CLI access filter or use a more restrictive or less restrictive base DN.
While authenticating a connection to Active Directory (AD) server, rarely the connection event log indicates
blocked LDAP traffic although the connection to AD server is successful. This incorrect connection log occurs
when the AD server sends a duplicate reset packet. The threat defense device identifies the second reset packet
as part of a new connection request and logs the connection with Block action.
Limited user privileges 7.7.0 7.7.0 The scope of the Threat Defense CLI Basic user privilege is now limited to the
for Threat Defense CLI following commands: dig, ping, traceroute. If you have created users with the
Basic user. Basic privilege, evaluate whether you need to change them to the Config
privilege. You can change a user’s privilege level using the configure user
access command.
See: Cisco Secure Firewall Threat Defense Command Reference
Support for the 6.4.0 Any For RADIUS authentication of threat defense CLI users, you used to have to
Service-Type attribute for pre-define the usernames in the RADIUS external authentication object and
threat defense users manually make sure that the list matched usernames defined on the RADIUS
defined on the RADIUS server. You can now define CLI users on the RADIUS server using the
server. Service-Type attribute and also define both Basic and Config user roles. To
use this method, be sure to leave the shell access filter blank in the external
authentication object.
External authentication 6.2.3 Any You can now configure external authentication for SSH access to the threat
for threat defense SSH defense using LDAP or RADIUS.
access.
New/modified screens: Devices > Platform Settings > External
Authentication
Procedure
Step 4 Optionally, preview and validate the ticket to ensure the changes are complete and correct.
Step 5 Submit the ticket. At this point, the approver can either approve or reject the ticket.
• If the ticket is approved, deploy the changes.
• If the ticket is rejected, address the issues, and resubmit the ticket.
If you need more granular roles to separate these activities due to your organizational requirements, you can
create separate roles to ensure that ticket approval is assigned only to those users who have the organizational
authority to approve changes. To create new user roles, go to System > Users, and select the User Roles tab..
Following are the permissions, in the System > Change Management folder, relevant to ticket usage and
approval. Note that these permissions are available only after you enable Change Management.
• Modify Tickets—To create tickets (for yourself), to use tickets for configuration changes, and to discard
tickets.
• Review Tickets—To approve or reject tickets.
• Both Modify and Review Tickets—To create tickets for yourself and others, use tickets, and approve/reject
tickets. You can also take over tickets assigned to other users.
The approach you take depends on your precise requirements. For example:
• If your approvers should also be allowed to make configuration changes, you can simply assign them
the system-defined roles, such as Administrator. Then, create custom configuration-only roles that include
the same permissions but not the Review Tickets permission.
• If you need complete separation between approvers and those who make configuration changes, create
custom roles for both, limiting the roles to either the Modify Tickets or the Review Tickets permission
plus all other needed permissions for viewing or changing the supported policies and objects.
Supported Policies
• Access Control, including rules, references to other policies, and inheritance settings.
• Device Configuration policies:
• Interfaces
• Inline Sets
• DHCP
• VTEP
• All Routing
• Decryption policy
• DNS policy
• FlexConfig
• Intrusion policy and Network Analysis Policy (NAP), Snort 3 only.
• Malware and File policy
• Network Address Translation (NAT)
• Network Discovery policy
• Platform Settings
• Prefilter
• QoS
• Umbrella SASE Topology
• VPN policies, both site-to-site and remote access
• Zero Trust Access
Supported Objects
• AAA Server
• Access List
• Address Pools
• AS Path
• Cipher suit lists
• Community List
• Distinguished Name objects
• DHCP IPv6 Pools
• DNS Server Group
• FlexConfig objects
• Group policy
• Interface
• Key Chain
• Network
• PKI certificates, all objects
• Policy List
• Port
• Prefix List
• Route Map
• Sinkhole
• SLA Monitor
• Time Range
• Time Zone
• Tunnel Zone
• URL
• Variable Set
• VLAN Tag
• VPN objects (IKEv1, IKEv2 IPSec and policy, PKI enrollment, certificate map)
Supported Domains
Any
User Roles
• To enable or disable Change Management: Admin.
• To both modify and review tickets:
• Admin
• Network Admin
• Some processes, such as deployment and backup/restore, prevent you from changing the Change
Management mode. Wait until the process completes to change the mode.
• Your ability to create objects while configuring a feature is constrained based on whether the feature and
objects are all supported by change management. For example, importing a configuration is not supported
by change management. Therefore, you cannot create security zone objects, which are supported, during
the import. On the other hand, you can create new objects while configuring access control rules, because
both are supported.
• When using Cloud-delivered Firewall Management Center, a user defined in Cisco Security Cloud Control
is available to be assigned tickets only after the user cross-launches cdFMC at least once. Until the first
cross-launch, the user does not exist in cdFMC.
Procedure
Step 4 Select the Number of approvals required, which is how many administrators must approve the change for
the ticket to be approved and deployable. The default is 1, but you can require up to 5 approvers per ticket.
Users can override this number when creating tickets.
Step 5 Select the Ticket Purge Duration, which is the number of days to keep approved tickets, from 1-100 days.
The default is 5 days.
Step 6 (Optional.) Enter the Reply to Address and the email addresses for the List of Approver Addresses. You
must also configure the Email Notification system settings for email to work.
Step 7 Click Save.
The system adds the Ticket ( ) shortcut to the menu bar, and the System ( ) > Change Management
Workflow command. Users can manage tickets using these methods.
Managing Tickets
When you enable Change Management, configuration changes for supported policies must be done within
the context of a ticket. You open a ticket, make your changes, then submit the ticket for approval.
You can see a list of tickets, and create new ones, either on the Change Management page or through the
Ticket quick-access menu. All ticket changes are synchronized in each menu, so you can switch back and
forth at your convenience and use whichever method you prefer.
Note When you open a ticket and make a change to a supported policy, that policy is locked from changes by other
users or through other tickets. The policy remains locked until the ticket is approved or discarded.
Procedure
• Click the Ticket ( ) quick-access menu. The icon can either be named Select a Ticket (if no ticket is
opened), the ticket name if a ticket is opened, or unnamed if no tickets exist.
Both pages are organized the same. The Ticket tab lists all tickets, whereas the Review tab lists tickets that
have been submitted for approval. The default view shows your tickets only.
• To validate the configuration changes in an open ticket, click Validate ( ) or More ( ) > Validate. A
dialog box opens showing error, warning, and informational messages, if there are any validation errors.
• To submit an open ticket for review and approval, click Submit for Approval ( ) or More ( ) > Submit
for Approval. The ticket must be open to be submitted.
Step 3 On the Reviews tab, take any of these actions on submitted tickets. The list is empty if there are no submitted
tickets. In addition, only users with Review Ticket permissions can see this tab.
• To validate the configuration changes in an open ticket, click Validate ( ) or More ( ) > Validate.
Procedure
Step 1 Choose System ( ) > Change Management Workflow, or click the Ticket ( ) shortcut menu.
Step 2 Click Add Ticket.
Step 3 Configure the ticket options:
• Name—The name of the ticket. The name can include letters, numbers, spaces, and the following special
characters: #-_!
• Description—An optional description of what you intend to configure using this ticket. For example, if
you have a case number related to what you intend to fix using this ticket, that would be useful information
in a description.
• Number of Approvers—How many administrators must approve the change for the ticket to be approved
and deployable. You can specify 1-5.
• Assign to—Select the user who will own the ticket and be responsible for implementing the changes.
Choose self to assign it to yourself.
• Create—The ticket is added to the list of tickets, but it is not opened. You need to open it before you
can work within the context of the ticket.
• Create and Open—The ticket is added to the list of tickets and also opened.
Procedure
Step 1 Choose System ( ) > Change Management Workflow, or click the Ticket ( ) shortcut menu.
Step 2 On the Tickets tab, click Open ( ) or More ( ) > Open for the ticket.
Step 3 Optionally, enter a comment for the action.
Step 4 Click Open.
You can now start your configuration changes. The name of the Ticket icon changes to the name of the open
ticket.
Previewing a Ticket
You can preview a ticket while making your configuration changes, or before approving it. The preview shows
all configuration changes made within the context of the ticket.
Procedure
Step 1 Choose System ( ) > Change Management Workflow, or click the Ticket ( ) shortcut menu.
Step 2 Click Preview ( ) for the ticket.
The Preview dialog box opens. Changes are color coded according to the legend at the top of the dialog box.
Step 3 Select the policy whose changes you want to view in the Changed Policies list.
You are shown both the current version of the policy as it is defined in Secure Firewall Management Center
(on the left) and the proposed changes defined within the ticket.
For policies that contain pages, such as Platform Settings, you can select the overall policy to see all changes,
or specific pages within the policy, in the Changed Policies list.
You cannot alter the changes from within the preview. If you need to change something, you must close the
preview and return to the policy you want to change.
Step 4 Optionally, click Download as PDF to save the preview to a PDF file for offline viewing or archival purposes.
Step 5 Click OK.
Submitting a Ticket
After you have completed the changes needed for a ticket, you can preview and validate the changes. Then,
when you are satisfied with the changes, submit the ticket for review and approval.
Changes made within the ticket are not applied until you submit the ticket and the ticket is approved. Until
approval happens, all policies modified within a ticket are locked to that ticket and cannot be changed by
anyone else.
Procedure
Step 1 Choose System ( ) > Change Management Workflow, or click the Ticket ( ) shortcut menu.
Step 2 Click Submit for Approval ( ) or More ( ) > Submit for Approval for the open ticket.
Step 3 Optionally, enter a comment for your action.
Step 4 Click Submit.
Discarding a Ticket
If you no longer need to make the changes for which you created a ticket, you can discard the ticket. When
you discard a ticket, any changes that you made within the ticket are removed.
You cannot undo this action and retrieve a ticket with its changes. If you need them, you must create a new
ticket and start over.
You cannot discard a ticket after you submit it. However, if the approver rejects the ticket, you can then discard
it.
Note If you have permission to modify tickets, you can discard tickets that belong to another user. This makes it
possible to deal with situations where an admin is on vacation or otherwise unavailable to manage an in-process
ticket. If you have Review Ticket permission, you can alternatively reassign or take over the ticket rather
than discard it.
Procedure
Step 1 Choose System ( ) > Change Management Workflow, or click the Ticket ( ) shortcut menu.
Step 2 Click Discard ( ) or More ( ) > Discard for the ticket.
Step 3 Optionally, enter a comment for your action.
Procedure
Step 1 Choose System ( ) > Change Management Workflow, or click the Ticket ( ) shortcut menu.
Step 2 On the Review tab, click Preview ( ) for the ticket and evaluate the proposed changes.
You can also click Validate ( ) or More ( ) > Validate to check for errors.
However, you can assign a user only if the user has the same role as the current ticket owner, or the Admin
role. This ensures that the new user has the permissions required to configure the features currently modified
within the ticket.
You cannot reassign a ticket that has been submitted for approval.
Procedure
Taking over tickets and 7.6.0 Any You can take over another user’s ticket. This is useful if a ticket is blocking
additional support for other updates to a policy and the user is unavailable. In addition, the following
Change Management. features are now included in the Change Management approval workflow:
Decryption policies, DNS policies, file and malware policies, network discovery,
certificates and certificate groups, cipher suite lists, Distinguished Name objects,
Sinkhole objects.
Change management. 7.4.1 Any You can enable change management if your organization needs to implement
more formal processes for configuration changes, including audit tracking and
official approval before changes are deployed.
Deployment Required
Configuration changes that require a deployment include:
• Modifying an access control policy: any changes to access control rules, the default action, policy targets,
Security Intelligence filtering, advanced options including preprocessing, and so on.
• Modifying any of the policies that the access control policy invokes: the SSL policy, network analysis
policies, intrusion policies, file policies, identity policies, or DNS policies.
• Changing any reusable object or configuration used in an access control policy or policies it invokes:
• network, port, VLAN tag, URL, and geolocation objects
• Security Intelligence lists and feeds
• application filters or detectors
• intrusion policy variable sets
• file lists
• Updating the system software, intrusion rules, or the vulnerability database (VDB).
Keep in mind that you can change some of these configurations from multiple places in the web interface.
For example, you can modify security zones using the object manager (Objects > Object Management), but
modifying an interface type in a device’s configuration (Devices > Device Management) can also change a
zone and require a deployment.
Deployment Preview
Preview provides a snapshot of all the policy and object changes to be deployed on the device. The policy
changes include the new policies, changes in the existing policies, and the deleted policies. The object changes
include the added and modified objects which are used in policies. The unused object changes are not displayed
because they are not deployed on the device.
Click the Preview icon next to a deployment job to view the configuration change log for that are pending to
be deployed on the device. The change log includes:
• Comparison View: Displays a side-by-side comparison of all the device configuration changes made
since your last deployment.
• Advanced View: Displays the pending CLI commands to be applied to the device.
For more information about viewing the deployment preview, see Deploy Configuration Changes, on page
251.
The preview shows all the default values, even when they are not altered, along with the other configured
settings when an interface or a platform settings policy is added for the first time. Similarly, the high
availability-related policies and default values for settings are shown, even when they are not altered, in the
first preview after a high availability pair is configured or disrupted.
To view changes due to an auto rollback, see Edit Deployment Settings, on page 195.
Unsupported Features
• Object additions and attribute changes are displayed in the preview only if the objects are associated
with any device or interface. Object deletions are not displayed.
• Preview is not supported for the following policies:
• High availability
• Network discovery
• Network analysis
• Device settings
• User information at the rule level is not available for intrusion policies.
• The preview does not show the reordering of rules across policies.
For DNS policies, reordered rules appear in the preview list as rule additions and deletions. For example,
moving a rule from position 1 to position 3 in the rule order is displayed as if the rule was deleted from
position 1 and added as a new rule in position 3. Similarly, when a rule is deleted, the rules under it are
listed as edited rules as they have changed their positions. The changes are displayed in the final order
in which they appear in the policy.
• Preview is not supported in the following HA scenarios:
• If a device was in standalone mode and if a chain is made, then an auto-deployment is triggered.
For that particular job, preview is not supported. On hover over the Preview ( ), a message is
displayed that it is a HA bootstrap deployment, and no preview is supported.
• Configuration groups - Consider a flow in which a device was initially standalone. Subsequently,
three deployments took place. In the fourth deployment, the device was a HA bootstrap deployment.
After these, the user deploys devices 5, 6, and 7. The deployment 7 is an HA break deployment,
and the user deploys devices 8, 9, and 10.
In this flow, the preview between 3 and 5 is not supported because 4 was a HA deployment. Similarly,
the preview between 8 and 3 is also not supported. Preview is supported only from 3 to 1, 7,6, 5, 4,
and 10, 9, and 8.
• If a device is broken (HA is broken) then the new device is considered as a fresh device.
• Routing policies
• VPN policies
There are certain limitations to selectively deploying policies. Follow the contents in the table below to
understand when selective policy deployment can be used.
Full deployment Full deployment is necessary for Scenarios wherein a full deployment is required
specific deploy scenarios, and the are:
management center does not
• The first deployment after you have upgraded
support selective deployment in
the threat defense or the management center.
such scenarios. If you encounter an
error in such scenarios, you may • The first deployment after you have restored
choose to proceed by selecting all the threat defense.
the changes for deployment on the
device. • The first deployment after modifications in
the threat defense interface settings.
• The first deployment after modifications in
the virtual router settings.
• When the threat defense device is moved to a
new domain (global to sub-domain or
sub-domain to global).
Associated policy The management center identifies Scenarios wherein an associated policy is
deployment interdependent policies which are automatically selected:
interlinked. When one of the
• When a new object is associated with an
interlinked policies is selected, the
existing policy.
remaining interlinked policies are
automatically selected. • When an existing policy's object is modified.
Access Policy Access Policy Group policies are The scenarios and the expected behavior for Access
Group listed together in the preview Policy Group policies are:
specifications window under Access Policy
• If the access control policy is out-of-date, all
Group when you click View ( ). other out-of-date policies under this group,
except file policy and intrusion policy, are
selected when the access control policy is
selected for deployment.
However, if the access control policy is
out-of-date, intrusion and file policies can be
individually selected or deselected irrespective
of whether the access control policy is selected
or not, unless there are any dependent changes.
For example, if a new intrusion policy is
assigned to an access control rule, it indicates
that there are dependent changes, then both
the access control policy and the intrusion
policy will be automatically selected when
either of them is selected.
• If no access control policy is out-of-date, other
out-of-date policies in this group can be
selected and deployed individually.
System Username
The management center displays the username as system for the following operations:
• Rollback
• Upgrade
• Threat Defense backup and restore
• SRU update
• LSP update
• VDB update
Deploying a specific configuration that requires the Configurations that Restart the Snort Process When
Snort process to restart. Deployed or Activated, on page 248
Modifying a configuration that immediately restarts Changes that Immediately Restart the Snort Process,
the Snort process. on page 249
Traffic-activation of the currently deployed Automatic Configure Automatic Application Bypass, on page
Application Bypass (AAB) configuration. 192
Enabling or disabling "Logging connection events to See the section Log to Ramdisk in Troubleshoot
RAM disk" feature. Drain of FMC Unprocessed Events.
Related Topics
Access Control Policy Advanced Settings, on page 1732
Configurations that Restart the Snort Process When Deployed or Activated, on page 248
or passes without inspection during the interruption depends on how the device handles traffic. Note that you
can proceed with the deployment, cancel the deployment and modify the configuration, or delay the deployment
until a time when deploying would have the least impact on your network.
When the Inspect Interruption column indicates Yes and you expand the device configuration listing, the
system indicates any specific configuration type that would restart the Snort process with an Inspect
Interruption ( ). When you hover your mouse over the icon, a message informs you that deploying the
configuration may interrupt traffic.
The following table summarizes how the deploy page displays inspection interruption warnings.
For information on all configurations that restart the Snort process for all device types, see Configurations
that Restart the Snort Process When Deployed or Activated, on page 248.
When the configurations you deploy do not require a Snort restart, the system initially uses the currently
deployed access control policy to inspect traffic, and switches during deployment to the access control
policy you are deploying.
• Disabled — Traffic is not inspected during the deployment. The Snort process always restarts when you
deploy.
The following graphic illustrates how Snort restarts can occur when you enable or disable Inspect traffic
during policy apply.
Caution When you deploy, resource demands may result in a small number of packets dropping without inspection.
Additionally, deploying some configurations restarts the Snort process, which interrupts traffic inspection.
Whether traffic drops during this interruption or passes without further inspection depends on how the target
device handles traffic. See Snort Restart Traffic Behavior, on page 246 and Configurations that Restart the
Snort Process When Deployed or Activated, on page 248.
Table 14: The Threat Defense and the Threat Defense Virtual Restart Traffic Effects
routed, transparent (including EtherChannel, existing TCP/UDP flows: passed without inspection
redundant, subinterface): preserve-connection so long as at least one packet arrives while Snort is
enabled (configure snort preserve-connection down
enable; default)
new TCP/UDP flows and all non-TCP/UDP flows:
For more information, see Cisco Secure Firewall dropped
Threat Defense Command Reference.
Note that the following traffic drops even when
preserve-connection is enabled:
• plaintext, passthrough prefilter tunnel traffic that
matches an Analyze rule action or an Analyze
all tunnel traffic default policy action
• connections that do not match an access control
rule and are instead handled by the default action.
• decrypted TLS/SSL traffic
• a safe search flow
• a captive portal flow
Note In addition to traffic handling when the Snort process is down while it restarts, traffic can also pass without
inspection or drop when the Snort process is busy, depending on the configuration of the Snort Fail Open
Busy option (see Configure an Inline Set, on page 891). A device supports either the Failsafe option or the
Snort Fail Open option, but not both.
Note When the Snort process is busy but not down during configuration deployment, some packets may drop on
routed, switched, or transparent interfaces if the total CPU load exceeds 60 percent.
Warning Do not reboot the system while the Snort Rule Update is in progress.
Snort-busy drops happen when snort is not able to process the packets fast enough. Lina does not know whether
Snort is busy due to processing delay, or if is stuck or due to call blocking. When transmission queue is full,
snort-busy drops occur. Based on Transmission queue utilization, Lina will try to access if the queue is being
serviced smoothly.
File Policy
Deploy the first or last of any one of the following configurations; note that while otherwise deploying these
file policy configurations does not cause a restart, deploying non-file-policy configurations can cause restarts.
• Take either of the following actions:
• Enable or disable Inspect Archives when the deployed access control policy includes at least one
file policy.
• Add the first or remove the last file policy rule when Inspect Archives is enabled (note that at least
one rule is required for Inspect Archives to be meaningful).
Note that access control rules that deploy these file policy configurations to security zones or tunnel zones
cause a restart only when your configuration meets the following conditions:
• Source or destination security zones in your access control rule must match the security zones associated
with interfaces on the target devices.
• Unless the destination zone in you access control rule is any, a source tunnel zone in the rule must match
a tunnel zone assigned to a tunnel rule in the prefilter policy.
Identity Policy
• When SSL decryption is disabled (that is, when the access control policy does not include an SSL policy),
add the first or remove the last active authentication rule.
An active authentication rule has either an Active Authentication rule action, or a Passive Authentication
rule action with Use active authentication if passive or VPN identity cannot be established selected.
Network Discovery
• Enable or disable non-authoritative, traffic-based user detection over the HTTP, FTP, or MDNS protocols,
using the network discovery policy.
Device Management
• MTU: Change the highest MTU value among all non-management interfaces on a device.
• Automatic Application Bypass (AAB): The currently deployed AAB configuration activates when a
malfunction of the Snort process or a device misconfiguration causes a single packet to use an excessive
amount of processing time. The result is a partial restart of the Snort process to alleviate extremely high
latency or prevent a complete traffic stall. This partial restart causes a few packets to pass without
inspection, or drop, depending on how the device handles traffic.
Updates
• System update: Deploy configurations the first time after a software update that includes a new version
of the Snort binary or data acquisition library (DAQ).
• For managed devices running Snort 3, deploying configurations the first time after installing a vulnerability
database (VDB) update may temporarily interrupt application detection, but there will be no traffic
interruptions.
Related Topics
Deploy Configuration Changes, on page 251
Snort Restart Scenarios, on page 244
A message warns you that continuing restarts the Snort process, and allows you to cancel; the restart
occurs on any managed device in the current domain or in any of its child domains.
• Create or break a threat defense high availability pair.
A message warns you that continuing to create a high availability pair restarts the Snort process on the
primary and secondary devices and allows you to cancel.
Supported Domains
Any
User Roles
• Admin
• Network Admin
• Security Approver
Caution We recommend against a device's management connection going through a VPN tunnel that terminates on
the device itself. If you deploy a configuration change that causes the VPN to go down, the management
connection will be disconnected and you will not have any way to recover the configuration without connecting
directly to the device.
If management traffic exits a VPN-terminating interface, be sure to exclude the management traffic from the
VPN tunnel.
Do not exceed the capability of your devices. If you exceed the maximum number of rules or policies supported
by a target device, the system displays a warning. The maximum depends on a number of factors—not only
memory and the number of processors on the device, but also on policy and rule complexity. For information
on optimizing policies and rules, see Best Practices for Access Control Rules, on page 1714.
You can configure the system to deploy automatically by scheduling a deploy task or by setting the system
to deploy when importing intrusion rule updates. Automating policy deployment is especially useful if you
allow intrusion rule updates to modify system-provided base policies for intrusion and network analysis.
Intrusion rule updates can also modify default values for the advanced preprocessing and performance options
in your access control policies.
Caution When you deploy, resource demands may result in a small number of packets dropping without inspection.
Additionally, deploying some configurations restarts the Snort process, which interrupts traffic inspection.
Whether traffic drops during this interruption or passes without further inspection depends on how the target
device handles traffic. See Snort Restart Traffic Behavior, on page 246 and Configurations that Restart the
Snort Process When Deployed or Activated, on page 248.
Note The deployment process fails if the device configuration is being read at the device CLI during deployment.
Do not execute commands such as show running-config during the deployment.
Procedure
• The Modified By column lists the users who have modified the policies or objects. On expanding the
device listing, you can view the users who have modified the policies against each policy listing. For
information about when the System user is shown (instead of the logged-in user), see System Username,
on page 243.
Note
Usernames are not provided for deleted policies and objects.
• The Inspect Interruption column indicates if traffic inspection interruption may be caused in the device
during deployment.
When the status indicates (Yes) that deploying will interrupt inspection, and perhaps traffic, on the threat
defense device, the expanded list indicates the specific configurations causing the interruption with the
Inspect Interruption ( ).
If the entry is blank in this column for a device, then it indicates that there will be no traffic inspection
interruptions on that device during deployment.
See Restart Warnings for Devices, on page 244 for information to help you identify configurations that
interrupt traffic inspection and might interrupt traffic when deployed to the threat defense devices.
• The Last Modified Time column specifies when you last made the configuration changes.
• The Preview column allows you to preview the changes for the next deployment.
• The Status column provides the status for each deployment. For more information, see View Deployment
Status, on page 258.
Step 4 In the Preview column, click Preview ( ) to see the configuration changes that you can deploy.
Figure 97: Preview
Note
If you change the management center name in System ( ) > Configuration > Information, the deployment
preview does not specify this change, yet it requires a deployment.
For unsupported features for Preview, see Deployment Preview, on page 240.
The Comparison View tab lists all the policy and object changes. The left pane lists all the different policy
types that have changed on the device, organized in a tree structure.
Figure 98: Comparison View
The Filter( lets you filter the policies at the user level and policy level.
The right pane lists all the additions, changes, or deletions in the policy, or the object selected in the left pane.
The two columns on the right pane provide the last deployed configuration settings (in the Deployed Version
column) versus the changes that are due for deployment (in the Version on Firewall Management Center
column). The last-deployed configuration settings are derived from a snapshot of the last saved deployment
in the management center and not from the device. The background colors of the settings are color-coded as
per the legend available on the top-right of the page.
The Modified By column lists the users who have modified, or added the configuration settings. At the policy
level, the management center displays all the users who have modified the policy, and at the rule level, the
management center displays only the last user who has modified the rule.
You can download a copy of the change log by clicking the Download Report button.
The Advanced View tab shows the CLI commands that will be applied. This view is useful if you are familiar
with ASA CLI, which is used on the back end of the threat defense.
Figure 99: Advanced View
Step 5 Use Show or Hide Policy ( ) to selectively view or hide the associated unmodified policies.
Figure 100: Show or Hide Policy
Step 6 Check the box next to the device name to deploy all configuration changes, or click Policy selection ( )
to select individual policies or configurations to deploy while withholding the remaining changes without
deploying them.
You can also view the interdependent changes for a certain policy or configuration using this option. The
management center dynamically detects dependencies between policies (for example, between an access
control policy and an intrusion policy), and between the shared objects and the policies. Interdependent changes
are indicated using color-coded tags to identify a set of interdependent deployment changes. When one of the
deployment changes is selected, the interdependent changes are automatically selected.
For more details, see Selective Policy Deployment, on page 241.
Note
• When the changes in shared objects are deployed, the impacted policies should also be deployed along
with them. When you select a shared object during deployment, the impacted policies are automatically
selected.
• Selective deployment is not supported for scheduled deployments and deployments using REST APIs.
You can only opt for complete deployment of all the changes in these cases.
• The pre-deployment checks for warnings and errors are performed not only on the selected policies, but
on all the policies that are out-of-date. Therefore, the warnings or errors list shows the deselected policies
as well.
• Similarly, the Inspect Interruption column indication on the Deployment page considers all out-of-date
policies and not just the selected policies. For information on the Inspect Interruption column, see
Restart Warnings for Devices, on page 244.
Step 7 After you select the devices or policies to deploy, click Estimate to get a rough estimate of the deployment
duration.
Figure 101: Estimate
The time duration is a rough estimate (having around 70% accuracy), and the actual time taken for deployment
may vary for a few scenarios. The estimate is dependable for deployments of up to 20 devices.
When an estimate is not available, it indicates that the data is not available, since the first successful deployment
on the selected device is pending. This situation could occur after the management center reimage, version
upgrade, or after a high availability failover.
Note
The estimate is incorrect and unreliable for bulk policy changes (in case of bulk policy migrations), and
selective deployments because the estimate is based on the heuristic technique.
What to do next
• (Optional) Monitor deployment status; see Viewing Deployment Messages in the Cisco Secure Firewall
Management Center Administration Guide.
• If the deployment fails, see Best Practices for Deploying Configuration Changes, on page 250.
• During deployment, if there are specific configuration changes in the deployment, the deployment failure
may lead to traffic being interrupted. For example, in a cluster environment, an erroneous configuration
of an IP address that is not in the same subnet as the Site IPs is configured on the interface. Due to this
error, deployment fails and the device attempts to clear the configuration while the rollback operation is
being processed. These events collectively lead to a deployment failure that interrupts the traffic.
See the following table to know what configuration changes may cause traffic interruption when
deployment fails.
Note The configuration changes interrupting traffic during deployment is valid only
if both the management center and the threat defense are of version 6.2.3 or
higher.
Related Topics
Snort Restart Scenarios, on page 244
Caution When you deploy, resource demands may result in a small number of packets dropping without inspection.
Additionally, deploying some configurations restarts the Snort process, which interrupts traffic inspection.
Whether traffic drops during this interruption or passes without further inspection depends on how the target
device handles traffic. See Snort Restart Traffic Behavior, on page 246 and Configurations that Restart the
Snort Process When Deployed or Activated, on page 248.
Procedure
Note
Force-deploy takes more time than the regular deployment because it involves the complete generation of the
policy rules to be deployed on the threat defense.
What to do next
• (Optional) Monitor deployment status; see Viewing Deployment Messages in the Cisco Secure Firewall
Management Center Administration Guide.
• If deploy fails, see Best Practices for Deploying Configuration Changes, on page 250.
Related Topics
Snort Restart Scenarios, on page 244
Manage Deployments
View Deployment Status
On the Deployment page, the Status column provides the deployment status for each device. If a deployment
is in progress, then the live status of the deployment progress is displayed, else one of the following statuses
is displayed:
• Pending—Indicates that there are changes in the device that are to be deployed.
• Warnings or errors—Indicates that the pre-deployment checks have identified warnings or errors for the
deployment, and you have not proceeded with the deployment. You can continue with the deployment
if there are any warnings, but not if there are any errors.
Note The status column provides the warning or error status only for a single user
session on the deployment page. If you navigate away from the page or refresh
the page, the status changes to pending.
• Failed—Indicates that the previous deployment attempt failed. Click on the status to view the details.
• In queue—Indicates that deployment is initiated, and the system is yet to start the deployment process.
• Completed—Indicates that deployment has completed successfully.
Procedure
Step 1 On the management center menu bar, click Deploy and then click Deployment History ( ).
Figure 103: Deployment History Icon
A list of all the previous deployment and rollback jobs is displayed in reverse chronological order.
Figure 104: Deployment History Page
Step 2 Click Expand Arrow ( ) next to the required deployment job to view the devices included in the job and
their deployment statuses.
Step 3 (Optional) Click Transcript Details ( ) to view the commands sent to the device, and the responses received.
Figure 106: Transcript Details Icon
In the CLI Apply section, the deployment transcript includes commands that are sent to the device, and any
responses returned from the device. These responses can be informative messages or error messages. For
failed deployments, look for messages that indicate errors with the commands. Examining these errors can
be particularly helpful if you are using FlexConfig policies to configure customized features. These errors
can help you correct the script in the FlexConfig object that is trying to configure the commands.
Note
There is no distinction that is made in the transcript between commands that are sent for managed features
and those generated from FlexConfig policies.
For example, the following sequence shows that management center sent commands to configure
GigabitEthernet0/0 with the logical name outside. The device responded that it automatically set the security
level to 0. Threat Defense does not use the security level for anything.
Step 4 (Optional) Click Preview ( ) to view the policy and object changes deployed on the device versus the
previously deployed version.
Figure 108: Preview Icon
a. To compare any two versions and view the change log, choose the required versions in the drop-down
boxes and click the Show button. The drop-down boxes show the deployment job name and the end time
of the deployment.
Note
The drop-down boxes also show failed deployments.
b. The Modified By column lists the users who have modified the policies or objects.
1. At the policy level, management center displays all the user names who have modified the policy.
2. At the rule level, management center displays the last user who has modified the rule.
c. You can also download a copy of the change log by clicking Download Report.
Note
• Deployment history preview is not supported for certificate enrollments, HA operations, and failed
deployments.
• When a device is registered, preview is not supported for the job history record that is created.
Step 5 (Optional) Against each deployment job, click the More ( ) icon and execute other actions:
• Bookmark—To bookmark the deployment job.
• Edit Deployment Notes—To edit your custom deployment notes that you added for a deployment job.
• Generate Report—To generate a deployment report, which can be used for auditing. This report includes
job properties with preview and transcript information, and the report can be downloaded as a PDF file.
a. Click Generate Report to generate a deployment report.
Procedure
Step 1 On the management center menu bar, choose Deploy > Deployment History ( ).
Step 2 Click Deployment Setting.
Step 3 Choose the number of configuration versions that you want to retain for a device from the Number of Versions
to Retain drop-down list.
Note
Reducing the number of versions removes the oldest configuration versions to match the version size you
have selected. You cannot roll back or preview the removed versions.
• Maximum Permitted Disk Size: The maximum size for storing configuration versions is 20 GB. The
management center calculates the size of configuration versions periodically and sends a health alert if
the size of the configuration versions exceeds 20 GB. To resolve the health alert, choose a Number of
Versions to Retain for which the estimated configuration version size is less than 20 GB.
• Current Configuration Version Size: The size of the configuration files on the management center for
the previous deployment.
• Estimated Configuration Version Size: The approximate size of the configuration files on the
management center. It is calculated based on the number of configuration versions you chose to retain.
After a Rollback
1. After a successful rollback operation, choose Deploy > Deployment, and click the Preview icon next to
the rolled back device.
2. View the changes between the rolled back configuration and the current changes in the management center
that are pending deployment.
3. After identifying the change causing the problem, rectify the configuration, and redeploy it on the device.
• Rollback is not supported when a device that is currently in standalone mode was part of a cluster
in the previous deployment version.
• (Secure Firewall 3100/4200 and threat defense virtual in a private cloud) If you change the clustering
bootstrap configuration or add or delete nodes, you cannot roll back to a version prior to those
changes.
Configurations that are reverted during a rollback Configurations that are not reverted during a rollback
• SRU configurations
• VDB configurations
• LSP configurations
• VPN configurations
• FXOS configurations
Perform a Rollback
You can roll back a device to a previously deployed configuration. After a policy deployment, if the traffic
through the device is affected in an unintended way, rollback provides an option to revert the device to the
earlier state, which existed before the faulty deployment.
Rollback reverts the configuration only on the selected devices.
Procedure
The job names and associated deployment notes are also listed for a particular rollback version.
Step 6 (Optional) Click the Preview ( ) to view the changes deployed in the selected version.
Step 7 Click Rollback.
What to do next
To know the status of the rollback, choose Deploy > Deployment. You can view the rollback status next to
the device name.
Note The CLI command information is available after a rollback is complete and is available only until the next
deployment. The first deployment after a rollback operation erases all the rollback-related information.
Note For any rollback deployment, the Deployment Notes are updated automatically as Rollback Job. In the
Deployment History page, the user can filter the Rollback Jobs easily using the Search option.
Procedure
Step 1 On the Secure Firewall Management Center menu bar, choose System > Health > Monitor.
Step 2 Select the device, which was rolled back, from the left pane.
Step 3 Click View System & Troubleshooting Details link.
Step 4 Click Advanced Troubleshooting.
Step 5 Click Threat Defense CLI.
Step 6 Select show from the Command drop-down box.
Step 7 Enter running in the Parameter field.
Step 8 Click Execute.
Procedure
Step 2 Check the check box next to the devices for which you want to generate a pending policy changes report, and
then click Pending Changes Reports.
Step 3 Click Pending Changes Reports. Reports are generated in the background.
Step 4 On the management center menu bar, choose Notifications > Tasks to view the report generation task.
When the report request task is complete, the download link appears within the task notification.
Compare Policies
To review policy changes for compliance with your organization's standards or to optimize system performance,
you can examine the differences between two policies or between a saved policy and the running configuration.
You can compare the following policy types:
• DNS
• File
• Health
• Identity
• Network Analysis
• SSL
The comparison view displays both policies in a side-by-side format. Differences between the two policies
are highlighted:
• Blue indicates that the highlighted setting is different in the two policies, and the difference is noted in
red text.
• Green indicates that the highlighted setting appears in one policy but not the other.
Procedure
Step 1 Access the management page for the policy you want to compare:
• DNS—Policies > Access Control heading > DNS
• File—Policies > Access Control heading > Malware & File
• Health—System ( ) > Health > Policy
• Identity—Policies > Access Control heading > Identity
• Network Analysis—Policies > Access Control heading > Access Control, then click Network Analysis
Policy or Policies > Access Control heading > Intrusion, then click Network Analysis Policies
Note
If your custom user role limits access to the first path listed here, use the second path to access the policy.
Step 4 Depending on the comparison type you choose, you have the following choices:
• If you are comparing two different policies, choose the policies you want to compare from the Policy A
and Policy B drop-down lists.
• If you are comparing the running configuration to another policy, choose the second policy from the
Policy B drop-down list.
Note Intrusion policy reports combine the settings in the base policy with the settings of the policy layers, and make
no distinction between which settings originated in the base policy or policy layer.
Procedure
Step 1 Access the management page for the policy for which you want to generate a report:
• Access Control—Policies > Access Control heading > Access Control
Step 2 Click Report ( ) next to the policy for which you want to generate a report.
Set the number of 7.2.6 Any You can now set the number of deployment history files to retain for device
deployment history files rollback, up to ten (the default). This can help you save disk space on the
7.4.1
to retain for device management center.
rollback.
New/modified screens: Deploy > Deployment History ( ) > Deployment
Setting > Configuration Version Setting
Other version restrictions: Not supported with management center Version
7.3.x or 7.4.0.
View and generate 7.2.6 Any You can generate, view, and download (as a zip file) the following reports on
reports on configuration configuration changes since your last deployment:
7.4.1
changes since your last
• A policy changes report for each device that previews the additions,
deployment.
changes, or deletions in the policy, or the objects that are to be deployed
on the device.
• A consolidated report that categorizes each device based on the status of
policy changes report generation.
This is especially useful after you upgrade either the management center or
threat defense devices, so that you can see the changes made by the upgrade
before you deploy.
New/modified screens: Deploy > Advanced Deploy.
Other version restrictions: Not supported with management center Version
7.3.x or 7.4.0.
Generate and email a 7.2 Any You can now generate a report for any deployment.
report when you deploy
configuration changes. New/modified screens: Deploy > Deployment History( ) icon >
More( )Generate Report
Deployment preview and 7.0 Any The Deployment page has the following newly added features:
user information in
• On the Deployment page, the Modified By column lists the users who
preview.
have modified the policies against each policy listing.
• Filter support for deployment – The Filter icon provided on the
Deployment page provides an option to filter the device listings that are
pending deployment. The Filter icon provides options to filter the listings
based on selected devices and user names.
• Deployment History Preview – Click Preview to view the policy and
object changes deployed on the device versus the previously deployed
version. In the deployment history, the last 10 successful deployments,
the last five failed deployments, and last five rollback deployments are
captured.
• Deployment Notes – The Deployment Notes are custom and optional
notes that a user can add as part of deployment. You can view the
Deployment Notes column in the Deployment History page.
• Deployment rollback is available for Snort 3 policies as well.
Roll back deployment on 6.7 6.7 Rollback is a deployment functionality provided to remove the existing
threat defense devices. deployment on threat defense devices and to reconfigure the device with the
previously deployed configuration.
New/modified pages: The Deploy > Deployment History page provides a new
Rollback column with the rollback icons. Similar rollback icons can also be
found when the jobs are expanded, to initiate rollback at the device level.
New deployment web 6.6 Any The Deploy button on the management center menu bar is changed to Deploy
interface. menu. There are two new sub-menu options under it. These are Deployment
and Deployment History. The Deployment page has undergone an
improvement along with newly added features, and the new Deployment History
page provides a legend of all the previous deployments.
The Deployment page has the following newly added features:
• Deployment status - On the Deployment page, the Status column provides
the deployment status for each device.
• Deployment estimate - The Estimate link is available on the Deployment
page after you select a device, a policy, or a configuration. The Estimate
link provides an estimate of the deployment duration once clicked.
• Deployment preview - Preview provides a snapshot of all the policy and
object changes to be deployed on the device. The policy changes include
the new policies, changes in the existing policies, and the deleted policies.
The object changes include the added and modified objects which are
used in policies.
• Selective policy deployment - management center allows you to select a
specific policy within the list of all the changes on the device that are due
for deployment and deploy only the selected policy.
Note The firewall mode only affects regular firewall interfaces, and not IPS-only interfaces such as inline sets or
passive interfaces. IPS-only interfaces can be used in both firewall modes. See Inline Sets and Passive Interfaces,
on page 883 for more information about IPS-only interfaces. Inline sets might be familiar to you as "transparent
inline sets," but the inline interface type is unrelated to the transparent firewall mode described in this chapter
or the firewall-type interfaces.
Caution
• Use FTD CLI commands to set "Firewall Mode."
mode. In routed mode, you can have one or more isolated bridge groups like in transparent mode, but also
have normal routed interfaces as well for a mixed deployment.
you can allow DHCP traffic (instead of the unsupported DHCP relay feature) or multicast traffic such as that
created by IP/TV. You can also establish routing protocol adjacencies through a transparent firewall; you can
allow OSPF, RIP, EIGRP, or BGP traffic through based on an access rule. Likewise, protocols like HSRP or
VRRP can pass through the threat defense device.
If you do not name the BVI in routed mode, then the threat defense device does not route bridge group traffic.
This configuration replicates transparent firewall mode for the bridge group. If you do not need clustering or
EtherChannel member interfaces, you might consider using routed mode instead. In routed mode, you can
have one or more isolated bridge groups like in transparent mode, but also have normal routed interfaces as
well for a mixed deployment.
The following figure shows two networks connected to the threat defense device, which has two bridge groups.
Figure 114: Transparent Firewall Network with Two Bridge Groups
Figure 115: Routed Firewall Network with an Inside Bridge Group and an Outside Routed Interface
BPDU Handling
To prevent loops using the Spanning Tree Protocol, BPDUs are passed by default.
By default BPDUs are also forwarded for advanced inspection, which is unnecessary for this type of packet,
and which can cause problems if they are blocked due to an inspection restart, for example. We recommend
that you always exempt BPDUs from advanced inspection. To do so, use FlexConfig to configure an EtherType
ACL that trusts BPDUs and exempts them from advanced inspection on each member interface. See FlexConfig
Policies, on page 2617.
The FlexConfig object should deploy the following commands, where you replace <if-name> with an interface
name. Add as many access-group commands as needed to cover each bridge group member interface on the
device. You can also choose a different name for the ACL.
• Traffic at least one hop away for which the threat defense device performs NAT—Configure a static
route on the threat defense device for traffic destined for the remote network. You also need a static route
on the upstream router for traffic destined for the mapped addresses to be sent to the threat defense device.
This routing requirement is also true for embedded IP addresses for VoIP and DNS with NAT enabled,
and the embedded IP addresses are at least one hop away. The threat defense device needs to identify
the correct egress interface so it can perform the translation.
Feature Description
Dynamic DNS —
DHCPv6 stateless server Only the DHCPv4 server is supported on bridge group member interfaces.
DHCP relay The transparent firewall can act as a DHCPv4 server, but it does not support
DHCP relay. DHCP relay is not required because you can allow DHCP
traffic to pass through using two access rules: one that allows DCHP
requests from the inside interface to the outside, and one that allows the
replies from the server in the other direction.
Feature Description
Dynamic routing protocols You can, however, add static routes for traffic originating on the threat
defense device for bridge group member interfaces. You can also allow
dynamic routing protocols through the threat defense device using an
access rule.
Multicast IP routing You can allow multicast traffic through the threat defense device by
allowing it in an access rule.
QoS —
VPN termination for through The transparent firewall supports site-to-site VPN tunnels for management
traffic connections only on bridge group member interfaces. It does not terminate
VPN connections for traffic through the threat defense device. You can
pass VPN traffic through the ASA using an access rule, but it does not
terminate non-management connections.
Feature Description
EtherChannel member interfaces Only physical interfaces, redundant interfaces, and subinterfaces are
supported as bridge group member interfaces.
Management interfaces are also not supported.
Dynamic DNS —
DHCP relay The routed firewall can act as a DHCPv4 server, but it does not support
DHCP relay on BVIs or bridge group member interfaces.
Dynamic routing protocols You can, however, add static routes for BVIs. You can also allow dynamic
routing protocols through the threat defense device using an access rule.
Non-bridge group interfaces support dynamic routing.
Multicast IP routing You can allow multicast traffic through the threat defense device by
allowing it in an access rule. Non-bridge group interfaces support multicast
routing.
Feature Description
VPN termination for through You cannot terminate a VPN connection on the BVI. Non-bridge group
traffic interfaces support VPN.
Bridge group member interfaces support site-to-site VPN tunnels for
management connections only. It does not terminate VPN connections for
traffic through the threat defense device. You can pass VPN traffic through
the bridge group using an access rule, but it does not terminate
non-management connections.
Default Settings
Bridge Group Defaults
By default, all ARP packets are passed within the bridge group.
• In transparent mode, do not specify the BVI IP address as the default gateway for connected devices;
devices need to specify the router on the other side of the threat defense as the default gateway.
• In transparent mode, the default route, which is required to provide a return path for management traffic,
is only applied to management traffic from one bridge group network. This is because the default route
specifies an interface in the bridge group as well as the router IP address on the bridge group network,
and you can only define one default route. If you have management traffic from more than one bridge
group network, you need to specify a regular static route that identifies the network from which you
expect management traffic.
• Transparent mode is not supported on threat defense virtual instances deployed on Amazon Web Services,
Microsoft Azure, Google Cloud Platform, and Oracle Cloud Infrastructure.
• In routed mode, to route between bridge groups and other routed interfaces, you must name the BVI.
• In routed mode, threat defense-defined EtherChannel interfaces are not supported as bridge group
members. EtherChannels on the Firepower 4100/9300 can be bridge group members.
• Bidirectional Forwarding Detection (BFD) echo packets are not allowed through the threat defense when
using bridge group members. If there are two neighbors on either side of the threat defense running BFD,
then the threat defense will drop BFD echo packets because they have the same source and destination
IP address and appear to be part of a LAND attack.
Procedure
Step 1 Unregister the threat defense device from the management center.
You cannot change the mode until you deregister the device.
a) Choose Devices > Device Management.
b) Next to the device you want to unregister, click More ( ), and then click Delete.
Step 2 Access the threat defense device CLI, preferably from the console port.
Step 3 Change the firewall mode:
configure firewall [routed | transparent]
Example:
Step 4 Re-register with the management center. See Complete the Threat Defense Initial Configuration Using the
CLI, on page 19 and Add a Device Using a Registration Key (Legacy Screen)—Basic Configuration, on page
36.
About Interfaces
The Firepower 4100/9300 chassis supports physical interfaces, VLAN subinterfaces for container instances,
and EtherChannel (port-channel) interfaces. EtherChannel interfaces can include up to 16 member interfaces
of the same type.
Note that the chassis management interface remains up even if the physical cable or SFP module are unplugged,
or if the mgmt-port shut command is performed, or if the logical device is offline.
Note The chassis management interface does not support jumbo frames.
Interface Types
Physical interfaces, VLAN subinterfaces for container instances, and EtherChannel (port-channel) interfaces
can be one of the following types:
• Data—Use for regular data. Data interfaces cannot be shared between logical devices, and logical devices
cannot communicate over the backplane to other logical devices. For traffic on Data interfaces, all traffic
must exit the chassis on one interface and return on another interface to reach another logical device.
• Data-sharing—Use for regular data. Only supported with container instances, these data interfaces can
be shared by one or more logical devices/container instances (threat defense-using-management center
only). Each container instance can communicate over the backplane with all other instances that share
this interface. Shared interfaces can affect the number of container instances you can deploy. Shared
interfaces are not supported for bridge group member interfaces (in transparent mode or routed mode),
inline sets, passive interfaces, clusters, or failover links.
• Mgmt—Use to manage application instances. These interfaces can be shared by one or more logical
devices to access external hosts; logical devices cannot communicate over this interface with other logical
devices that share the interface. You can only assign one management interface per logical device.
Depending on your application and manager, you can later enable management from a data interface;
but you must assign a Management interface to the logical device even if you don't intend to use it after
you enable data management. For information about the separate chassis management interface, see
Chassis Management Interface, on page 289.
Note Mgmt interface change will cause reboot of the logical device, for example one
change mgmt from e1/1 to e1/2 will cause the logical device to reboot to apply
the new management.
Note A virtual Ethernet interface is allocated when each application instance is installed.
If the application does not use an eventing interface, then the virtual interface
will be in an admin down state.
Firepower # show interface Vethernet775
Firepower # Vethernet775 is down (Administratively down)
Bound Interface is Ethernet1/10
Port description is server 1/1, VNIC ext-mgmt-nic5
• Cluster—Use as the cluster control link for a clustered logical device. By default, the cluster control link
is automatically created on Port-channel 48. The Cluster type is only supported on EtherChannel interfaces.
For multi-instance clustering, you cannot share a Cluster-type interface across devices. You can add
VLAN subinterfaces to the Cluster EtherChannel to provide separate cluster control links per cluster. If
you add subinterfaces to a Cluster interface, you cannot use that interface for a native cluster. The device
manager and Security Cloud Control does not support clustering.
Note This chapter discusses FXOS VLAN subinterfaces only. You can separately create subinterfaces within the
threat defense application. See FXOS Interfaces vs. Application Interfaces, on page 292 for more information.
See the following table for interface type support for the threat defense and ASA applications in standalone
and cluster deployments.
VLAN Subinterfaces
For all logical devices, you can create VLAN subinterfaces within the application.
For container instances in standalone mode only, you can also create VLAN subinterfaces in FXOS.
Multi-instance clusters do not support subinterfaces in FXOS except on the Cluster-type interface.
Application-defined subinterfaces are not subject to the FXOS limit. Choosing in which operating system to
create subinterfaces depends on your network deployment and personal preference. For example, to share a
subinterface, you must create the subinterface in FXOS. Another scenario that favors FXOS subinterfaces
comprises allocating separate subinterface groups on a single interface to multiple instances. For example,
you want to use Port-channel1 with VLAN 2–11 on instance A, VLAN 12–21 on instance B, and VLAN
22–31 on instance C. If you create these subinterfaces within the application, then you would have to share
the parent interface in FXOS, which may not be desirable. See the following illustration that shows the three
ways you can accomplish this scenario:
Figure 117: VLANs in FXOS vs. the Application for Container Instances
For example, create a large EtherChannel to bundle all of your like-kind interfaces together, and then
share subinterfaces of that EtherChannel: Port-Channel1.2, 3, and 4 instead of Port-Channel2,
Port-Channel3, and Port-Channel4. When you share subinterfaces from a single parent, the VLAN group
table provides better scaling of the forwarding table than when sharing physical/EtherChannel interfaces
or subinterfaces across parents.
Figure 118: Best: Shared Subinterface Group on One Parent
If you do not share the same set of subinterfaces with a group of instances, your configuration can cause
more resource usage (more VLAN groups). For example, share Port-Channel1.2, 3, and 4 with instances
1, 2, and 3 (one VLAN group) instead of sharing Port-Channel1.2 and 3 with instances 1 and 2, while
sharing Port-Channel1.3 and 4 with instance 3 (two VLAN groups).
Figure 119: Good: Sharing Multiple Subinterface Groups on One Parent
Each SM-44 module can support up to 14 instances. Instances are split between modules as necessary to stay
within limits.
Table 18: Physical/EtherChannel Interfaces and Instances on a Firepower 9300 with Three SM-44s
32: 0 4: 16%
•8 • Instance 1
•8 • Instance 2
•8 • Instance 3
•8 • Instance 4
30: 0 2: 14%
• 15 • Instance 1
• 15 • Instance 2
30: 1 6: 25%
• 30 (1 ea.) • Instance 1-Instance 6
30: 3: 6: 23%
• 10 (5 ea.) •1 • Instance 1-Instance2
• 10 (5 ea.) •1 • Instance 2-Instance 4
• 10 (5 ea.) •1 • Instance 5-Instance 6
30: 2 5: 28%
• 30 (6 ea.) • Instance 1-Instance 5
30: 4: 5: 26%
• 12 (6 ea.) •2 • Instance 1-Instance2
• 18 (6 ea.) •2 • Instance 2-Instance 5
24: 7 4: 44%
•6 • Instance 1
•6 • Instance 2
•6 • Instance 3
•6 • Instance 4
The following table applies to three SM-44 security modules on a 9300 using subinterfaces on a single parent
physical interface. For example, create a large EtherChannel to bundle all of your like-kind interfaces together,
and then share subinterfaces of that EtherChannel. Sharing multiple physical interfaces uses more forwarding
table resources than sharing multiple subinterfaces.
Each SM-44 module can support up to 14 instances. Instances are split between modules as necessary to stay
within limits.
Table 19: Subinterfaces on One Parent and Instances on a Firepower 9300 with Three SM-44s
Table 20: Physical/EtherChannel Interfaces and Instances on a Firepower 9300 with One SM-44
32: 0 4: 16%
•8 • Instance 1
•8 • Instance 2
•8 • Instance 3
•8 • Instance 4
30: 0 2: 14%
• 15 • Instance 1
• 15 • Instance 2
32: 1 4: 21%
•8 • Instance 1
•8 • Instance 2
•8 • Instance 3
•8 • Instance 4
32: 2 4: 20%
• 16 (8 ea.) • Instance 1-Instance 2
• 16 (8 ea.) • Instance 3-Instance 4
32: 2 4: 25%
•8 • Instance 1
•8 • Instance 2
•8 • Instance 3
•8 • Instance 4
32: 4: 4: 24%
• 16 (8 ea.) •2 • Instance 1-Instance 2
• 16 (8 ea.) •2 • Instance 3-Instance 4
24: 8 3: 37%
•8 • Instance 1
•8 • Instance 2
•8 • Instance 3
10: 10 5: 69%
• 10 (2 ea.) • Instance 1-Instance 5
14: 10 7: 109%
• 12 (2 ea.) • Instance 1-Instance 7 DISALLOWED
The following table applies to the Firepower 9300 with one SM-44 using subinterfaces on a single parent
physical interface. For example, create a large EtherChannel to bundle all of your like-kind interfaces together,
and then share subinterfaces of that EtherChannel. Sharing multiple physical interfaces uses more forwarding
table resources than sharing multiple subinterfaces.
The Firepower 9300 with one SM-44 can support up to 14 instances.
Table 21: Subinterfaces on One Parent and Instances on a Firepower 9300 with One SM-44
Note Do not enable Hardware Bypass and link state propagation for the same inline set.
Note For the Firepower 9300, you can install different application types (ASA and threat defense) on separate
modules in the chassis. You can also run different versions of an application instance type on separate modules.
Note Multi-instance capability is similar to ASA multiple context mode, although the
implementation is different. Multiple context mode partitions a single application
instance, while multi-instance capability allows independent container instances.
Container instances allow hard resource separation, separate configuration
management, separate reloads, separate software updates, and full threat defense
feature support. Multiple context mode, due to shared resources, supports more
contexts on a given platform. Multiple context mode is not available on the threat
defense.
For the Firepower 9300, you can use a native instance on some modules, and container instances on the other
module(s).
Note This document discusses FXOS VLAN subinterfaces only. You can separately create subinterfaces within the
threat defense application. See FXOS Interfaces vs. Application Interfaces, on page 292 for more information.
Note If the destination MAC address is a multicast or broadcast MAC address, the packet is duplicated and delivered
to each instance.
Classification Examples
Figure 122: Packet Classification with a Shared Interface Using MAC Addresses
Inline Sets
For inline sets, you must use unique interfaces and they must be physical interfaces or EtherChannels. The
following figure shows a packet destined to a host on the Instance C inside network from the internet. The
classifier assigns the packet to Instance C because the ingress interface is Ethernet 1/5, which is assigned to
Instance C.
Note Do not use cascading instances (using a shared interface) with High Availability. After a failover occurs and
the standby unit rejoins, MAC addresses can overlap temporarily and cause an outage. You should instead
use unique interfaces for the gateway instance and inside instance using an external switch to pass traffic
between the instances.
• Outside—All instances use the Port-Channel3 interface (data-sharing type). This EtherChannel includes
two 10 Gigibit Ethernet interfaces. Within each application, the interface uses a unique IP address on
the same outside network.
• Failover—Each instance uses a subinterface on Port-Channel4 (data type). This EtherChannel includes
two 10 Gigibit Ethernet interfaces. Each subinterface is on a separate network.
The user-defined prefix is an integer that is converted into hexadecimal. For an example of how the user-defined
prefix is used, if you set a prefix of 77, then the chassis converts 77 into the hexadecimal value 004D (yyxx).
When used in the MAC address, the prefix is reversed (xxyy) to match the chassis native form:
[Link]
For a prefix of 1009 (03F1), the MAC address is:
[Link]
one URL Filtering license per module for a total of 3 licenses, regardless of the number of instances in
use.
For example:
Table 22: Sample License Usage for Container Instances on a Firepower 9300
3 2 3 2
example, you can install 2 SM-40s in chassis 1, and 3 SM-40s in chassis 2. You cannot use clustering if
you install 1 SM-48 and 2 SM-40s in the same chassis.
• Container instance Clustering—You can create a cluster using instances on different model types. For
example, you can create a cluster using an instance on a Firepower 9300 SM-56, SM-48, and SM-40.
You cannot mix the Firepower 9300 and the Firepower 4100 in the same cluster, however.
• High Availability—High Availability is only supported between same-type modules on the Firepower
9300. However, the two chassis can include mixed modules. For example, each chassis has an SM-40,
SM-48, and SM-56. You can create High Availability pairs between the SM-40 modules, between the
SM-48 modules, and between the SM-56 modules.
• ASA and threat defense application types—You can install different application types on separate modules
in the chassis. For example, you can install ASA on module 1 and module 2, and threat defense on module
3.
• ASA or threat defense versions—You can run different versions of an application instance type on
separate modules, or as separate container instances on the same module. For example, you can install
the threat defense 6.3 on module 1, threat defense 6.4 on module 2, and threat defense 6.5 on module 3.
Model Max. Container Available CPU Cores Available RAM Available Disk Space
Instances
Model Max. Container Available CPU Cores Available RAM Available Disk Space
Instances
• High Availability is only supported between same-type modules on the Firepower 9300; but the two
chassis can include mixed modules. For example, each chassis has an SM-56, SM-48, and SM-40. You
can create High Availability pairs between the SM-56 modules, between the SM-48 modules, and between
the SM-40 modules.
• For container instances, each unit must use the same resource profile attributes.
• For container instances: Do not use cascading instances (using a shared interface) with High Availability.
After a failover occurs and the standby unit rejoins, MAC addresses can overlap temporarily and cause
an outage. You should instead use unique interfaces for the gateway instance and inside instance using
an external switch to pass traffic between the instances.
• For other High Availability system requirements, see High Availability System Requirements, on page
415.
• Firepower 9300— You can include up to 16 nodes in the cluster. For example, you can use 1 module in
16 chassis, or 2 modules in 8 chassis, or any combination that provides a maximum of 16 modules.
Supports clustering with multiple chassis and clustering isolated to security modules within one chassis.
• Firepower 4100—Supported for up to 16 nodes using clustering with multiple chassis.
User Roles
• Admin
• Access Admin
• Network Admin
• Must run the identical FXOS and application software except at the time of an image upgrade. Mismatched
software versions can lead to poor performance, so be sure to upgrade all nodes in the same maintenance
window.
• Must include the same interface configuration for interfaces you assign to the cluster, such as the same
Management interface, EtherChannels, active interfaces, speed and duplex, and so on. You can use
different network module types on the chassis as long as the capacity matches for the same interface IDs
and interfaces can successfully bundle in the same spanned EtherChannel. Note that all data interfaces
must be EtherChannels in clusters with multiple chassis. If you change the interfaces in FXOS after you
enable clustering (by adding or removing interface modules, or configuring EtherChannels, for example),
then perform the same changes on each chassis, starting with the data nodes, and ending with the control
node.
• Must use the same NTP server. For threat defense, the management center must also use the same NTP
server. Do not set the time manually.
• Mix and match clusters and standalone instances—Not all container instances on a security module/engine
need to belong to a cluster. You can use some instances as standalone or High Availability nodes. You
can also create multiple clusters using separate instances on the same security module/engine.
• All 3 modules in a Firepower 9300 must belong to the cluster—For the Firepower 9300, a cluster requires
a single container instance on all 3 modules. You cannot create a cluster using instances on module 1
and 2, and then use a native instance on module 3, or example.
• Match resource profiles—We recommend that each node in the cluster use the same resource profile
attributes; however, mismatched resources are allowed when changing cluster nodes to a different resource
profile, or when using different models.
• Dedicated cluster control link—For clusters with multiple chassis, each cluster needs a dedicated cluster
control link. For example, each cluster can use a separate subinterface on the same cluster-type
EtherChannel, or use separate EtherChannels.
• No shared interfaces—Shared-type interfaces are not supported with clustering. However, the same
Management and Eventing interfaces can used by multiple clusters.
• No subinterfaces—A multi-instance cluster cannot use FXOS-defined VLAN subinterfaces. An exception
is made for the cluster control link, which can use a subinterface of the Cluster EtherChannel.
• Mix chassis models—We recommend that you use the same security module or chassis model for each
cluster instance. However, you can mix and match container instances on different Firepower 9300
security module types or Firepower 4100 models in the same cluster if required. You cannot mix Firepower
9300 and 4100 instances in the same cluster. For example, you can create a cluster using an instance on
a Firepower 9300 SM-56, SM-48, and SM-40. Or you can create a cluster on a Firepower 4145 and a
4125.
Switch Requirements
• Be sure to complete the switch configuration and successfully connect all the EtherChannels from the
chassis to the switch(es) before you configure clustering on the Firepower 4100/9300 chassis.
• For supported switch characteristics, see Cisco FXOS Compatibility.
Note If you assign a parent interface to a container instance, it only passes untagged
(non-VLAN) traffic. Do not assign the parent interface unless you intend to pass
untagged traffic. For Cluster type interfaces, the parent interface cannot be used.
• Subinterfaces are supported on Data or Data-sharing type interfaces, as well as Cluster type interfaces.
If you add subinterfaces to a Cluster interface, you cannot use that interface for a native cluster.
• For multi-instance clustering, FXOS subinterfaces are not supported on Data interfaces. However,
subinterfaces are supported for the cluster control link, so you can use either a dedicated EtherChannel
or a subinterface of an EtherChannel for the cluster control link. Note that application-defined subinterfaces
are supported for Data interfaces.
• You can create up to 500 VLAN IDs.
• See the following limitations within the logical device application; keep these limitations in mind when
planning your interface allocation.
• You cannot use subinterfaces for an threat defense inline set or as a passive interface.
• If you use a subinterface for the failover link, then all subinterfaces on that parent, and the parent
itself, are restricted for use as failover links. You cannot use some subinterfaces as failover links,
and some as regular data interfaces.
Data-sharing Interfaces
• You cannot use a data-sharing interface with a native instance.
• Maximum 14 instances per shared interface. For example, you can allocate Ethernet1/1 to Instance1
through Instance14.
Maximum 10 shared interfaces per instance. For example, you can allocate Ethernet1/1.1 through
Ethernet1/1.10 to Instance1.
• See the following limitations within the logical device application; keep these limitations in mind when
planning your interface allocation.
• You cannot use a data-sharing interface with a transparent firewall mode device.
• You cannot use a data-sharing interface with threat defense inline sets or passive interfaces.
• You cannot use a data-sharing interface for the failover link.
Hardware Bypass
• Supported for the threat defense; you can use them as regular interfaces for the ASA.
• The threat defense only supports Hardware Bypass with inline sets.
• Hardware Bypass-capable interfaces cannot be configured for breakout ports.
• You cannot include Hardware Bypass interfaces in an EtherChannel and use them for Hardware Bypass;
you can use them as regular interfaces in an EtherChannel.
• Hardware Bypass is not supported with High Availability.
• Do not enable Hardware Bypass and link state propagation for the same inline set.
High Availability
• Configure high availability within the application configuration.
• You can use any data interfaces as the failover and state links. Data-sharing interfaces are not supported.
Multi-Instance
• Multi-instance capability with container instances is only available for the threat defense using management
center.
• For threat defense container instances, a single management center must manage all instances on a security
module/engine.
• For threat defense container instances, the following features are not supported:
• Radware DefensePro link decorator
• Management Center UCAPL/CC mode
• Flow offload to hardware
Configure Interfaces
By default, physical interfaces are disabled. You can enable interfaces, add EtherChannels, add VLAN
subinterfaces, and edit interface properties.
Procedure
Step 2 To enable the interface, click the disabled Slider disabled ( ) so that it changes to the enabled Slider
enabled ( ).
Click Yes to confirm the change. The corresponding interface in the visual representation changes from gray
to green.
Step 3 To disable the interface, click the enabled Slider enabled ( ) so that it changes to the disabled Slider
disabled ( ).
Click Yes to confirm the change. The corresponding interface in the visual representation changes from green
to gray.
Note • For QSFPH40G-CUxM, auto-negotiation is always enabled by default and you cannot disable it.
• If you replace an SFP on a port with a different SFP module, the speed, duplex, and auto-negotiation of
the interface is not updated automatically. You must manually re-configure the interface.
Procedure
Step 2 Click Edit in the row for the interface you want to edit to open the Edit Interface dialog box.
Step 3 To enable the interface, check the Enable check box. To disable the interface, uncheck the Enable check
box.
Step 4 Choose the interface Type:
See Interface Types, on page 290 for details about interface type usage.
• Data
• Data-sharing—For container instances only.
• Mgmt
• Firepower-eventing—For threat defense only.
• Cluster—Do not choose the Cluster type; by default, the cluster control link is automatically created
on Port-channel 48.
Step 5 (Optional) Choose the speed of the interface from the Speed drop-down list.
Step 6 (Optional) If your interface supports Auto Negotiation, click the Yes or No radio button.
Step 7 (Optional) Choose the duplex of the interface from the Duplex drop-down list.
Step 8 (Optional) Explicitly configure Debounce Time (ms). Enter a value between 0-15000 milli-seconds.
Note
Configuring Debounce Time is not supported on 1G interfaces.
Note It may take up to three minutes for an EtherChannel to come up to an operational state if you change its mode
from On to Active or from Active to On.
• The EtherChannel is added as a management interface or cluster control link for a logical device that is
part of a cluster
• The EtherChannel is added as a data interface for a logical device that is part of a cluster and at least one
unit has joined the cluster
Note that the EtherChannel does not come up until you assign it to a logical device. If the EtherChannel is
removed from the logical device or the logical device is deleted, the EtherChannel will revert to a Suspended
or Down state.
Procedure
Step 2 Click Add Port Channel above the interfaces table to open the Add Port Channel dialog box.
Step 3 Enter an ID for the port channel in the Port Channel ID field. Valid values are between 1 and 47.
Port-channel 48 is reserved for the cluster control link when you deploy a clustered logical device. If you do
not want to use Port-channel 48 for the cluster control link, you can delete it and configure a Cluster type
EtherChannel with a different [Link] can add multiple Cluster type EtherChannels and add VLAN subinterfaces
for use with multi-instance clustering. For intra-chassis clustering, do not assign any interfaces to the Cluster
EtherChannel.
Step 4 To enable the port channel, check the Enable check box. To disable the port channel, uncheck the Enable
check box.
Step 5 Choose the interface Type:
See Interface Types, on page 290 for details about interface type usage.
• Data
• Data-sharing—For container instances only.
• Mgmt
• Firepower-eventing—For threat defense only.
• Cluster
Step 6 Set the required Admin Speed for the member interfaces from the drop-down list.
If you add a member interface that is not at the specified speed, it will not successfully join the port channel.
Step 7 For Data or Data-sharing interfaces, choose the LACP port-channel Mode, Active or On.
For non-Data or non-Data-sharing interfaces, the mode is always active.
Step 8 Set the required Admin Duplex for the member interfaces, Full Duplex or Half Duplex.
If you add a member interface that is configured with the specified duplex, it will not successfully join the
port channel.
Step 9 To add an interface to the port channel, select the interface in the Available Interface list and click Add
Interface to move the interface to the Member ID list.
You can add up to 16 member interfaces of the same media type and capacity. The member interfaces must
be set to the same speed and duplex, and must match the speed and duplex that you configured for this port
channel. The media type can be either RJ-45 or SFP; SFPs of different types (copper and fiber) can be mixed.
You cannot mix interface capacities (for example 1GB and 10GB interfaces) by setting the speed to be lower
on the larger-capacity interface.
Tip
You can add multiple interfaces at one time. To select multiple individual interfaces, click on the desired
interfaces while holding down the Ctrl key. To select a range of interfaces, select the first interface in the
range, and then, while holding down the Shift key, click to select the last interface in the range.
Step 10 To remove an interface from the port channel, click the Delete button to the right of the interface in the Member
ID list.
Step 11 Click OK.
Procedure
Step 2 Click Add New > Subinterface to open the Add Subinterface dialog box.
Step 3 Choose the interface Type:
See Interface Types, on page 290 for details about interface type usage.
• Data
• Data-sharing
• Cluster—If you add subinterfaces to a Cluster interface, you cannot use that interface for a native cluster.
For Data and Data-sharing interfaces: The type is independent of the parent interface type; you can have a
Data-sharing parent and a Data subinterface, for example.
Note Instances with a smaller number of cores might experience relatively higher CPU
utilization than those with larger numbers of cores. Instances with a smaller
number of cores are more sensitive to traffic load changes. If you experience
traffic drops, try assigning more cores.
• You can assign cores as an even number (6, 8, 10, 12, 14 etc.) up to the maximum.
• The maximum number of cores available depends on the security module/chassis model; see Requirements
and Prerequisites for Container Instances, on page 315.
The chassis includes a default resource profile called "Default-Small," which includes the minimum number
of cores. You can change the definition of this profile, and even delete it if it is not in use. Note that this profile
is created when the chassis reloads and no other profile exists on the system.
Changing the resource profile after you assign it is disruptive. See the following guidelines:
• You cannot change the resource profile settings if it is currently in use. You must disable any instances
that use it, then change the resource profile, and finally reenable the instance.
• If you change the resource profile settings after you add the threat defense instance to the management
center, then update the inventory for each unit on the management center Devices > Device Management >
Device > System > Inventory dialog box.
• If you assign a different profile to an instance, it reboots.
• If you assign a different profile to instances in an established high-availability pair, which requires the
profile to be the same on both units, you must:
1. Break high availability.
2. Assign the new profile to both units.
3. Re-establish high availability.
• If you assign a different profile to instances in an established cluster, which allows mismatched profiles,
then apply the new profile on the data nodes first; after they all come back up, you can apply the new
profile to the control node.
Procedure
Step 1 Choose Platform Settings > Resource Profiles , and click Add.
The Add Resource Profile dialog box appears.
Note For the Firepower 9300, you can install different application types (ASA and
threat defense) on separate modules in the chassis. You can also run different
versions of an application instance type on separate modules.
• Configure a management interface to use with the logical device. The management interface is required.
Note that this management interface is not the same as the chassis management port that is used only for
chassis management (and that appears at the top of the Interfaces tab as MGMT).
• You can later enable management from a data interface; but you must assign a Management interface to
the logical device even if you don't intend to use it after you enable data management. See the configure
network management-data-interface command in the FTD command reference for more information.
• You must also configure at least one Data type interface. Optionally, you can also create a
firepower-eventing interface to carry all event traffic (such as web events). See Interface Types, on page
290 for more information.
• For container instances, if you do not want to use the default profile, add a resource profile according to
Add a Resource Profile for Container Instances, on page 328.
• For container instances, before you can install a container instance for the first time, you must reinitialize
the security module/engine so that the disk has the correct formatting. Choose Security Modules or
Security Engine, and click the Reinitialize icon. An existing logical device will be deleted and then
reinstalled as a new device, losing any local application configuration. If you are replacing a native
instance with container instances, you will need to delete the native instance in any case. You cannot
automatically migrate a native instance to a container instance.
• Gather the following information:
• Interface IDs for this device
• Management interface IP address and network mask
• Gateway IP address
• management center IP address and/or NAT ID of your choosing
• DNS server IP address
• threat defense hostname and domain name
Procedure
Step 3 Expand the Data Ports area, and click each interface that you want to assign to the device.
You can only assign data and data-sharing interfaces that you previously enabled on the Interfaces page. You
will later enable and configure these interfaces in management center, including setting the IP addresses.
You can only assign up to 10 data-sharing interfaces to a container instance. Also, each data-sharing interface
can be assigned to at most 14 container instances. A data-sharing interface is indicated by the sharing icon
( ).
Hardware Bypass-capable ports are shown with the following icon: . For certain interface modules, you
can enable the Hardware Bypass feature for Inline Set interfaces only (see the management center configuration
guide). Hardware Bypass ensures that traffic continues to flow between an inline interface pair during a power
outage. This feature can be used to maintain network connectivity in the case of software or hardware failures.
If you do not assign both interfaces in a Hardware Bypass pair, you see a warning message to make sure your
assignment is intentional. You do not need to use the Hardware Bypass feature, so you can assign single
interfaces if you prefer.
a) (For the Firepower 9300) Under Security Module Selection click the security module that you want to
use for this logical device.
b) For a container instance, specify the Resource Profile.
If you later assign a different resource profile, then the instance will reload, which can take approximately
5 minutes.
Note
If you later assign a different profile to instances in an established high-availability pair, which requires
the profile to be the same on both units, you must:
1. Break high availability.
2. Assign the new profile to both units.
3. Re-establish high availability.
a) For a native instance, in the Management type of application instance drop-down list, choose FMC.
Native instances also support device manager as a manager. After you deploy the logical device, you
cannot change the manager type.
b) Enter the Firepower Management Center IP of the managing management center. If you do not know
the management center IP address, leave this field blank and enter a passphrase in the Firepower
Management Center NAT ID field.
c) For a container instance, Permit Expert mode from FTD SSH sessions: Yes or No. Expert Mode provides
threat defense shell access for advanced troubleshooting.
If you choose Yes for this option, then users who access the container instance directly from an SSH
sesssion can enter Expert Mode. If you choose No, then only users who access the container instance from
the FXOS CLI can enter Expert Mode. We recommend choosing No to increase isolation between instances.
Use Expert Mode only if a documented procedure tells you it is required, or if the Cisco Technical
Assistance Center asks you to use it. To enter this mode, use the expert command in the threat defense
CLI.
d) Enter the Search Domains as a comma-separated list.
e) Choose the Firewall Mode: Transparent or Routed.
In routed mode, the threat defense is considered to be a router hop in the network. Each interface that you
want to route between is on a different subnet. A transparent firewall, on the other hand, is a Layer 2
firewall that acts like a “bump in the wire,” or a “stealth firewall,” and is not seen as a router hop to
connected devices.
The firewall mode is only set at initial deployment. If you re-apply the bootstrap settings, this setting is
not used.
f) Enter the DNS Servers as a comma-separated list.
The threat defense uses DNS if you specify a hostname for the management center, for example.
g) Enter the Fully Qualified Hostname for the threat defense.
h) Enter a Registration Key to be shared between the management center and the device during registration.
You can choose any text string for this key between 1 and 37 characters; you will enter the same key on
the management center when you add the threat defense.
i) Enter a Password for the threat defense admin user for CLI access.
j) Choose the Eventing Interface on which events should be sent. If not specified, the management interface
will be used.
This interface must be defined as a Firepower-eventing interface.
k) For a container instance, set the Hardware Crypto as Enabled or Disabled.
This setting enables TLS crypto acceleration in hardware, and improves performance for certain types of
traffic. This feature is enabled by default. You can enable TLS crypto acceleration for up to 16 instances
per security module. This feature is always enabled for native instances. To view the percentage of hardware
crypto resources allocated to this instance, enter the show hw-crypto command.
Step 7 On the Agreement tab, read and accept the end user license agreement (EULA).
Step 8 Click OK to close the configuration dialog box.
Step 9 Click Save.
The chassis deploys the logical device by downloading the specified software version and pushing the bootstrap
configuration and management interface settings to the application instance. Check the Logical Devices page
for the status of the new logical device. When the logical device shows its Status as online, you can start
configuring the security policy in the application.
Step 10 See the management center configuration guide to add the threat defense as a managed device and start
configuring your security policy.
Procedure
Step 3 Enable High Availability on the logical devices. See High Availability, on page 415.
Step 4 If you need to make interface changes after you enable High Availability, perform the changes on the standby
unit first, and then perform the changes on the active unit.
interface changes cause a reboot), and you sync the configuration in the management centerthe , you can
add the (now unallocated) management interface to the EtherChannel as well.
• For clustering or High Availability, make sure you add or remove the interface on all units before you
sync the configuration in the management centerthe . We recommend that you make the interface changes
on the data/standby unit(s) first, and then on the control/active unit. Note that new interfaces are added
in an administratively down state, so they do not affect interface monitoring.
• In mult-instance mode, for changing a sub-interface with an another sub-interface with the same vlan
tag, you must first remove all the configuration (including nameif config) of the interface and then
unalloacte the interface from chassis manager. Once unallocated, add the new interface and then use
sync interfaces from the management center.
Procedure
Procedure
Step 1 Connect to the module CLI using a console connection or a Telnet connection.
connect module slot_number {console | telnet}
To connect to the security engine of a device that does not support multiple security modules, always use 1
as the slot_number.
The benefits of using a Telnet connection is that you can have multiple sessions to the module at the same
time, and the connection speed is faster.
Example:
Firepower-module1>
Synchronization between 6.7 Any The chassis can now synchronize the threat defense operational link state with
the threat defense the physical link state for data interfaces. Currently, interfaces will be in an Up
operational link state and state as long as the FXOS admin state is up and the physical link state is up.
the physical link state The threat defense application interface admin state is not considered. Without
synchronization from threat defense, data interfaces can be in an Up state
physically before the threat defense application has completely come online,
for example, or can stay Up for a period of time after you initiate threat defense
shutdown. For inline sets, this state mismatch can result in dropped packets
because external routers may start sending traffic to the threat defense before
the threat defense can handle it. This feature is disabled by default, and can be
enabled per logical device in FXOS.
Note
This feature is not supported for clustering, container instances, or threat
defense with a Radware vDP decorator. It is also not supported for the ASA.
Threat Defense 6.7 Any You can now use the management center backup/restore tool on threat defense
configuration backup and container instances.
restore using
New/Modified management center screens: System > Tools > Backup/Restore
management center for
> Managed Device Backup
container instances
New/Modified threat defense CLI commands: restore
Supported platforms: Firepower 4100/9300
Note
Requires FXOS 2.9.
Support for VLAN 6.6 Any For use with multi-instance clusters, you can now create VLAN subinterfaces
subinterfaces on a Cluster on cluster type interfaces. Because each cluster requires a unique cluster control
type interface link, VLAN subinterfaces provide a simple method to fulfill this requirement.
(multi-instance use only) You can alternatively assign a dedicated EtherChannel per cluster. Multiple
cluster interfaces are now allowed.
New/Modified Firepower Chassis Manager screens:
Interfaces > All Interfaces > Add New drop-down menu > Subinterface >
Type field
New/Modified FXOS commands: set port-type cluster
Note
Requires FXOS 2.8.1.
TLS crypto acceleration 6.5 Any TLS crypto acceleration is now supported on multiple container instances (up
for multiple container to 16) on a Firepower 4100/9300 chassis. Previously, you could enable TLS
instances crypto acceleration for only one container instance per module/security engine.
New instances have this feature enabled by default. However, the upgrade does
not enable acceleration on existing instances. Instead, use the enter hw-crypto
and then the set admin-state enabled FXOS commands.
New/Modified Firepower Chassis Manager screens:
Logical Devices > Add Device > Settings > Hardware Crypto drop-down
menu
Note
Requires FXOS 2.7.1.
Threat Defense on the 6.4 Any We introduced the Firepower 4115, 4125, and 4145.
Firepower 4115, 4125,
Note
and 4145
Requires FXOS [Link].
Firepower 9300 SM-40, 6.4 Any We introduced the following three security modules: SM-40, SM-48, and
SM-48, and SM-56 SM-56.
support
Note
Requires FXOS [Link].
Support for ASA and 6.4 Any You can now deploy ASA and threat defense logical devices on the same
threat defense on separate Firepower 9300.
modules of the same
Note
Firepower 9300
Requires FXOS [Link].
Support for SSL 6.4 Any You can now enable SSL hardware acceleration for one container instance on
hardware acceleration on a module/security engine. SSL hardware acceleration is disabled for other
one threat defense container instances, but enabled for native instances.
container instance on a
New/Modified FXOS commands: config hwCrypto enable
module/security engine
No modified screens.
Note
Requires FXOS [Link].
Multi-instance capability 6.3 Any You can now deploy multiple logical devices, each with a threat defense
for threat defense on the container instance, on a single security engine/module. Formerly, you could
Firepower 4100/9300 only deploy a single native application instance.
To provide flexible physical interface use, you can create VLAN subinterfaces
in FXOS and also share interfaces between multiple instances. Resource
management lets you customize performance capabilities for each instance.
You can use High Availability using a container instance on 2 separate chassis.
Clustering is not supported.
Note
Multi-instance capability is similar to ASA multiple context mode, although
the implementation is different. Multiple context mode is not available on the
threat defense.
Cluster control link 6.3 Any By default, the cluster control link uses the [Link]/16 network. You can now
customizable IP Address set the network when you deploy the cluster in FXOS. The chassis
for the Firepower auto-generates the cluster control link interface IP address for each unit based
4100/9300 on the chassis ID and slot ID: 127.2.chassis_id.slot_id. However, some
networking deployments do not allow [Link]/16 traffic to pass. Therefore,
you can now set a custom /16 subnet for the cluster control link in FXOS except
for loopback ([Link]/8) and multicast ([Link]/4) addresses.
New/modified Firepower Chassis Manager screens:
• Logical Devices > Add Device > Cluster Information > CCL Subnet
IP field
Support for data 6.3 Any You can now set data and data-sharing EtherChannels to either Active LACP
EtherChannels in On mode or to On mode. Other types of EtherChannels only support Active mode.
mode
New/Modified Firepower Chassis Manager screens:
• Interfaces > All Interfaces > Edit Port Channel > Mode
Support for 6.2 Any You can now use EtherChannels in a threat defense inline set.
EtherChannels in threat
Supported platforms: Firepower 4100/9300
defense inline sets
Inter-chassis clustering 6.2 Any You can now enable inter-chassis clustering for the threat defense. You can
for 6 threat defense include up to 6 modules in up to 6 chassis.
modules
New/modified Firepower Chassis Manager screens:
• Logical Devices > Configuration
Hardware bypass support 6.1 Any Hardware Bypass ensures that traffic continues to flow between an inline
on the Firepower interface pair during a power outage. This feature can be used to maintain
4100/9300 for supported network connectivity in the case of software or hardware failures.
network modules
New/Modified screens:
• Devices > Device Management > Interfaces > Edit Physical Interface
Inline set link state 6.1 Any When you configure an inline set in the threat defense application and enable
propagation support for link state propagation, the threat defense sends inline set membership to the
the threat defense FXOS chassis. Link state propagation means that the chassis automatically
brings down the second interface in the inline interface pair when one of the
interfaces in an inline set goes down.
New/Modified FXOS commands: show fault |grep link-down, show interface
detail
Supported platforms: Firepower 4100/9300
Support for intra-chassis 6.0.1 Any The Firepower 9300 supports intra-chassis clustering with the threat defense
clustering on the threat application.
defense on the Firepower
New/Modified Firepower Chassis Manager screens:
9300
• Logical Devices > Configuration
Appliance Mode
Appliance mode is the default. The device runs the native threat defense image and acts as a single device.
The only chassis-level configuration available (on the Chassis Manager page) is for network module
management (breakout ports or enabling/disabling a network module).
Multi-Instance Mode
If you change to multi-instance mode, the device runs the Secure Firewall eXtensible Operating System
(FXOS) on the chassis, while each instance runs separate threat defense images. You can configure the mode
using the FXOS CLI.
Because multiple instances run on the same chassis, you need to perform chassis-level management of:
• CPU and memory resources using resource profiles.
For a multi-instance device, you add the chassis to the management center and configure chassis-level settings
on the Chassis Manager page.
Note By default, SSH is not allowed to this interface in multi-instance mode unless you enable the SSH server and
an SSH access list. This difference means that you can connect to the application-mode threat defense
Management interface using SSH, but after you convert to multi-instance mode, you can no longer connect
using SSH by default. See Configure SSH and SSH Access List, on page 389.
Instance Management
All instances share the chassis management interface, and each instance has its own IP address on the
Management network. After you add the instance and specify the IP address, you can make changes to the
network settings at the threat defense CLI.
The instance Management IP address allows SSH by default.
Instance Interfaces
To provide flexible physical interface use for instances, you can create VLAN subinterfaces on the chassis
and also share interfaces (VLAN or physical) between multiple instances. See Shared Interface Scalability,
on page 351 and Configure a Subinterface, on page 375.
Note This chapter discusses chassis VLAN subinterfaces only. You can separately create subinterfaces within the
threat defense instance. See Chassis Interfaces vs. Instance Interfaces, on page 349 for more information.
Interface Types
Physical interfaces, VLAN subinterfaces, and EtherChannel interfaces can be one of the following types:
• Data—Use for regular data or the failover link. Data interfaces cannot be shared between instances, and
instances cannot communicate over the backplane to other instances. For traffic on Data interfaces, all
traffic must exit the chassis on one interface and return on another interface to reach another instance.
You can add VLAN subinterfaces to a data interface to provide separate failover links per High Availability
pair.
• Data-sharing—Use for regular data. These data interfaces can be shared by one or more instances. Each
instance can communicate over the backplane with all other instances that share this interface. Shared
interfaces can affect the number of instances you can deploy. Shared interfaces are not supported for
bridge group member interfaces (in transparent mode or routed mode), inline sets, passive interfaces, or
failover links.
VLAN Subinterfaces
You can create VLAN subinterfaces within the instance, just as you would for any device.
You can also create VLAN subinterfaces in the chassis. The instance-defined subinterfaces are not subject to
the chassis limit. Choosing in which location to create subinterfaces depends on your network deployment
and personal preference. For example, to share a subinterface, you must create the subinterface on the chassis.
Another scenario that favors chassis subinterfaces comprises allocating separate subinterface groups on a
single interface to multiple instances. For example, you want to use Port-channel1 with VLAN 2–11 on
instance A, VLAN 12–21 on instance B, and VLAN 22–31 on instance C. If you create these subinterfaces
in the instance, then you would have to share the parent interface in the chassis, which may not be desirable.
See the following illustration that shows the three ways you can accomplish this scenario:
Port-Channel3, and Port-Channel4. When you share subinterfaces from a single parent, the VLAN group
table provides better scaling of the forwarding table than when sharing physical/EtherChannel interfaces
or subinterfaces across parents.
Figure 128: Best: Shared Subinterface Group on One Parent
If you do not share the same set of subinterfaces with a group of instances, your configuration can cause
more resource usage (more VLAN groups). For example, share Port-Channel1.2, 3, and 4 with instances
1, 2, and 3 (one VLAN group) instead of sharing Port-Channel1.2 and 3 with instances 1 and 2, while
sharing Port-Channel1.3 and 4 with instance 3 (two VLAN groups).
Figure 129: Good: Sharing Multiple Subinterface Groups on One Parent
Note If the destination MAC address is a multicast or broadcast MAC address, the packet is duplicated and delivered
to each instance.
Classification Examples
Packet Classification with a Shared Interface Using MAC Addresses
The following figure shows multiple instances sharing an outside interface. The classifier assigns the packet
to Instance C because Instance C includes the MAC address to which the router sends the packet.
Figure 132: Packet Classification with a Shared Interface Using MAC Addresses
Inline Sets
For inline sets, you must use unique interfaces and they must be physical interfaces or EtherChannels. The
following figure shows a packet destined to a host on the Instance C inside network from the internet. The
classifier assigns the packet to Instance C because the ingress interface is Ethernet 1/5, which is assigned to
Instance C.
Cascading Instances
Placing an instance directly in front of another instance is called cascading instances; the outside interface of
one instance is the same interface as the inside interface of another instance. You might want to cascade
instances if you want to simplify the configuration of some instances by configuring shared parameters in the
top instance.
The following figure shows a gateway instance with two instances behind the gateway.
Note Do not use cascading instances (using a shared interface) with High Availability. After a failover occurs and
the standby unit rejoins, MAC addresses can overlap temporarily and cause an outage. You should instead
use unique interfaces for the gateway instance and inside instance using an external switch to pass traffic
between the instances.
• Outside—All instances use the Port-Channel2 interface (data-sharing type). This EtherChannel includes
two 10 Gigibit Ethernet interfaces. Within each application, the interface uses a unique IP address on
the same outside network.
• Failover—Each instance uses a subinterface on Port-Channel3 (data type). This EtherChannel includes
two 10 Gigibit Ethernet interfaces. Each subinterface is on a separate network.
MAC address pool. For example, if the range of MAC addresses shown for module 1 is b0aa.772f.f0b0 to
b0aa.772f.f0bf, then the system prefix will be f0b0.
The user-defined prefix is an integer that is converted into hexadecimal. For an example of how the user-defined
prefix is used, if you set a prefix of 77, then the chassis converts 77 into the hexadecimal value 004D (yyxx).
When used in the MAC address, the prefix is reversed (xxyy) to match the chassis native form:
[Link]
For a prefix of 1009 (03F1), the MAC address is:
[Link]
Software Requirements
• You can run different versions of threat defense software on each instance as long as they are all compatible
with the version of FXOS running on the chassis.
• You cannot deploy an instance with a patch version of the threat defense software because it is not a
complete bundle. You need to first deploy the major or maintenance version, and then patch it after
deployment.
• Primary management of the chassis by Security Cloud Control cloud-delivered management center and
separate analytics-only management of the chassis by an on-prem management center is not supported.
You can however add Security Cloud Control-managed instances to an analytics-only on-prem
management center.
Management Interface
• No support for a data interface for chassis management; only the dedicated Management interface can
be used
• No DHCP addressing for the Management interface
VLAN Subinterfaces
• This document discusses chassis VLAN subinterfaces only. You can separately create subinterfaces
within the instance.
• If you assign a parent interface to an instance, it only passes untagged (non-VLAN) traffic. Do not assign
the parent interface unless you intend to pass untagged traffic.
• Subinterfaces are supported on Data or Data-sharing type interfaces.
• You can create up to 500 VLAN IDs.
EtherChannels
• You can configure up to 48 EtherChannels, limited by the number of physical interfaces.
• The EtherChannel can have up to 8 active interfaces.
• All interfaces in the EtherChannel must be the same media type and speed capacity. The media type can
be either RJ-45 or SFP; SFPs of different types (copper and fiber) can be mixed. You cannot mix interface
capacities (for example 1GB and 10GB interfaces) by setting the speed to be lower on the larger-capacity
interface, unless you set the speed to Detect SFP; in this case, you can use different interface capacities,
and the lowest common speed is used.
• The chassis does not support LACPDUs that are VLAN-tagged. If you enable native VLAN tagging on
the neighboring switch using the Cisco IOS vlan dot1Q tag native command, then the chassis will drop
the tagged LACPDUs. Be sure to disable native VLAN tagging on the neighboring switch.
• In Cisco IOS software versions earlier than 15.1(1)S2, the chassis did not support connecting an
EtherChannel to a switch stack. With default switch settings, if the chassis EtherChannel is connected
cross stack, and if the primary switch is powered down, then the EtherChannel connected to the remaining
switch will not come up. To improve compatibility, set the stack-mac persistent timer command to a
large enough value to account for reload time; for example, 8 minutes or 0 for indefinite. Or, you can
upgrade to more a more stable switch software version, such as 15.1(1)S2.
Data-sharing Interfaces
• Maximum 14 instances per shared interface. For example, you can allocate Ethernet1/1 to Instance1
through Instance14.
Maximum 10 shared interfaces per instance. For example, you can allocate Ethernet1/1.1 through
Ethernet1/1.10 to Instance1.
• You cannot use a data-sharing interface with a transparent firewall mode instance.
• You cannot use a data-sharing interface with inline sets or passive interfaces.
• You cannot use a data-sharing interface for the failover link.
Configure Instances
Before you configure instances, you need to enable multi-instance mode, add the chassis to the management
center, and configure chassis interfaces. You can also customize the chassis settings.
with the exception of the Management network settings and the admin password. The chassis hostname is set
to "firepower-model." The Management IP address is assigned to the chassis for the management connection
with the management center. When you add instances, they will use separate IP addresses on the Management
interface and maintain their own management connections.
After you convert to multi-instance mode, you can use the management center to configure all chassis settings
as well as instances. The Secure Firewall chassis manager or configuration at the FXOS CLI is not supported.
Note If you would prefer to use the CLI to convert to multi-instance mode before adding the device to the
management center, see Enable Multi-Instance Mode at the CLI, on page 402.
Procedure
Step 1 On Devices > Device Management, next to the device you want to convert to multi-instance mode, choose
More ( ) > Convert to Multi-Instance.
Figure 138: Convert to Multi-Instance
You can alternatively check the check-box next to multiple devices that you want to convert, and choose
Select Bulk Action > Convert to Multi-Instance.
Step 2 Confirm that you want to perform the conversion and click Continue.
Figure 140: Conversion Confirmation
A readiness check is performed. The check might fail if, for example, a deployment is in progress.
Step 3 Optionally change the name of the chassis, and click Convert to Multi-Instance. By default, the device name
is used, but you may want a different naming convention for multi-instance chassis.
Note
If the readiness check failed, for example because of a deployment in progress, you can wait for the process
to complete and click to rerun the readiness check so you can continue.
Wait for approximately 15 minutes, during which the device is removed from the device list, and then after
conversion, it is re-added as a chassis.
Step 4 To view and configure the chassis, click Manage in the Chassis column, or click Edit ( ).
The Chassis Manager page opens for the chassis to the Summary page.
Figure 142: Chassis Summary
Note To configure breakout ports and perform other network module operations, see Manage the Network Module
for the Secure Firewall 3100/4200, on page 780.
Note For information about the Sync Device button, see Sync Interface Changes with the Management Center, on
page 779.
Procedure
Step 1 From Devices > Device Management, click Manage in the Chassis column or click Edit ( ).
Figure 143: Manage Chassis
The Chassis Manager page opens for the chassis to the Summary page.
Step 8 (Optional) Check LLDP Transmit and/or LLDP Receive to enable Link Layer Discovery Protocol (LLDP)
packets.
Step 9 (Optional) Check Flow Control Send to enable pause (XOFF) frames for flow control.
Flow control enables connected Ethernet ports to control traffic rates during congestion by allowing congested
nodes to pause link operation at the other end. If the threat defense port experiences congestion (exhaustion
of queuing resources on the internal switch) and cannot receive any more traffic, it notifies the other port by
sending a pause frame to stop sending until the condition clears. Upon receipt of a pause frame, the sending
device stops sending any data packets, which prevents any loss of data packets during the congestion period.
Note
The threat defense supports transmitting pause frames so that the remote peer can rate-control the traffic.
However, receiving of pause frames is not supported.
The internal switch has a global pool of 8000 buffers of 250 bytes each, and the switch allocates buffers
dynamically to each port. A pause frame is sent out every interface with flow control enabled when the buffer
usage exceeds the global high-water mark (2 MB (8000 buffers)); and a pause frame is sent out of a particular
interface when its buffer exceeds the port high-water mark (.3125 MB (1250 buffers)). After a pause is sent,
an XON frame can be sent when the buffer usage is reduced below the low-water mark (1.25 MB globally
(5000 buffers); .25 MB per port (1000 buffers)). The link partner can resume traffic after receiving an XON
frame.
Only flow control frames defined in 802.3x are supported. Priority-based flow control is not supported.
Step 10 (Optional) Check Auto Negotiation to set the interface to negotiate the speed, link status, and flow control.
You cannot edit this setting for speeds lower than 1Gbps. For SFP interfaces, you can only disable
auto-negotiation when the speed is set to 1Gbps.
Step 11 Click Save and then Save in the top right of the Interfaces page.
You can now Deploy the policy to the chassis. The changes are not active until you deploy them.
Configure an EtherChannel
An EtherChannel (also known as a port channel) can include up to 8 member interfaces of the same media
type and capacity, and must be set to the same speed and duplex. The media type can be either RJ-45 or SFP;
SFPs of different types (copper and fiber) can be mixed. You cannot mix interface capacities (for example
1GB and 10GB interfaces) by setting the speed to be lower on the larger-capacity interface, unless you set
the speed to Detect SFP; in this case, you can use different interface capacities, and the lowest common speed
is used.
The Link Aggregation Control Protocol (LACP) aggregates interfaces by exchanging the Link Aggregation
Control Protocol Data Units (LACPDUs) between two network devices. LACP coordinates the automatic
addition and deletion of links to the EtherChannel without user intervention. It also handles misconfigurations
and checks that both ends of member interfaces are connected to the correct channel group. “On” mode cannot
use standby interfaces in the channel group when an interface goes down, and the connectivity and
configurations are not checked.
When the chassis creates an EtherChannel, the EtherChannel stays in a Suspended state for Active LACP
mode or a Down state for On LACP mode until you assign it to a logical device, even if the physical link is
up. The EtherChannel will be brought out of this Suspended state when it is added to an instance.
Procedure
Step 1 From Devices > Device Management, click Manage in the Chassis column or click Edit ( ).
Figure 147: Manage Chassis
The Chassis Manager page opens for the chassis to the Summary page.
d) To add a physical interface to the EtherChannel, select click Add ( ) in the Available Interfaces list
to move it to the Selected Interfaces list.
To add or remove all interfaces, click the double arrow button.
Note
You cannot add an interface that is already assigned to an instance.
Many of these settings (excluding the LACP settings) set the requirements for interfaces to be included in the
EtherChannel; they do not override the settings of member interfaces. So if you check LLDP Transmit, for
example, you should only add interfaces that have that setting. If you set the Admin Speed to 1Gbps, then
only 1Gbps interfaces can be included.
Figure 151: Configuration Settings
a) Choose the required Admin Duplex for the member interfaces, Full Duplex or Half Duplex.
If you add a member interface that is configured with the specified duplex, it will not successfully join
the port channel.
b) Choose the required Admin Speed for the member interfaces from the drop-down list.
If you add a member interface that is not at the specified speed, it will not successfully join the port
channel.
c) Choose the LACP Mode, Active or On.
• Active—Sends and receives LACP updates. An active EtherChannel can establish connectivity with
either an active or a passive EtherChannel. You should use the active mode unless you need to
minimize the amount of LACP traffic.
• On—The EtherChannel is always on, and LACP is not used. An “on” EtherChannel can only establish
a connection with another “on” EtherChannel.
Note
It may take up to three minutes for an EtherChannel to come up to an operational state if you change its
mode from On to Active or from Active to On.
Configure a Subinterface
You can add up to 500 subinterfaces to your chassis.
VLAN IDs per interface must be unique, and within an instance, VLAN IDs must be unique across all assigned
interfaces. You can reuse VLAN IDs on separate interfaces as long as they are assigned to different instances.
However, each subinterface still counts towards the limit even though it uses the same ID.
This section discusses FXOS VLAN subinterfaces only. You can separately create subinterfaces within the
instance. See Chassis Interfaces vs. Instance Interfaces, on page 349.
Procedure
Step 1 From Devices > Device Management, click Manage in the Chassis column or click Edit ( ).
Figure 152: Manage Chassis
The Chassis Manager page opens for the chassis to the Summary page.
a)
Step 5 Click Save and then Save in the top right of the Interfaces page.
You can now Deploy the policy to the chassis. The changes are not active until you deploy them.
Add an Instance
You can add one or more instances to a chassis in multi-instance mode. The number of supported instances
depends on your model; see Requirements and Prerequisites for Instances, on page 360.
Procedure
Step 1 From Devices > Device Management, click Manage in the Chassis column or click Edit ( ).
Figure 156: Manage Chassis
The Chassis Manager page opens for the chassis to the Summary page.
Step 3 On Agreement, check I understand and accept the agreement, then click Next.
Figure 158: Agreement
Step 4 On Instance Configuration, set the instance parameters, then click Next.
Figure 159: Instance Configuration
• Display Name
• Device Version—Versions listed are packages currently downloaded to the chassis. Patch versions are
not listed and cannot be used because they don't contain the entire bundle. To upgrade to a new package,
see Devices > Chassis Upgrade. When you upgrade, both the old threat defense version and the new
threat defense version will be listed in the menu. To download an older package, you need to use the
FXOS CLI. Note: Both FXOS and threat defense images are included in the same package. See the
troubleshooting guide for more information.
For example:
• IPv4, IPv6, or Both—Set a Management IP address on the same network as the chassis Management
interface. Set the Network Mask and gateway (likely the same gateway as the chassis). The chassis
Management interface is shared with each instance, and each instance has its own IP address on the
network. You can SSH to this IP address by default to reach the threat defense CLI.
• (Optional) FQDN
• Firewall Mode—Routed or Transparent. For more information about the firewall mode, see Transparent
or Routed Firewall Mode, on page 277.
• DNS Servers—Enter a comma-separated list of DNS servers for management traffic only.
• (Optional) Permit Expert Mode for CLI—Expert Mode provides threat defense shell access for advanced
troubleshooting.
If you enable this option, then users who access the instance directly from an SSH session can enter
Expert Mode. If you disable this option, then only users who access the instance from the FXOS CLI
can enter Expert Mode. We recommend disabling this option to increase isolation between instances.
Use Expert Mode only if a documented procedure tells you it is required, or if the Cisco Technical
Assistance Center asks you to use it. To enter this mode, use the expert command in the threat defense
CLI.
• Resource Profile—The resource profile sets the number of CPU cores; RAM is dynamically allocated
according to the number of cores, and disk space is set to 40 GB per instance. The chassis includes the
following default resource profiles: Default-Small, Default-Medium, and Default-Large. You can add
additional profiles for this chassis by clicking Add ( ). You cannot later edit the resource profile.
Figure 160: Add Resource Profile
Instances with a smaller number of cores might experience relatively higher CPU utilization than
those with larger numbers of cores. Instances with a smaller number of cores are more sensitive to
traffic load changes. If you experience traffic drops, try assigning more cores.
• You can assign cores as an even number (6, 8, 10, 12, 14 etc.) up to the maximum.
• The maximum number of cores available depends on the model; see Requirements and Prerequisites
for Instances, on page 360.
If you later assign a different resource profile, then the instance will reload, which can take approximately
5 minutes. Note that for an established High Availability pair, if you assign a different-sized resource
profile, be sure to make all members the same size as soon as possible.
• Device SSH Password—Set the threat defense admin user password for CLI access, either SSH or
console. Repeat the password in the Confirm Password field.
Step 5 On Interface Assignment, assign the chassis interfaces to the instance, then click Next.
Figure 161: Interface Assignment
Step 6 On Device Management, set the device-specific settings, then click Next.
• Device Group
• Access Control Policy—Choose an existing access control policy, or create a new policy.
• Platform Settings—Choose an existing platform setting policy, or create a new policy.
• Smart Licensing
You can edit any settings on this screen before saving the instance. After you save, the instance is added to
the Instances screen.
Configure SNMP
You can access chassis-level MIBs through the data interface of one of the instances, which you specify in
the chassis system configuration. You can only use this instance for chassis SNMP information. You cannot
access SNMP through the chassis Management interface.
Procedure
Step 1 From Devices > Device Management, click Manage in the Chassis column or click Edit ( ).
Figure 164: Manage Chassis
The Chassis Manager page opens for the chassis to the Summary page.
Procedure
Step 1 From Devices > Device Management, click Manage in the Chassis column or click Edit ( ).
Figure 166: Manage Chassis
The Chassis Manager page opens for the chassis to the Summary page.
b) Monitor the notifications for the Export file created successfully message.
c) Download the export file by clicking the notification message (Download Export Package) or by clicking
Download.
Figure 169: Download
Step 5 To import a configuration, drag the .sfo file on the Import > Drop File here area.
Procedure
Step 4 To change the target chassis for a policy, click Edit ( ) next to the platform settings policy that you want to
edit.
a) Click Policy Assignment.
b) To assign a chassis to the policy, select it in the Available Chassis list and click Add. You can also drag
and drop.
c) To remove a chassis assignment, click Delete ( ) next to a chassis in the Selected Chassis list.
d) Click OK.
Configure DNS
You need to specify a DNS server if the chassis requires resolution of hostnames to IP addresses. These chassis
DNS settings are separate from the DNS settings per instance, which are configured in the device platform
settings.
When you configure multiple DNS servers, the chassis uses servers in a random order. You can configure up
to four servers across four DNS server groups. For example, you can configure a single server group with
four servers, or you can configure four server groups with one server each.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the chassis policy.
Step 2 Choose DNS.
Figure 171: DNS
Step 5 Either select an existing DNS server group (see Creating DNS Server Group Objects, on page 1364), or click
( ) New Group.
If you add a new group, you see the following dialog box. Provide a name and up to four DNS server IP
addresses as comma-separated values, and click Add.
Figure 173: New DNS Server Group Object
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the chassis policy.
Step 2 Choose SSH.
Step 3 To enable SSH access to the chassis, enable the Enable SSH Server slider.
Figure 174: SSH
Step 6 For the server Volume Rekey Limit, set the amount of traffic in KB allowed over the connection before
FXOS disconnects from the session.
Step 7 For the server Time Rekey Limit, set the minutes for how long an SSH session can be idle before FXOS
disconnects the session.
Step 8 For the SSH Client, configure the following settings.
• Strict Host Keycheck—Choose enable, disable, or prompt to control SSH host key checking.
• enable—The connection is rejected if the host key is not already in the FXOS known hosts file.
You must manually add hosts at the FXOS CLI using the enter ssh-host command in the
system/services scope.
• prompt—You are prompted to accept or reject the host key if it is not already stored on the chassis.
• disable—(The default) The chassis accepts the host key automatically if it was not stored before.
• Algorithms—Click Edit ( ). and select the Encryption, Key Exchange, and Mac algorithms.
• Volume Rekey Limit—Set the amount of traffic in KB allowed over the connection before FXOS
disconnects from the session.
• Time Rekey Limit—Set the minutes for how long an SSH session can be idle before FXOS disconnects
the session.
Step 9 Choose SSH Access List. You need to allow access to IP addresses or networks before you can use SSH.
Step 10 Click Edit ( ) to add network objects and click Save. You can also manually enter IP addresses.
Configure Syslog
You can enable syslogs from the chassis. These syslogs come from the chassis' FXOS operating system.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the chassis policy.
Step 2 Choose Syslog.
Step 3 Click the Local Destinations tab, and complete the following fields.
Name Description
Console Section
Admin State field Whether the chassis displays syslog messages on the console.
Check the Enable check box if you want to have syslog messages
displayed on the console as well as added to the log. If the Enable check
box is unchecked, syslog messages are added to the log but are not
displayed on the console.
Level field If you checked the Enable check box for Console - Admin State, select
the lowest message level that you want displayed on the console. The
chassis displays that level and above on the console. This can be one of
the following:
• Emergencies
• Alerts
• Critical
Monitor Section
Name Description
Admin State field Whether the chassis displays syslog messages on the monitor.
Check the Enable check box if you want to have syslog messages
displayed on the monitor as well as added to the log. If the Enable check
box is unchecked, syslog messages are added to the log but are not
displayed on the monitor.
Level drop-down list If you checked the Enable check box for Monitor - Admin State, select
the lowest message level that you want displayed on the monitor. The
system displays that level and above on the monitor. This can be one of
the following:
• Emergencies
• Alerts
• Critical
• Errors
• Warnings
• Notifications
• Information
• Debugging
Step 4 On the Remote Destinations tab, complete the following fields for up to three external logs that can store
messages generated by the chassis:
By sending syslog messages to a remote destination, you can archive messages according to the available disk
space on the external syslog server, and manipulate logging data after it is saved. For example, you could
specify actions to be executed when certain types of syslog messages are logged, extract data from the log
and save the records to another file for reporting, or track statistics using a site-specific script.
Name Description
Admin State field Check the Enable check box if you want to have syslog messages stored
in a remote log file.
Name Description
Level drop-down list Select the lowest message level that you want the system to store. The
system stores that level and above in the remote file. This can be one of
the following:
• Emergencies
• Alerts
• Critical
• Errors
• Warnings
• Notifications
• Information
• Debugging
Hostname/IP Address field The hostname or IP address on which the remote log file resides.
Note
You must configure a DNS server if you use a hostname rather than an
IP address.
Facility drop-down list Choose a system log facility for syslog servers to use as a basis to file
messages. This can be one of the following:
• Local0
• Local1
• Local2
• Local3
• Local4
• Local5
• Local6
• Local7
Step 5 Click the Local Sources tab, and complete the following fields.
Name Description
Faults > Enable Admin State Enable system fault logging.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the chassis policy.
Step 2 Choose Time Synchronization.
Figure 182: Time Synchronization
Step 3 If you want to obtain the time from the management center, click Via NTP from Management Center.
This option ensures both the chassis and the management center have the same time.
Step 4 To use an external NTP server, click Use Custom NTP Server.
a) Click Add to add a server.
Figure 183: Add NTP Server
b) Choose any already-defined servers from the drop-down menu and click Add, or click New Server
to add a new server.
c) For a new server, enter the following fields, and click Add.
• NTP Server Name—A name to identify this server.
• IP/FQDN—The IP address or hostname of the server.
• Authentication Key and Authentication Value—Obtain the key ID and value from the NTP server.
For example, to generate the SHA1 key on NTP server Version 4.2.8p8 or later with OpenSSL
installed, enter the ntp-keygen -M command, and then view the key ID and value in the [Link]
file. The key is used to tell both the client and server which value to use when computing the message
digest.
Only SHA1 is supported for NTP server authentication.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the chassis policy.
Step 2 Choose Time Zones.
Note Although you can connect to SSH on the management port, we recommend using the console port to avoid
multiple disconnections. This procedure covers the console port.
Procedure
Step 2 Log in with the username admin and the password Admin123.
The first time you log in to FXOS, you are prompted to change the password.
Note
If the password was already changed, and you do not know it, you must reimage the device to reset the
password to the default. See the FXOS troubleshooting guide for the reimage procedure.
Example:
[...]
[...]
firepower#
Step 3 Check your current mode, Native or Container. If the mode is Native, you can continue with this procedure
to convert to multi-instance (Container) mode.
show system detail
Example:
Systems:
Name: firepower
Mode: Stand Alone
System IP Address: [Link]
System IPv6 Address: ::
System Owner:
System Site:
Deploy Mode: Native
Description for System:
firepower #
Step 5 The first time you log in to the threat defense, you are prompted to accept the General Terms. You are then
presented with the CLI setup script.
The setup script lets you set the Management interface IP address and other settings. However, when you
convert to multi-instance mode, the only settings that are retained are the following.
• Admin password (that you set at initial login)
• DNS servers
• Search domains
You will reset the Management IP address and gateway as part of the multi-instance mode command. After
you convert to multi-instance mode, you can change Management settings at the FXOS CLI. See Change
Chassis Management Settings at the FXOS CLI, on page 407.
Step 6 Enable multi-instance mode, set the chassis management interface settings, and identify the management
center. You can use IPv4 and/or IPv6 static addressing; DHCP is not supported. After you enter the command,
you will be prompted to erase the configuration and reboot. Enter ERASE (all caps). The system reboots and,
as part of changing the mode, erases the configuration with the exception of the Management network settings
you set in the command and the admin password. The chassis hostname is set to "firepower-model."
IPv4:
configure multi-instance network ipv4 ip_address network_mask gateway_ip_address manager
manager_name {hostname | ipv4_address | DONTRESOLVE} registration_key nat_id
IPv6:
configure multi-instance network ipv6 ipv6_address prefix_length gateway_ip_address manager
manager_name {hostname | ipv6_address | DONTRESOLVE} registration_key nat_id
See the following manager components:
• {hostname | ipv4_address | DONTRESOLVE}—Specifies either the FQDN or IP address of the
management center. At least one of the devices, either the management center or the chassis, must have
a reachable IP address to establish the two-way, SSL-encrypted communication channel between the
two devices. If you don't specify a manager hostname or IP address in this command, then enter
DONTRESOLVE; in this case, the chassis must have a reachable IP address or hostname, and you must
specify the nat_id.
• registration_key—Enter a one-time registration key of your choice that you will also specify on the
management center when you register the chassis. The registration key must not exceed 37 characters.
Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-).
• nat_id—Specifies a unique, one-time string of your choice that you will also specify on the management
center when you register the chassis when one side does not specify a reachable IP address or hostname.
It is required if you do not specify a manager address or hostname, however, we recommend that you
always set the NAT ID even when you specify a hostname or IP address. The NAT ID must not exceed
37 characters. Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-).
This ID cannot be used for any other devices registering to the management center.
To change the mode back to appliance mode, you must use the FXOS CLI and enter scope system and then
set deploymode native. See Change Chassis Management Settings at the FXOS CLI, on page 407.
Example:
Step 7 Add the chassis to the management center. See Add a Chassis, on page 55.
Note For high availability, you need to make the same interface changes for the other unit. Otherwise, high availability
might not operate correctly.
Procedure
Step 1 From Devices > Device Management, click Manage in the Chassis column or click Edit ( ).
Figure 186: Manage Chassis
The Chassis Manager page opens for the chassis to the Summary page.
Step 2 Click Instances, and click Edit ( ) next to the instance for which you want to change interfaces.
Figure 187: Instances
Step 3 Click Next until you get to the Interface Assignment screen.
Procedure
Step 2 Log in with the username admin and the password you set during initial setup.
Step 3 Change the Management IP address. You can use a static IPv4 and/or IPv6 address.
IPv4:
scope fabric-interconnect
set out-of-band static ip ip_address netmask network_mask gw gateway_ip_address
IPv6:
scope fabric-interconnect
scope ipv6-config
set out-of-band static ipv6 ipv6_address ipv6-prefix prefix_length ipv6-gw gateway_address
Example:
IPv4:
IPv6:
or hostname. It is required if you do not specify a hostname, however we recommend that you always
set the NAT ID even when you specify a hostname or IP address. The NAT ID must not exceed 37
characters. Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-). This
ID cannot be used for any other devices registering to the management center.
• Registration Key: reg_key—You will be prompted for a one-time registration key of your choice that
you will also specify on the management center when you register the chassis. The registration key must
not exceed 37 characters. Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the
hyphen (-).
Example:
Step 6 Disable multi-instance mode and set the system back to appliance mode.
scope system
set deploymode native
You are prompted to reboot.
Example:
To change the mode back to multi-instance mode, enter set deploymode container. You can check the current
mode using the show system detail command.
Systems:
Name: firepower
Mode: Stand Alone
System IP Address: [Link]
System IPv6 Address: ::
System Owner:
System Site:
Deploy Mode: Native
Description for System:
firepower #
Systems:
Name Mode Deploy Mode System IP Address System IPv6 Address
---------- ----------- ----------- ----------------- -------------------
firepower-3110
Stand Alone Container [Link] ::
Systems:
Name Mode Deploy Mode System IP Address System IPv6 Address
---------- ----------- ----------- ----------------- -------------------
3110-1 Stand Alone Native [Link] ::
3110-1 /system #
This command shows the internal switch-forwarding rule for two instances with shared physical interfaces
assigned to two instances. Ethernet 1/1 is shared between ftd1 and ftd2.
ECMP group 1540 is assigned to ftd1 and ECMP group 1541 is assigned to ftd2.
MCAST group 4096 is used for replicating broadcast traffic between ftd1 and ftd2.
This command shows the internal switch-forwarding rule for two instances with shared subinterfaces assigned
to both instances. Ethernet 1/1.2452 is shared between ftd1 and ftd2.
ECMP group 1540 is assigned to ftd1 and ECMP group 1541 is assigned to ftd2.
MCAST group 4097 is used for replicating broadcast traffic between ftd1 and ftd2.
Note Physical-Port 18 is the backplane uplink interface between the internal switch and the instance.
Multi-instance mode 7.6.0 7.6.0 You can now register an application-mode device to the management center
conversion in the and then convert it to multi-instance mode without having to use the CLI.
management center
New/modified screens:
• Devices > Device Management> More ( )> Convert to Multi-Instance
• Devices > Device Management > Select Bulk Action > Convert to
Multi-Instance
Multi-instance mode for 7.6.0 7.6.0 Multi-instance mode is now supported for the Secure Firewall 4200.
the Secure Firewall 4200
Multi-instance mode for 7.4.1 7.4.1 You can deploy the Secure Firewall 3100 as a single device (appliance mode)
the Secure Firewall 3100. or as multiple container instances (multi-instance mode). In multi-instance
mode, you can deploy multiple container instances on a single chassis that act
as completely independent devices. Note that in multi-instance mode, you
upgrade the operating system and the firmware (chassis upgrade) separately
from the container instances (threat defense upgrade).
New/modified screens:
• Devices > Device Management > Add > Chassis
• Devices > Device Management > Device > Chassis Manager
• Devices > Platform Settings > New Policy > Chassis Platform Settings
• Devices > Chassis Upgrade
Note High availability is not supported on threat defense virtual running in the public cloud. See the Cisco Secure
Firewall Threat Defense Virtual Getting Started Guide for more information about configuring the threat
defense virtual device for high availability.
Hardware Requirements
The two units in a High Availability configuration must:
• Be the same model. In addition, for container instances, they must use the same resource profile attributes.
For the Firepower 9300, High Availability is only supported between same-type modules; but the two
chassis can include mixed modules. For example, each chassis has an SM-56, SM-48, and SM-40. You
can create High Availability pairs between the SM-56 modules, between the SM-48 modules, and between
the SM-40 modules.
If you change the resource profile after you add the High Availability pair to the management center,
update the inventory for each unit on the Devices > Device Management > Device > System > Inventory
dialog box.
If you assign a different profile to instances in an established high-availability pair, which requires the
profile to be the same on both units, you must:
1. Break high availability.
2. Assign the new profile to both units.
3. Re-establish high availability.
If you are using units with different flash memory sizes in your High Availability configuration, make sure
the unit with the smaller flash memory has enough space to accommodate the software image files and the
configuration files. If it does not, configuration synchronization from the unit with the larger flash memory
to the unit with the smaller flash memory will fail.
Software Requirements
The two units in a High Availability configuration must:
• Be in the same firewall mode (routed or transparent).
• Have the same software version.
• Be in the same domain or group on the management center.
• Have the same NTP configuration. See Configure NTP Time Synchronization for Threat Defense.
• Be fully deployed on the management center with no uncommitted changes.
• Not have DHCP or PPPoE configured in any of their interfaces.
• (Firepower 4100/9300) Have the same flow offload mode, either both enabled or both disabled.
Before high availability is established, it does not matter which licenses are assigned to the secondary/standby
device. During high availability configuration, the management center releases any unnecessary licenses
assigned to the standby unit and replaces them with identical licenses assigned to the primary/active unit. For
example, if the active unit has a Essentials license and a IPS license, and the standby unit has only a Essentials
license, the management center communicates with the Smart Software Manager to obtain an available IPS
license from your account for the standby unit. If your license account does not include enough purchased
entitlements, your account becomes Out-of-Compliance until you purchase the correct number of licenses.
Failover Link
The two units in a failover pair constantly communicate over a failover link to determine the operating status
of each unit.
Note When using an EtherChannel as the failover or state link, you must confirm that the same EtherChannel with
the same member interfaces exists on both devices before establishing high availability.
Note If you have a large configuration and a low unit hold time, alternating between the member interfaces can
prevent the secondary unit from joining/re-joining. In this case, disable one of the member interfaces until
after the secondary unit joins.
For an EtherChannel used as the failover link, to prevent out-of-order packets, only one interface in the
EtherChannel is used. If that interface fails, then the next interface in the EtherChannel is used. You cannot
alter the EtherChannel configuration while it is in use as a failover link.
If you do not use a switch between the units, if the interface fails, the link is brought down on both peers. This
condition may hamper troubleshooting efforts because you cannot easily determine which unit has the failed
interface and caused the link to come down.
Scenario 2—Recommended
We recommend that failover links not use the same switch as the data interfaces. Instead, use a different switch
or use a direct cable to connect the failover link, as shown in the following figures.
Scenario 3—Recommended
If the threat defense data interfaces are connected to more than one set of switches, then a failover link can
be connected to one of the switches, preferably the switch on the secure (inside) side of network, as shown
in the following figure.
Figure 193: Connecting with a Secure Switch
Note Although recommended, the standby address is not required. Without a standby IP address, the active unit
cannot perform network tests to check the standby interface health; it can only track the link state. You also
cannot connect to the standby unit on that interface for management purposes.
The IP address and MAC address for the state link do not change at failover.
2. When the active unit fails over, the standby unit assumes the IP addresses and MAC addresses of the
failed unit and begins passing traffic.
3. When the failed unit comes back online, it is now in a standby state and takes over the standby IP addresses
and MAC addresses.
However, if the secondary unit boots without detecting the primary unit, then the secondary unit becomes the
active unit and uses its own MAC addresses, because it does not know the primary unit MAC addresses. When
the primary unit becomes available, the secondary (active) unit changes the MAC addresses to those of the
primary unit, which can cause an interruption in your network traffic. Similarly, if you swap out the primary
unit with new hardware, a new MAC address is used.
If you disable high availability and set the failover configurations to a disabled state, you will need to manually
resume high availability, or reboot the device. It is recommended to use the command configure
high-availability resume and resume the high availability instead of rebooting the device. If you reload the
standby unit with the failover configuration disabled, the standby unit boots up as the active unit and uses the
primary unit's IP addresses and MAC addresses. This leads to duplicate IP addresses and causes network
traffic disruptions. Use the command configure high-availability resume to enable failover and restore the
traffic flow.
Virtual MAC addresses guard against this disruption, because the active MAC addresses are known to the
secondary unit at startup, and remain the same in the case of new primary unit hardware. We recommend that
you configure the virtual MAC address on both the primary and secondary units to ensure that the secondary
unit uses the correct MAC addresses when it is the active unit, even if it comes online before the primary unit.
If you do not configure virtual MAC addresses, you might need to clear the ARP tables on connected routers
to restore traffic flow. The threat defense device does not send gratuitous ARPs for static NAT addresses
when the MAC address changes, so connected routers do not learn of the MAC address change for these
addresses.
Stateful Failover
During Stateful Failover, the active unit continually passes per-connection state information to the standby
unit. After a failover occurs, the same connection information is available at the new active unit. Supported
end-user applications are not required to reconnect to keep the same communication session.
Supported Features
For Stateful Failover, the following state information is passed to the standby threat defense device:
• NAT translation table.
• TCP and UDP connections and states, including HTTP connection states. Other types of IP protocols,
and ICMP, are not parsed by the active unit, because they get established on the new active unit when a
new packet arrives.
• Snort connection states, inspection results, and pin hole information, including strict TCP enforcement.
• The ARP table
• The Layer 2 bridge table (for bridge groups)
• The ISAKMP and IPsec SA table
• GTP PDP connection database
• SIP signaling sessions and pin holes.
• Static and dynamic routing tables—Stateful Failover participates in dynamic routing protocols, like OSPF
and EIGRP, so routes that are learned through dynamic routing protocols on the active unit are maintained
in a Routing Information Base (RIB) table on the standby unit. Upon a failover event, packets travel
normally with minimal disruption to traffic because the active secondary unit initially has rules that
mirror the primary unit. Immediately after failover, the re-convergence timer starts on the newly active
unit. Then the epoch number for the RIB table increments. During re-convergence, OSPF and EIGRP
routes become updated with a new epoch number. Once the timer is expired, stale route entries (determined
by the epoch number) are removed from the table. The RIB then contains the newest routing protocol
forwarding information on the newly active unit.
Note Routes are synchronized only for link-up or link-down events on an active unit.
If the link goes up or down on the standby unit, dynamic routes sent from the
active unit may be lost. This is normal, expected behavior.
• DHCP Server—DHCP address leases are not replicated. However, a DHCP server configured on an
interface will send a ping to make sure an address is not being used before granting the address to a
DHCP client, so there is no impact to the service. State information is not relevant for DHCP relay or
DDNS.
• Access control policy decisions—Decisions related to traffic matching (including URL, URL category,
geolocation, and so forth), intrusion detection, malware, and file type are preserved during failover.
However, for connections being evaluated at the moment of failover, there are the following caveats:
• AVC—App-ID verdicts are replicated, but not detection states. Proper synchronization occurs as
long as the App-ID verdicts are complete and synchronized before failover occurs.
• Intrusion detection state—Upon failover, once mid-flow pickup occurs, new inspections are
completed, but old states are lost.
• File malware blocking—The file disposition must become available before failover.
• File type detection and blocking—The file type must be identified before failover. If failover occurs
while the original active device is identifying the file, the file type is not synchronized. Even if your
file policy blocks that file type, the new active device downloads the file.
• User identity decisions from the identity policy, including the user-to-IP address mappings gathered
passively through ISE Session Directory, and active authentication through captive portal. Users who
are actively authenticating at the moment of failover might be prompted to authenticate again.
• Network AMP—Cloud lookups are independent from each device, so failover does not affect this feature
in general. Specifically:
• Signature Lookup—If failover occurs in the middle of a file transmission, no file event is generated
and no detection occurs.
• File Storage—If failover occurs when the file is being stored, it is stored on the original active
device. If the original active device went down while the file was being stored, the file does not get
stored.
• File Pre-classification (Local Analysis)—If failover occurs in the middle of pre-classification,
detection fails.
• File Dynamic Analysis (Connectivity to the cloud)—If failover occurs, the system might submit
the file to the cloud.
• Archive File Support—If failover occurs in the middle of an analysis, the system loses visibility
into the file/archive.
• Custom Blocking—If failover occurs, no events are generated.
• Security Intelligence decisions. However, DNS-based decisions that are in process at the moment of
failover are not completed.
• RA VPN—Remote access VPN end users do not have to reauthenticate or reconnect the VPN session
after a failover. However, applications operating over the VPN connection could lose packets during the
failover process and not recover from the packet loss.
• From all the connections, only established ones will be replicated on the Standby device.
Unsupported Features
For Stateful Failover, the following state information is not passed to the standby threat defense device:
• Sessions in plaintext tunnels other than GREv0 and IPv4-in-IP. Sessions inside tunnels are not replicated
and the new active node will not be able to reuse existing inspection verdicts to match the correct policy
rules.
• Decrypted TLS/SSL connections—The decryption states are not synchronized, and if the active unit
fails, then decrypted connections will be reset. New connections will need to be established to the new
active unit. Connections that are not decrypted (in other words, those that match a TLS/SSL Do Not
Decrypt rule action) are not affected and are replicated correctly.
interface interface_id
spanning-tree portfast
The PortFast feature immediately transitions the port into STP forwarding mode upon linkup. The port
still participates in STP. So if the port is to be a part of the loop, the port eventually transitions into STP
blocking mode.
• If the switch port is in Trunk mode, or you cannot enable STP PortFast, then you can use one of the
following less desirable workarounds that impacts failover functionality or STP stability:
• Disable interface monitoring on the bridge group and member interfaces.
• Increase the interface hold time in the failover criteria to a high value that will allow STP to converge
before the unit fails over.
• Decrease the STP timers on the switch to allow STP to converge faster than the interface hold time.
• If the threat defense device does not receive a response on any interface, then the standby unit switches
to active mode and classifies the other unit as failed.
Note • The additional heartbeat module is enabled by default whenever HA is enabled. You do not have to set
a poll interval for the additional heartbeat module in the data plane. This module uses the same heartbeat
interval that you set for the control plane.
Interface Monitoring
When a unit does not receive hello messages on a monitored interface for 15 seconds, it runs interface tests.
If one of the interface tests fails for an interface, but this same interface on the other unit continues to
successfully pass traffic, then the interface is considered to be failed, and the device stops running tests.
If the threshold you define for the number of failed interfaces is met (see Devices > Device Management >
High Availability > Failover Trigger Criteria), and the active unit has more failed interfaces than the standby
unit, then a failover occurs. If an interface fails on both units, then both interfaces go into the “Unknown”
state and do not count towards the failover limit defined by failover interface policy.
An interface becomes operational again if it receives any traffic. A failed device returns to standby mode if
the interface failure threshold is no longer met.
If an interface has IPv4 and IPv6 addresses configured on it, the device uses the IPv4 addresses to perform
the health monitoring. If an interface has only IPv6 addresses configured on it, then the device uses IPv6
neighbor discovery instead of ARP to perform the health monitoring tests. For the broadcast ping test, the
device uses the IPv6 all nodes address (FE02::1).
Interface Tests
The threat defense device uses the following interface tests. The duration of each test is approximately 1.5
seconds.
1. Link Up/Down test—A test of the interface status. If the Link Up/Down test indicates that the interface
is down, then the device considers it failed, and testing stops. If the status is Up, then the device performs
the Network Activity test.
2. Network Activity test—A received network activity test. At the start of the test, each unit clears its received
packet count for its interfaces. As soon as a unit receives any eligible packets during the test, then the
interface is considered operational. If both units receive traffic, then testing stops. If one unit receives
traffic and the other unit does not, then the interface on the unit that does not receive traffic is considered
failed, and testing stops. If neither unit receives traffic, then the device starts the ARP test.
3. ARP test—A test for successful ARP replies. Each unit sends a single ARP request for the IP address in
the most recent entry in its ARP table. If the unit receives an ARP reply or other network traffic during
the test, then the interface is considered operational. If the unit does not receive an ARP reply, then the
device sends a single ARP request for the IP address in the next entry in the ARP table. If the unit receives
an ARP reply or other network traffic during the test, then the interface is considered operational. If both
units receive traffic, then testing stops. If one unit receives traffic, and the other unit does not, then the
interface on the unit that does not receive traffic is considered failed, and testing stops. If neither unit
receives traffic, then the device starts the Broadcast Ping test.
4. Broadcast Ping test—A test for successful ping replies. Each unit sends a broadcast ping, and then counts
all received packets. If the unit receives any packets during the test, then the interface is considered
operational. If both units receive traffic, then testing stops. If one unit receives traffic, and the other unit
does not, then the interface on the unit that does not receive traffic is considered failed, and testing stops.
If neither unit receives traffic, then testing starts over again with the ARP test. If both units continue to
receive no traffic from the ARP and Broadcast Ping tests, then these tests will continue running in
perpetuity.
Interface Status
Monitored interfaces can have the following status:
• Unknown—Initial status. This status can also mean the status cannot be determined.
• Normal—The interface is receiving traffic.
• Normal (Waiting)—The interface is up, but has not yet received a hello packet from the corresponding
interface on the peer unit.
• Normal (Not-Monitored)—The interface is up, but is not monitored by the failover process.
• Testing—Hello messages are not heard on the interface for five poll times.
• Link Down—The interface or VLAN is administratively down.
• Link Down (Waiting)—The interface or VLAN is administratively down and has not yet received a hello
packet from the corresponding interface on the peer unit.
• Link Down (Not-Monitored)—The interface or VLAN is administratively down, but is not monitored
by the failover process.
• No Link—The physical link for the interface is down.
• No Link (Waiting)—The physical link for the interface is down and has not yet received a hello packet
from the corresponding interface on the peer unit.
• No Link (Not-Monitored)—The physical link for the interface is down, but is not monitored by the
failover process.
• Failed—No traffic is received on the interface, yet traffic is heard on the peer interface.
Table 28:
Command Purpose
The following table shows the failover triggering events and associated failure detection timing. If failover
occurs, you can view the reason for the failover in the Message Center, along with various operations pertaining
to the high availability pair. You can configure these thresholds to a value within the specified
minimum-maximum range.
Active unit loses power, hardware goes down, or the 800 milliseconds 15 seconds 45 seconds
software reloads or crashes. When any of these occur,
the monitored interfaces or failover link do not receives
any hello message.
Active unit interface physical link down. 500 milliseconds 5 seconds 15 seconds
Active unit interface up, but connection problem causes 5 seconds 25 seconds 75 seconds
interface testing.
Failover Events
In Active/Standby failover, failover occurs on a unit basis.
The following table shows the failover action for each failure event. For each failure event, the table shows
the failover policy (failover or no failover), the action taken by the active unit, the action taken by the standby
unit, and any special notes about the failover condition and actions.
Failure Event Policy Active Unit Action Standby Unit Action Notes
Active unit failed (power or Failover n/a Become active No hello messages are received on
hardware) any monitored interface or the
Mark active as failed
failover link.
Failure Event Policy Active Unit Action Standby Unit Action Notes
Standby unit failed (power or No failover Mark standby as n/a When the standby unit is marked as
hardware) failed failed, then the active unit does not
attempt to fail over, even if the
interface failure threshold is
surpassed.
Failover link failed during No failover Mark failover link as Mark failover link as You should restore the failover link
operation failed failed as soon as possible because the unit
cannot fail over to the standby unit
while the failover link is down.
Failover link failed at startup No failover Become active Become active If the failover link is down at startup,
both units become active.
Mark failover link as Mark failover link as
failed failed
State link failed No failover No action No action State information becomes out of
date, and sessions are terminated if a
failover occurs.
Interface failure on active unit Failover Mark active as failed Become active None.
above threshold
Interface failure on standby unit No failover No action Mark standby as When the standby unit is marked as
above threshold failed failed, then the active unit does not
attempt to fail over even if the
interface failure threshold is
surpassed.
Config-Sync Optimization
When a device reboots or rejoins following a suspend or resume high availability, the joining device clears
its running configuration. The active device then sends its entire configuration to the joining device for a full
configuration synchronization. If the active device has a large configuration, this process can take several
minutes.
The configuration sync optimization functionality enables comparing the configuration of the joining device
and the active device by exchanging configuration hash values. If the hash computed on both active and
joining devices match, the joining device skips full configuration synchronization and rejoin the high availability
configuration. This functionality ensures faster peering and reduces maintenance window and upgrade time.
• If you configure passphrase and failover IPsec key, then configuration sync optimization is not effective
as the hash value computed in the active and standby devices differs.
• If you configure the device with dynamic ACL or SNMPv3, configuration sync optimization is not
effective.
• Active device synchronizes full configuration with flapping LAN links as default behavior. During
failover flaps between active and standby devices, configuration sync optimization is not triggered and
devices perform a full configuration synchronization.
• Configuration sync optimization gets triggered when the high availability configuration recovers from
an interruption or loss of network communication between the active and standby devices.
Supported Domains
Any
User Roles
Admin
Network Admin
Additional Guidelines
• When the active unit fails over to the standby unit, the connected switch port running Spanning Tree
Protocol (STP) can go into a blocking state for 30 to 50 seconds when it senses the topology change. To
avoid traffic loss while the port is in a blocking state, you can enable the STP PortFast feature on the
switch:
interface interface_id spanning-tree portfast
This workaround applies to switches connected to both routed mode and bridge group interfaces. The
PortFast feature immediately transitions the port into STP forwarding mode upon linkup. The port still
participates in STP. So if the port is to be a part of the loop, the port eventually transitions into STP
blocking mode.
• Configuring port security on the switches connected to the threat defense device failover pair can cause
communication problems when a failover event occurs. This problem occurs when a secure MAC address
configured or learned on one secure port moves to another secure port, a violation is flagged by the switch
port security feature.
• For Active/Standby High Availability and a VPN IPsec tunnel, you cannot monitor both the active and
standby units using SNMP over the VPN tunnel. The standby unit does not have an active VPN tunnel,
and will drop traffic destined for the NMS. You can instead use SNMPv3 with encryption so the IPsec
tunnel is not required.
• Both the peer devices go into unknown state and high-availability configuration fails if you run clish in
any of the peer devices while creating a High Availability pair.
• Immediately after failover, the source address of syslog messages will be the failover interface address
for a few seconds.
• For better convergence (during a failover), you must shut down the interfaces on a HA pair that are not
associated with any configuration or instance.
• If you configure failover encryption in evaluation mode, the systems use DES for the encryption. If you
then register the devices using an export-compliant account, the devices will use AES after a reboot.
Thus, if a system reboots for any reason, including after installing an upgrade, the peers will be unable
to communicate and both units will become the active unit. We recommend that you do not configure
encryption until after you register the devices. If you do configure this in evaluation mode, we recommend
you remove the encryption before registering the devices.
• When using SNMPv3 with failover, if you replace a failover unit, then SNMPv3 users are not replicated
to the new unit. You must remove the users, re-add them, and then redeploy your configuration to force
the users to replicate to the new unit.
• The device does not share SNMP client engine data with its peer.
• If you have a very large number of access control and NAT rules, the size of the configuration can prevent
efficient configuration replication, resulting in the standby unit taking an excessively long time to reach
standby ready state. This can also impact your ability to connect to the standby unit during replication
through the console or SSH session. To enhance configuration replication performance, enable transactional
commit for both access rules and NAT, using the asp rule-engine transactional-commit access-group
and asp rule-engine transactional-commit nat commands.
• A unit in a High Availability pair transitioning to the standby role synchronizes its clock with the active
unit.
Example:
firepower#show clock
[Link] UTC Mar 1 2022
...
[Link] UTC Mar 1 2022 <======= Incorrect (previous) clock
Cold Standby Sync Config Detected an Active mate
• The units in High Availability do not dynamically synchronize the clock. Here are some examples of
events when synchronization takes place:
• A new High Availability pair is created.
• High Availability is broken and re-created.
• Communication over the failover link was disrupted and reestablished.
• Failover status was manually changed at the CLI using the no failover/failover or configure
high-availability suspend/resume (threat defense) commands.
• Enabling High Availability forces all routes to be deleted and are re-added after the High Availability
progression changes to the Active state. You could experience connection loss during this phase.
• If you replace the primary unit, then when you re-create high-availability, you should set the replacement
unit as the secondary unit so that the configurations are replicated from the former secondary unit to the
replacement unit. If you set the replacement unit as primary, you will accidentally overwrite the
configuration that is present on the operational unit.
• Deploying Firepower 1100 devices in high availability with hundreds of interfaces configured on them
can result in increased delay in the failover time (seconds).
• In the High Availability configuration, short-lived connections, usually using port 53, are closed quickly
and never transferred or synchronized from Active to Standby, so there might be a difference in the
number of connections on both High Availability devices. This is expected behavior for short-lived
connections. You can try to compare the connections that are long-lived ( for example, more than 30-60
seconds).
• In the High Availability configuration, embryonic connections—connection requests that have not yet
completed the three-way handshake process—are closed quickly and not synchronized between the active
and standby devices. This design ensures HA system efficiency and security. For this reason, there might
be a difference in the number of connections on both High Availability devices, which is to be expected.
• If the failover LAN link is not connected back-to-back and instead connected through one or more
switches, a failure within the intermediate path can cause the active unit to lose connectivity with the
standby unit, resulting in inconsistent active/standby states. Although this does not impact High Availability
functionality, it is recommended to check and recover the failover-link path between the active and
standby units.
When the failover LAN link is down, it is not recommended to deploy any configuration, as it may not
be replicated to the peer unit.
• See the Cisco Secure Firewall Threat Defense Virtual Getting Started Guide and review your threat
defense virtual device configurations for high availability.
• In transparent mode, if you have problems with the active unit losing the MAC address of the hot-standby
router (HSRP), create a static mapping for the MAC address.
• UCAPL or CC compliance mode cannot be changed if the threat defense device is in high availability.
Modify the compliance mode before forming the high availability pair.
Note The failover link and the stateful failover link are in a private IP space and are only used for communication
between peers in a high-availability pair. After high availability is established, selected interface links and
encryption settings cannot be modified without breaking the high-availability pair and reconfiguring it.
Caution Creating or breaking a high-availability pair immediately restarts the Snort process on the primary and
secondary devices, temporarily interrupting traffic inspection on both devices. Whether traffic drops during
this interruption or passes without further inspection depends on how the target device handles traffic. See
Snort Restart Traffic Behavior, on page 246 for more information. The system warns you that continuing to
create a high-availability pair restarts the Snort process on the primary and secondary devices and allows you
to cancel.
Note Only routed mode is supported for manager access on a data interface.
• Have the same NTP configuration. See Time Synchronization, on page 992.
• Are fully deployed with no uncommitted changes.
• Do not have DHCP or PPPoE configured on any interfaces.
• For manager access on a data interface:
• Use the same data interface on both devices for manager access.
• You cannot use DHCP; only a static IP address is supported. Features that rely on DHCP cannot be
used, including DDNS and zero-touch provisioning.
• Have different static IP addresses in the same subnet.
• Use either IPv4 or IPv6; you cannot set both.
• Use the same manager configuration (configure manager add command) to ensure that the
connectivity is the same.
• You cannot use the data interface as the failover or state link.
Note The high availability formation is possible between the two threat defense devices when the certificate available
on the primary device is not present on the secondary device. When high availability is formed, the certificate
will be synched on the secondary device.
Procedure
Step 1 Add both devices to the management center according to Add a Device Using a Registration Key (Legacy
Screen)—Basic Configuration, on page 36.
Step 2 Choose Devices > Device Management.
Step 3 From the Add drop-down menu, choose High Availability.
Step 4 Enter a display Name for the high-availability pair.
Step 5 Choose the Primary Peer device for the high-availability pair.
Step 6 Choose the Secondary Peer device for the high-availability pair.
Step 7 Click Continue.
Step 8 Under LAN Failover Link, choose an Interface with enough bandwidth to reserve for failover communications.
Note
Only interfaces that do not have a logical name and do not belong to a security zone, will be listed in the
Interface drop-down in the Add High Availability Pair dialog.
Step 10 Type a Primary IP address for the failover link on the active unit.
This address should be on an unused subnet.
Note
[Link]/24 and [Link]*::/64 are internally used subnets and cannot be used for the failover or state
links.
Step 15 Optionally, choose Enabled and choose the Key Generation method for IPsec Encryption between the
failover links.
Step 16 Click OK. This process takes a few minutes as the process synchronizes system data.
What to do next
Back up the devices. You can use the backup to quickly replace the devices when they fail and to restore the
high availability service without being delinked from the management center. For more information, see Cisco
Secure Firewall Management Center Administration Guide.
Procedure
Step 7 If you configured the IPv6 address manually, on the IPv6 tab, click the Edit ( ) next to the active IP address,
enter the Standby IP Address, and click OK.
This address must be a free address on the same network as the active IP address. For autogenerated and
Enforce EUI 64 addresses, the standby address is automatically generated.
Procedure
• From the Add Interface MAC Address dialog-box which is accessed from the High Availability page;
see this procedure.
Note To configure the MAC address in both primary and secondary units (so that the
MAC address is transferred to all sub-interfaces to both the high-availability
units), the recommended approach is to use the Interfaces tab to replicate the
MAC addresses on sub-interfaces over both active and standby high-availability
units.
If you configure active and standby MAC addresses in both locations, the addresses defined during interface
configuration take precedence for failover.
You can minimize loss of traffic during failover by designating active and standby MAC addresses to the
physical interface. This feature offers redundancy against IP address mapping for failover.
Procedure
Switch the Active Peer in the Threat Defense High Availability Pair
After you establish the threat defense high availability pair, you can manually switch the active and standby
units, effectively forcing failover for reasons such as persistent fault or health events on the current active
unit. Both units should be fully deployed before you complete this procedure.
Procedure
Refresh Node Status for a Single Threat Defense High Availability Pair
Whenever active or standby devices in the threat defense high availability pair are rebooted, the management
center may not display accurate high availability status for either device. This is because when the device
reboots, the high availability status is immediately updated on the device and its corresponding event is sent
to the management center. However, the status may not be updated on the management center because the
communication between the device and the management center is yet to be established.
Communication failures or weak communication channels between the management center and devices may
result in out of sync data. When you switch the active and standby devices in a high availability pair, the
change may not be reflected in the management center even after a significant time duration.
In these scenarios, you can refresh the high availability node status to obtain accurate information about the
active and standby device in a high availability pair.
Procedure
When you suspend high availability, the currently active device remains active, handling all user connections.
However, failover criteria are no longer monitored, and the system will never fail over to the now
pseudo-standby device.
When using a data interface for manager access, the management connection will be broken until after you
resume.
The key difference between suspending high availability and breaking high availability is that on a suspended
high-availability device, the high-availability configuration is retained. When you break high availability, the
configuration is erased. Thus, you have the option to resume high availability on a suspended system, which
enables the existing configuration and makes the two devices function as a failover pair again.
To suspend high availability, use the configure high-availability suspend command.
If you suspend high availability from the active unit, the configuration is suspended on both the active and
standby units. The standby unit interface configuration is also erased. If you suspend it from the standby unit,
it is suspended on the standby unit only, but the active unit will not attempt to fail over to a suspended unit.
To resume failover, use the configure high-availability resume command.
You can resume a unit only if it is in Suspended state. The unit will negotiate active/standby status with the
peer unit.
Note Suspending high availability is a temporary state. If you reload a unit, it resumes the high-availability
configuration automatically and negotiates the active/standby state with the peer.
Caution Creating or breaking the threat defense high availability pair immediately restarts the Snort process on the
primary and secondary devices, temporarily interrupting traffic inspection on both devices. Whether traffic
drops during this interruption or passes without further inspection depends on how the target device handles
traffic. See Snort Restart Traffic Behavior, on page 246 for more information. The system warns you that
continuing to create a high availability pair restarts the Snort process on the primary and secondary devices
and allows you to cancel.
Caution Never move a disk from sensor or management center to another device without reimaging the disk. This is
an unsupported configuration and can cause breakage in functionality.
Procedure
Step 1 Choose Force Break to separate the high availability pair; see Break a High Availability Pair, on page 441.
Note
The break operation removes all the configuration related to HA from threat defense and management center,
and you need to recreate it manually later. To successfully configure the same HA pair, ensure that you save
the IPs, MAC addresses, and monitoring configuration of all the interfaces/subinterfaces prior to executing
the HA break operation.
Step 2 Unregister the failed primary threat defense device from the management center; see Unregister a Device
from the Management Center, on page 61.
Step 3 Register the replacement threat defense to the management center; see Add a Device Using a Registration
Key (Legacy Screen)—Basic Configuration, on page 36.
Step 4 Configure high availability, using the existing secondary/active unit as the primary device and the replacement
device as the secondary/standby device during registration; see Add a High Availability Pair, on page 433.
Caution Creating or breaking the threat defense high availability pair immediately restarts the Snort process on the
primary and secondary devices, temporarily interrupting traffic inspection on both devices. Whether traffic
drops during this interruption or passes without further inspection depends on how the target device handles
traffic. See Snort Restart Traffic Behavior, on page 246 for more information. The system warns you that
continuing to create a high availability pair restarts the Snort process on the primary and secondary devices
and allows you to cancel.
Procedure
Step 1 Choose Force Break to separate the high availability pair; see Break a High Availability Pair, on page 441.
Note
The break operation removes all the configuration related to HA from threat defense and management center,
and you need to recreate it manually later. To successfully configure the same HA pair, ensure that you save
the IPs, MAC addresses, and monitoring configuration of all the interfaces/subinterfaces prior to executing
the HA break operation.
Step 2 Unregister the secondary threat defense device from the management center; see Unregister a Device from
the Management Center, on page 61.
Step 3 Register the replacement threat defense to the management center; see Add a Device Using a Registration
Key (Legacy Screen)—Basic Configuration, on page 36.
Step 4 Configure high availability, using the existing primary/active unit as the primary device and the replacement
device as the secondary/standby device during registration; see Add a High Availability Pair, on page 433.
Policies that were not deployed to the active unit prior to the break operation continue to remain un-deployed
after the break operation is complete. Deploy the policies on the standalone device after the break operation
is complete.
Note • When IPsec is enabled on high availability interfaces on the threat defense device, the device cannot
prioritize the encrypted packets into the high-priority receive queue. As a result, during high-volume
data traffic scenarios, attempts to break high availability may fail as the device cannot efficiently manage
and prioritize the large number of encrypted connections. To view the device's resource usage and the
maximum throughput, use the show resource usage command.
• If you cannot reach the high-availability pair using the management center, connect to the CLI on each
device and enter configure high-availability disable to manually break high availability. See also
Unregister a High Availability Pair and Register to a New Management Center, on page 443.
Caution Breaking the threat defense high-availability pair immediately restarts the Snort process on the primary and
secondary units, temporarily interrupting traffic inspection on both devices. Whether traffic drops during this
interruption or passes without further inspection depends on how the target device handles traffic. See Snort
Restart Traffic Behavior, on page 246 for more information.
Procedure
What to do next
If you are using a FlexConfig policy on the active unit, alter and re-deploy the FlexConfig policy to eliminate
deployment errors.
Note After you break high availability, the threat defense device that was operating as the active unit will still have
the standby unit's IP address listed in its configuration. To resolve this, do an additional deployment on the
formerly active threat defense device to remove the standby unit's IP address from its configuration.
Registering the pair again to the same or a different management center causes the configuration to be removed,
so the pair will stop processing traffic at that point; the High Availability configuration remains intact so you
can add the pair as a whole. You can choose an access control policy at registration, but you will have to
re-apply other policies after registration and then deploy the configuration before it will process traffic again.
Procedure
[...]
b) At the primary unit's CLI, identify the new management center using the configure manager add command.
See Modify Threat Defense Management Interfaces at the CLI, on page 173.
c) Choose Devices > Device Management, and then click Add > Device.
You only need to add the primary unit as a device, and the management center will discover the secondary
unit.
Procedure
Procedure
Improved role switch 7.7 7.7 When a failover occurs, the new active device generates multicast packets for
time during failover each MAC address entry and sends them to all bridge group interfaces,
prompting the upstream switches to update their routing tables. This task of
generating and sending multicast packets to the bridge interfaces now runs
asynchronously in the data plane, allowing critical failover tasks in the control
plane to proceed without delays. This enhancement improves role switch time
during a failover and reduces downtime.
High availability support 7.4 7.4 You can now use a data interface for manager access with threat defense high
for the manager access availability.
data interface
Unregistering a 7.3 Any When you delete (unregister) a high-availability pair, you no longer have to
high-availability pair now manually break the pair at the CLI and re-register standalone devices. You can
allows you to re-register now add the primary unit to a new management center, and the standby unit
without breaking the pair will be discovered automatically. Re-registering the pair will still erase the
configuration, and your policies will need to be re-applied.
Policy rollback support 7.2 Any The configure policy rollback command is supported for high availability.
for high availability
Config-Sync 7.2 Any The Config-Sync Optimization feature enables comparing the configuration
Optimization feature for of the joining unit and the active unit by exchanging config-hash values. If the
faster HA peering hash computed on both active and joining units match, the joining unit skips
full config-sync and rejoin the HA. This feature enables faster HA peering and
reduces maintenance window and upgrade time.
Improvements to the 7.1 Any We made the following improvements to the upgrade workflow for clustered
upgrade workflow for and high-availability devices:
clustered and
• The upgrade wizard now correctly displays clustered and high-availability
high-availability devices
units as groups, rather than as individual devices. The system can identify,
report, and preemptively require fixes for group-related issues you might
have. For example, you cannot upgrade a cluster on the Firepower
4100/9300 if you have made unsynced changes on Firepower Chassis
Manager.
• We improved the speed and efficiency of copying upgrade packages to
clusters and high-availability pairs. Previously, the FMC copied the
package to each group member sequentially. Now, group members can
get the package from each other as part of their normal sync process.
• You can now specify the upgrade order of data units in a cluster. The
control unit always upgrades last.
Clearing routes in a 7.1 Any In previous releases, the clear route command cleared the routing table on the
high-availability group or unit only. Now, when operating in a high-availability group or cluster, the
cluster. command is available on the active or control unit only, and clears the routing
table on all units in the group or cluster.
FTD High Availability 6.2.3 Any Version 6.2.3 introduces the following features for FTD devices in high
Hardening availability:
• Whenever active or standby FTD devices in a high-availability pair restart,
the FMC may not display accurate high-availability status for either
managed device. However, the status may not upgrade on the FMC because
the communication between the device and the FMC is not established
yet. The Refresh Node Status option on the Devices > Device
Management page allows you to refresh the high-availability unit status
to obtain accurate information about the active and standby device in a
high-availability pair.
• The Devices > Device Management page of the FMC UI has a new
Switch Active Peer icon.
• Version 6.2.3 includes a new REST API object, Device High Availability
Pair Services, that contains four functions:
• DELETE ftddevicehapairs
• PUT ftddevicehapairs
• POST ftddevicehapairs
• GET ftddevicehapairs
Note Some features are not supported when using clustering. See Unsupported Features with Clustering, on page
501.
When you place the cluster in your network, the upstream and downstream routers need to be able to
load-balance the data coming to and from the cluster using one of the following methods:
• Spanned EtherChannel (Recommended)—Interfaces on multiple members of the cluster are grouped
into a single EtherChannel; the EtherChannel performs load balancing between units.
• Policy-Based Routing (Routed firewall mode only)—The upstream and downstream routers perform
load balancing between units using route maps and ACLs.
• Equal-Cost Multi-Path Routing (Routed firewall mode only)—The upstream and downstream routers
perform load balancing between units using equal cost static or dynamic routes.
Cluster Interfaces
You can configure data interfaces as either Spanned EtherChannels or as Individual interfaces. All data
interfaces in the cluster must be one type only. See About Cluster Interfaces, on page 456 for more information.
For Spanned EtherChannels: You can use regular firewall interfaces or IPS-only interfaces (inline sets or
passive interfaces). For Individual interfaces: IPS-only interfaces are not supported.
Configuration Replication
All nodes in the cluster share a single configuration. You can only make configuration changes on the control
node (with the exception of the bootstrap configuration), and changes are automatically synced to all other
nodes in the cluster.
Management Network
You must manage each node using the Management interface; management from a data interface is not
supported with clustering.
Note If you add the cluster before the management center is licensed (and running in Evaluation mode), then when
you license the management center, you can experience traffic disruption when you deploy policy changes
to the cluster. Changing to licensed mode causes all data units to leave the cluster and then rejoin.
User Roles
• Admin
• Access Admin
• Network Admin
Switch Requirements
• Be sure to complete the switch configuration before you configure clustering. Make sure the ports
connected to the cluster control link have the correct (higher) MTU configured. By default, the cluster
control link MTU is set to 100 bytes higher than the data interfaces. If the switches have an MTU
mismatch, the cluster formation will fail.
High Availability
High Availability is not supported with clustering.
IPv6
The cluster control link is only supported using IPv4.
Switches
• Make sure connected switches match the MTU for both cluster data interfaces and the cluster control
link interface. You should configure the cluster control link interface MTU to be at least 100 bytes higher
than the data interface MTU, so make sure to configure the cluster control link connecting switch
appropriately. Because the cluster control link traffic includes data packet forwarding, the cluster control
link needs to accommodate the entire size of a data packet plus cluster traffic overhead. In addition, we
do not recommend setting the cluster control link MTU between 2561 and 8362; due to block pool
handling, this MTU size is not optimal for system operation.
• For Cisco IOS XR systems, if you want to set a non-default MTU, set the IOS XR interface MTU to be
14 bytes higher than the cluster device MTU. Otherwise, OSPF adjacency peering attempts may fail
unless the mtu-ignore option is used. Note that the cluster device MTU should match the IOS XR IPv4
MTU. This adjustment is not required for Cisco Catalyst and Cisco Nexus switches.
• On the switch(es) for the cluster control link interfaces, you can optionally enable Spanning Tree PortFast
on the switch ports connected to the cluster unit to speed up the join process for new units.
• On the switch, we recommend that you use one of the following EtherChannel load-balancing algorithms:
source-dest-ip or src-dst-mixed-ip-port (see the Cisco Nexus OS and Cisco IOS-XE port-channel
load-balance command). Do not use a vlan keyword in the load-balance algorithm because it can cause
unevenly distributed traffic to the devices in a cluster.
• If you change the load-balancing algorithm of the EtherChannel on the switch, the EtherChannel interface
on the switch temporarily stops forwarding traffic, and the Spanning Tree Protocol restarts. There will
be a delay before traffic starts flowing again.
• Switches on the cluster control link path should not verify the L4 checksum. Redirected traffic over the
cluster control link does not have a correct L4 checksum. Switches that verify the L4 checksum could
cause traffic to be dropped.
• Port-channel bundling downtime should not exceed the configured keepalive interval.
• On Supervisor 2T EtherChannels, the default hash distribution algorithm is adaptive. To avoid asymmetric
traffic in a VSS design, change the hash algorithm on the port-channel connected to the cluster device
to fixed:
router(config)# port-channel id hash-distribution fixed
Do not change the algorithm globally; you may want to take advantage of the adaptive algorithm for the
VSS peer link.
• You should disable the LACP Graceful Convergence feature on all cluster-facing EtherChannel interfaces
for Cisco Nexus switches.
EtherChannels
• In Catalyst 3750-X Cisco IOS software versions earlier than 15.1(1)S2, the cluster unit did not support
connecting an EtherChannel to a switch stack. With default switch settings, if the cluster unit EtherChannel
is connected cross stack, and if the control unit switch is powered down, then the EtherChannel connected
to the remaining switch will not come up. To improve compatibility, set the stack-mac persistent timer
command to a large enough value to account for reload time; for example, 8 minutes or 0 for indefinite.
Or, you can upgrade to more a more stable switch software version, such as 15.1(1)S2.
• Spanned vs. Device-Local EtherChannel Configuration—Be sure to configure the switch appropriately
for Spanned EtherChannels vs. Device-local EtherChannels.
• Spanned EtherChannels—For cluster unit Spanned EtherChannels, which span across all members
of the cluster, the interfaces are combined into a single EtherChannel on the switch. Make sure each
interface is in the same channel group on the switch.
Additional Guidelines
• When significant topology changes occur (such as adding or removing an EtherChannel interface, enabling
or disabling an interface on the threat defense or the switch, adding an additional switch to form a VSS
or vPC) you should disable the health check feature and also disable interface monitoring for the disabled
interfaces. When the topology change is complete, and the configuration change is synced to all units,
you can re-enable the interface health check feature.
• When adding a unit to an existing cluster, or when reloading a unit, there will be a temporary, limited
packet/connection drop; this is expected behavior. In some cases, the dropped packets can hang your
connection; for example, dropping a FIN/ACK packet for an FTP connection will make the FTP client
hang. In this case, you need to reestablish the FTP connection.
• If you use a Windows 2003 server connected to a Spanned EtherChannel, when the syslog server port
is down and the server does not throttle ICMP error messages, then large numbers of ICMP messages
are sent back to the ASA cluster. These messages can result in some units of the ASA cluster experiencing
high CPU, which can affect performance. We recommend that you throttle ICMP error messages.
• For decrypted TLS/SSL connections, the decryption states are not synchronized, and if the connection
owner fails, then decrypted connections will be reset. New connections will need to be established to a
new unit. Connections that are not decrypted (they match a do-not-decrypt rule) are not affected and are
replicated correctly.
Configure Clustering
To add a cluster to the management center, add each node to the management center as a standalone unit,
configure interfaces on the unit you want to make the control node, and then form the cluster.
Note For a 2-member cluster, do not directly-connect the cluster control link from one node to the other node. If
you directly connect the interfaces, then when one unit fails, the cluster control link fails, and thus the remaining
healthy unit fails. If you connect the cluster control link through a switch, then the cluster control link remains
up for the healthy unit. If you need to directly-connect the units (for testing purposes, for example), then you
should configure and enable the cluster control link interface on both nodes before you form the cluster.
A higher-bandwidth cluster control link helps the cluster to converge faster when there are membership changes
and prevents throughput bottlenecks.
Note If your cluster has large amounts of asymmetric (rebalanced) traffic, then you should increase the cluster
control link size.
Load Balancing
The EtherChannel link is selected using a proprietary hash algorithm, based on source or destination IP
addresses and TCP and UDP port numbers.
Note On the switch, we recommend that you use one of the following algorithms: source-dest-ip or
source-dest-ip-port (see the Cisco Nexus OS or Cisco IOS port-channel load-balance command). Do not
use a vlan keyword in the load-balance algorithm because it can cause unevenly distributed traffic to the
ASAs in a cluster.
EtherChannel Redundancy
The EtherChannel has built-in redundancy. It monitors the line protocol status of all links. If one link fails,
traffic is re-balanced between remaining links. If all links in the EtherChannel fail on a particular unit, but
other units are still active, then the unit is removed from the cluster.
Policy-Based Routing
When using Individual interfaces, each threat defense interface maintains its own IP address and MAC address.
One method of load balancing is Policy-Based Routing (PBR).
We recommend this method if you are already using PBR, and want to take advantage of your existing
infrastructure.
PBR makes routing decisions based on a route map and ACL. You must manually divide traffic between all
threat defenses in a cluster. Because PBR is static, it may not achieve the optimum load balancing result at
all times. To achieve the best performance, we recommend that you configure the PBR policy so that forward
and return packets of a connection are directed to the same threat defense. For example, if you have a Cisco
router, redundancy can be achieved by using Cisco IOS PBR with Object Tracking. Cisco IOS Object Tracking
monitors each threat defense using ICMP ping. PBR can then enable or disable route maps based on reachability
of a particular threat defense. See the following URLs for more details:
[Link]
[Link]
If you use static routes, be sure to use a static route monitoring feature such as Object Tracking. We recommend
using dynamic routing protocols to add and remove routes, in which case, you must configure each threat
defense to participate in dynamic routing.
Procedure
Step 1 Cable the cluster control link network, management network, and data networks.
Step 2 Configure the upstream and downstream equipment.
a) For the cluster control link network, set the MTU to be at least 100 bytes higher than the data interface
MTU.
By default, the data interface MTU is 1500 bytes, so the cluster control link MTU on the cluster node will
be set to 1600 bytes. If you use higher MTUs on your data interfaces, increase the cluster control link
MTU on connecting switches accordingly.
b) Configure cluster control link interfaces on upstream and downstream equipment, including for an optional
EtherChannel.
See Cluster Control Link Interfaces and Network, on page 457 for cluster control link requirements.
c) Configure data interfaces on upstream and downstream equipment, including Spanned EtherChannels, if
you choose that cluster interface mode.
See About Cluster Interfaces, on page 456 for information about how to cable Spanned EtherChannels.
Step 3 Add each node to the management center as a standalone device in the same domain and group.
See Add a Device Using a Registration Key (Legacy Screen)—Basic Configuration, on page 36. You can
create a cluster with a single device, and then add more nodes later. The initial settings (licensing, access
control policy) that you set when you add a device will be inherited by all cluster nodes from the control node.
You will choose the control node when forming the cluster.
Step 4 Enable the cluster control link on the device you want to be the control node.
When you add the other nodes, they will inherit the cluster control link configuration.
Note
Do not configure the name or IP addressing for the cluster control link. The MTU of the cluster control link
interface is automatically set to 100 bytes more than the highest data interface MTU when you form the cluster,
so you do not need to set it now. However, we do not recommend setting the cluster control link MTU between
2561 and 8362; due to block pool handling, this MTU size is not optimal for system operation. If the MTU
is set in this range when you add the cluster, we recommend returning to the Interfaces page and manually
increasing it above 8362.
a) On the device you want to be the control node, choose Devices > Device Management, and click Edit
( ).
b) Click Interfaces.
c) Enable the interface. If you are going to use an EtherChannel for the cluster control link, enable all
members. See Enable the Physical Interface and Configure Ethernet Settings, on page 768.
Figure 194: Enable the Cluster Control Link Interface
Create a Cluster
Form a cluster from one or more devices in the management center.
Procedure
Step 1 Choose Devices > Device Management, and then choose Add > Cluster.
Step 2 Specify a Cluster Name and an authentication Cluster Key for control traffic.
• Cluster Name—An ASCII string from 1 to 38 characters.
• Cluster Key—An ASCII string from 1 to 63 characters. The Cluster Key value is used to generate the
encryption key. This encryption does not affect datapath traffic, including connection state update and
forwarded packets, which are always sent in the clear.
To resolve the above issues, remove the unsupported VPN license and deploy pending configuration
changes to the device.
• Cluster Control Link Network—Specify an IPv4 subnet; IPv6 is not supported for this interface. Specify
a 24, 25, 26, or 27 subnet.
• Cluster Control Link—Choose the physical interface or EtherChannel you want to use for the cluster
control link.
Note
The MTU of the cluster control link interface is automatically set to 100 bytes more than the highest data
interface MTU; by default, the MTU is 1600 bytes. We do not recommend setting the cluster control
link MTU between 2561 and 8362; due to block pool handling, this MTU size is not optimal for system
operation. If the MTU is set in this range when you add the cluster, we recommend increasing the MTU
above 8362 on the Devices > Device Management > Interfaces page.
Make sure you configure switches connected to the cluster control link to the correct (higher) MTU;
otherwise, cluster formation will fail.
• Cluster Control Link IPv4 Address—This field will be auto-populated with the first address on the
cluster control link network. You can edit the host address if desired.
• Priority—Set the priority of this node for control node elections. The priority is between 1 and 100,
where 1 is the highest priority. Even if you set the priority to be lower than other nodes, this node will
still be the control node when the cluster is first formed.
• Site ID—(FlexConfig feature) Enter the site ID for this node between 1 and 8. A value of 0 disables
inter-site clustering. Additional inter-site cluster customizations to enhance redundancy and stability,
such as director localization, site redundancy, and cluster flow mobility, are only configurable using the
FlexConfig feature.
Step 4 For the Cluster Mode, choose Spanned EtherChannel Mode or Individual Interface Mode.
Step 5 For Data Nodes (Optional), click Add a data node to add a node to the cluster.
You can form the cluster with only the control node for faster cluster formation, or you can add all nodes now.
Set the following for each data node:
• Node—Choose the device that you want to add.
Note
If you see an Error ( ) icon next to the node name, click the icon to view configuration issues. You
must cancel cluster formation, resolve the issues, and then return to cluster formation.
• Cluster Control Link IPv4 Address—This field will be auto-populated with the next address on the
cluster control link network. You can edit the host address if desired.
• Priority—Set the priority of this node for control node elections. The priority is between 1 and 100,
where 1 is the highest priority.
• Site ID—(FlexConfig feature) Enter the site ID for this node between 1 and 8. A value of 0 disables
inter-site clustering. Additional inter-site cluster customizations to enhance redundancy and stability,
such as director localization, site redundancy, and cluster flow mobility, are only configurable using the
FlexConfig feature.
Step 6 Click Continue. Review the Summary, and then click Save.
The cluster name shows on the Devices > Device Management page; expand the cluster to see the cluster
nodes.
Figure 197: Cluster Management
You can monitor cluster node registration by clicking the Notifications icon and choosing Tasks. The
management center updates the Cluster Registration task as each node registers.
Step 7 Configure device-specific settings by clicking the Edit ( ) for the cluster.
Most configuration can be applied to the cluster as a whole, and not nodes in the cluster. For example, you
can change the display name per node, but you can only configure interfaces for the whole cluster.
Step 8 On the Devices > Device Management > Cluster screen, you see General and other settings for the cluster.
• General > Name—Change the cluster display name by clicking the Edit ( ).
• General > Cluster Live Status—Click the View link to open the Cluster Status dialog box.
The Cluster Status dialog box also lets you retry data unit registration by clicking Reconcile All. You
can also ping the cluster control link from a node. See Perform a Ping on the Cluster Control Link, on
page 498.
• General > Troubleshoot—You can generate and download troubleshooting logs, and you can view
cluster CLIs. See Troubleshooting the Cluster, on page 497.
Figure 200: Troubleshoot
Step 9 On the Devices > Device Management > Devices, you can choose each member in the cluster from the top
right drop-down menu and configure the following settings.
• General > Name—Change the cluster member display name by clicking the Edit ( ).
• Management > Host—If you change the management IP address in the device configuration, you must
match the new address in the management center so that it can reach the device on the network. First
disable the connection, edit the Host address in the Management area, then re-enable the connection.
Configure Interfaces
You can configure data interfaces as either Spanned EtherChannels or as Individual interfaces. Each method
uses a different load-balancing mechanism. You cannot configure both types in the same configuration.
Procedure
Step 1 Choose Devices > Device Management, and click Edit ( ) next to the cluster.
Step 2 Click Interfaces.
Step 3 Configure Spanned EtherChannel data interfaces.
a) Configure one or more EtherChannels. See Configure an EtherChannel, on page 775.
You can include one or more member interfaces in the EtherChannel. Because this EtherChannel is spanned
across all of the nodes, you only need one member interface per node; however, for greater throughput
and redundancy, multiple members are recommended.
b) (Optional) For regular firewall interfaces, configure VLAN subinterfaces on the EtherChannel. The rest
of this procedure applies to the subinterfaces. See Add a Subinterface, on page 826.
c) Click Edit ( ) for the EtherChannel interface.
d) Configure the name and other parameters. For regular firewall interfaces, see Configure Routed Mode
Interfaces, on page 846 or, for transparent mode, Configure Bridge Group Interfaces, on page 850. For
IPS-only interfaces, see Inline Sets and Passive Interfaces, on page 883.
• If the cluster control link interface MTU is not at least 100 bytes higher than the data interface MTU,
you will see an error that you must reduce the MTU of the data interface. By default, the cluster
control link MTU is 1600 bytes. If you want to increase the MTU of data interfaces, first increase
the cluster control link MTU. Note that we do not recommend setting the cluster control link MTU
between 2561 and 8362; due to block pool handling, this MTU size is not optimal for system operation.
• For routed mode, DHCP, PPPoE, IPv6 autoconfig and manual link-local addresses are not supported.
For point-to-point connections, you can specify a 31-bit subnet mask ([Link]). In this case,
no IP addresses are reserved for the network or broadcast addresses.
e) Set a unique, manual global MAC address for the EtherChannel. Click Advanced, and in the Active Mac
Address field, enter a MAC address in H.H.H format, where H is a 16-bit hexadecimal digit.
For example, the MAC address 00-0C-F1-42-4C-DE would be entered as 000C.F142.4CDE. The MAC
address must not have the multicast bit set, that is, the second hexadecimal digit from the left cannot be
an odd number.
Do not set the Standby Mac Address; it is ignored.
You must configure a unique MAC address not currently in use on your network for a Spanned
EtherChannel to avoid potential network connectivity problems. With a manually-configured MAC
address, the MAC address stays with the current control unit. If you do not configure a MAC address,
then if the control unit changes, the new control unit uses a new MAC address for the interface, which
can cause a temporary network outage.
f) Click OK. Repeat the above steps for other data interfaces.
Step 4 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
Procedure
Step 1 Choose Objects > Object Management > Address Pools to add an IPv4 and/or IPv6 address pool. See
Address Pools, on page 1354.
Include at least as many addresses as there are units in the cluster. The main IP address is not a part of this
pool, but needs to be on the same network. You cannot determine the exact Local address assigned to each
unit in advance.
Figure 203: Add Address Pool
Note
Although not common, if you want to set the MAC addresses manually, you can also add a MAC address
pool object.
Step 2 On Devices > Device Management > Interfaces, click Edit ( ) for the interface you want to configure.
Step 3 On the IPv4 page, enter the Virtual IP Address and mask. This main ("virtual") IP address is a fixed address
for the cluster, and always belongs to the control node.
DHCP and PPPoE are not supported. For point-to-point connections, you can specify a 31-bit subnet mask
([Link]). In this case, no IP addresses are reserved for the network or broadcast addresses.
Figure 204: IPv4 Page
Step 4 From the IPv4 Address Pool drop-down list, choose the address pool you created.
Step 5 On IPv6 > Basic, from the IPv6 Address Pool drop-down list, choose the address pool you created.
IPv6 autoconfig and manual link-local addresses are not supported.
Field Description
Timeouts
Hold Time Between .3 and 45 seconds; The default is 3 seconds. To determine node system
health, the cluster nodes send heartbeat messages on the cluster control link
to other nodes. If a node does not receive any heartbeat messages from a peer
node within the hold time period, the peer node is considered unresponsive or
dead.
Interface Debounce Time Between 300 and 9000 ms. The default is 500 ms. The interface debounce time
is the amount of time before the node considers an interface to be failed, and
the node is removed from the cluster.
Monitored Interfaces The interface health check monitors for link failures. If all physical ports for
a given logical interface fail on a particular node, but there are active ports
under the same logical interface on other nodes, then the node is removed from
the cluster. The amount of time before the node removes a member from the
cluster depends on the type of interface and whether the node is an established
node or is joining the cluster.
Service Application Shows whether the Snort and disk-full processes are monitored.
Auto-Rejoin Settings
Field Description
Cluster Interface Shows the auto-rejoin settings after a cluster control link failure.
Attempts Between -1 and 65535. The default is -1 (unlimited). Sets the number of rejoin
attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 1x the interval duration. Defines if the interval
duration increases at each attempt.
Data Interfaces Shows the auto-rejoin settings after a data interface failure.
Attempts Between -1 and 65535. The default is 3. Sets the number of rejoin attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 2x the interval duration. Defines if the interval
duration increases at each attempt.
System Shows the auto-rejoin settings after internal errors. Internal failures include:
application sync timeout; inconsistent application statuses; and so on.
Attempts Between -1 and 65535. The default is 3. Sets the number of rejoin attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 2x the interval duration. Defines if the interval
duration increases at each attempt.
Note If you disable the system health check, fields that do not apply when the system health check is disabled will
not show.
Procedure
Step 5 Disable the system health check by clicking the Health Check slider .
Figure 206: Disable the System Health Check
When any topology changes occur (such as adding or removing a data interface, enabling or disabling an
interface on the node or the switch, or adding an additional switch to form a VSS or vPC or VNet) you should
disable the system health check feature and also disable interface monitoring for the disabled interfaces. When
the topology change is complete, and the configuration change is synced to all nodes, you can re-enable the
system health check feature and monitored interfaces.
Step 7 Customize the auto-rejoin cluster settings after a health check failure.
Set the following values for the Cluster Interface, Data Interface, and System (internal failures include:
application sync timeout; inconsistent application statuses; and so on):
• Attempts—Sets the number of rejoin attempts, between -1 and 65535. 0 disables auto-rejoining. The
default for the Cluster Interface is -1 (unlimited). The default for the Data Interface and System is 3.
• Interval Between Attempts—Defines the interval duration in minutes between rejoin attempts, between
2 and 60. The default value is 5 minutes. The maximum total time that the node attempts to rejoin the
cluster is limited to 14400 minutes (10 days) from the time of last failure.
• Interval Variation—Defines if the interval duration increases. Set the value between 1 and 3: 1 (no
change); 2 (2 x the previous duration), or 3 (3 x the previous duration). For example, if you set the interval
duration to 5 minutes, and set the variation to 2, then the first attempt is after 5 minutes; the 2nd attempt
is 10 minutes (2 x 5); the 3rd attempt 20 minutes (2 x 10), and so on. The default value is 1 for the Cluster
Interface and 2 for the Data Interface and System.
Step 8 Configure monitored interfaces by moving interfaces in the Monitored Interfaces or Unmonitored Interfaces
window. You can also check or uncheck Enable Service Application Monitoring to enable or disable
monitoring of the Snort and disk-full processes.
The interface health check monitors for link failures. If all physical ports for a given logical interface fail on
a particular node, but there are active ports under the same logical interface on other nodes, then the node is
removed from the cluster. The amount of time before the node removes a member from the cluster depends
on the type of interface and whether the node is an established node or is joining the cluster. Health check is
enabled by default for all interfaces and for the Snort and disk-full processes.
You might want to disable health monitoring of non-essential interfaces.
When any topology changes occur (such as adding or removing a data interface, enabling or disabling an
interface on the node or the switch, or adding an additional switch to form a VSS or vPC or VNet) you should
disable the system health check feature and also disable interface monitoring for the disabled interfaces. When
the topology change is complete, and the configuration change is synced to all nodes, you can re-enable the
system health check feature and monitored interfaces.
Procedure
Step 1 Choose Devices > Device Management, click More ( ) for the cluster, and choose Add Nodes.
Step 2 From the Node menu, choose a device, adjust the IP address, priority, and Site ID if desired.
Figure 210: Manage Cluster Wizard
Step 4 Click Continue. Review the Summary, and then click Save
The node that is currently registering shows the loading icon.
Figure 211: Node Registration
You can monitor cluster node registration by clicking the Notifications icon and choosing Tasks.
Break a Node
You can remove a node from the cluster so that it becomes a standalone device. You cannot break the control
node unless you break the entire cluster. The data node has its configuration erased.
Procedure
Step 1 Choose Devices > Device Management, click More ( ) for the node you want to break, and choose Break
Node.
You can optionally break one or more nodes from the cluster More menu by choosing Break Nodes.
You can monitor the cluster node break by clicking the Notifications icon and choosing Tasks.
Procedure
Step 1 Make sure all cluster nodes are being managed by the management center by reconciling nodes. See Reconcile
Cluster Nodes, on page 489.
Step 2 Choose Devices > Device Management, click More ( ) for the cluster, and choose Break Cluster.
You can monitor the cluster break by clicking the Notifications icon and choosing Tasks.
Disable Clustering
You may want to deactivate a node in preparation for deleting the node, or temporarily for maintenance. This
procedure is meant to temporarily deactivate a node; the node will still appear in the management center
device list. When a node becomes inactive, all data interfaces are shut down.
Procedure
Step 1 For the unit you want to disable, choose Devices > Device Management, click More ( ), and choose Disable
Node Clustering.
If you disable clustering on the control node, one of the data nodes will become the new control node. Note
that for centralized features, if you force a control node change, then all connections are dropped, and you
have to re-establish the connections on the new control node. You cannot disable clustering on the control
node if it is the only node in the cluster.
Procedure
Step 1 For the unit you want to reactivate, choose Devices > Device Management, click More ( ), and choose Enable
Node Clustering.
Step 2 Confirm that you want to enable clustering on the unit.
Caution The best method to change the control node is to disable clustering on the control node, wait for a new control
election, and then re-enable clustering. If you must specify the exact unit you want to become the control
node, use the procedure in this section. Note that for centralized features, if you force a control node change
using either method, then all connections are dropped, and you have to re-establish the connections on the
new control node.
Procedure
Step 1 Open the Cluster Status dialog box by choosing Devices > Device Management > More ( ) > Cluster Live
Status.
Figure 217: Cluster Status
Step 2 For the unit you want to become the control unit, choose More ( ) > Change Role to Control.
Step 3 You are prompted to confirm the role change. Check the checkbox, and click OK.
Procedure
Step 1 Choose Devices > Device Management, click More ( ) for the cluster, and choose Edit Configuration.
If the cluster control link is an EtherChannel, you can edit the interface membership and LACP configuration
by clicking Edit ( ) next to the interface drop-down menu.
Step 3 Click Continue. Review the Summary, and then click Save
Procedure
Step 1 Choose Devices > Device Management > More ( ) for the cluster, and then choose Cluster Live Status to
open the Cluster Status dialog box.
Figure 220: Cluster Live Status
For more information about the cluster status, see Monitoring the Cluster, on page 491.
Registering the cluster again to the same or a different management center causes the configuration to be
removed, so the cluster will stop processing traffic at that point; the cluster configuration remains intact so
you can add the cluster as a whole. You can choose an access control policy at registration, but you will have
to re-apply other policies after registration and then deploy the configuration before it will process traffic
again.
Procedure
Step 1 Choose Devices > Device Management, click More ( ) for the cluster or node, and choose Unregister.
Figure 222: Unregister Cluster or Node
Step 2 You are prompted to unregister the cluster or node; click Yes.
Step 3 You can register the cluster to a new (or the same) management center by adding one of the cluster members
as a new device.
You only need to add one of the cluster nodes as a device, and the rest of the cluster nodes will be discovered.
a) Connect to one cluster node's CLI, and identify the new management center using the configure manager
add command. See Modify Threat Defense Management Interfaces at the CLI, on page 173.
b) Choose Devices > Device Management, and then click Add > Device.
Step 4 To re-add an unregistered node, see Reconcile Cluster Nodes, on page 489.
For each node, you can view the Summary or the History.
Note The CPU and memory metrics display the individual average of the data plane
and snort usage.
• The metric charts, namely, CPU Usage, Memory Usage, Throughput, and Connections,
diagrammatically display the statistics of the cluster over the specified time period.
• Load Distribution dashboard―Displays load distribution across the cluster nodes in two widgets:
• The Distribution widget displays the average packet and connection distribution over the time range
across the cluster nodes. This data depicts how the load is being distributed by the nodes. Using this
widget, you can easily identify any abnormalities in the load distribution and rectify it.
• The Node Statistics widget displays the node level metrics in table format. It displays metric data
on CPU usage, memory usage, input rate, output rate, active connections, and NAT translations
across the cluster nodes. This table view enables you to correlate data and easily identify any
discrepancies.
• Member Performance dashboard―Displays current metrics of the cluster nodes. You can use the selector
to filter the nodes and view the details of a specific node. The metric data include CPU usage, memory
usage, input rate, output rate, active connections, and NAT translations.
• CCL dashboard―Displays, graphically, the cluster control link data namely, the input, and output rate.
• Troubleshooting and Links ― Provides convenient links to frequently used troubleshooting topics and
procedures.
• Time range―An adjustable time window to constrain the information that appears in the various cluster
metrics dashboards and widgets.
• Custom Dashboard―Displays data on both cluster-wide metrics and node-level metrics. However, node
selection only applies for the threat defense metrics and not for the entire cluster to which the node
belongs.
Procedure
Step 2 In the device list, click Expand( ) and Collapse ( ) to expand and collapse the list of managed cluster
devices.
Step 3 To view the cluster health statistics, click on the cluster name. The cluster monitor reports health and
performance metrics in several predefined dashboards by default. The metrics dashboards include:
• Overview ― Highlights key metrics from the other predefined dashboards, including its nodes, CPU,
memory, input and output rates, connection statistics, and NAT translation information.
• Load Distribution ― Traffic and packet distribution across the cluster nodes.
• Member Performance ― Node-level statistics on CPU usage, memory usage, input throughput, output
throughput, active connection, and NAT translation.
• CCL ― Interface status and aggregate traffic statistics.
You can navigate through the various metrics dashboards by clicking on the labels. For a comprehensive list
of the supported cluster metrics, see Cisco Secure Firewall Threat Defense Health Metrics.
Step 4 You can configure the time range from the drop-down in the upper-right corner. The time range can reflect a
period as short as the last hour (the default) or as long as two weeks. Select Custom from the drop-down to
configure a custom start and end date.
Click the refresh icon to set auto refresh to 5 minutes or to toggle off auto refresh.
Step 5 Click on deployment icon for a deployment overlay on the trend graph, with respect to the selected time range.
The deployment icon indicates the number of deployments during the selected time-range. A vertical band
indicates the deployment start and end time. For multiple deployments, multiple bands/lines appear. Click on
the icon on top of the dotted line to view the deployment details.
Step 6 (For node-specific health monitor) View the Health Alerts for the node in the alert notification at the top of
page, directly to the right of the device name.
Hover your pointer over the Health Alerts to view the health summary of the node. The popup window shows
a truncated summary of the top five health alerts. Click on the popup to open a detailed view of the health
alert summary.
Step 7 (For node-specific health monitor) The device monitor reports health and performance metrics in several
predefined dashboards by default. The metrics dashboards include:
• Overview ― Highlights key metrics from the other predefined dashboards, including CPU, memory,
interfaces, connection statistics; plus disk usage and critical process information.
• CPU ― CPU utilization, including the CPU usage by process and by physical cores.
• Memory ― Device memory utilization, including data plane and Snort memory usage.
• Interfaces ― Interface status and aggregate traffic statistics.
• Connections ― Connection statistics (such as elephant flows, active connections, peak connections, and
so on) and NAT translation counts.
• Snort ― Statistics that are related to the Snort process.
• ASP drops ― Statistics related to the dropped packets against various reasons.
You can navigate through the various metrics dashboards by clicking on the labels. See Cisco Secure Firewall
Threat Defense Health Metrics for a comprehensive list of the supported device metrics.
Step 8 Click the plus sign Add New Dashboard( ) in the upper right corner of the health monitor to create a custom
dashboard by building your own variable set from the available metric groups.
For cluster-wide dashboard, choose Cluster metric group, and then choose the metric.
Cluster Metrics
The cluster health monitor tracks statistics that are related to a cluster and its nodes, and aggregate of load
distribution, performance, and CCL traffic statistics.
Data Throughput Incoming and outgoing data traffic statistics for a bytes
cluster.
CCL Throughput Incoming and outgoing CCL traffic statistics for a bytes
cluster.
You can also enter any show command in the Command field. See View CLI Output, on page 130 for
more information.
Procedure
Step 1 Choose Devices > Device Management, click the More ( ) icon next to the cluster, and choose > Cluster
Live Status.
Figure 226: Cluster Status
The node sends a ping on the cluster control link to every other node using a packet size that matches the
maximum MTU.
Firewall on a Stick
Data traffic from different security domains are associated with different VLANs, for example, VLAN 10 for
the inside network and VLAN 20 for the outside network. Each has a single physical port connected to the
external switch or router. Trunking is enabled so that all packets on the physical link are 802.1q encapsulated.
The is the firewall between VLAN 10 and VLAN 20.
When using Spanned EtherChannels, all data links are grouped into one EtherChannel on the switch side. If
the becomes unavailable, the switch will rebalance traffic between the remaining units.
Traffic Segregation
You may prefer physical separation of traffic between the inside and outside network.
As shown in the diagram above, there is one Spanned EtherChannel on the left side that connects to the inside
switch, and the other on the right side to outside switch. You can also create VLAN subinterfaces on each
EtherChannel if desired.
Note To view FlexConfig features that are also not supported with clustering, for example WCCP inspection, see
the ASA general operations configuration guide. FlexConfig lets you configure many ASA features that are
not present in the management center GUI. See FlexConfig Policies, on page 2617.
Note Traffic for centralized features is forwarded from member nodes to the control node over the cluster control
link.
If you use the rebalancing feature, traffic for centralized features may be rebalanced to non-control nodes
before the traffic is classified as a centralized feature; if this occurs, the traffic is then sent back to the control
node.
For centralized features, if the control node fails, all connections are dropped, and you have to re-establish
the connections on the new control node.
Note To view FlexConfig features that are also centralized with clustering, for example RADIUS inspection, see
the ASA general operations configuration guide. FlexConfig lets you configure many ASA features that are
not present in the management center GUI. See FlexConfig Policies, on page 2617.
• SUNRPC
• TFTP
• XDMCP
• Site-to-site VPN
• IGMP multicast control plane protocol processing (data plane forwarding is distributed across the cluster)
• PIM multicast control plane protocol processing (data plane forwarding is distributed across the cluster)
• No Proxy ARP—For Individual interfaces, a proxy ARP reply is never sent for mapped addresses. This
prevents the adjacent router from maintaining a peer relationship with an ASA that may no longer be in
the cluster. The upstream router needs a static route or PBR with Object Tracking for the mapped addresses
that points to the Main cluster IP address. This is not an issue for a Spanned EtherChannel, because there
is only one IP address associated with the cluster interface.
• No interface PAT on an Individual interface—Interface PAT is not supported for Individual interfaces.
• PAT with Port Block Allocation—See the following guidelines for this feature:
• Maximum-per-host limit is not a cluster-wide limit, and is enforced on each node individually. Thus,
in a 3-node cluster with the maximum-per-host limit configured as 1, if the traffic from a host is
load-balanced across all 3 nodes, then it can get allocated 3 blocks with 1 in each node.
• Port blocks created on the backup node from the backup pools are not accounted for when enforcing
the maximum-per-host limit.
• On-the-fly PAT rule modifications, where the PAT pool is modified with a completely new range
of IP addresses, will result in xlate backup creation failures for the xlate backup requests that were
still in transit while the new pool became effective. This behavior is not specific to the port block
allocation feature, and is a transient PAT pool issue seen only in cluster deployments where the
pool is distributed and traffic is load-balanced across the cluster nodes.
• When operating in a cluster, you cannot simply change the block allocation size. The new size is
effective only after you reload each device in the cluster. To avoid having to reload each device,
we recommend that you delete all block allocation rules and clear all xlates related to those rules.
You can then change the block size and recreate the block allocation rules.
• NAT pool address distribution for dynamic PAT—When you configure a PAT pool, the cluster divides
each IP address in the pool into port blocks. By default, each block is 512 ports, but if you configure port
block allocation rules, your block setting is used instead. These blocks are distributed evenly among the
nodes in the cluster, so that each node has one or more blocks for each IP address in the PAT pool. Thus,
you could have as few as one IP address in a PAT pool for a cluster, if that is sufficient for the number
of PAT’ed connections you expect. Port blocks cover the 1024-65535 port range, unless you configure
the option to include the reserved ports, 1-1023, on the PAT pool NAT rule.
• Reusing a PAT pool in multiple rules—To use the same PAT pool in multiple rules, you must be careful
about the interface selection in the rules. You must either use specific interfaces in all rules, or "any" in
all rules. You cannot mix specific interfaces and "any" across the rules, or the system might not be able
to match return traffic to the right node in the cluster. Using unique PAT pools per rule is the most reliable
option.
• No round-robin—Round-robin for a PAT pool is not supported with clustering.
• No extended PAT—Extended PAT is not supported with clustering.
• Dynamic NAT xlates managed by the control node—The control node maintains and replicates the xlate
table to data nodes. When a data node receives a connection that requires dynamic NAT, and the xlate
is not in the table, it requests the xlate from the control node. The data node owns the connection.
• Stale xlates—The xlate idle time on the connection owner does not get updated. Thus, the idle time might
exceed the idle timeout. An idle timer value higher than the configured timeout with a refcnt of 0 is an
indication of a stale xlate.
• No static PAT for the following inspections—
• FTP
• RSH
• SQLNET
• TFTP
• XDMCP
• SIP
• If you have an extremely large number of NAT rules, over ten thousand, you should enable the
transactional commit model using the asp rule-engine transactional-commit nat command in the device
CLI. Otherwise, the node might not be able to join the cluster.
Dynamic Routing
The routing process only runs on the control node, and routes are learned through the control node and
replicated to data nodes. If a routing packet arrives at a data node, it is redirected to the control node.
Figure 228: Dynamic Routing in Spanned EtherChannel Mode
After the data node learn the routes from the control node, each node makes forwarding decisions independently.
The OSPF LSA database is not synchronized from the control node to data nodes. If there is a control node
switchover, the neighboring router will detect a restart; the switchover is not transparent. The OSPF process
picks an IP address as its router ID. Although not required, you can assign a static router ID to ensure a
consistent router ID is used across the cluster. See the OSPF Non-Stop Forwarding feature to address the
interruption.
In the above diagram, Router A learns that there are 4 equal-cost paths to Router B, each through a node.
ECMP is used to load balance traffic between the 4 paths. Each node picks a different router ID when talking
to external routers.
You must configure a cluster pool for the router ID so that each node has a separate router ID.
EIGRP does not form neighbor relationships with cluster peers in individual interface mode.
Note If the cluster has multiple adjacencies to the same router for redundancy purposes, asymmetric routing can
lead to unacceptable traffic loss. To avoid asymmetric routing, group all of these node interfaces into the same
traffic zone. See Create an ECMP Zone, on page 1213.
VPN functionality is limited to the control node and does not take advantage of the cluster high availability
capabilities. If the control node fails, all existing VPN connections are lost, and VPN users will see a disruption
in service. When a new control node is elected, you must reestablish the VPN connections.
When you connect a VPN tunnel to a Spanned EtherChannel address, connections are automatically forwarded
to the control node. For connections to an Individual interface when using PBR or ECMP, you must always
connect to the Main cluster IP address, not a Local address.
VPN-related keys and certificates are replicated to all nodes.
For example, if your model can handle approximately 10 Gbps of traffic when running alone, then for a cluster
of 8 units, the maximum combined throughput will be approximately 80% of 80 Gbps (8 units x 10 Gbps):
64 Gbps.
Note If multiple nodes tie for the highest priority, the cluster node name and then the serial number is used to
determine the control node.
4. If a node later joins the cluster with a higher priority, it does not automatically become the control node;
the existing control node always remains as the control node unless it stops responding, at which point a
new control node is elected.
5. In a "split brain" scenario when there are temporarily multiple control nodes, then the node with highest
priority retains the role while the other nodes return to data node roles.
Note You can manually force a node to become the control node. For centralized features, if you force a control
node change, then all connections are dropped, and you have to re-establish the connections on the new control
node.
in this scenario. After the cluster control link is restored, then the control node that has the higher priority will
keep the control node’s role.
See Control Node Election, on page 508 for more information.
Interface Monitoring
Each node monitors the link status of all named hardware interfaces in use, and reports status changes to the
control node.
• Spanned EtherChannel—Uses cluster Link Aggregation Control Protocol (cLACP). Each node monitors
the link status and the cLACP protocol messages to determine if the port is still active in the EtherChannel.
The status is reported to the control node.
• Individual interfaces (Routed mode only)—Each node self-monitors its interfaces and reports interface
status to the control node.
When you enable health monitoring, all physical interfaces (including the main EtherChannel) are monitored
by default; you can optionally disable monitoring per interface. Only named interfaces can be monitored. For
example, the named EtherChannel must fail to be considered failed, which means all member ports of an
EtherChannel must fail to trigger cluster removal.
A node is removed from the cluster if its monitored interfaces fail. The amount of time before the threat
defense removes a member from the cluster depends on the type of interface and whether the node is an
established member or is joining the cluster. For EtherChannels (spanned or not): If the interface is down on
an established member, then the threat defense removes the member after 9 seconds. The threat defense does
not monitor interfaces for the first 90 seconds that a node joins the cluster. Interface status changes during
this time will not cause the threat defense to be removed from the cluster. For non-EtherChannels, the node
is removed after 500 ms, regardless of the member state.
Note When the threat defense becomes inactive and fails to automatically rejoin the cluster, all data interfaces are
shut down; only the Management interface can send and receive traffic.
• Failed data interface—The threat defense automatically tries to rejoin at 5 minutes, then at 10 minutes,
and finally at 20 minutes. If the join is not successful after 20 minutes, then the threat defense application
disables clustering. After you resolve the problem with the data interface, you have to manually enable
clustering.
• Failed node—If the node was removed from the cluster because of a node health check failure, then
rejoining the cluster depends on the source of the failure. For example, a temporary power failure means
the node will rejoin the cluster when it starts up again as long as the cluster control link is up. The threat
defense application attempts to rejoin the cluster every 5 seconds.
• Internal error—Internal failures include: application sync timeout; inconsistent application statuses; and
so on.
• Failed configuration deployment—If you deploy a new configuration from management center, and the
deployment fails on some cluster members but succeeds on others, then the nodes that failed are removed
from the cluster. You must manually rejoin the cluster by re-enabling clustering. If the deployment fails
on the control node, then the deployment is rolled back, and no members are removed. If the deployment
fails on all data nodes, then the deployment is rolled back, and no members are removed.
SNMP Engine ID No —
Connection Roles
See the following roles defined for each connection:
• Owner—Usually, the node that initially receives the connection. The owner maintains the TCP state and
processes packets. A connection has only one owner. If the original owner fails, then when new nodes
receive packets from the connection, the director chooses a new owner from those nodes.
• Backup owner—The node that stores TCP/UDP state information received from the owner, so that the
connection can be seamlessly transferred to a new owner in case of a failure. The backup owner does
not take over the connection in the event of a failure. If the owner becomes unavailable, then the first
node to receive packets from the connection (based on load balancing) contacts the backup owner for
the relevant state information so it can become the new owner.
As long as the director (see below) is not the same node as the owner, then the director is also the backup
owner. If the owner chooses itself as the director, then a separate backup owner is chosen.
For clustering on the Firepower 9300, which can include up to 3 cluster nodes in one chassis, if the
backup owner is on the same chassis as the owner, then an additional backup owner will be chosen from
another chassis to protect flows from a chassis failure.
• Director—The node that handles owner lookup requests from forwarders. When the owner receives a
new connection, it chooses a director based on a hash of the source/destination IP address and ports (see
below for ICMP hash details), and sends a message to the director to register the new connection. If
packets arrive at any node other than the owner, the node queries the director about which node is the
owner so it can forward the packets. A connection has only one director. If a director fails, the owner
chooses a new director.
As long as the director is not the same node as the owner, then the director is also the backup owner (see
above). If the owner chooses itself as the director, then a separate backup owner is chosen.
ICMP/ICMPv6 hash details:
• For Echo packets, the source port is the ICMP identifier, and the destination port is 0.
• For Reply packets, the source port is 0, and the destination port is the ICMP identifier.
• For other packets, both source and destination ports are 0.
• Forwarder—A node that forwards packets to the owner. If a forwarder receives a packet for a connection
it does not own, it queries the director for the owner, and then establishes a flow to the owner for any
other packets it receives for this connection. The director can also be a forwarder. Note that if a forwarder
receives the SYN-ACK packet, it can derive the owner directly from a SYN cookie in the packet, so it
does not need to query the director. (If you disable TCP sequence randomization, the SYN cookie is not
used; a query to the director is required.) For short-lived flows such as DNS and ICMP, instead of
querying, the forwarder immediately sends the packet to the director, which then sends them to the owner.
A connection can have multiple forwarders; the most efficient throughput is achieved by a good
load-balancing method where there are no forwarders and all packets of a connection are received by
the owner.
• Fragment Owner—For fragmented packets, cluster nodes that receive a fragment determine a fragment
owner using a hash of the fragment source IP address, destination IP address, and the packet ID. All
fragments are then forwarded to the fragment owner over the cluster control link. Fragments may be
load-balanced to different cluster nodes, because only the first fragment includes the 5-tuple used in the
switch load balance hash. Other fragments do not contain the source and destination ports and may be
load-balanced to other cluster nodes. The fragment owner temporarily reassembles the packet so it can
determine the director based on a hash of the source/destination IP address and ports. If it is a new
connection, the fragment owner will register to be the connection owner. If it is an existing connection,
the fragment owner forwards all fragments to the provided connection owner over the cluster control
link. The connection owner will then reassemble all fragments.
1. The SYN packet originates from the client and is delivered to one threat defense (based on the load
balancing method), which becomes the owner. The owner creates a flow, encodes owner information into
a SYN cookie, and forwards the packet to the server.
2. The SYN-ACK packet originates from the server and is delivered to a different threat defense (based on
the load balancing method). This threat defense is the forwarder.
3. Because the forwarder does not own the connection, it decodes owner information from the SYN cookie,
creates a forwarding flow to the owner, and forwards the SYN-ACK to the owner.
4. The owner sends a state update to the director, and forwards the SYN-ACK to the client.
5. The director receives the state update from the owner, creates a flow to the owner, and records the TCP
state information as well as the owner. The director acts as the backup owner for the connection.
6. Any subsequent packets delivered to the forwarder will be forwarded to the owner.
7. If packets are delivered to any additional nodes, it will query the director for the owner and establish a
flow.
8. Any state change for the flow results in a state update from the owner to the director.
The first UDP packet originates from the client and is delivered to one threat defense (based on the load
balancing method).
2. The node that received the first packet queries the director node that is chosen based on a hash of the
source/destination IP address and ports.
3. The director finds no existing flow, creates a director flow and forwards the packet back to the previous
node. In other words, the director has elected an owner for this flow.
4. The owner creates the flow, sends a state update to the director, and forwards the packet to the server.
5. The second UDP packet originates from the server and is delivered to the forwarder.
6. The forwarder queries the director for ownership information. For short-lived flows such as DNS, instead
of querying, the forwarder immediately sends the packet to the director, which then sends it to the owner.
7. The director replies to the forwarder with ownership information.
8. The forwarder creates a forwarding flow to record owner information and forwards the packet to the
owner.
9. The owner forwards the packet to the client.
16-node clusters for the 7.6.0 7.6.0 For the Secure Firewall 3100 and 4200, the maximum nodes were increased
Secure Firewall from 8 to 16.
3100/4200.
Individual interface mode 7.6.0 7.6.0 Individual interfaces are normal routed interfaces, each with their own local
for Secure Firewall IP address used for routing. The main cluster IP address for each interface is
3100/4200 clusters. a fixed address that always belongs to the control node. When the control node
changes, the main cluster IP address moves to the new control node, so
management of the cluster continues seamlessly. Load balancing must be
configured separately on the upstream switch.
Restrictions: Not supported for container instances.
New/modified screens:
• Devices > Device Management > Add Cluster
• Devices > Device Management > Cluster > Interfaces / EIGRP / OSPF
/ OSPFv3 / BGP
• Objects > Object Management > Address Pools > MAC Address Pool
Cluster control link ping 7.2.6 Any You can check to make sure all the cluster nodes can reach each other over the
tool. cluster control link by performing a ping. One major cause for the failure of a
7.4.1
node to join the cluster is an incorrect cluster control link configuration; for
example, the cluster control link MTU may be set higher than the connecting
switch MTUs.
New/modified screens: Devices > Device Management > More( ) > Cluster
Live Status
Other version restrictions: Not supported with management center Version
7.3.x or 7.4.0.
Troubleshooting file 7.4.1 7.4.1 You can generate and download troubleshooting files for each device on the
generation and download Device page and also for all cluster nodes on the Cluster page. For a cluster,
available from Device you can download all files as a single compressed file. You can also include
and Cluster pages. cluster logs for the cluster for cluster nodes. You can alternatively trigger file
generation from the Devices > Device Management > More( ) > Troubleshoot
Files menu.
New/modified screens:
• Devices > Device Management > Device > General
• Devices > Device Management > Cluster > General
Automatic generation of 7.4.1 7.4.1 If a node fails to join the cluster, a troubleshooting file is automatically
a troubleshooting file on generated for the node. You can download the file from Tasks or from the
a node when it fails to Cluster page.
join the cluster.
View CLI output for a 7.4.1 Any You can view a set of pre-defined CLI outputs that can help you troubleshoot
device or device cluster. the device or cluster. You can also enter any show command and see the output.
New/modified screens: Devices > Device Management > Cluster > General
Clustering for the Secure 7.4.0 7.4.0 The Secure Firewall 4200 supports Spanned EtherChannel clustering for up to
Firewall 4200 8 nodes.
Cluster health monitor 7.3.0 Any You can now edit cluster health monitor settings.
settings
New/modified screens: Devices > Device Management > Cluster > Cluster
Health Monitor Settings
Note
If you previously configured these settings using FlexConfig, be sure to remove
the FlexConfig configuration before you deploy. Otherwise the FlexConfig
configuration will overwrite the management center configuration.
Cluster health monitor 7.3.0 Any You can now view cluster health on the cluster health monitor dashboard.
dashboard
New/modified screens: System() > Health > Monitor
Automatic configuration 7.2.0 7.2.0 The MTU of the cluster control link interface is now automatically set to 100
of the cluster control link bytes more than the highest data interface MTU; by default, the MTU is 1600
MTU bytes.
Clustering for the Secure 7.1.0 7.1.0 The Secure Firewall 3100 supports Spanned EtherChannel clustering for up to
Firewall 3100 8 nodes.
New/modified screens:
• Devices > Device Management > Add Cluster
• Devices > Device Management > More menu
• Devices > Device Management > Cluster
Note Some features are not supported when using clustering. See Unsupported Features and Clustering, on page
556.
• About Threat Defense Virtual Clustering in the Private Cloud, on page 517
• Licenses for Threat Defense Virtual Clustering, on page 521
• Requirements and Prerequisites for Threat Defense Virtual Clustering, on page 521
• Guidelines for Threat Defense Virtual Clustering, on page 523
• Configure Threat Defense Virtual Clustering, on page 523
• Manage Cluster Nodes, on page 538
• Monitoring the Cluster, on page 548
• Troubleshooting the Cluster, on page 554
• Reference for Clustering, on page 556
• History for Threat Defense Virtual Clustering in a Private Cloud, on page 568
• Management access to each firewall for configuration and monitoring. The threat defense virtual
deployment includes a Management 0/0 interface that you will use to manage the cluster nodes.
When you place the cluster in your network, the upstream and downstream routers need to be able to
load-balance the data coming to and from the cluster using Layer 3 Individual interfaces and one of the
following methods:
• Policy-Based Routing—The upstream and downstream routers perform load balancing between nodes
using route maps and ACLs.
• Equal-Cost Multi-Path Routing—The upstream and downstream routers perform load balancing between
nodes using equal cost static or dynamic routes.
Individual Interfaces
You can configure cluster interfaces as Individual interfaces.
Individual interfaces are normal routed interfaces, each with their own Local IP address used for routing. The
Main cluster IP address for each interface is a fixed address that always belongs to the control node. When
the control node changes, the Main cluster IP address moves to the new control node, so management of the
cluster continues seamlessly.
IPS-only interfaces (inline sets and passive interfaces) are not supported as Individual interfaces.
Because interface configuration must be configured only on the control node, you configure a pool of IP
addresses to be used for a given interface on the cluster nodes, including one for the control node.
Load balancing must be configured separately on the upstream switch.
Policy-Based Routing
When using Individual interfaces, each threat defense interface maintains its own IP address and MAC address.
One method of load balancing is Policy-Based Routing (PBR).
We recommend this method if you are already using PBR, and want to take advantage of your existing
infrastructure.
PBR makes routing decisions based on a route map and ACL. You must manually divide traffic between all
threat defenses in a cluster. Because PBR is static, it may not achieve the optimum load balancing result at
all times. To achieve the best performance, we recommend that you configure the PBR policy so that forward
and return packets of a connection are directed to the same threat defense. For example, if you have a Cisco
router, redundancy can be achieved by using Cisco IOS PBR with Object Tracking. Cisco IOS Object Tracking
monitors each threat defense using ICMP ping. PBR can then enable or disable route maps based on reachability
of a particular threat defense. See the following URLs for more details:
[Link]
[Link]
ECMP routing can forward packets over multiple “best paths” that tie for top place in the routing metric. Like
EtherChannel, a hash of source and destination IP addresses and/or source and destination ports can be used
to send a packet to one of the next hops. If you use static routes for ECMP routing, then the threat defense
failure can cause problems; the route continues to be used, and traffic to the failed threat defense will be lost.
If you use static routes, be sure to use a static route monitoring feature such as Object Tracking. We recommend
using dynamic routing protocols to add and remove routes, in which case, you must configure each threat
defense to participate in dynamic routing.
VNI Interface
A VNI interface is similar to a VLAN interface: it is a virtual interface that keeps network traffic separated
on a given physical interface by using tagging. You can only configure one VNI interface. Each VNI interface
has an IP address on the same subnet.
Peer VTEPs
Unlike regular VXLAN for data interfaces, which allows a single VTEP peer, The threat defense virtual
clustering allows you to configure multiple peers.
Configuration Replication
All nodes in the cluster share a single configuration. You can only make configuration changes on the control
node (with the exception of the bootstrap configuration), and changes are automatically synced to all other
nodes in the cluster.
Management Network
You must manage each node using the Management interface; management from a data interface is not
supported with clustering.
Note If you add the cluster before the management center is licensed (and running in Evaluation mode), then when
you license the management center, you can experience traffic disruption when you deploy policy changes
to the cluster. Changing to licensed mode causes all data units to leave the cluster and then rejoin.
User Roles
• Admin
• Access Admin
• Network Admin
Switch Requirements
Be sure to complete the switch configuration before you configure clustering. Make sure the ports connected
to the cluster control link have the correct (higher) MTU configured. By default, the cluster control link MTU
is set to 154 bytes higher than the data interfaces. If the switches have an MTU mismatch, the cluster formation
will fail.
IPv6
The cluster control link is only supported using IPv4.
Additional Guidelines
• When significant topology changes occur (such as adding or removing an EtherChannel interface, enabling
or disabling an interface on the threat defense virtual, adding an additional switch to form a VSS or vPC,
configuring IP addresses or interface flap on the cluster) you should disable the health check feature and
also disable interface monitoring for the interfaces that are affected by the topology changes. When the
topology change is complete, and the configuration change is synced to all units, you can re-enable the
interface health check feature.
• When adding a unit to an existing cluster, or when reloading a unit, there will be a temporary, limited
packet/connection drop; this is expected behavior. In some cases, the dropped packets can hang your
connection; for example, dropping a FIN/ACK packet for an FTP connection will make the FTP client
hang. In this case, you need to reestablish the FTP connection.
• For decrypted TLS/SSL connections, the decryption states are not synchronized, and if the connection
owner fails, then decrypted connections will be reset. New connections will need to be established to a
new unit. Connections that are not decrypted (they match a do-not-decrypt rule) are not affected and are
replicated correctly.
• We do not support VXLANs for data interfaces; only the cluster control link supports VXLAN.
Procedure
Step 1 Deploy each cluster node according the Cisco Secure Firewall Threat Defense Virtual Getting Started Guide.
All units in a cluster:
• Must have jumbo frame reservation enabled for the cluster control link. Do this in the Day 0 configuration
when you deploy the threat defense virtual by setting "DeploymentType": "Cluster". Otherwise, you
must restart each node to enable jumbo frames after the cluster has formed and is healthy.
• (KVM only) Must use CPU hard partitioning (CPU pinning) for all VMs on the KVM host.
Step 2 Add each node to the management center as a standalone device in the same domain and group.
See Add a Device Using a Registration Key (Legacy Screen)—Basic Configuration, on page 36. You can
create a cluster with a single device, and then add more nodes later. The initial settings (licensing, access
control policy) that you set when you add a device will be inherited by all cluster nodes from the control node.
You will choose the control node when forming the cluster.
Create a Cluster
Form a cluster from one or more devices in the management center.
Procedure
Step 1 Choose Devices > Device Management, and then choose Add > Cluster.
The Add Cluster Wizard appears.
Step 2 Specify a Cluster Name and an authentication Cluster Key for control traffic.
• Cluster Name—An ASCII string from 1 to 38 characters.
• Cluster Key—An ASCII string from 1 to 63 characters. The Cluster Key value is used to generate the
encryption key. This encryption does not affect datapath traffic, including connection state update and
forwarded packets, which are always sent in the clear.
To resolve the above issues, remove the unsupported VPN license and deploy pending configuration
changes to the device.
• VXLAN Network Identifier (VNI) Network—Specify an IPv4 subnet for the VNI network; IPv6 is
not supported for this network. Specify a 24, 25, 26, or 27 subnet. An IP address will be auto-assigned
to each node on this network. The VNI network is the encrypted virtual network that runs on top of the
physical VTEP network.
• Cluster Control Link—Choose the physical interface you want to use for the cluster control link.
• Virtual Tunnel Endpoint (VTEP) Network—Specify an IPv4 subnet for the physical interface network;
IPv6 is not supported for this network. The VTEP network is a different network than the VNI network,
and it is used for the physical cluster control link.
• VTEP IPv4 Address—This field will be auto-populated with the first address on the VTEP network.
• Priority—Set the priority of this node for control node elections. The priority is between 1 and 100,
where 1 is the highest priority. Even if you set the priority to be lower than other nodes, this node will
still be the control node when the cluster is first formed.
Step 4 For Data Nodes (Optional), click Add a data node to add a node to the cluster.
You can form the cluster with only the control node for faster cluster formation, or you can add all nodes now.
Set the following for each data node:
• Node—Choose the device that you want to add.
Note
If you see an Error ( ) icon next to the node name, click the icon to view configuration issues. You
must cancel cluster formation, resolve the issues, and then return to cluster formation.
• VTEP IPv4 Address—This field will be auto-populated with the next address on the VTEP network.
• Priority—Set the priority of this node for control node elections. The priority is between 1 and 100,
where 1 is the highest priority.
Step 5 Click Continue. Review the Summary, and then click Save.
The cluster bootstrap configuration is saved to the cluster nodes. The bootstrap configuration includes the
VXLAN interface used for the cluster control link.
The cluster name shows on the Devices > Device Management page; expand the cluster to see the cluster
nodes.
You can monitor cluster node registration by clicking the Notifications icon and choosing Tasks. The
management center updates the Cluster Registration task as each node registers.
Step 6 Configure device-specific settings by clicking the Edit ( ) for the cluster.
Most configuration can be applied to the cluster as a whole, and not nodes in the cluster. For example, you
can change the display name per node, but you can only configure interfaces for the whole cluster.
Step 7 On the Devices > Device Management > Cluster screen, you see General and other settings for the cluster.
• General > Name—Change the cluster display name by clicking the Edit ( ).
• General > View—Click the View link to open the Cluster Status dialog box.
The Cluster Status dialog box also lets you retry data unit registration by clicking Reconcile [Link]
can also ping the cluster control link from a node. See Perform a Ping on the Cluster Control Link, on
page 555.
• General > Troubleshoot—You can generate and download troubleshooting logs, and you can view
cluster CLIs. See Troubleshooting the Cluster, on page 554.
Figure 236: Troubleshoot
Step 8 On the Devices > Device Management > Devices, you can choose each member in the cluster from the top
right drop-down menu and configure the following settings.
• General > Name—Change the cluster member display name by clicking the Edit ( ).
• Management > Host—If you change the management IP address in the device configuration, you must
match the new address in the management center so that it can reach the device on the network. First
disable the connection, edit the Host address in the Management area, then re-enable the connection.
Step 9 If you deployed your cluster nodes without enabling jumbo-frame reservation, then restart all cluster nodes
to enable jumbo frames, which are required for the cluster control link. See Shut Down or Restart the Device,
on page 62.
If you previously enabled jumbo-frame reservation, you can skip this step.
Because the cluster control link traffic includes data packet forwarding, the cluster control link needs to
accommodate the entire size of a data packet plus cluster traffic overhead (100 bytes) and VXLAN overhead
(54 bytes). When you create the cluster, the MTU is set to 154 bytes higher than the highest data interface
MTU (1654 by default). If you later increase the data interface MTU, be sure to also increase the cluster
control link MTU. For example, because the maximum MTU is 9198 bytes, then the highest data interface
MTU can be 9044, while the cluster control link can be set to 9198. See Configure the MTU, on page 870.
Note
Make sure you configure switches connected to the cluster control link to the correct (higher) MTU; otherwise,
cluster formation will fail.
Configure Interfaces
This section describes how to configure interfaces to be Individual interfaces compatible with clustering.
Individual interfaces are normal routed interfaces, each with their own IP address taken from a pool of IP
addresses. The Main cluster IP address is a fixed address for the cluster that always belongs to the current
control node. All data interfaces must be Individual interfaces.
Procedure
Step 1 Choose Objects > Object Management > Address Pools to add an IPv4 and/or IPv6 address pool. See
Address Pools, on page 1354.
Include at least as many addresses as there are units in the cluster. The Virtual IP address is not a part of this
pool, but needs to be on the same network. You cannot determine the exact Local address assigned to each
unit in advance.
Step 2 Choose Devices > Device Management, and click Edit ( ) next to the cluster.
Step 3 Click Interfaces, and then click Edit ( ) for a data interface.
Step 4 On the IPv4, enter the IP Address and mask. This IP address is a fixed address for the cluster, and always
belongs to the current control unit.
Step 5 From the IPv4 Address Pool drop-down list, choose the address pool you created.
Note
If you want to manually assign a MAC address to this interface, you need to create a mac-address pool using
FlexConfig.
Step 6 On IPv6 > Basic, from the IPv6 Address Pool drop-down list, choose the address pool you created.
Step 7 Configure other interface settings as normal.
Step 8 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
Field Description
Timeouts
Hold Time Between .3 and 45 seconds; The default is 3 seconds. To determine node system
health, the cluster nodes send heartbeat messages on the cluster control link
to other nodes. If a node does not receive any heartbeat messages from a peer
node within the hold time period, the peer node is considered unresponsive or
dead.
Interface Debounce Time Between 300 and 9000 ms. The default is 500 ms. The interface debounce time
is the amount of time before the node considers an interface to be failed, and
the node is removed from the cluster.
Monitored Interfaces The interface health check monitors for link failures. If all physical ports for
a given logical interface fail on a particular node, but there are active ports
under the same logical interface on other nodes, then the node is removed from
the cluster. The amount of time before the node removes a member from the
cluster depends on the type of interface and whether the node is an established
node or is joining the cluster.
Service Application Shows whether the Snort and disk-full processes are monitored.
Auto-Rejoin Settings
Field Description
Cluster Interface Shows the auto-rejoin settings after a cluster control link failure.
Attempts Between -1 and 65535. The default is -1 (unlimited). Sets the number of rejoin
attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 1x the interval duration. Defines if the interval
duration increases at each attempt.
Data Interfaces Shows the auto-rejoin settings after a data interface failure.
Attempts Between -1 and 65535. The default is 3. Sets the number of rejoin attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 2x the interval duration. Defines if the interval
duration increases at each attempt.
System Shows the auto-rejoin settings after internal errors. Internal failures include:
application sync timeout; inconsistent application statuses; and so on.
Attempts Between -1 and 65535. The default is 3. Sets the number of rejoin attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 2x the interval duration. Defines if the interval
duration increases at each attempt.
Note If you disable the system health check, fields that do not apply when the system health check is disabled will
not show.
Procedure
Step 5 Disable the system health check by clicking the Health Check slider .
Figure 240: Disable the System Health Check
When any topology changes occur (such as adding or removing a data interface, enabling or disabling an
interface on the node or the switch, or adding an additional switch to form a VSS or vPC or VNet) you should
disable the system health check feature and also disable interface monitoring for the disabled interfaces. When
the topology change is complete, and the configuration change is synced to all nodes, you can re-enable the
system health check feature and monitored interfaces.
Step 7 Customize the auto-rejoin cluster settings after a health check failure.
Set the following values for the Cluster Interface, Data Interface, and System (internal failures include:
application sync timeout; inconsistent application statuses; and so on):
• Attempts—Sets the number of rejoin attempts, between -1 and 65535. 0 disables auto-rejoining. The
default for the Cluster Interface is -1 (unlimited). The default for the Data Interface and System is 3.
• Interval Between Attempts—Defines the interval duration in minutes between rejoin attempts, between
2 and 60. The default value is 5 minutes. The maximum total time that the node attempts to rejoin the
cluster is limited to 14400 minutes (10 days) from the time of last failure.
• Interval Variation—Defines if the interval duration increases. Set the value between 1 and 3: 1 (no
change); 2 (2 x the previous duration), or 3 (3 x the previous duration). For example, if you set the interval
duration to 5 minutes, and set the variation to 2, then the first attempt is after 5 minutes; the 2nd attempt
is 10 minutes (2 x 5); the 3rd attempt 20 minutes (2 x 10), and so on. The default value is 1 for the Cluster
Interface and 2 for the Data Interface and System.
Step 8 Configure monitored interfaces by moving interfaces in the Monitored Interfaces or Unmonitored Interfaces
window. You can also check or uncheck Enable Service Application Monitoring to enable or disable
monitoring of the Snort and disk-full processes.
The interface health check monitors for link failures. If all physical ports for a given logical interface fail on
a particular node, but there are active ports under the same logical interface on other nodes, then the node is
removed from the cluster. The amount of time before the node removes a member from the cluster depends
on the type of interface and whether the node is an established node or is joining the cluster. Health check is
enabled by default for all interfaces and for the Snort and disk-full processes.
You might want to disable health monitoring of non-essential interfaces.
When any topology changes occur (such as adding or removing a data interface, enabling or disabling an
interface on the node or the switch, or adding an additional switch to form a VSS or vPC or VNet) you should
disable the system health check feature and also disable interface monitoring for the disabled interfaces. When
the topology change is complete, and the configuration change is synced to all nodes, you can re-enable the
system health check feature and monitored interfaces.
Procedure
Step 1 Choose Devices > Device Management, click the More ( ) for the cluster, and choose Add Nodes.
Step 2 From the Node menu, choose a device, and adjust the IP address and priority if desired.
Figure 244: Manage Cluster Wizard
You can monitor cluster node registration by clicking the Notifications icon and choosing Tasks.
Break a Node
You can remove a node from the cluster so that it becomes a standalone device. You cannot break the control
node unless you break the entire cluster. The data node has its configuration erased.
Procedure
Step 1 Choose Devices > Device Management, click the More ( ) for the node you want to break, and choose Break
Node.
Figure 246: Break a Node
You can optionally break one or more nodes from the cluster More menu by choosing Break Nodes.
You can monitor the cluster node break by clicking the Notifications icon and choosing Tasks.
Procedure
Step 1 Make sure all cluster nodes are being managed by the management center by reconciling nodes. See Reconcile
Cluster Nodes, on page 546.
Step 2 Choose Devices > Device Management, click the More ( ) for the cluster, and choose Break Cluster.
Figure 248: Break Cluster
You can monitor the cluster break by clicking the Notifications icon and choosing Tasks.
Disable Clustering
You may want to deactivate a node in preparation for deleting the node, or temporarily for maintenance. This
procedure is meant to temporarily deactivate a node; the node will still appear in the management center
device list. When a node becomes inactive, all data interfaces are shut down.
Procedure
Step 1 For the unit you want to disable, choose Devices > Device Management, click the More ( ), and choose
Disable Node Clustering.
Figure 250: Disable Clustering
If you disable clustering on the control node, one of the data nodes will become the new control node. Note
that for centralized features, if you force a control node change, then all connections are dropped, and you
have to re-establish the connections on the new control node. You cannot disable clustering on the control
node if it is the only node in the cluster.
Procedure
Step 1 For the unit you want to reactivate, choose Devices > Device Management, click the More ( ), and choose
Enable Node Clustering.
Step 2 Confirm that you want to enable clustering on the node.
Caution The best method to change the control node is to disable clustering on the control node, wait for a new control
election, and then re-enable clustering. If you must specify the exact unit you want to become the control
node, use the procedure in this section. Note that for centralized features, if you force a control node change
using either method, then all connections are dropped, and you have to re-establish the connections on the
new control node.
Procedure
Step 1 Open the Cluster Status dialog box by choosing Devices > Device Management > More ( ) > Cluster Live
Status.
Step 2 For the unit you want to become the control unit, choose More ( ) > Change Role to Control.
Step 3 You are prompted to confirm the role change. Check the checkbox, and click OK.
Procedure
Step 1 Choose Devices > Device Management, click the More ( ) for the cluster, and choose Edit Configuration.
Step 3 Click Continue. Review the Summary, and then click Save
Procedure
Step 1 Choose Devices > Device Management > More ( ) for the cluster, and then choose Cluster Live Status to
open the Cluster Status dialog box.
Figure 254: Cluster Live Status
For more information about the cluster status, see Monitoring the Cluster, on page 548.
Registering the cluster again to the same or a different management center causes the configuration to be
removed, so the cluster will stop processing traffic at that point; the cluster configuration remains intact so
you can add the cluster as a whole. You can choose an access control policy at registration, but you will have
to re-apply other policies after registration and then deploy the configuration before it will process traffic
again.
Procedure
Step 1 Choose Devices > Device Management, click More ( ) for the cluster or node, and choose Unregister.
Figure 256: Unregister Cluster or Node
Step 2 You are prompted to unregister the cluster or node; click Yes.
Step 3 You can register the cluster to a new (or the same) management center by adding one of the cluster members
as a new device.
a) Connect to one cluster node's CLI, and identify the new management center using the configure manager
add command. See Modify Threat Defense Management Interfaces at the CLI.
b) Choose Devices > Device Management, and then click Add Device.
You only need to add one of the cluster nodes as a device, and the rest of the cluster nodes will be
discovered.
Step 4 To re-add a deleted node, see Reconcile Cluster Nodes, on page 546.
• Cluster Status dialog box, which is available from the Devices > Device Management > More ( ) icon
or from the Devices > Device Management > Cluster page > General area > Cluster Live Status link.
Figure 257: Cluster Status
For each node, you can view the Summary or the History.
Note The CPU and memory metrics display the individual average of the data plane
and snort usage.
• The metric charts, namely, CPU Usage, Memory Usage, Throughput, and Connections,
diagrammatically display the statistics of the cluster over the specified time period.
• Load Distribution dashboard―Displays load distribution across the cluster nodes in two widgets:
• The Distribution widget displays the average packet and connection distribution over the time range
across the cluster nodes. This data depicts how the load is being distributed by the nodes. Using this
widget, you can easily identify any abnormalities in the load distribution and rectify it.
• The Node Statistics widget displays the node level metrics in table format. It displays metric data
on CPU usage, memory usage, input rate, output rate, active connections, and NAT translations
across the cluster nodes. This table view enables you to correlate data and easily identify any
discrepancies.
• Member Performance dashboard―Displays current metrics of the cluster nodes. You can use the selector
to filter the nodes and view the details of a specific node. The metric data include CPU usage, memory
usage, input rate, output rate, active connections, and NAT translations.
• CCL dashboard―Displays, graphically, the cluster control link data namely, the input, and output rate.
• Troubleshooting and Links ― Provides convenient links to frequently used troubleshooting topics and
procedures.
• Time range―An adjustable time window to constrain the information that appears in the various cluster
metrics dashboards and widgets.
• Custom Dashboard―Displays data on both cluster-wide metrics and node-level metrics. However, node
selection only applies for the threat defense metrics and not for the entire cluster to which the node
belongs.
Procedure
Step 2 In the device list, click Expand( ) and Collapse ( ) to expand and collapse the list of managed cluster
devices.
Step 3 To view the cluster health statistics, click on the cluster name. The cluster monitor reports health and
performance metrics in several predefined dashboards by default. The metrics dashboards include:
• Overview ― Highlights key metrics from the other predefined dashboards, including its nodes, CPU,
memory, input and output rates, connection statistics, and NAT translation information.
• Load Distribution ― Traffic and packet distribution across the cluster nodes.
• Member Performance ― Node-level statistics on CPU usage, memory usage, input throughput, output
throughput, active connection, and NAT translation.
• CCL ― Interface status and aggregate traffic statistics.
You can navigate through the various metrics dashboards by clicking on the labels. For a comprehensive list
of the supported cluster metrics, see Cisco Secure Firewall Threat Defense Health Metrics.
Step 4 You can configure the time range from the drop-down in the upper-right corner. The time range can reflect a
period as short as the last hour (the default) or as long as two weeks. Select Custom from the drop-down to
configure a custom start and end date.
Click the refresh icon to set auto refresh to 5 minutes or to toggle off auto refresh.
Step 5 Click on deployment icon for a deployment overlay on the trend graph, with respect to the selected time range.
The deployment icon indicates the number of deployments during the selected time-range. A vertical band
indicates the deployment start and end time. For multiple deployments, multiple bands/lines appear. Click on
the icon on top of the dotted line to view the deployment details.
Step 6 (For node-specific health monitor) View the Health Alerts for the node in the alert notification at the top of
page, directly to the right of the device name.
Hover your pointer over the Health Alerts to view the health summary of the node. The popup window shows
a truncated summary of the top five health alerts. Click on the popup to open a detailed view of the health
alert summary.
Step 7 (For node-specific health monitor) The device monitor reports health and performance metrics in several
predefined dashboards by default. The metrics dashboards include:
• Overview ― Highlights key metrics from the other predefined dashboards, including CPU, memory,
interfaces, connection statistics; plus disk usage and critical process information.
• CPU ― CPU utilization, including the CPU usage by process and by physical cores.
• Memory ― Device memory utilization, including data plane and Snort memory usage.
• Interfaces ― Interface status and aggregate traffic statistics.
• Connections ― Connection statistics (such as elephant flows, active connections, peak connections, and
so on) and NAT translation counts.
• Snort ― Statistics that are related to the Snort process.
• ASP drops ― Statistics related to the dropped packets against various reasons.
You can navigate through the various metrics dashboards by clicking on the labels. See Cisco Secure Firewall
Threat Defense Health Metrics for a comprehensive list of the supported device metrics.
Step 8 Click the plus sign Add New Dashboard( ) in the upper right corner of the health monitor to create a custom
dashboard by building your own variable set from the available metric groups.
For cluster-wide dashboard, choose Cluster metric group, and then choose the metric.
Cluster Metrics
The cluster health monitor tracks statistics that are related to a cluster and its nodes, and aggregate of load
distribution, performance, and CCL traffic statistics.
Data Throughput Incoming and outgoing data traffic statistics for a bytes
cluster.
CCL Throughput Incoming and outgoing CCL traffic statistics for a bytes
cluster.
You can also enter any show command in the Command field. See View CLI Output, on page 130 for
more information.
Procedure
Step 1 Choose Devices > Device Management, click the More ( ) icon next to the cluster, and choose > Cluster
Live Status.
Figure 260: Cluster Status
The node sends a ping on the cluster control link to every other node using a packet size that matches the
maximum MTU.
Note To view FlexConfig features that are also not supported with clustering, for example WCCP inspection, see
the ASA general operations configuration guide. FlexConfig lets you configure many ASA features that are
not present in the management center GUI. See FlexConfig Policies, on page 2617.
Note Traffic for centralized features is forwarded from member nodes to the control node over the cluster control
link.
If you use the rebalancing feature, traffic for centralized features may be rebalanced to non-control nodes
before the traffic is classified as a centralized feature; if this occurs, the traffic is then sent back to the control
node.
For centralized features, if the control node fails, all connections are dropped, and you have to re-establish
the connections on the new control node.
Note To view FlexConfig features that are also centralized with clustering, for example RADIUS inspection, see
the ASA general operations configuration guide. FlexConfig lets you configure many ASA features that are
not present in the management center GUI. See FlexConfig Policies, on page 2617.
In the above diagram, Router A learns that there are 4 equal-cost paths to Router B, each through a node.
ECMP is used to load balance traffic between the 4 paths. Each node picks a different router ID when talking
to external routers.
You must configure a cluster pool for the router ID so that each node has a separate router ID.
idle timeout value. However, if the control flow owner is reloaded, and the control flow is re-hosted, the
parent/child flow relationship will not longer be maintained; the control flow idle timeout will not be
updated.
• PAT with Port Block Allocation—See the following guidelines for this feature:
• Maximum-per-host limit is not a cluster-wide limit, and is enforced on each node individually. Thus,
in a 3-node cluster with the maximum-per-host limit configured as 1, if the traffic from a host is
load-balanced across all 3 nodes, then it can get allocated 3 blocks with 1 in each node.
• Port blocks created on the backup node from the backup pools are not accounted for when enforcing
the maximum-per-host limit.
• On-the-fly PAT rule modifications, where the PAT pool is modified with a completely new range
of IP addresses, will result in xlate backup creation failures for the xlate backup requests that were
still in transit while the new pool became effective. This behavior is not specific to the port block
allocation feature, and is a transient PAT pool issue seen only in cluster deployments where the
pool is distributed and traffic is load-balanced across the cluster nodes.
• When operating in a cluster, you cannot simply change the block allocation size. The new size is
effective only after you reload each device in the cluster. To avoid having to reload each device,
we recommend that you delete all block allocation rules and clear all xlates related to those rules.
You can then change the block size and recreate the block allocation rules.
• NAT pool address distribution for dynamic PAT—When you configure a PAT pool, the cluster divides
each IP address in the pool into port blocks. By default, each block is 512 ports, but if you configure port
block allocation rules, your block setting is used instead. These blocks are distributed evenly among the
nodes in the cluster, so that each node has one or more blocks for each IP address in the PAT pool. Thus,
you could have as few as one IP address in a PAT pool for a cluster, if that is sufficient for the number
of PAT’ed connections you expect. Port blocks cover the 1024-65535 port range, unless you configure
the option to include the reserved ports, 1-1023, on the PAT pool NAT rule.
• Reusing a PAT pool in multiple rules—To use the same PAT pool in multiple rules, you must be careful
about the interface selection in the rules. You must either use specific interfaces in all rules, or "any" in
all rules. You cannot mix specific interfaces and "any" across the rules, or the system might not be able
to match return traffic to the right node in the cluster. Using unique PAT pools per rule is the most reliable
option.
• No round-robin—Round-robin for a PAT pool is not supported with clustering.
• No extended PAT—Extended PAT is not supported with clustering.
• Dynamic NAT xlates managed by the control node—The control node maintains and replicates the xlate
table to data nodes. When a data node receives a connection that requires dynamic NAT, and the xlate
is not in the table, it requests the xlate from the control node. The data node owns the connection.
• Stale xlates—The xlate idle time on the connection owner does not get updated. Thus, the idle time might
exceed the idle timeout. An idle timer value higher than the configured timeout with a refcnt of 0 is an
indication of a stale xlate.
• No static PAT for the following inspections—
• FTP
• RSH
• SQLNET
• TFTP
• XDMCP
• SIP
• If you have an extremely large number of NAT rules, over ten thousand, you should enable the
transactional commit model using the asp rule-engine transactional-commit nat command in the device
CLI. Otherwise, the node might not be able to join the cluster.
Note If multiple nodes tie for the highest priority, the cluster node name and then the serial number is used to
determine the control node.
4. If a node later joins the cluster with a higher priority, it does not automatically become the control node;
the existing control node always remains as the control node unless it stops responding, at which point a
new control node is elected.
5. In a "split brain" scenario when there are temporarily multiple control nodes, then the node with highest
priority retains the role while the other nodes return to data node roles.
Note You can manually force a node to become the control node. For centralized features, if you force a control
node change, then all connections are dropped, and you have to re-establish the connections on the new control
node.
Interface Monitoring
Each node monitors the link status of all named hardware interfaces in use, and reports status changes to the
control node.
All physical interfaces are monitored; only named interfaces can be monitored. You can optionally disable
monitoring per interface.
A node is removed from the cluster if its monitored interfaces fail. The node is removed after 500 ms.
Note When the threat defense becomes inactive and fails to automatically rejoin the cluster, all data interfaces are
shut down; only the Management interface can send and receive traffic.
SNMP Engine ID No —
Connection Roles
See the following roles defined for each connection:
• Owner—Usually, the node that initially receives the connection. The owner maintains the TCP state and
processes packets. A connection has only one owner. If the original owner fails, then when new nodes
receive packets from the connection, the director chooses a new owner from those nodes.
• Backup owner—The node that stores TCP/UDP state information received from the owner, so that the
connection can be seamlessly transferred to a new owner in case of a failure. The backup owner does
not take over the connection in the event of a failure. If the owner becomes unavailable, then the first
node to receive packets from the connection (based on load balancing) contacts the backup owner for
the relevant state information so it can become the new owner.
As long as the director (see below) is not the same node as the owner, then the director is also the backup
owner. If the owner chooses itself as the director, then a separate backup owner is chosen.
For clustering on the Firepower 9300, which can include up to 3 cluster nodes in one chassis, if the
backup owner is on the same chassis as the owner, then an additional backup owner will be chosen from
another chassis to protect flows from a chassis failure.
• Director—The node that handles owner lookup requests from forwarders. When the owner receives a
new connection, it chooses a director based on a hash of the source/destination IP address and ports (see
below for ICMP hash details), and sends a message to the director to register the new connection. If
packets arrive at any node other than the owner, the node queries the director about which node is the
owner so it can forward the packets. A connection has only one director. If a director fails, the owner
chooses a new director.
As long as the director is not the same node as the owner, then the director is also the backup owner (see
above). If the owner chooses itself as the director, then a separate backup owner is chosen.
ICMP/ICMPv6 hash details:
• For Echo packets, the source port is the ICMP identifier, and the destination port is 0.
• For Reply packets, the source port is 0, and the destination port is the ICMP identifier.
• For other packets, both source and destination ports are 0.
• Forwarder—A node that forwards packets to the owner. If a forwarder receives a packet for a connection
it does not own, it queries the director for the owner, and then establishes a flow to the owner for any
other packets it receives for this connection. The director can also be a forwarder. Note that if a forwarder
receives the SYN-ACK packet, it can derive the owner directly from a SYN cookie in the packet, so it
does not need to query the director. (If you disable TCP sequence randomization, the SYN cookie is not
used; a query to the director is required.) For short-lived flows such as DNS and ICMP, instead of
querying, the forwarder immediately sends the packet to the director, which then sends them to the owner.
A connection can have multiple forwarders; the most efficient throughput is achieved by a good
load-balancing method where there are no forwarders and all packets of a connection are received by
the owner.
• Fragment Owner—For fragmented packets, cluster nodes that receive a fragment determine a fragment
owner using a hash of the fragment source IP address, destination IP address, and the packet ID. All
fragments are then forwarded to the fragment owner over the cluster control link. Fragments may be
load-balanced to different cluster nodes, because only the first fragment includes the 5-tuple used in the
switch load balance hash. Other fragments do not contain the source and destination ports and may be
load-balanced to other cluster nodes. The fragment owner temporarily reassembles the packet so it can
determine the director based on a hash of the source/destination IP address and ports. If it is a new
connection, the fragment owner will register to be the connection owner. If it is an existing connection,
the fragment owner forwards all fragments to the provided connection owner over the cluster control
link. The connection owner will then reassemble all fragments.
1. The SYN packet originates from the client and is delivered to one threat defense (based on the load
balancing method), which becomes the owner. The owner creates a flow, encodes owner information into
a SYN cookie, and forwards the packet to the server.
2. The SYN-ACK packet originates from the server and is delivered to a different threat defense (based on
the load balancing method). This threat defense is the forwarder.
3. Because the forwarder does not own the connection, it decodes owner information from the SYN cookie,
creates a forwarding flow to the owner, and forwards the SYN-ACK to the owner.
4. The owner sends a state update to the director, and forwards the SYN-ACK to the client.
5. The director receives the state update from the owner, creates a flow to the owner, and records the TCP
state information as well as the owner. The director acts as the backup owner for the connection.
6. Any subsequent packets delivered to the forwarder will be forwarded to the owner.
7. If packets are delivered to any additional nodes, it will query the director for the owner and establish a
flow.
8. Any state change for the flow results in a state update from the owner to the director.
The first UDP packet originates from the client and is delivered to one threat defense (based on the load
balancing method).
2. The node that received the first packet queries the director node that is chosen based on a hash of the
source/destination IP address and ports.
3. The director finds no existing flow, creates a director flow and forwards the packet back to the previous
node. In other words, the director has elected an owner for this flow.
4. The owner creates the flow, sends a state update to the director, and forwards the packet to the server.
5. The second UDP packet originates from the server and is delivered to the forwarder.
6. The forwarder queries the director for ownership information. For short-lived flows such as DNS, instead
of querying, the forwarder immediately sends the packet to the director, which then sends it to the owner.
7. The director replies to the forwarder with ownership information.
8. The forwarder creates a forwarding flow to record owner information and forwards the packet to the
owner.
9. The owner forwards the packet to the client.
Clustering for the Threat 7.4.1 7.4.1 The Threat Defense Virtual now supports individual interface clustering for
Defense Virtual on up to 16 nodes on VMware and KVM.
VMware and KVM
Cluster control link ping 7.2.6/7.4.1 Any You can check to make sure all the cluster nodes can reach each other over the
tool. cluster control link by performing a ping. One major cause for the failure of a
node to join the cluster is an incorrect cluster control link configuration; for
example, the cluster control link MTU may be set higher than the connecting
switch MTUs.
New/modified screens: Devices > Device Management > More( ) > Cluster
Live Status
Other version restrictions: Not supported with management center Version
7.3.x or 7.4.0.
Troubleshooting file 7.4.1 7.4.1 You can generate and download troubleshooting files for each device on the
generation and download Device page and also for all cluster nodes on the Cluster page. For a cluster,
available from Device you can download all files as a single compressed file. You can also include
and Cluster pages. cluster logs for the cluster for cluster nodes. You can alternatively trigger file
generation from the Devices > Device Management > More( ) > Troubleshoot
Files menu.
New/modified screens:
• Devices > Device Management > Device > General
• Devices > Device Management > Cluster > General
Automatic generation of 7.4.1 7.4.1 If a node fails to join the cluster, a troubleshooting file is automatically
a troubleshooting file on generated for the node. You can download the file from Tasks or from the
a node when it fails to Cluster page.
join the cluster.
View CLI output for a 7.4.1 Any You can view a set of pre-defined CLI outputs that can help you troubleshoot
device or device cluster. the device or cluster. You can also enter any show command and see the output.
New/modified screens: Devices > Device Management > Cluster > General
Cluster health monitor 7.3.0 Any You can now edit cluster health monitor settings.
settings
New/Modified screens: Devices > Device Management > Cluster > Cluster
Health Monitor Settings
Note
If you previously configured these settings using FlexConfig, be sure to remove
the FlexConfig configuration before you deploy. Otherwise the FlexConfig
configuration will overwrite the management center configuration.
Cluster health monitor 7.3.0 Any You can now view cluster health on the cluster health monitor dashboard.
dashboard
New/Modified screens: System( ) > Health > Monitor
Clustering for the Threat 7.2.0 7.2.0 The threat defense virtual supports Individual interface clustering for up to 4
Defense Virtual on nodes on VMware and KVM.
VMware and KVM
New/Modified screens:
• Devices > Device Management > Add Cluster
• Devices > Device Management > More menu
• Devices > Device Management > Cluster
Note Some features are not supported when using clustering. See Unsupported Features and Clustering, on page
675.
• About Threat Defense Virtual Clustering in the Public Cloud, on page 572
• Licenses for Threat Defense Virtual Clustering, on page 574
• Requirements and Prerequisites for Threat Defense Virtual Clustering, on page 574
• Guidelines for Threat Defense Virtual Clustering, on page 576
• Deploy the Cluster in AWS, on page 577
• Deploy the Cluster in Azure, on page 600
• Threat Defense Virtual Clustering Autoscale Solution on Azure, on page 620
• Deploy the Cluster in GCP, on page 643
• Add the Cluster to the Management Center (Manual Deployment), on page 652
• Configure Cluster Health Monitor Settings, on page 659
• Manage Cluster Nodes, on page 664
• Monitoring the Cluster, on page 666
• Troubleshooting the Cluster, on page 672
• Upgrading the Cluster, on page 674
• Reference for Clustering, on page 675
• History for Threat Defense Virtual Clustering in the Public Cloud, on page 686
Note Layer 2 Spanned EtherChannels are not supported for load balancing.
Individual Interfaces
You can configure cluster interfaces as Individual interfaces.
Individual interfaces are normal routed interfaces, each with their own local IP address. The IP address for
the interface will be configured automatically via DHCP. Static IP configuration is not supported.
VNI Interface
A VNI interface is similar to a VLAN interface: it is a virtual interface that keeps network traffic separated
on a given physical interface by using tagging. You can only configure one VNI interface. Each VNI interface
has an IP address on the same subnet.
Peer VTEPs
Unlike regular VXLAN for data interfaces, which allows a single VTEP peer, The threat defense virtual
clustering allows you to configure multiple peers.
• Health monitoring.
Configuration Replication
All nodes in the cluster share a single configuration. You can only make configuration changes on the control
node (with the exception of the bootstrap configuration), and changes are automatically synced to all other
nodes in the cluster.
Management Network
You must manage each node using the Management interface; management from a data interface is not
supported with clustering.
Note If you add the cluster before the Management Center is licensed (and running in Evaluation mode), then when
you license the Management Center, you can experience traffic disruption when you deploy policy changes
to the cluster. Changing to licensed mode causes all data units to leave the cluster and then rejoin.
Note FTDv5 and FTDv10 do not support Amazon Web Services (AWS) Gateway
Load Balancer (GWLB) and Azure GWLB.
• Maximum 16 nodes
See also the general requirements for the Threat Defense Virtual in the Cisco Secure Firewall Threat Defense
Virtual Getting Started Guide.
User Roles
• Admin
• Access Admin
• Network Admin
MTU
Make sure the ports connected to the cluster control link have the correct (higher) MTU configured. If there
is an MTU mismatch, the cluster formation will fail. The cluster control link MTU should be 154 bytes higher
than the data interfaces. Because the cluster control link traffic includes data packet forwarding, the cluster
control link needs to accommodate the entire size of a data packet plus cluster traffic overhead (100 bytes)
plus VXLAN overhead (54 bytes).
For AWS with GWLB, the data interface uses Geneve encapsulation. In this case, the entire Ethernet datagram
is being encapsulated, so the new packet is larger and requires a larger MTU. You should set the source
interface MTU to be the network MTU + 306 bytes. So for the standard 1500 MTU network path, the source
interface MTU should be 1806, and the cluster control link MTU should be +154, 1960.
For Azure with GWLB, the data interface uses VXLAN encapsulation. In this case, the entire Ethernet datagram
is being encapsulated, so the new packet is larger and requires a larger MTU. You should set the cluster control
link MTU to be the source interface MTU + 80 bytes.
The following table shows the default values for the cluster control link MTU and the data interface MTU.
Note We do not recommend setting the cluster control link MTU between 2561 and 8362; due to block pool handling,
this MTU size is not optimal for system operation.
IPv6
The cluster control link is only supported using IPv4.
Additional Guidelines
• When significant topology changes occur (such as adding or removing an EtherChannel interface, enabling
or disabling an interface on the Threat Defense or the switch, adding an additional switch to form a VSS
or vPC or VNet) you should disable the health check feature and also disable interface monitoring for
the disabled interfaces. When the topology change is complete, and the configuration change is synced
to all units, you can re-enable the interface health check feature.
• When adding a node to an existing cluster, or when reloading a node, there will be a temporary, limited
packet/connection drop; this is expected behavior. In some cases, the dropped packets can hang your
connection; for example, dropping a FIN/ACK packet for an FTP connection will make the FTP client
hang. In this case, you need to reestablish the FTP connection.
• Do not power off a node without first disabling clustering on the node.
• For decrypted TLS/SSL connections, the decryption states are not synchronized, and if the connection
owner fails, then decrypted connections will be reset. New connections will need to be established to a
new node. Connections that are not decrypted (they match a do-not-decrypt rule) are not affected and
are replicated correctly.
• Dynamic scaling is not supported.
• If you are using Secure Firewall versions 7.2 or 7.3, Stateful Target Failover is not supported when you
deploy the cluster on AWS.
• Perform a global deployment after the completion of each maintenance window.
• Ensure that you do not remove more than one device at a time from the auto scale group (AWS) / instance
group (GCP) / scale set (Azure). We also recommend that you run the cluster disable command on the
device before removing the device from the auto scale group (AWS) / instance group (GCP) / scale set
(Azure).
• If you want to disable data nodes and the control node in a cluster, we recommend that you disable the
data nodes before disabling the control node. If a control node is disabled while there are other data nodes
in the cluster, one of the data nodes has to be promoted to be the control node. Note that the role change
could disturb the cluster.
• In the customized day 0 configuration scripts given in this guide, you can change the IP addresses as per
your requirement, provide custom interface names, and change the sequence of the CCL-Link interface.
• If you experience CCL instability issues, such as intermittent ping failures, after deploying a Threat
Defense Virtual cluster on a cloud platform, we recommend that you address the reasons that are causing
CCL instability. Also, you can increase the hold time as a temporary workaround to mitigate CCL
instability issues to a certain extent. For more information on how to change the hold time, see Edit
Cluster Health Monitor Settings.
• When you are configuring your security firewall rule or security group for the Management Center virtual,
you must include both Private and Public IP addresses of the Threat Defense Virtual in the Source IP
address range. Also, ensure to specify the Private and Public IP addresses of the Management Center
Virtual in the security firewall rule or security group of the Threat Defense Virtual. This is important to
ensure proper registration of nodes during clustering deployment.
Note This use case is the only currently supported use case for Geneve interfaces.
The AWS Gateway Load Balancer combines a transparent network gateway and a load balancer that distributes
traffic and scales virtual appliances on demand. The Threat Defense Virtual supports the Gateway Load
Balancer centralized control plane with a distributed data plane (Gateway Load Balancer endpoint). The
following figure shows traffic forwarded to the Gateway Load Balancer from the Gateway Load Balancer
endpoint. The Gateway Load Balancer balances traffic among multiple Threat Defense Virtuals, which inspect
the traffic before either dropping it or sending it back to the Gateway Load Balancer (U-turn traffic). The
Gateway Load Balancer then sends the traffic back to the Gateway Load Balancer endpoint and to the
destination.
Note Transport Layer Security (TLS) Server Identity Discovery is not supported with Geneve single-arm setup on
AWS.
Sample Topologies
Threat Defense Virtual Clustering with Autoscale in Single and Multiple Availability Zones of an AWS
Region
An availability zone is a standalone data center or a set of independent data centers within an AWS region
that operate independently. Each zone has its own networking infrastructure, connectivity, and power source
ensuring a failure in one zone does not affect others. To improve redundancy and reliability, companies use
multiple availability zones in their disaster recovery plans.
Deploying Threat Defense Virtual across multiple availability zones and configuring clustering with dynamic
scaling can significantly enhance the availability and scalability of your infrastructure. In addition, utilizing
multiple availability zones in the same region can offer extra redundancy and guarantee high availability in
the event of a failure.
You can modify the IP allocation mechanism of Cluster Control Link (CCL) to support both single and multiple
availability zone deployments of Threat Defense Virtual clusters on AWS. The topologies given below depict
both inbound and outbound traffic flow in a single and multiple availability zones with autoscaling ability.
Threat Defense Virtual Clustering with Autoscale in Single Availability Zone
There are two Threat Defense Virtual instances in the cluster that are connected to a GWLB.
Inbound traffic from the internet goes to the GWLB endpoint, which is then transmits the traffic to the GWLB.
Traffic is then forwarded to the Threat Defense Virtual cluster. After the traffic is inspected by an Threat
Defense Virtual instance in the cluster, it is forwarded to the application VM, App1.
Outbound traffic from App1 is transmitted to the GWLB endpoint > GWLB > TDv > GWLB > GWLB
Endpoint, which then sends it out to the internet.
Threat Defense Virtual Clustering with Autoscale in Multiple Availability Zones
There are two Threat Defense Virtual instances in the cluster in different availability zones that are connected
to a GWLB.
Note Multiple Availability Zone deployment is supported from Threat Defense Virtual Version 7.6.0 and later.
Inbound traffic from the internet goes to the GWLB endpoint, which then transmits the traffic to the GWLB.
Based on the availability zone, the traffic is then routed to the Threat Defense Virtual cluster. After the traffic
is inspected by an Threat Defense Virtual instance in the cluster, it is forwarded to the application VM, App1.
Workspace Steps
Local Host Copy cluster_layer.zip file to the Lambda python files folder.
Manual Deployment
The following flowchart illustrates the workflow for manual deployment of the Threat Defense Virtual cluster
on AWS.
Workspace Steps
AWS Console Create target group and GWLB; attach target group to the
GWLB.
AWS Console Register instances with the target group using data interface IP.
Templates
The templates given below are available in GitHub. The parameter values are self-explanatory with the
parameter names, default values, allowed values, and description, given in the template.
• [Link] – Template for infrastructure deployment.
• deploy_ngfw_cluster.yaml – Template for cluster deployment.
Note Ensure that you check the list of supported AWS instance types before deploying cluster nodes. This list is
found in the deploy_ngfw_cluster.yaml template, under allowed values for the parameter InstanceType.
Procedure
{
"licenseCaps": ["BASE", "MALWARE", "THREAT"],
"performanceTier": "FTDv50",
"fmcIpforDeviceReg": "DONTRESOLVE",
"RegistrationId": "cisco",
"NatId": "cisco",
"fmcAccessPolicyName": "AWS-ACL"
}
Note
FTDv5 and FTDv10 tiers are not supported.
d) Create a file named cluster_layer.zip to provide essential Python libraries to Lambda functions.
We recommend to use the Amazon Linux with Python 3.9 installed to create the cluster_layer.zip file.
Note
If you need an Amazon Linux environment, you can create an EC2 instance using Amazon Linux 2023
AMI or use AWS Cloudshell, which runs the latest version of Amazon Linux.
For creating the [Link] file, you need to first create [Link] file that consists of the
python library package details and then run the shell script.
1. Create the [Link] file by specifying the python package details.
The following is the sample package details that you provide in the [Link] file:
$ cat [Link]
pycryptodome
paramiko
requests
scp
jsonschema
cffi
zipp
importlib-metadata
Note
If you encounter a dependency conflict error during installation, such as urllib3 or cryptography, it is
recommended that you include the conflicting packages along with their recommended versions in the
[Link] file. After that, you can run the installation again to resolve the conflict.
e) Copy the resulting cluster_layer.zip file to the lambda python files folder -
cluster/aws/lambda-python-files.
f) Create the cluster_layer.zip, custom_metrics_publisher.zip, cluster_manger.zip and lifecycle_ftdv.zip
files.
A [Link] file can be found in the cloned repository (cluster/aws/[Link]). This will zip the
python files into a Zip file and copy to a target folder.
python3 [Link] build
Step 2 Deploy [Link] and note the output values for cluster deployment. Before deploying the
infrastructure stack, it is important to identify the AWS region and the availability zones that will be used.
Each AWS region has a different set of availability zones and VPC infrastructure, therefore it is essential to
select the correct region and availability zones for your deployment.
a) On the AWS Console, go to CloudFormation and click Create stack; select With new
resources(standard).
b) Select Upload a template file, click Choose file, and select [Link] from the target folder.
c) Click Next and provide the required information.
d) Enter a unique Cluster Name and Cluster Number for the cluster.
e) Select the availability zone from the Availability Zone list. This field lists only availability zones based
on the AWS region that you select for deploying the infrastructure stack using the ClusterFormation
template.
f) Click Next, then Create stack.
g) After the deployment is complete, go to Outputs and note the S3 BucketName.
Cluster Configuration
ClusterGrpNamePrefix String This is the cluster name Prefix. The cluster number will
be added as a suffix.
ClusterNumber String This is the cluster number. This will be suffixed to the
cluster name (msa-ftdv-infra). For example, if this value
is 1, the group name will be msa-ftdv-infra-1.
It should be at least 1 digit, but not more than 3 digits.
Default: 1.
ClusterSize Numbers This is the total number of Threat Defense Virtual nodes
in a cluster.
Minimum: 1
Maximum:16
Infrastructure Details
NoOfAZs String This is the total number of availability zones into which
Threat Defense Virtual is deployed. (The number of
availability zones varies from a Minimum 1 to Maximum
3 depending on a region).
The subnet will be created in these availability zones.
The availability zones available in this list is based on
the region selected for deploying the cluster.
Note
AZ String The availability zone list is based on the region you plan
to deploy.
In Availability Zone list, select the valid availability zone
(1 availability zone or 2 availability zones or 3
availability zones).
Count should match with the value of Number of
Availability Zones parameter.
NotifyEmailID String Email address to which cluster events email will be sent.
You must accept a subscription email request to receive
this email notification.
Example: admin@[Link]
VpcId String The VPC ID for the cluster group.
Type: AWS::EC2::VPC::Id
S3BktName String The S3 Bucket that contains the uploaded Lambda zip
files. You must specify correct bucket name.
LambdaSubnets List Enter at least two subnet for the Lambda functions. The
two subnets you enter must have a NAT gateway to
enable the Lambda functions to communicate with AWS
services, which are public DNS.
Type: List<AWS::EC2::Subnet::Id>
MgmtInterfaceSG List Select security group ID for the Threat Defense Virtual
instances.
Type: List<AWS::EC2::SecurityGroup::Id>
InsideInterfaceSG List Select security group ID for the inside interface of Threat
Defense Virtual instances.
Type: List<AWS::EC2::SecurityGroup::Id>
CCLInterfaceSG List Select a security group ID for CCL interface of the Threat
Defense Virtual instances.
GWLB Configuration
Cisco NGFWv
Instance
Configuration
AmiID String Choose the correct AMI ID as per the region, version,
and license type (BYOL or PAYG).
Threat Defense Virtual 7.2 and later support clustering,
and Threat Defense Virtual Version 7.6 and later support
the autoscaling and multiple availability zone
enhancements.
Type: AWS::EC2::Image::Id
FMC Automation
Configuration
fmcDeviceGrpName String Enter a unique name for the cluster group in management
center.
fmcMetricsUsername String Enter a unique internal user name for polling memory
metrics from management center.
The user must have privileges of Network Admin and
Maintenance User or more .
Scaling Configuration
MemoryThresholds CommaDelimitedList Specifying non-zero lower and upper threshold will create
scale policies. If (0,0) is selected, no memory scaling
alarm or policies will be created. Evaluation points and
data points are at default or recommended values.
e) Click Next.
f) Click to acknowledge all the AWS CloudFormation options.
g) Click Submit to deploy the cluster.
h) Click Next, then Create stack.
The Lambda functions manage the rest of the process, and the threat defense virtuals will automatically
register with the management center.
Step 5 Verify the cluster deployment by logging into any one of the nodes and using the show cluster info command.
Figure 268: Cluster Nodes
Procedure
Step 1 From the AWS console, choose Services > EC2 > Auto Scaling groups > Created ClusterAutoscale
group.
Configure IMDSv2 Required Mode in Threat Defense Virtual Clustering by Updating Stack
You can configure the IMDSv2 Required mode for the Threat Defense Virtual autoscale group instances that
are already deployed on the AWS.
Procedure
Single Availability Zone - Day0 Configuration with a fixed configuration for AWS
{
"AdminPassword": "password",
"Hostname": "hostname",
"FirewallMode": "Routed",
"ManageLocally": "No",
"Cluster": {
"CclSubnetRange": "ip_address_start ip_address_end",
"ClusterGroupName": "cluster_name",
[For Gateway Load Balancer] "Geneve": "{Yes | No}",
[For Gateway Load Balancer] "HealthProbePort": "port"
}
}
For example:
{
"AdminPassword": "Sup3rnatural",
"Hostname": "ciscoftdv",
"FirewallMode": "Routed",
"ManageLocally": "No",
"Cluster": {
"CclSubnetRange": "[Link] [Link]",
"ClusterGroupName": "ftdv-cluster",
"Geneve": "Yes",
"HealthProbePort": "7777"
}
}
Multiple Availability Zone - Day0 Configuration with a fixed configuration for AWS
{
"AdminPassword": "password",
"Hostname": "hostname",
"FirewallMode": "Routed",
"ManageLocally": "No",
"Cluster": {
"CclSubnetRange":[
"ip_address_start_AZ1 ip_address_end_AZ1",
"ip_address_start_AZ2 ip_address_end_AZ2",
"ip_address_start_AZ3 ip_address_end_AZ3"
],
"ClusterGroupName": "cluster_name",
[For Gateway Load Balancer] "Geneve": "{Yes | No}",
[For Gateway Load Balancer] "HealthProbePort": "port"
}
}
{
"AdminPassword": "Sup4rnatural",
"Hostname": "ftdvcluster",
"FirewallMode": "Routed",
"ManageLocally": "No",
"Cluster": {
"CclSubnetRange": [
"[Link] [Link]",
"[Link] [Link]"
],
"ClusterGroupName": "ftdv-cluster",
"Geneve": "Yes",
"HealthProbePort": "8080"
}
}
{
"AdminPassword": "Sup4rnatural",
"Hostname": "ftdvcluster",
"FirewallMode": "Routed",
"ManageLocally": "No",
"Cluster": {
"CclSubnetRange": [
"[Link] [Link]",
"[Link] [Link]",
"[Link] [Link]"
],
"ClusterGroupName": "ftdv-cluster",
"Geneve": "Yes",
"HealthProbePort": "8080"
}
}
For the CclSubnetRange variable, specify a range of IP addresses starting from x.x.x.4. Ensure that you have
at least 16 available IP addresses for clustering. Some examples of start (ip_address_start) and end
(ip_address_end) IP addresses given below.
Procedure
Step 1 Deploy the Threat Defense Virtual instance by using the cluster day 0 configuration with the required number
of interfaces - four interfaces if you are using Gateway Load Balancer (GWLB), or five interfaces if you are
using non-native load balancer. To do this, in the Configure Instance Details > Advanced Details section,
paste the cluster day 0 configuration.
Note
Ensure that you attach interfaces to the instances in the order given below.
• AWS Gateway Load Balancer - four interfaces - management, diagnostic, inside, and cluster control
link.
• Non-native load balancers - five interfaces - management, diagnostic, inside, outside, and cluster control
link.
For more information on deploying Threat Defense Virtual on AWS, see Deploy the Threat Defense Virtual
on AWS.
c) Register the data interface (inside interface) with the Target Group using IP addresses.
For more information, see Create a Gateway Load Balancer.
Step 5 Add the control node to the Management Center. See Add the Cluster to the Management Center (Manual
Deployment), on page 652.
Configure Target Failover for Secure Firewall Threat Defense Virtual Clustering
with GWLB in AWS
Threat Defense Virtual clustering in AWS utilizes the Gateway Load Balancer (GWLB) to balance and forward
network packets for inspection to a designated Threat Defense Virtual node. The GWLB is designed to continue
sending network packets to the target node in the event of a failover or deregistration of that node.
The Target Failover feature in AWS enables GWLB to redirect network packets to a healthy target node in
the event of node deregistration during planned maintenance or a target node failure. It takes advantage of
the cluster's stateful failover.
In AWS, you can configure Target Failover through the AWS Elastic Load Balancing (ELB) API or AWS
console.
Note If a target node fails while the GWLB routes traffic using certain protocols such as SSH, SCP, CURL, and
so on, then there may be a delay in redirecting traffic to a healthy target. This delay is due to rebalancing and
rerouting of traffic flow.
In AWS, you can configure Target Failover through the AWS ELB API or AWS console.
• AWS API - In the AWS ELB API - modify-target-group-attributes you can define the flow handling
behavior by modifying the following two new parameters.
• target_failover.on_unhealthy - It defines how the GWLB handles the network flow when the target
becomes unhealthy.
• target_failover.on_deregistration - It defines how the GWLB handles the network flow when the
target is deregistered.
The following command shows the sample API parameter configuration of defining these two parameters.
aws elbv2 modify-target-group-attributes \
--target-group-arn arn:aws:elasticloadbalancing:…/my-targets/73e2d6bc24d8a067 \
--attributes \
Key=target_failover.on_unhealthy, Value=rebalance[no_rebalance] \
Key=target_failover.on_deregistration, Value=rebalance[no_rebalance]
• AWS Console – In the EC2 console, you can enable the Target Failover option on the Target Group page
by configuring the following options.
• Edit Target Groups Attributes
• Enable Target Failover
• Verify Rebalance Flows
For more information about how to enable Target Failover, see Enable Target Failover for Secure Firewall
Threat Defense Virtual Clustering in AWS, on page 599.
Enable Target Failover for Secure Firewall Threat Defense Virtual Clustering
in AWS
The data interface of threat defense virtual is registered to a target group of GWLB in AWS. In the threat
defense virtual clustering, each instance is associated with a Target Group. The GWLB load balances and
sends the traffic to this healthy instance identified or registered as a target node in the target group.
Procedure
Figure 271: Outbound Traffic Use Case and Topology with GWLB
End-to-End Process for Deploying Threat Defense Virtual Cluster in Azure with
GWLB
Template-based Deployment
The following flowchart illustrates the workflow for template-based deployment of the Threat Defense Virtual
cluster in Azure with GWLB.
Workspace Steps
Workspace Steps
Azure Cloud Use the Function app to register the cluster with the Management
Center.
Azure Cloud Create FTPS credentials.
Manual Deployment
The following flowchart illustrates the workflow of manual deployment of Threat Defense Virtual cluster in
Azure with GWLB.
Workspace Steps
Templates
The templates given below are available in GitHub. The parameter values are self-explanatory with the
parameter names, and values, given in the template.
From Secure Firewall version 7.4.1, you can deploy the cluster without the diagnostic interface. To deploy
the cluster with only the Outside, Inside, Management, and CCL interfaces, use the withoutDiagnostic templates
- azure_withoutDiagnostic_ftdv_gwlb_cluster_parameters.json and
azure_withoutDiagnostic_ftdv_gwlb_cluster.json files.
Templates to deploy with Diagnostic Interface:
• azure_ftdv_gwlb_cluster_parameters.json – Template to enter parameters for the Threat Defense Virtual
cluster with GWLB.
• azure_ftdv_gwlb_cluster.json – Template to deploy Threat Defense Virtual cluster with GWLB.
Prerequisites
• To allow the cluster to auto-register to the management center, create a user with Network Admin &
Maintenance User privileges on the management center. Users with these privileges can use REST API.
See the Cisco Secure Firewall Management Center Administration Guide.
• Add an access policy in the management center that matches the name of the policy that you will specify
during template deployment.
• Ensure that the Management Center Virtual is licensed appropriately.
• Perform the steps given below after the cluster is added to the Management Center Virtual:
1. Configure platform settings with the health check port number in the Management Center. For more
information on configuring this, see Platform Settings.
2. Create a static route for data traffic. For more information on creating a static route, see Add a Static
Route.
Sample static route configuration:
Network: any-ipv4
Interface: vxlan_tunnel
Leaked from Virtual Router: Global
Gateway: vxlan_tunnel_gw
Tunneled: false
Metric: 2
Procedure
In the IP Addresses tab, click Add subnet and add the following subnets – Management, Diagnostic,
Data, and Cluster Control Link.
If you are deploying the Threat Defense Virtual 7.4.1 cluster without a Diagnostic interface, then you
must skip the Diagnostic subnet creation.
b) Add the subnets.
Step 5 Deploy the custom template.
Step 8 In the Azure Portal, click the Function app to register the cluster with the Management Center.
Note
If you do not want to use the Function app, you can alternatively register the control node to the management
center directly by using Add > Device (not Add > Cluster). The rest of the cluster nodes will register
automatically.
Step 9 Create FTPS Credentials by clicking Deployment Center > FTPS credentials > User scope > Configure
Username and Password, and then click Save.
Step 10 Upload the Cluster_Function.zip file to the Function app by executing the following curl command in the
local terminal.
curl -X POST -u username --data-binary @"Cluster_Function.zip" https://
Function_App_Name.[Link]/api/zipdeploy
Note
The curl command might take few minutes (~2 to 3 minutes) to complete command execution.
The function will be uploaded to the Function app. The function will start, and you can see the logs in the
storage account’s outqueue. The device registration with the Management Center will be initiated.
This topology depicts both inbound and outbound traffic flow. The Threat Defense Virtual cluster is sandwiched
between the internal and external load balancers. A Management Center Virtual instance is used to manage
the cluster.
Inbound traffic from the internet goes to the external load balancer which then transmits the traffic to the
Threat Defense Virtual cluster. After the traffic has been inspected by a Threat Defense Virtual instance in
the cluster, it is forwarded to the application VM.
Outbound traffic from the application VM is transmitted to the internal load balancer. Traffic is then forwarded
to the Threat Defense Virtual cluster and then sent out to the internet.
End-to-End Process for Deploying Threat Defense Virtual Cluster in Azure with
NLB
Template-based Deployment
The following flowchart illustrates the workflow of template-based deployment of Threat Defense Virtual
cluster in Azure with NLB.
Workspace Steps
Azure Cloud Use the Function app to register the cluster with the Management
Center.
Azure Cloud Create FTPS credentials.
Manual Deployment
The following flowchart illustrates the workflow of manual deployment of Threat Defense Virtual cluster in
Azure with NLB.
Workspace Steps
Templates
The templates given below are available in GitHub. The parameter values are self-explanatory with the
parameter names, and values, given in the template.
From Secure Firewall version 7.4.1, you can deploy the cluster without the diagnostic interface. To deploy
the cluster with only the Outside, Inside, Management, and CCL interfaces, use the withoutDiagnostic templates
- azure_withoutDiagnostic_ftdv_nlb_cluster_parameters.json and
azure_withoutDiagnostic_ftdv_nlb_cluster.json files.
Templates to deploy with Diagnostic Interface:
• azure_ftdv_nlb_cluster_parameters.json – Template to enter parameters for the Threat Defense Virtual
cluster with NLB.
• azure_ftdv_nlb_cluster.json – Template to deploy Threat Defense Virtual cluster with NLB.
Prerequisites
• To allow the cluster to auto-register with the Management Center, create a user with Network Admin &
Maintenance User privileges on the Management Center. Users with these privileges can use REST API.
See the Cisco Secure Firewall Management Center Administration Guide.
• Add an access policy in the Management Center that matches the name of the policy that you will specify
during template deployment.
• Ensure that the Management Center Virtual is licensed appropriately.
• After the cluster is added to the Management Center Virtual:
1. Configure platform settings with the health check port number in the Management Center. For more
information on configuring this, see Platform Settings.
2. Create static routes for traffic from outside and inside interfaces. For more information on creating
a static route, see Add a Static Route.
Sample static route configuration for the outside interface:
Network: any-ipv4
Interface: outside
Leaked from Virtual Router: Global
Gateway: ftdv-cluster-outside
Tunneled: false
Metric: 10
Network: any-ipv4
Interface: inside
Leaked from Virtual Router: Global
Gateway: ftdv-cluster-inside-gw
Tunneled: false
Metric: 11
3. Configure NAT rule for data traffic. For more information on configuring NAT rules, see Network
Address Translation.
Deploy Cluster on Azure with NLB Using an Azure Resource Manager Template
Deploy the cluster for Azure NLB using the customized Azure Resource Manager (ARM) template.
Procedure
Step 8 In the Azure Portal, click the Function app to register the cluster to the management center.
Note
If you do not want to use the Function app, you can alternatively register the control node with the Management
Center directly by using Add > Device (not Add > Cluster). The rest of the cluster nodes will register
automatically.
Step 9 Create FTPS Credentials by clicking Deployment Center > FTPS credentials > User scope > Configure
Username and Password, and then click Save.
Step 10 Upload the Cluster_Function.zip file to the Function app by executing the following curl command in the
local terminal.
curl -X POST -u username --data-binary @"Cluster_Function.zip" https://
Function_App_Name.[Link]/api/zipdeploy
Note
The curl command might take a few minutes (~2 to 3 minutes) to complete command execution.
The function will be uploaded to the Function app. The function will start, and you can see the logs in the
storage account’s outqueue. The device registration with the Management Center will be initiated.
{
"AdminPassword": "password",
"FirewallMode": "Routed",
"ManageLocally": "No",
"Diagnostic": "OFF", //For deployment of version 7.4.1 and later without Diagnostics
template, set this parameter to OFF.
. "FmcIp": "<FMC_IP>",
"FmcRegKey": "<REGISTRATION_KEY>",
"FmcNatId": "<NAT_ID>",
"Cluster": {
"CclSubnetRange": "ip_address_start ip_address_end",
"ClusterGroupName": "cluster_name",
"HealthProbePort": "port_number",
"GatewayLoadBalancerIP": "ip_address",
"EncapsulationType": "vxlan",
"InternalPort": "internal_port_number",
"ExternalPort": "external_port_number",
"InternalSegId": "internal_segment_id",
"ExternalSegId": "external_segment_id"
}
}
Example
A sample day 0 configuration is given below.
{
"AdminPassword": "password",
"FirewallMode": "routed",
"ManageLocally": "No",
"Diagnostic": "OFF", //For deployment of version 7.4.1 and later without Diagnostics
template, set this parameter to OFF.
"FmcIp":"<FMC_IP>",
"FmcRegKey":"<REGISTRATION_KEY>",
"FmcNatId":"<NAT_ID>",
"Cluster": {
"CclSubnetRange": "[Link] [Link]", //mandatory user input
"ClusterGroupName": "ngfwv-cluster", //mandatory user input
"HealthProbePort": "7777", //mandatory user input
"GatewayLoadBalanceIP": "[Link]", //mandatory user input
"EncapsulationType": "vxlan",
"InternalPort": "2000",
"ExternalPort": "2001",
"InternalSegId": "800",
"ExternalSegId": "801"
}
}
Note If you are copying and pasting the configuration given above, ensure that you remove //mandatory user
input from the configuration
For the Azure health check settings, be sure to specify the HealthProbePort you set here.
For the CclSubnetRange variable, specify a range of IP addresses starting from x.x.x.4. Ensure that you have
at least 16 available IP addresses for clustering. Some examples of start and end IP addresses are given below.
{
"AdminPassword": "password",
"FirewallMode": "Routed",
"ManageLocally": "No",
"Diagnostic": "OFF", //For deployment of version 7.4.1 and later without Diagnostics
template, set this parameter to OFF.
"FmcIp": "<FMC_IP>",
"FmcRegKey": "<REGISTRATION_KEY>",
"FmcNatId": "<NAT_ID>",
"Cluster": {
"CclSubnetRange": "ip_address_start ip_address_end",
"ClusterGroupName": "cluster_name",
"HealthProbePort": "port_number",
"GatewayLoadBalancerIP": "ip_address",
"EncapsulationType": "vxlan",
"InternalPort": "internal_port_number",
"ExternalPort": "external_port_number",
"InternalSegId": "internal_segment_id",
"ExternalSegId": "external_segment_id"
}
}
Example
A sample day 0 configuration for version 7.4 and later is given below.
{
"AdminPassword": "Sup3rnatural",
"Hostname": "clusterftdv",
"FirewallMode": "routed",
"ManageLocally": "No",
"Diagnostic": "OFF", //For deployment of version 7.4.1 and later without Diagnostics
template, set this parameter to OFF.
"FmcIp": "<FMC_IP>",
"FmcRegKey": "<REGISTRATION_KEY>",
"FmcNatId": "<NAT_ID>",
"run_config": [
"cluster interface-mode individual force",
"policy-map global_policy",
"class inspection_default",
"no inspect h323 h225",
"no inspect h323 ras",
"no inspect rtsp",
"no inspect skinny",
"interface Management0/0",
"management-only",
"nameif management",
"security-level 0",
"ip address dhcp",
"interface GigabitEthernet0/0",
"no shutdown",
"nameif vxlan_tunnel",
"security-level 0",
"ip address dhcp",
"interface GigabitEthernet0/1",
"no shutdown",
"nve-only cluster",
"nameif ccl_link",
"security-level 0",
"ip address dhcp",
"interface vni1",
"description Clustering Interface",
"segment-id 1",
"vtep-nve 1",
"interface vni2",
"proxy paired",
"nameif GWLB-backend-pool",
"internal-segment-id 800",
"external-segment-id 801",
"internal-port 2000",
"external-port 2001",
"security-level 0",
"vtep-nve 2",
"object network ccl#link",
"range [Link] [Link]", //mandatory user input
"object-group network cluster#group",
"network-object object ccl#link",
"nve 1 ",
"encapsulation vxlan",
"source-interface ccl_link",
"peer-group cluster#group",
"nve 2 ",
"encapsulation vxlan",
"source-interface vxlan_tunnel",
"peer ip <GatewayLoadbalancerIP>",
"cluster group ftdv-cluster", //mandatory user input
"local-unit 1",
"cluster-interface vni1 ip [Link] [Link]",
"priority 1",
"enable",
"mtu vxlan_tunnel 1454",
"mtu ccl_link 1454"
]
}
A sample day 0 configuration for version 7.3 and earlier is given below.
{
"AdminPassword": "Sup3rnatural",
"Hostname": "clusterftdv",
"FirewallMode": "routed",
"ManageLocally": "No",
"FmcIp": "<FMC_IP>",
"FmcRegKey": "<REGISTRATION_KEY>",
"FmcNatId": "<NAT_ID>",
"run_config": [
"cluster interface-mode individual force",
"policy-map global_policy",
"class inspection_default",
"no inspect h323 h225",
"no inspect h323 ras",
"no inspect rtsp",
"no inspect skinny",
"interface Management0/0",
"management-only",
"nameif management",
"security-level 0",
"ip address dhcp",
"interface GigabitEthernet0/0",
"no shutdown",
"nameif vxlan_tunnel",
"security-level 0",
"ip address dhcp",
"interface GigabitEthernet0/1",
"no shutdown",
"nve-only cluster",
"nameif ccl_link",
"security-level 0",
"ip address dhcp",
"interface vni1",
"description Clustering Interface",
"segment-id 1",
"vtep-nve 1",
"interface vni2",
"proxy paired",
"nameif GWLB-backend-pool",
"internal-segment-id 800",
"external-segment-id 801",
"internal-port 2000",
"external-port 2001",
"security-level 0",
"vtep-nve 2",
"object network ccl#link",
"range [Link] [Link]", //mandatory user input
"object-group network cluster#group",
"network-object object ccl#link",
"nve 1 ",
"encapsulation vxlan",
"source-interface ccl_link",
"peer-group cluster#group",
"nve 2 ",
"encapsulation vxlan",
"source-interface vxlan_tunnel",
"peer ip <GatewayLoadbalancerIP>",
"cluster group ftdv-cluster", //mandatory user input
"local-unit 1",
"cluster-interface vni1 ip [Link] [Link]",
"priority 1",
"enable",
"mtu vxlan_tunnel 1454",
"mtu ccl_link 1554"
]
}
Note If you are copying and pasting the configuration given above, ensure that you remove //mandatory user
input from the configuration.
Procedure
Step 1 Create a Virtual Machine Scale Set from the Marketplace image with 0 instance count using the az vmss
create CLI.
az vmss create --resource-group <ResourceGroupName> --name <VMSSName> --vm-sku <InstanceSize>
--image <FTDvImage> --instance-count 0 --admin-username <AdminUserName> --admin-password
<AdminPassword> --plan-name <ftdv-azure-byol/ftdv-azure-payg> --plan-publisher cisco --plan-product
cisco-ftdv --plan-promotion-code <ftdv-azure-byol/ftdv-azure-payg> --vnet-name <VirtualNetworkName>
--subnet <MgmtSubnetName>
Procedure
Step 1 Create a Virtual Machine Scale Set from the Marketplace image with 0 instance count using the az vmss
create CLI.
az vmss create --resource-group <ResourceGroupName> --name <VMSSName> --vm-sku <InstanceSize>
--image <FTDvImage> --instance-count 0 --admin-username <AdminUserName> --admin-password
<AdminPassword> --plan-name <ftdv-azure-byol/ftdv-azure-payg> --plan-publisher cisco --plan-product
• Issue: Role-related error while deploying resources again in the same resource group.
Troubleshooting: Remove the roles given below by using the following commands on the terminal.
Error message:
"error": {
"code": "RoleAssignmentUpdateNotPermitted",
"message": "Tenant ID, application ID, principal ID, and scope are not allowed to be
updated.”}
• az role assignment delete --resource-group <Resource Group Name> --role "Storage Queue
Data Contributor"
• az role assignment delete --resource-group <Resource Group Name> --role "Contributor"
Sample Topologies
Threat Defense Virtual Clustering with Autoscale in Azure using Sandwich Topology (Network Load
Balancer)
The Threat Defense Virtual clustering with autoscale in Azure using sandwich topology (NLB) use case is
an automated horizontal scaling solution that positions the Threat Defense Virtual scale set sandwiched
between an Azure Internal load balancer (ILB) and an Azure External load balancer (ELB).
In this topology, the Threat Defense Virtual uses only four interfaces: management, inside, outside, and CCL
subnets.
Threat Defense Virtual Clustering with Autoscale in Azure using Sandwich Topology (NLB)
The following describes high-level flow on how a Threat Defense Virtual cluster with autoscale in Azure
using NLB functions:
• The ELB distributes traffic from the internet to the Threat Defense Virtual instances in the scale set, and
then the firewall forwards traffic to the application.
• The ILB distributes outbound internet traffic from an application to Threat Defense Virtual instances in
the scale set and then the firewall forwards traffic to the internet.
• A network packet will never pass through both (Internal and External) load balancers in a single
connection.
• The number of Threat Defense Virtual instances in the scale set will be scaled and configured automatically
based on load conditions.
Threat Defense Virtual Clustering with Autoscale in Azure using Gateway Load Balancer
The integration of the Azure Gateway Load Balancer (GWLB) and Threat Defense Virtual cluster using
autoscale solution simplifies deployment, management, and scaling of instances in the cluster setup. The
Azure Gateway Load Balancer (GWLB) ensures that internet traffic to and from an Azure VM, such as an
application server, is inspected by secure firewall without requiring any routing changes. This integration also
reduces operational complexity and provides a single entry and exit point for traffic at the firewall. The
applications and infrastructure can maintain visibility of source IP address, which is critical in some
environments.
The Threat Defense Virtual uses only three interfaces: management, data, and CCL interface in this use case.
Note • Network Address Translation (NAT) is not required if you are deploying the Azure GWLB.
• Only IPv4 is supported.
The following describes high-level flow on how a Threat Defense Virtualcluster with autoscale in Azure using
GWLB functions:
• Inbound traffic from the internet goes to the GWLB endpoint, which then transmits the traffic to the
GWLB.
• The traffic is then routed to the Threat Defense Virtual cluster.
• After the traffic is inspected by the Threat Defense Virtual instance in the cluster, it is forwarded to the
application Application VM.
Prerequisites
• Scaling policy 1 - When one cluster node exceeds the resource utilization limits.
• Scaling policy 2 - Overall average resource utilization of all the nodes.
Scale-out
Scale-out is a process of adding a new node to the cluster when the traffic load threshold exceeds the configured
CPU or memory limit on any one of the cluster's node.
The following is the process of adding a new node to the cluster during scale-out:
1. A new Threat Defense Virtual instance is launched.
2. Appropriate configuration is applied to a Threat Defense Virtual.
3. Appropriate licenses are applied.
4. A new Threat Defense Virtual instance is added to the cluster.
If the configuration of the new Threat Defense Virtual instance fails (low probability) during the scale-out
process, the failing instance is terminated, and a new instance is launched and configured.
Scale-in
Scale-in is the process of removing a node from a cluster when the configured scale-in threshold and total
number of cluster instances exceed the minimum cluster size.
The following is the process of terminating a node in the cluster during scale-in:
1. The Threat Defense Virtual instance with the least CPU or memory usage is identified using VMSS
metrics.
2. If there is more than one instance with the same least utilization, then the instance with the higher VM
index in VMSS is chosen for scale-in.
3. Any new connections to this instance are disabled by appropriate configuration and policies.
4. The instance is de-registered from smart licensing (applicable for BYOL).
5. The instance is terminated.
• Premium
• You can select this hosting plan for the Function app during deployment.
• This plan supports adding a Network Address Translation (NAT) gateway to the Function app to
control the outbound IP address of the Function app. This plan allows SSH access to Threat Defense
Virtual instances only from a fixed IP address of the NAT gateway thereby offering enhanced
security.
For more information about overview on auto scale solution components, see Auto Scale Solution Components
in Cisco Secure Firewall Threat Defense Virtual Getting Started Guide.
• Autoscale solution template for Threat Defense Virtual clustering using GWLB:
azure_ftdv_gwlb_cluster_autoscale.json available in the folder
azure_autoscale_clustering/tdv_cluster/arm_templates/
Input Parameters
The following table defines the template parameters and provides an example. Once you decide on these
values, you can use these parameters to create the ASA virtual device when you deploy the Azure Resource
Manager (ARM) template into your Azure [Link] the clustering with autoscale soultion with GWLB
for Azure, networking infrastructure is also created due to which additional input parameters have to be
configured in the template. The parameter descriptions are self-explanatory.
resourceNamePrefix String* (3-10 All the resources are created with New
characters) name containing this prefix.
Note: Use only lowercase letters.
Example: ftdv
*Azure has restrictions on the naming convention for new resources. Review the limitations or simply use
all lowercase. Do not use spaces or any other special characters.
The following resources are created within a resource group when you deploy Threat Defense Virtual cluster
with autoscale in Azure using the ARM template for GWLB -
azure_ftdv_gwlb_cluster_autoscale.json
• Virtual Machine (VM) or Virtual Machine Scale Set (VMSS)
• Gateway Load Balancer (GWLB)
• Azure Function App
• Logic App
• Networking Infrastructure
• Security Groups and other miscellaneous components needed for deployment.
The Threat Defense Virtual clustering autoscale with NLB solution for Azure is an Azure Resource Manager
(ARM) template-based deployment which makes use of the serverless infrastructure provided by Azure (Logic
App, Azure Functions, Load Balancers, Virtual Machine Scale Set, and so on).
The Threat Defense Virtual clustering autoscale with GWLB solution for Azure is an ARM template-based
deployment that creates the GWLB, networking infrastructure, threat defense virtual auto scaling group,
serverless components, and other required resources.
The deployment procedures for both solutions are similar.
Download the files required to launch the Threat Defense Virtual clustering with autoscale solution for Azure.
Deployment scripts and templates for your version are available in the GitHub repository.
Procedure
Step 1 Log in to the Microsoft Azure portal ([Link] using your Microsoft account username and
password.
Step 2 Click Resource groups from the menu of services to access the Resource Groups blade. You will see all
the resource groups in your subscription listed in the blade. Create a new resource group or select an existing,
empty resource group. For example, threat defense virtual_AutoScale.
Step 3 Click Create a resource (+) to create a new resource for template deployment. The Create Resource Group
blade appears.
Step 4 4. Click Virtual Network from the menu of services to access the Virtual network blade. Create a virtual
network with subnets.
• For GWLB deployment, create virtual network with management, data, and CCL subnets.
• For NLB deployment, create virtual network with management, inside, outside, and CCL subnets.
Step 5 In Search the Marketplace, type Template deployment (deploy using custom templates), and then
press Enter.
Step 6 Click Create. There are several options for creating a template. Choose Build your own template in editor.
Step 7 In the Edit template window, delete all the default content and copy the contents from the updated
azure_ftdv_gwlb_cluster_custom_image.json or
azure_ftdv_nlb_cluster_custom_image.json (depending on the type of autoscale solution you
are deploying on Azure) and click Save. Or Click Load file to browse and upload this file from your computer.
Step 8 In the parameter field sections, fill all the parameters. Refer to Input Parameters for details about each parameter,
then click Review+Create.
Step 9 When a template deployment is successful, it creates all the required resources for the threat defense virtual
auto scale for Azure solution. See the resources in the following figure. The Type column describes each
resource, including the Logic App, VMSS, Load Balancers, Public IP address, etc.
What to do next
Deploy Azure Functions App, on page 640.
Procedure
Step 1 Go to the function app you created when you deployed the ARM template and perform the following:
Run the following command from your local computer to deploy the cluster autoscale Azure Functions to the
Function app.
az functionapp deployment source config-zip -g <Resource Group Name>
-n <Function App Name> --src <cluster_functions.zip> --build-remote true
Step 2 After the deployment of the Azure Functions, you can view the uploaded Functions in the overview section
of the function application.
Procedure
Step 1 From the repository, retrieve the file [Link] to the local system and edit as shown below.
Important
Read and understand all of these steps before proceeding.
These manual steps are not automated in the ARM template so that only the Logic App can be upgraded
independently later in time.
a) Required: Find and replace all the occurrences of “SUBSCRIPTION_ID” with your subscription ID
information.
b) Required: Find and replace all the occurrences of “RG_NAME” with your resource group name.
c) Required: Find and replace all of the occurrences of “FUNCTIONAPPNAME” to your function app name.
The following example shows a few of these lines in the [Link] file:
"AutoScaleManager": {
"inputs": {
"function": {
"id":
"/subscriptions/SUBSCRIPTION_ID/resourceGroups/RG_NAME/providers/[Link]/sites/FUNCTIONAPPNAME/functions/AutoScaleManager"
}
.
.
},
"Deploy_Changes_to_FTD": {
"inputs": {
"body": "@body('AutoScaleManager')",
"function": {
"id":
"/subscriptions/SUBSCRIPTION_ID/resourceGroups/RG_NAME/providers/[Link]/sites/FUNCTIONAPPNAME/functions/DeployConfiguration"
}
.
.
"DeviceDeRegister": {
"inputs": {
"body": "@body('AutoScaleManager')",
"function": {
"id":
"/subscriptions/SUBSCRIPTION_ID/resourceGroups/RG_NAME/providers/[Link]/sites/FUNCTIONAPPNAME/functions/DeviceDeRegister"
}
},
"runAfter": {
"Delay_For_connection_Draining": [
d) (Optional) Edit the trigger interval, or leave the default value (5). This is the time interval at which the
Autoscale functionality is periodically triggered. The following example shows these lines in the
[Link] file:
"triggers": {
"Recurrence": {
"conditions": [],
"inputs": {},
"recurrence": {
"frequency": "Minute",
"interval": 5
},
e) (Optional) Edit the time to drain, or leave the default value (5). This is the time interval to drain existing
connections from the threat defense virtual before deleting the device during the Scale-In operation. The
following example shows these lines in the [Link] file:
"actions": {
"Branch_based_on_Scale-In_or_Scale-Out_condition": {
"actions": {
"Delay_For_connection_Draining": {
"inputs": {
"interval": {
"count": 5,
"unit": "Minute"
}
f) (Optional) Edit the cool down time, or leave the default value (10). This is the time to perform NO ACTION
after the Scale-Out is complete. The following example shows these lines in the [Link] file:
"actions": {
"Branch_based_on_Scale-Out_or_Invalid_condition": {
"actions": {
"Cooldown_time": {
"inputs": {
"interval": {
"count": 10,
"unit": "Second"
}
Note
These steps can also be done from the Azure portal. Consult the Azure documentation for more information.
Step 2 Go to the Logic App code view, delete the default contents and paste the contents from the edited [Link]
file, and click Save.
Figure 278: Logic App Code View
Step 3 When you save the Logic App, it is in a 'Disabled' state. Click Enable when you want to start the Auto Scale
Manager.
Figure 279: Enable Logic App
Step 4 Once enabled, the tasks start running. Click the 'Running' status to see the activity.
Figure 280: Logic App Running Status
Step 5 Once the Logic App starts, all the deployment-related steps are complete.
Step 6 Verify in the VMSS that threat defense virtual instances are being created.
Figure 281: Threat Defense Virtual Instances Running
In this example, three threat defense virtual instances are launched because 'minFtdCount' was set to '3' and
'initDeploymentMode' was set to 'BULK' in the ARM template deployment.
Note Outbound traffic requires interface NAT and is limited to 64K connections.
Sample Topology
This topology depicts both inbound and outbound traffic flow. The Threat Defense Virtual cluster is sandwiched
between the internal and external load balancers. A Management Center Virtual instance is used to manage
the cluster.
Inbound traffic from the internet goes to the external load balancer which then transmits the traffic to the
Threat Defense Virtual cluster. After the traffic has been inspected by a Threat Defense Virtual instance in
the cluster, it is forwarded to the application VM.
Outbound traffic from the application VM is transmitted to the internal load balancer. Traffic is then forwarded
to the Threat Defense Virtual cluster and then sent out to the internet.
Workspace Steps
Google Cloud Platform If private IP addresses are used, create VPC connector.
Manual Deployment
The following flowchart illustrates the workflow for manual deployment of the Threat Defense Virtual cluster
on GCP.
Workspace Steps
Workspace Steps
Google Cloud Platform Create instance group and attach instance template.
Templates
The templates given below are available in GitHub. The parameter values are self-explanatory with the
parameter names, and values, given in the template.
• Cluster deployment template for East-West traffic - deploy_ngfw_cluster_yaml
• Cluster deployment template for North-South traffic - deploy_ngfw_cluster.yaml
Procedure
From Secure Firewall version 7.4.1, you can deploy the cluster without the diagnostic interface. To deploy
the cluster with only the Outside, Inside, Management, and CCL interfaces, set the withDiagnostic variable
to False in both the [Link] and the deploy_ngfw_cluster.yaml files.
Note that there is a deploy_ngfw_cluster.yaml file in both the east-west and north-south folders in GitHub.
Download the appropriate template as per your traffic flow requirement.
Step 3 Create a bucket using Google Cloud Shell to upload the Google cloud function source archive file
ftdv_cluster_function.zip.
gsutil mb --pap enforced gs://resourceNamePrefix-ftdv-cluster-bucket/
Ensure that the resourceNamePrefix variable here matches the resourceNamePrefix variable that you specified
in cluster_function_infra.yaml.
Step 5 Upload the Google source archive that you created earlier.
gsutil cp ftdv_cluster_function.zip gs://resourceNamePrefix-ftdv-cluster-bucket/
Step 7 If you are using private IP addresses, perform the steps given below:
a) Launch and set up the Management Center Virtual with a Threat Defense Virtual management VPC.
b) Create a VPC connector to connect the Google Cloud functions with the Threat Defense Virtual
management VPC.
gcloud compute networks vpc-access connectors create vpc-connector-name --region us-central1
--subnet resourceNamePrefix-ftdv-mgmt-subnet28
Step 8 If the Management Center is remote from the Threat Defense Virtual, and the Threat Defense Virtual needs
an external IP address, ensure that you set deployWithExternalIP to True in cluster_function_infra.yaml.
Step 9 Deploy the cluster function infrastructure.
gcloud deployment-manager deployments create cluster_name --config cluster_function_infra.yaml
{
"AdminPassword": "password",
"Hostname": "hostname",
"FirewallMode": "Routed",
"ManageLocally": "No",
"Diagnostic": "OFF", //Optional user input from version 7.4.1 - use
to deploy cluster without Diagnostic interface
"Cluster": {
"CclSubnetRange": "ip_address_start ip_address_end",
"ClusterGroupName": "cluster_name"
}
}
For example:
{
"AdminPassword": "DeanW1nche$ter",
"Hostname": "ciscoftdv",
"FirewallMode": "Routed",
"ManageLocally": "No",
"Cluster": {
"CclSubnetRange": "[Link] [Link]", //mandatory user input
"ClusterGroupName": "ftdv-cluster" //mandatory user input
}
}
Note If you are copying and pasting the configuration given above, ensure that you remove //mandatory user
input from the configuration.
For the CclSubnetRange variable, note that you cannot use the first two IP addresses and the last two IP
addresses in the subnet. See Reserved IP addresses in IPv4 subnets for more information. Ensure that you
have at least 16 available IP addresses for clustering. Some examples of start and end IP addresses are given
below.
{
"AdminPassword": "password",
"Hostname": "hostname",
"FirewallMode": "Routed",
"ManageLocally": "No",
"run_config": [comma_separated_threat_defense_configuration]
}
The following example creates a configuration with Management, Inside, and Outside interfaces, and a VXLAN
interface for the cluster control link. Note the values in bold that need to be unique per node.
{
"AdminPassword": "W1nch3sterBr0s",
"Hostname": "ftdv1",
"FirewallMode": "Routed",
"ManageLocally": "No",
"run_config": [
"cluster interface-mode individual force",
"interface Management0/0",
"management-only",
"nameif management",
"ip address dhcp",
"interface GigabitEthernet0/0",
"no shutdown",
"nameif outside",
"ip address dhcp",
"interface GigabitEthernet0/1",
"no shutdown",
"nameif inside",
"ip address dhcp",
"interface GigabitEthernet0/2",
"nve-only cluster",
"nameif ccl_link",
"ip address dhcp",
"no shutdown",
"interface vni1",
"description Clustering Interface",
"segment-id 1",
"vtep-nve 1",
"object network ccl#link",
"range [Link] [Link]",
"object-group network cluster#group",
Note For the cluster control link network object, specify only as many addresses as you need (up to 16). A larger
range can affect performance.
Procedure
Step 1 Create an instance template using the day 0 configuration (in the Metadata > Startup Script section) with
5 interfaces: outside, inside, management, diagnostic, and cluster control link.
See Cisco Secure Firewall Threat Defense Virtual Getting Started Guide.
You can set up a route for GCP health checks across all interfaces that are used to configure their health
probes. You can achieve this by creating a route with a higher metric on interfaces where a route for GCP
health checks is not already available.
nat (inside,outside) source dynamic GCP-HC ILB-SOUTH destination static ILB-SOUTH METADATA
nat (outside,outside) source dynamic GCP-HC ELB-NORTH destination static ELB-NORTH METADATA
nat (outside,inside) source static any interface destination static ELB-NORTH Ubuntu-App-VM
nat (inside,outside) source dynamic any interface destination static obj-any obj-any
nat (inside,outside) source dynamic GCP-HC ILB-East destination static ILB-East Metadata
nat (outside,outside) source dynamic GCP-HC ILB-West destination static ILB-West Metadata
If a default route is not available, then policy-based routing can be used to route the traffic for health checks.
Procedure
Step 1 In the management center, choose Devices > Device Management, and then choose Add > Add Device to
add the control unit using the unit's management IP address.
a) In the Host field, enter the IP address or hostname of the control unit.
We recommend adding the control unit for the best performance, but you can add any unit of the cluster.
If you used a NAT ID during device setup, you may not need to enter this field. For more information,
see NAT Environments, on page 7.
b) In the Display Name field, enter a name for the control unit as you want it to display in the management
center.
This display name is not for the cluster; it is only for the control unit you are adding. You can later change
the name of other cluster members and the cluster display name.
c) In the Registration Key field, enter the same registration key that you used during device setup. The
registration key is a one-time-use shared secret.
d) (Optional) Add the device to a device Group.
e) Choose an initial Access Control Policy to deploy to the device upon registration, or create a new policy.
If you create a new policy, you create a basic policy only. You can later customize the policy as needed.
Note
GCP prioritizes nodes with public IP address during cluster node discovery. To ensure the Threat Defense
Virtual cluster registers with the management center virtual using the private IP address, you must first
disable the public IP address on the Threat Defense Virtual cluster node. This allows GCP node discovery
to proceed using the private IP address for registration node with the management center virtual.
You can monitor cluster unit registration by clicking the Notifications icon and choosing Tasks. The
management center updates the Cluster Registration task as each unit registers. If any units fail to register,
see Reconcile Cluster Nodes, on page 664.
Step 2 Configure device-specific settings by clicking the Edit ( ) for the cluster.
Most configuration can be applied to the cluster as a whole, and not nodes in the cluster. For example, you
can change the display name per node, but you can only configure interfaces for the whole cluster.
Step 3 On the Devices > Device Management > Cluster screen, you see General, License, System, and Health
settings.
• General > Cluster Live Status—Click the View link to open the Cluster Status dialog box.
The Cluster Status dialog box also lets you retry data unit registration by clicking [Link] can
also ping the cluster control link from a node. See Perform a Ping on the Cluster Control Link, on page
673.
• General > Troubleshoot—You can generate and download troubleshooting logs, and you can view
cluster CLIs. See Troubleshooting the Cluster, on page 672.
Step 4 On the Devices > Device Management > Devices, you can choose each member in the cluster from the top
right drop-down menu and configure the following settings.
• General > Name—Change the cluster member display name by clicking the Edit ( ).
• Management > Host—If you change the management IP address in the device configuration, you must
match the new address in the management center so that it can reach the device on the network; edit the
Host address in the Management area.
Field Description
Timeouts
Field Description
Hold Time Between .3 and 45 seconds; The default is 3 seconds. To determine node system
health, the cluster nodes send heartbeat messages on the cluster control link
to other nodes. If a node does not receive any heartbeat messages from a peer
node within the hold time period, the peer node is considered unresponsive or
dead.
Interface Debounce Time Between 300 and 9000 ms. The default is 500 ms. The interface debounce time
is the amount of time before the node considers an interface to be failed, and
the node is removed from the cluster.
Monitored Interfaces The interface health check monitors for link failures. If all physical ports for
a given logical interface fail on a particular node, but there are active ports
under the same logical interface on other nodes, then the node is removed from
the cluster. The amount of time before the node removes a member from the
cluster depends on the type of interface and whether the node is an established
node or is joining the cluster.
Service Application Shows whether the Snort and disk-full processes are monitored.
Auto-Rejoin Settings
Cluster Interface Shows the auto-rejoin settings after a cluster control link failure.
Attempts Between -1 and 65535. The default is -1 (unlimited). Sets the number of rejoin
attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 1x the interval duration. Defines if the interval
duration increases at each attempt.
Data Interfaces Shows the auto-rejoin settings after a data interface failure.
Attempts Between -1 and 65535. The default is 3. Sets the number of rejoin attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 2x the interval duration. Defines if the interval
duration increases at each attempt.
System Shows the auto-rejoin settings after internal errors. Internal failures include:
application sync timeout; inconsistent application statuses; and so on.
Attempts Between -1 and 65535. The default is 3. Sets the number of rejoin attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Field Description
Interval Variation Between 1 and 3. The default is 2x the interval duration. Defines if the interval
duration increases at each attempt.
Note If you disable the system health check, fields that do not apply when the system health check is disabled will
not show.
Procedure
When any topology changes occur (such as adding or removing a data interface, enabling or disabling an
interface on the node or the switch, or adding an additional switch to form a VSS or vPC or VNet) you should
disable the system health check feature and also disable interface monitoring for the disabled interfaces. When
the topology change is complete, and the configuration change is synced to all nodes, you can re-enable the
system health check feature and monitored interfaces.
Step 7 Customize the auto-rejoin cluster settings after a health check failure.
Figure 288: Configure Auto-Rejoin Settings
Set the following values for the Cluster Interface, Data Interface, and System (internal failures include:
application sync timeout; inconsistent application statuses; and so on):
• Attempts—Sets the number of rejoin attempts, between -1 and 65535. 0 disables auto-rejoining. The
default for the Cluster Interface is -1 (unlimited). The default for the Data Interface and System is 3.
• Interval Between Attempts—Defines the interval duration in minutes between rejoin attempts, between
2 and 60. The default value is 5 minutes. The maximum total time that the node attempts to rejoin the
cluster is limited to 14400 minutes (10 days) from the time of last failure.
• Interval Variation—Defines if the interval duration increases. Set the value between 1 and 3: 1 (no
change); 2 (2 x the previous duration), or 3 (3 x the previous duration). For example, if you set the interval
duration to 5 minutes, and set the variation to 2, then the first attempt is after 5 minutes; the 2nd attempt
is 10 minutes (2 x 5); the 3rd attempt 20 minutes (2 x 10), and so on. The default value is 1 for the Cluster
Interface and 2 for the Data Interface and System.
Step 8 Configure monitored interfaces by moving interfaces in the Monitored Interfaces or Unmonitored Interfaces
window. You can also check or uncheck Enable Service Application Monitoring to enable or disable
monitoring of the Snort and disk-full processes.
Figure 289: Configure Monitored Interfaces
The interface health check monitors for link failures. If all physical ports for a given logical interface fail on
a particular node, but there are active ports under the same logical interface on other nodes, then the node is
removed from the cluster. The amount of time before the node removes a member from the cluster depends
on the type of interface and whether the node is an established node or is joining the cluster. Health check is
enabled by default for all interfaces and for the Snort and disk-full processes.
You might want to disable health monitoring of non-essential interfaces.
When any topology changes occur (such as adding or removing a data interface, enabling or disabling an
interface on the node or the switch, or adding an additional switch to form a VSS or vPC or VNet) you should
disable the system health check feature and also disable interface monitoring for the disabled interfaces. When
the topology change is complete, and the configuration change is synced to all nodes, you can re-enable the
system health check feature and monitored interfaces.
Note Do not power off the node without first disabling clustering.
Procedure
Step 1 For the unit you want to disable, choose Devices > Device Management, click the More ( ), and choose
Disable Node Clustering.
Step 2 Confirm that you want to disable clustering on the node.
The node will show (Disabled) next to its name in the Devices > Device Management list.
Procedure
Step 1 For the unit you want to reactivate, choose Devices > Device Management, click the More ( ), and choose
Enable Node Clustering.
Step 2 Confirm that you want to enable clustering on the node.
Procedure
Step 1 Choose Devices > Device Management > More ( ) for the cluster, and then choose Cluster Live Status to
open the Cluster Status dialog box.
Step 2 Click Reconcile All.
Figure 290: Reconcile All
For more information about the cluster status, see Monitoring the Cluster, on page 666.
• Returns the cluster to local time management if the cluster's platform settings policy is configured to
receive time from the management center using NTP.
• Leaves the configuration intact, so the cluster continues to process traffic.
Policies, such as NAT and VPN, ACLs, and the interface configurations remain intact.
Registering the cluster again to the same or a different management center causes the configuration to be
removed, so the cluster will stop processing traffic at that point; the cluster configuration remains intact so
you can add the cluster as a whole. You can choose an access control policy at registration, but you will have
to re-apply other policies after registration and then deploy the configuration before it will process traffic
again.
Procedure
Step 1 Choose Devices > Device Management, click More ( ) for the cluster or node, and choose Unregister.
Step 2 You are prompted to unregister the cluster or node; click Yes.
Step 3 You can register the cluster to a new (or the same) management center by adding one of the cluster members
as a new device.
You only need to add one of the cluster nodes as a device, and the rest of the cluster nodes will be discovered.
a) Connect to one cluster node's CLI, and identify the new management center using the configure manager
add command.
b) Choose Devices > Device Management, and then click Add Device.
Step 4 To re-add a deleted node, see Reconcile Cluster Nodes, on page 664.
For each node, you can view the Summary or the History.
Note The CPU and memory metrics display the individual average of the data plane
and snort usage.
• The metric charts, namely, CPU Usage, Memory Usage, Throughput, and Connections,
diagrammatically display the statistics of the cluster over the specified time period.
• Load Distribution dashboard―Displays load distribution across the cluster nodes in two widgets:
• The Distribution widget displays the average packet and connection distribution over the time range
across the cluster nodes. This data depicts how the load is being distributed by the nodes. Using this
widget, you can easily identify any abnormalities in the load distribution and rectify it.
• The Node Statistics widget displays the node level metrics in table format. It displays metric data
on CPU usage, memory usage, input rate, output rate, active connections, and NAT translations
across the cluster nodes. This table view enables you to correlate data and easily identify any
discrepancies.
• Member Performance dashboard―Displays current metrics of the cluster nodes. You can use the selector
to filter the nodes and view the details of a specific node. The metric data include CPU usage, memory
usage, input rate, output rate, active connections, and NAT translations.
• CCL dashboard―Displays, graphically, the cluster control link data namely, the input, and output rate.
• Troubleshooting and Links ― Provides convenient links to frequently used troubleshooting topics and
procedures.
• Time range―An adjustable time window to constrain the information that appears in the various cluster
metrics dashboards and widgets.
• Custom Dashboard―Displays data on both cluster-wide metrics and node-level metrics. However, node
selection only applies for the threat defense metrics and not for the entire cluster to which the node
belongs.
Procedure
Step 2 In the device list, click Expand( ) and Collapse ( ) to expand and collapse the list of managed cluster
devices.
Step 3 To view the cluster health statistics, click on the cluster name. The cluster monitor reports health and
performance metrics in several predefined dashboards by default. The metrics dashboards include:
• Overview ― Highlights key metrics from the other predefined dashboards, including its nodes, CPU,
memory, input and output rates, connection statistics, and NAT translation information.
• Load Distribution ― Traffic and packet distribution across the cluster nodes.
• Member Performance ― Node-level statistics on CPU usage, memory usage, input throughput, output
throughput, active connection, and NAT translation.
• CCL ― Interface status and aggregate traffic statistics.
You can navigate through the various metrics dashboards by clicking on the labels. For a comprehensive list
of the supported cluster metrics, see Cisco Secure Firewall Threat Defense Health Metrics.
Step 4 You can configure the time range from the drop-down in the upper-right corner. The time range can reflect a
period as short as the last hour (the default) or as long as two weeks. Select Custom from the drop-down to
configure a custom start and end date.
Click the refresh icon to set auto refresh to 5 minutes or to toggle off auto refresh.
Step 5 Click on deployment icon for a deployment overlay on the trend graph, with respect to the selected time range.
The deployment icon indicates the number of deployments during the selected time-range. A vertical band
indicates the deployment start and end time. For multiple deployments, multiple bands/lines appear. Click on
the icon on top of the dotted line to view the deployment details.
Step 6 (For node-specific health monitor) View the Health Alerts for the node in the alert notification at the top of
page, directly to the right of the device name.
Hover your pointer over the Health Alerts to view the health summary of the node. The popup window shows
a truncated summary of the top five health alerts. Click on the popup to open a detailed view of the health
alert summary.
Step 7 (For node-specific health monitor) The device monitor reports health and performance metrics in several
predefined dashboards by default. The metrics dashboards include:
• Overview ― Highlights key metrics from the other predefined dashboards, including CPU, memory,
interfaces, connection statistics; plus disk usage and critical process information.
• CPU ― CPU utilization, including the CPU usage by process and by physical cores.
• Memory ― Device memory utilization, including data plane and Snort memory usage.
• Interfaces ― Interface status and aggregate traffic statistics.
• Connections ― Connection statistics (such as elephant flows, active connections, peak connections, and
so on) and NAT translation counts.
• Snort ― Statistics that are related to the Snort process.
• ASP drops ― Statistics related to the dropped packets against various reasons.
You can navigate through the various metrics dashboards by clicking on the labels. See Cisco Secure Firewall
Threat Defense Health Metrics for a comprehensive list of the supported device metrics.
Step 8 Click the plus sign Add New Dashboard( ) in the upper right corner of the health monitor to create a custom
dashboard by building your own variable set from the available metric groups.
For cluster-wide dashboard, choose Cluster metric group, and then choose the metric.
Cluster Metrics
The cluster health monitor tracks statistics that are related to a cluster and its nodes, and aggregate of load
distribution, performance, and CCL traffic statistics.
Data Throughput Incoming and outgoing data traffic statistics for a bytes
cluster.
CCL Throughput Incoming and outgoing CCL traffic statistics for a bytes
cluster.
You can also enter any show command in the Command field. See View CLI Output, on page 130 for
more information.
Procedure
Step 1 Choose Devices > Device Management, click the More ( ) icon next to the cluster, and choose > Cluster
Live Status.
Figure 294: Cluster Status
The node sends a ping on the cluster control link to every other node using a packet size that matches the
maximum MTU.
Procedure
Step 1 Upload the target image version to the cloud image storage.
Step 2 Update the cloud instance template of the cluster with the updated target image version.
a) Create a copy of the instance template with the target image version.
b) Attach the newly created template to cluster instance group.
Step 3 Upload the target image version upgrade package to the management center.
Step 4 Perform readiness check on the cluster that you want to upgrade.
Step 5 After successful readiness check, initiate installation of upgrade package.
Step 6 The management center upgrades the cluster nodes one at a time.
Step 7 The management center displays a notification after successful upgrade of the cluster.
There is no change in the serial number and UUID of the instance after the upgrade.
Note
• If you initiate the cluster upgrade from the management center, ensure that no threat defense virtual
device is accidentally terminated or replaced by the auto scaling group during the post-upgrade reboot
process. To prevent this, go to the AWS console, click Auto scaling group -> Advanced configurations,
and suspend the processes - Health Check and Replace Unhealthy. After the upgrade is completed, go
to Advanced configurations again and remove any suspended processes to detect unhealthy instances.
• If you upgrade a cluster deployed on AWS from a major release to a patch release and then scale up the
cluster, the new nodes will come up with the major release version instead of the patch release. You have
to then manually upgrade each node to the patch release from the management center.
Alternatively, you can also create an Amazon Machine Image (AMI) from a snapshot of a standalone
threat defense virtual instance on which the patch has been applied and which does not have a day 0
configuration. Use this AMI in the cluster deployment template. Any new nodes that come up when you
scale up the cluster will have the patch release.
Note To view FlexConfig features that are also not supported with clustering, for example WCCP inspection, see
the ASA general operations configuration guide. FlexConfig lets you configure many ASA features that are
not present in the management center GUI. See FlexConfig Policies, on page 2617.
Note Traffic for centralized features is forwarded from member nodes to the control node over the cluster control
link.
If you use the rebalancing feature, traffic for centralized features may be rebalanced to non-control nodes
before the traffic is classified as a centralized feature; if this occurs, the traffic is then sent back to the control
node.
For centralized features, if the control node fails, all connections are dropped, and you have to re-establish
the connections on the new control node.
Note To view FlexConfig features that are also centralized with clustering, for example RADIUS inspection, see
the ASA general operations configuration guide. FlexConfig lets you configure many ASA features that are
not present in the management center GUI. See FlexConfig Policies, on page 2617.
cluster-wide counter value at any given time. However, the information will get updated over time in a
load-balanced cluster.
In the above diagram, Router A learns that there are 4 equal-cost paths to Router B, each through a node.
ECMP is used to load balance traffic between the 4 paths. Each node picks a different router ID when talking
to external routers.
You must configure a cluster pool for the router ID so that each node has a separate router ID.
• PAT with Port Block Allocation—See the following guidelines for this feature:
• Maximum-per-host limit is not a cluster-wide limit, and is enforced on each node individually. Thus,
in a 3-node cluster with the maximum-per-host limit configured as 1, if the traffic from a host is
load-balanced across all 3 nodes, then it can get allocated 3 blocks with 1 in each node.
• Port blocks created on the backup node from the backup pools are not accounted for when enforcing
the maximum-per-host limit.
• On-the-fly PAT rule modifications, where the PAT pool is modified with a completely new range
of IP addresses, will result in xlate backup creation failures for the xlate backup requests that were
still in transit while the new pool became effective. This behavior is not specific to the port block
allocation feature, and is a transient PAT pool issue seen only in cluster deployments where the
pool is distributed and traffic is load-balanced across the cluster nodes.
• When operating in a cluster, you cannot simply change the block allocation size. The new size is
effective only after you reload each device in the cluster. To avoid having to reload each device,
we recommend that you delete all block allocation rules and clear all xlates related to those rules.
You can then change the block size and recreate the block allocation rules.
• NAT pool address distribution for dynamic PAT—When you configure a PAT pool, the cluster divides
each IP address in the pool into port blocks. By default, each block is 512 ports, but if you configure port
block allocation rules, your block setting is used instead. These blocks are distributed evenly among the
nodes in the cluster, so that each node has one or more blocks for each IP address in the PAT pool. Thus,
you could have as few as one IP address in a PAT pool for a cluster, if that is sufficient for the number
of PAT’ed connections you expect. Port blocks cover the 1024-65535 port range, unless you configure
the option to include the reserved ports, 1-1023, on the PAT pool NAT rule.
• Reusing a PAT pool in multiple rules—To use the same PAT pool in multiple rules, you must be careful
about the interface selection in the rules. You must either use specific interfaces in all rules, or "any" in
all rules. You cannot mix specific interfaces and "any" across the rules, or the system might not be able
to match return traffic to the right node in the cluster. Using unique PAT pools per rule is the most reliable
option.
• No round-robin—Round-robin for a PAT pool is not supported with clustering.
• No extended PAT—Extended PAT is not supported with clustering.
• Dynamic NAT xlates managed by the control node—The control node maintains and replicates the xlate
table to data nodes. When a data node receives a connection that requires dynamic NAT, and the xlate
is not in the table, it requests the xlate from the control node. The data node owns the connection.
• Stale xlates—The xlate idle time on the connection owner does not get updated. Thus, the idle time might
exceed the idle timeout. An idle timer value higher than the configured timeout with a refcnt of 0 is an
indication of a stale xlate.
• No static PAT for the following inspections—
• FTP
• RSH
• SQLNET
• TFTP
• XDMCP
• SIP
• If you have an extremely large number of NAT rules, over ten thousand, you should enable the
transactional commit model using the asp rule-engine transactional-commit nat command in the device
CLI. Otherwise, the node might not be able to join the cluster.
VPN functionality is limited to the control node and does not take advantage of the cluster high availability
capabilities. If the control node fails, all existing VPN connections are lost, and VPN users will see a disruption
in service. When a new control node is elected, you must reestablish the VPN connections.
For connections to an Individual interface when using PBR or ECMP, you must always connect to the Main
cluster IP address, not a Local address.
VPN-related keys and certificates are replicated to all nodes.
Note If multiple nodes tie for the highest priority, the cluster node name and then the serial number is used to
determine the control node.
4. If a node later joins the cluster with a higher priority, it does not automatically become the control node;
the existing control node always remains as the control node unless it stops responding, at which point a
new control node is elected.
5. In a "split brain" scenario when there are temporarily multiple control nodes, then the node with highest
priority retains the role while the other nodes return to data node roles.
Note You can manually force a node to become the control node. For centralized features, if you force a control
node change, then all connections are dropped, and you have to re-establish the connections on the new control
node.
Interface Monitoring
Each node monitors the link status of all named hardware interfaces in use, and reports status changes to the
control node.
All physical interfaces are monitored; only named interfaces can be monitored. You can optionally disable
monitoring per interface.
A node is removed from the cluster if its monitored interfaces fail. The node is removed after 500 ms.
Note When the Threat Defense becomes inactive and fails to automatically rejoin the cluster, all data interfaces are
shut down; only the Management interface can send and receive traffic.
disables clustering. After you resolve the problem with the data interface, you have to manually enable
clustering.
• Failed node—If the node was removed from the cluster because of a node health check failure, then
rejoining the cluster depends on the source of the failure. For example, a temporary power failure means
the node will rejoin the cluster when it starts up again as long as the cluster control link is up. The threat
defense application attempts to rejoin the cluster every 5 seconds.
• Internal error—Internal failures include: application sync timeout; inconsistent application statuses; and
so on.
• Failed configuration deployment—If you deploy a new configuration from management center, and the
deployment fails on some cluster members but succeeds on others, then the nodes that failed are removed
from the cluster. You must manually rejoin the cluster by re-enabling clustering. If the deployment fails
on the control node, then the deployment is rolled back, and no members are removed. If the deployment
fails on all data nodes, then the deployment is rolled back, and no members are removed.
SNMP Engine ID No —
Connection Roles
See the following roles defined for each connection:
• Owner—Usually, the node that initially receives the connection. The owner maintains the TCP state and
processes packets. A connection has only one owner. If the original owner fails, then when new nodes
receive packets from the connection, the director chooses a new owner from those nodes.
• Backup owner—The node that stores TCP/UDP state information received from the owner, so that the
connection can be seamlessly transferred to a new owner in case of a failure. The backup owner does
not take over the connection in the event of a failure. If the owner becomes unavailable, then the first
node to receive packets from the connection (based on load balancing) contacts the backup owner for
the relevant state information so it can become the new owner.
As long as the director (see below) is not the same node as the owner, then the director is also the backup
owner. If the owner chooses itself as the director, then a separate backup owner is chosen.
For clustering on the Firepower 9300, which can include up to 3 cluster nodes in one chassis, if the
backup owner is on the same chassis as the owner, then an additional backup owner will be chosen from
another chassis to protect flows from a chassis failure.
• Director—The node that handles owner lookup requests from forwarders. When the owner receives a
new connection, it chooses a director based on a hash of the source/destination IP address and ports (see
below for ICMP hash details), and sends a message to the director to register the new connection. If
packets arrive at any node other than the owner, the node queries the director about which node is the
owner so it can forward the packets. A connection has only one director. If a director fails, the owner
chooses a new director.
As long as the director is not the same node as the owner, then the director is also the backup owner (see
above). If the owner chooses itself as the director, then a separate backup owner is chosen.
ICMP/ICMPv6 hash details:
• For Echo packets, the source port is the ICMP identifier, and the destination port is 0.
• For Reply packets, the source port is 0, and the destination port is the ICMP identifier.
• For other packets, both source and destination ports are 0.
• Forwarder—A node that forwards packets to the owner. If a forwarder receives a packet for a connection
it does not own, it queries the director for the owner, and then establishes a flow to the owner for any
other packets it receives for this connection. The director can also be a forwarder. Note that if a forwarder
receives the SYN-ACK packet, it can derive the owner directly from a SYN cookie in the packet, so it
does not need to query the director. (If you disable TCP sequence randomization, the SYN cookie is not
used; a query to the director is required.) For short-lived flows such as DNS and ICMP, instead of
querying, the forwarder immediately sends the packet to the director, which then sends them to the owner.
A connection can have multiple forwarders; the most efficient throughput is achieved by a good
load-balancing method where there are no forwarders and all packets of a connection are received by
the owner.
• Fragment Owner—For fragmented packets, cluster nodes that receive a fragment determine a fragment
owner using a hash of the fragment source IP address, destination IP address, and the packet ID. All
fragments are then forwarded to the fragment owner over the cluster control link. Fragments may be
load-balanced to different cluster nodes, because only the first fragment includes the 5-tuple used in the
switch load balance hash. Other fragments do not contain the source and destination ports and may be
load-balanced to other cluster nodes. The fragment owner temporarily reassembles the packet so it can
determine the director based on a hash of the source/destination IP address and ports. If it is a new
connection, the fragment owner will register to be the connection owner. If it is an existing connection,
the fragment owner forwards all fragments to the provided connection owner over the cluster control
link. The connection owner will then reassemble all fragments.
1. The SYN packet originates from the client and is delivered to one threat defense (based on the load
balancing method), which becomes the owner. The owner creates a flow, encodes owner information into
a SYN cookie, and forwards the packet to the server.
2. The SYN-ACK packet originates from the server and is delivered to a different threat defense (based on
the load balancing method). This threat defense is the forwarder.
3. Because the forwarder does not own the connection, it decodes owner information from the SYN cookie,
creates a forwarding flow to the owner, and forwards the SYN-ACK to the owner.
4. The owner sends a state update to the director, and forwards the SYN-ACK to the client.
5. The director receives the state update from the owner, creates a flow to the owner, and records the TCP
state information as well as the owner. The director acts as the backup owner for the connection.
6. Any subsequent packets delivered to the forwarder will be forwarded to the owner.
7. If packets are delivered to any additional nodes, it will query the director for the owner and establish a
flow.
8. Any state change for the flow results in a state update from the owner to the director.
The first UDP packet originates from the client and is delivered to one threat defense (based on the load
balancing method).
2. The node that received the first packet queries the director node that is chosen based on a hash of the
source/destination IP address and ports.
3. The director finds no existing flow, creates a director flow and forwards the packet back to the previous
node. In other words, the director has elected an owner for this flow.
4. The owner creates the flow, sends a state update to the director, and forwards the packet to the server.
5. The second UDP packet originates from the server and is delivered to the forwarder.
6. The forwarder queries the director for ownership information. For short-lived flows such as DNS, instead
of querying, the forwarder immediately sends the packet to the director, which then sends it to the owner.
Cluster control link ping 7.2.6/7.4.1 Any You can check to make sure all the cluster nodes can reach each other over the
tool. cluster control link by performing a ping. One major cause for the failure of a
node to join the cluster is an incorrect cluster control link configuration; for
example, the cluster control link MTU may be set higher than the connecting
switch MTUs.
New/modified screens: Devices > Device Management > More( ) > Cluster
Live Status
Other version restrictions: Not supported with management center Version
7.3.x or 7.4.0.
Troubleshooting file 7.4.1 7.4.1 You can generate and download troubleshooting files for each device on the
generation and download Device page and also for all cluster nodes on the Cluster page. For a cluster,
available from Device you can download all files as a single compressed file. You can also include
and Cluster pages. cluster logs for the cluster for cluster nodes. You can alternatively trigger file
generation from the Devices > Device Management > More( ) > Troubleshoot
Files menu.
New/modified screens:
• Devices > Device Management > Device > General
• Devices > Device Management > Cluster > General
View CLI output for a 7.4.1 Any You can view a set of pre-defined CLI outputs that can help you troubleshoot
device or device cluster. the device or cluster. You can also enter any show command and see the output.
New/modified screens: Devices > Device Management > Cluster > General
Cluster health monitor 7.3.0 Any You can now edit cluster health monitor settings.
settings.
New/Modified screens: Devices > Device Management > Cluster > Cluster
Health Monitor Settings
Note
If you previously configured these settings using FlexConfig, be sure to remove
the FlexConfig configuration before you deploy. Otherwise the FlexConfig
configuration will overwrite the management center configuration.
Cluster health monitor 7.3.0 Any You can now view cluster health on the cluster health monitor dashboard.
dashboard.
New/Modified screens: System( ) > Health > Monitor
Clustering for the threat 7.3.0 7.3.0 You can now configure clustering for up to 16 nodes the threat defense virtual
defense virtual in Azure. in Azure for the Azure Gateway Load Balancer or for external load balancers.
New/modified screens:
• Devices > Device Management > Add Cluster
• Devices > Device Management > More menu
• Devices > Device Management > Cluster
Clustering for the Threat 7.2.0 7.2.0 The threat defense virtual supports Individual interface clustering for up to 16
Defense Virtual in the nodes in the public cloud (AWS and GCP).
Public Cloud (Amazon
New/Modified screens:
Web Services and
Google Cloud Platform). • Devices > Device Management > Add Device
• Devices > Device Management > More menu
• Devices > Device Management > Cluster
Note Some features are not supported when using clustering. See Unsupported Features with Clustering, on page
743.
Note Individual interfaces are not supported, with the exception of a management
interface.
Bootstrap Configuration
When you deploy the cluster, the Firepower 4100/9300 chassis supervisor pushes a minimal bootstrap
configuration to each unit that includes the cluster name, cluster control link interface, and other cluster
settings.
Cluster Members
Cluster members work together to accomplish the sharing of the security policy and traffic flows.
One member of the cluster is the control unit. The control unit is determined automatically. All other members
are data units.
You must perform all configuration on the control unit only; the configuration is then replicated to the data
units.
Some features do not scale in a cluster, and the control unit handles all traffic for those features. .
the remaining healthy unit fails. If you connect the cluster control link through a switch, then the cluster control
link remains up for the healthy unit.
Cluster control link traffic includes both control and data traffic.
A higher-bandwidth cluster control link helps the cluster to converge faster when there are membership changes
and prevents throughput bottlenecks.
Note If your cluster has large amounts of asymmetric (rebalanced) traffic, then you should increase the cluster
control link size.
Management Network
We recommend connecting all units to a single management network. This network is separate from the cluster
control link.
Management Interface
You must assign a Management type interface to the cluster. This interface is a special individual interface
as opposed to a Spanned interface. The management interface lets you connect directly to each unit. This
Management logical interface is separate from the other interfaces on the device. It is used to set up and
register the device to the Secure Firewall Management Center. It uses its own local authentication, IP address,
and static routing. Each cluster member uses a separate IP address on the management network that you set
as part of the bootstrap configuration.
Cluster Interfaces
For a cluster isolated to security modules within one Firepower 9300 chassis, you can assign both physical
interfaces or EtherChannels (also known as port channels) to the cluster. Interfaces assigned to the cluster are
Spanned interfaces that load-balance traffic across all members of the cluster.
For clustering with multiple chassis, you can only assign data EtherChannels to the cluster. These Spanned
EtherChannels include the same member interfaces on each chassis; on the upstream switch, all of these
interfaces are included in a single EtherChannel, so the switch does not know that it is connected to multiple
devices.
You can use regular firewall interfaces or IPS-only interfaces (inline sets or passive interfaces).
Individual interfaces are not supported, with the exception of a management interface.
Spanned EtherChannels
You can group one or more interfaces per chassis into an EtherChannel that spans all chassis in the cluster.
The EtherChannel aggregates the traffic across all the available active interfaces in the channel.
For regular firewall interfaces:A Spanned EtherChannel can be configured in both routed and transparent
firewall modes. In routed mode, the EtherChannel is configured as a routed interface with a single IP address.
In transparent mode, the IP address is assigned to the BVI, not to the bridge group member interface.
The EtherChannel inherently provides load balancing as part of basic operation.
For multi-instance clusters, each cluster requires dedicated data EtherChannels; you cannot use shared interfaces
or VLAN subinterfaces.
Configuration Replication
All nodes in the cluster share a single configuration. You can only make configuration changes on the control
node (with the exception of the bootstrap configuration), and changes are automatically synced to all other
nodes in the cluster.
When you add a cluster node to the management center, you can specify the feature licenses you want to use
for the cluster. You can modify licenses for the cluster in the Devices > Device Management > Cluster >
License area.
Note If you add the cluster before the management center is licensed (and running in Evaluation mode), then when
you license the management center, you can experience traffic disruption when you deploy policy changes
to the cluster. Changing to licensed mode causes all data units to leave the cluster and then rejoin.
User Roles
• Admin
• Access Admin
• Network Admin
• Must run the identical FXOS and application software except at the time of an image upgrade. Mismatched
software versions can lead to poor performance, so be sure to upgrade all nodes in the same maintenance
window.
• Must include the same interface configuration for interfaces you assign to the cluster, such as the same
Management interface, EtherChannels, active interfaces, speed and duplex, and so on. You can use
different network module types on the chassis as long as the capacity matches for the same interface IDs
and interfaces can successfully bundle in the same spanned EtherChannel. Note that all data interfaces
must be EtherChannels in clusters with multiple chassis. If you change the interfaces in FXOS after you
enable clustering (by adding or removing interface modules, or configuring EtherChannels, for example),
then perform the same changes on each chassis, starting with the data nodes, and ending with the control
node.
• Must use the same NTP server. For threat defense, the management center must also use the same NTP
server. Do not set the time manually.
• Mix and match clusters and standalone instances—Not all container instances on a security module/engine
need to belong to a cluster. You can use some instances as standalone or High Availability nodes. You
can also create multiple clusters using separate instances on the same security module/engine.
• All 3 modules in a Firepower 9300 must belong to the cluster—For the Firepower 9300, a cluster requires
a single container instance on all 3 modules. You cannot create a cluster using instances on module 1
and 2, and then use a native instance on module 3, or example.
• Match resource profiles—We recommend that each node in the cluster use the same resource profile
attributes; however, mismatched resources are allowed when changing cluster nodes to a different resource
profile, or when using different models.
• Dedicated cluster control link—For clusters with multiple chassis, each cluster needs a dedicated cluster
control link. For example, each cluster can use a separate subinterface on the same cluster-type
EtherChannel, or use separate EtherChannels.
• No shared interfaces—Shared-type interfaces are not supported with clustering. However, the same
Management and Eventing interfaces can used by multiple clusters.
• No subinterfaces—A multi-instance cluster cannot use FXOS-defined VLAN subinterfaces. An exception
is made for the cluster control link, which can use a subinterface of the Cluster EtherChannel.
• Mix chassis models—We recommend that you use the same security module or chassis model for each
cluster instance. However, you can mix and match container instances on different Firepower 9300
security module types or Firepower 4100 models in the same cluster if required. You cannot mix Firepower
9300 and 4100 instances in the same cluster. For example, you can create a cluster using an instance on
a Firepower 9300 SM-56, SM-48, and SM-40. Or you can create a cluster on a Firepower 4145 and a
4125.
Switch Requirements
• Be sure to complete the switch configuration and successfully connect all the EtherChannels from the
chassis to the switch(es) before you configure clustering on the Firepower 4100/9300 chassis.
• For supported switch characteristics, see Cisco FXOS Compatibility.
• On the switch(es) for the cluster control link interfaces, you can optionally enable Spanning Tree PortFast
on the switch ports connected to the cluster unit to speed up the join process for new units.
• On the switch, we recommend that you use one of the following EtherChannel load-balancing algorithms:
source-dest-ip or src-dst-mixed-ip-port (see the Cisco Nexus OS and Cisco IOS-XE port-channel
load-balance command). Do not use a vlan keyword in the load-balance algorithm because it can cause
unevenly distributed traffic to the devices in a cluster.
• If you change the load-balancing algorithm of the EtherChannel on the switch, the EtherChannel interface
on the switch temporarily stops forwarding traffic, and the Spanning Tree Protocol restarts. There will
be a delay before traffic starts flowing again.
• Switches on the cluster control link path should not verify the L4 checksum. Redirected traffic over the
cluster control link does not have a correct L4 checksum. Switches that verify the L4 checksum could
cause traffic to be dropped.
• Port-channel bundling downtime should not exceed the configured keepalive interval.
• On Supervisor 2T EtherChannels, the default hash distribution algorithm is adaptive. To avoid asymmetric
traffic in a VSS design, change the hash algorithm on the port-channel connected to the cluster device
to fixed:
router(config)# port-channel id hash-distribution fixed
Do not change the algorithm globally; you may want to take advantage of the adaptive algorithm for the
VSS peer link.
• Firepower 4100/9300 clusters support LACP graceful convergence. So you can leave LACP graceful
convergence enabled on connected Cisco Nexus switches.
• When you see slow bundling of a Spanned EtherChannel on the switch, you can enable LACP rate fast
for an individual interface on the switch. FXOS EtherChannels have the LACP rate set to fast by default.
Note that some switches, such as the Nexus series, do not support LACP rate fast when performing
in-service software upgrades (ISSUs), so we do not recommend using ISSUs with clustering.
Additional Guidelines
• When significant topology changes occur (such as adding or removing an EtherChannel interface, enabling
or disabling an interface on the Firepower 4100/9300 chassis or the switch, adding an additional switch
to form a VSS, vPC, StackWise, or StackWise Virtual) you should disable the health check feature, and
also disable interface monitoring for the disabled interfaces . When the topology change is complete,
and the configuration change is synced to all units, you can re-enable the health check feature.
• When adding a unit to an existing cluster, or when reloading a unit, there will be a temporary, limited
packet/connection drop; this is expected behavior. In some cases, the dropped packets can hang
connections; for example, dropping a FIN/ACK packet for an FTP connection will make the FTP client
hang. In this case, you need to reestablish the FTP connection.
• If you use a Windows 2003 server connected to a Spanned EtherChannel interface, when the syslog
server port is down, and the server does not throttle ICMP error messages, then large numbers of ICMP
messages are sent back to the cluster. These messages can result in some units of the cluster experiencing
high CPU, which can affect performance. We recommend that you throttle ICMP error messages.
• We recommend connecting EtherChannels to a VSS, vPC, StackWise, or StackWise Virtual for
redundancy.
• Within a chassis, you cannot cluster some security modules and run other security modules in standalone
mode; you must include all security modules in the cluster.
• For decrypted TLS/SSL connections, the decryption states are not synchronized, and if the connection
owner fails, then decrypted connections will be reset. New connections will need to be established to a
new unit. Connections that are not decrypted (they match a do-not-decrypt rule) are not affected and are
replicated correctly.
Defaults
• The cluster health check feature is enabled by default with the holdtime of 3 seconds. Interface health
monitoring is enabled on all interfaces by default.
• The cluster auto-rejoin feature for a failed cluster control link is set to unlimited attempts every 5 minutes.
• The cluster auto-rejoin feature for a failed data interface is set to 3 attempts every 5 minutes, with the
increasing interval set to 2.
• Connection replication delay of 5 seconds is enabled by default for HTTP traffic.
Configure Clustering
You can easily deploy the cluster from the Firepower 4100/9300 supervisor. All initial configuration is
automatically generated for each unit. You can then add the units to the management center and group them
into a cluster.
Procedure
c) For clustering on multiple chassis, add a member interface to the cluster control link EtherChannel (by
default, port-channel 48). See Add an EtherChannel (Port Channel), on page 325.
Do not add a member interface for a cluster isolated to security modules within one Firepower 9300
chassis. If you add a member, the chassis assumes this cluster will be using multiple chassis, and will only
allow you to use Spanned EtherChannels, for example.
On the Interfaces tab, the port-channel 48 cluster type interface shows the Operation State as failed if
it does not include any member interfaces. For a cluster isolated to security modules within one Firepower
9300 chassis, this EtherChannel does not require any member interfaces, and you can ignore this Operational
State.
Add the same member interfaces on each chassis. The cluster control link is a device-local EtherChannel
on each chassis. Use separate EtherChannels on the switch per device. See Clustering Guidelines and
Limitations, on page 697 for more information about EtherChannels.
For multi-instance clustering, you can create additional Cluster type EtherChannels. Unlike the Management
interface, the cluster control link is not sharable across multiple devices, so you will need a Cluster interface
for each cluster. However, we recommend using VLAN subinterfaces instead of multiple EtherChannels;
see the next step to add a VLAN subinterface to the Cluster interface.
d) For multi-instance clustering, add VLAN subinterfaces to the cluster EtherChannel so you have a
subinterface for each cluster. See Add a VLAN Subinterface for Container Instances, on page 327.
If you add subinterfaces to a Cluster interface, you cannot use that interface for a native cluster.
e) (Optional) Add an eventing interface. See Add an EtherChannel (Port Channel), on page 325 or Configure
a Physical Interface, on page 324.
This interface is a secondary management interface for the threat defense devices. To use this interface,
you must configure its IP address and other parameters at the threat defense CLI. For example, you can
separate management traffic from events (such as web events). See the configure network commands in
the threat defense command reference.
For clustering on multiple chassis, add the same eventing interface on each chassis.
g) Click OK.
You see the Provisioning - device name window.
For native mode clustering: All valid interfaces are assigned by default. If you defined multiple Cluster type
interfaces, deselect all but one.
For multi-instance clustering: Choose each data interface you want to assign to the cluster, and also choose
the Cluster type port-channel or port-channel subinterface.
a) (Container Instance for the Firepower 9300 only) In the Security Module (SM) and Resource Profile
Selection area, you can set a different resource profile per module; for example, if you are using different
security module types, and you want to use more CPUs on a lower-end model.
b) For clustering on multiple chassis, in the Chassis ID field, enter a chassis ID. Each chassis in the cluster
must use a unique ID.
This field only appears if you added a member interface to cluster control link Port-Channel 48.
c) For inter-site clustering, in the Site ID field, enter the site ID for this chassis between 1 and 8. FlexConfig
feature. Additional inter-site cluster customizations to enhance redundancy and stability, such as director
localization, site redundancy, and cluster flow mobility, are only configurable using the management
center FlexConfig feature.
d) In the Cluster Key field, configure an authentication key for control traffic on the cluster control link.
The shared secret is an ASCII string from 1 to 63 characters. The shared secret is used to generate the
key. This option does not affect datapath traffic, including connection state update and forwarded packets,
which are always sent in the clear.
e) Set the Cluster Group Name, which is the cluster group name in the logical device configuration.
The name must be an ASCII string from 1 to 38 characters.
Important
From 2.4.1, spaces in cluster group name will be considered as special characters and may result in error
while deploying the logical devices. To avoid this issue, you must rename the cluster group name without
a space.
a) In the Registration Key field, enter the key to be shared between the management center and the cluster
members during registration.
You can choose any text string for this key between 1 and 37 characters; you will enter the same key on
the management center when you add the threat defense.
b) Enter a Password for the threat defense admin user for CLI access.
c) In the Firepower Management Center IP field, enter the IP address of the managing management center.
If you do not know the management center IP address, leave this field blank and enter a passphrase in the
Firepower Management Center NAT ID field.
d) (Optional) For a container instance, Permit Expert mode from FTD SSH sessions: Yes or No. Expert
Mode provides threat defense shell access for advanced troubleshooting.
If you choose Yes for this option, then users who access the container instance directly from an SSH
sesssion can enter Expert Mode. If you choose No, then only users who access the container instance from
the FXOS CLI can enter Expert Mode. We recommend choosing No to increase isolation between instances.
Use Expert Mode only if a documented procedure tells you it is required, or if the Cisco Technical
Assistance Center asks you to use it. To enter this mode, use the expert command in the threat defense
CLI.
e) (Optional) In the Search Domains field, enter a comma-separated list of search domains for the
management network.
f) (Optional) From the Firewall Mode drop-down list, choose Transparent or Routed.
In routed mode, the threat defense is considered to be a router hop in the network. Each interface that you
want to route between is on a different subnet. A transparent firewall, on the other hand, is a Layer 2
firewall that acts like a “bump in the wire,” or a “stealth firewall,” and is not seen as a router hop to
connected devices.
The firewall mode is only set at initial deployment. If you re-apply the bootstrap settings, this setting is
not used.
g) (Optional) In the DNS Servers field, enter a comma-separated list of DNS servers.
The threat defense uses DNS if you specify a hostname for the management center, for example.
h) (Optional) In the Firepower Management Center NAT ID field, enter a passphrase that you will also
enter on the management center when you add the cluster as a new device.
Normally, you need both IP addresses (along with a registration key) for both routing purposes and for
authentication: the management center specifies the device IP address, and the device specifies the
management center IP address. However, if you only know one of the IP addresses, which is the minimum
requirement for routing purposes, then you must also specify a unique NAT ID on both sides of the
connection to establish trust for the initial communication and to look up the correct registration key. You
can specify any text string as the NAT ID, from 1 to 37 characters. The management center and device
use the registration key and NAT ID (instead of IP addresses) to authenticate and authorize for initial
registration.
i) (Optional) In the Fully Qualified Hostname field, enter a fully qualified name for the threat defense
device.
Valid characters are the letters from a to z, the digits from 0 to 9, the dot (.), and the hyphen (-); maximum
number of characters is 253.
j) (Optional) From the Eventing Interface drop-down list, choose the interface on which events should be
sent. If not specified, the management interface will be used.
To specify a separate interface to use for events, you must configure an interface as a firepower-eventing
interface. If you assign a Hardware Bypass-capable interface as the Eventing interface, you see a warning
message to make sure your assignment is intentional.
Step 8 On the Interface Information page, configure a management IP address for each security module in the
cluster. Select the type of address from the Address Type drop-down list and then complete the following
for each security module.
Note
You must set the IP address for all 3 module slots in a chassis, even if you do not have a module installed. If
you do not configure all 3 modules, the cluster will not come up.
Step 12 For clustering on multiple chassis, add the next chassis to the cluster:
a) On the first chassis of the chassis manager, click the Show Configuration icon at the top right; copy the
displayed cluster configuration.
b) Connect to the chassis manager on the next chassis, and add a logical device according to this procedure.
c) Choose I want to: > Join an Existing Cluster.
d) Click OK.
e) In the Copy Cluster Details box, paste in the cluster configuration from the first chassis, and click OK.
f) Click the device icon in the center of the screen. The cluster information is mostly pre-filled, but you must
change the following settings:
• Chassis ID—Enter a unique chassis ID.
• Site ID—For inter-site clustering, enter the site ID for this chassis between 1 and 8. Additional
inter-site cluster customizations to enhance redundancy and stability, such as director localization,
site redundancy, and cluster flow mobility, are only configurable using the management center
FlexConfig feature.
• Cluster Key—(Not prefilled) Enter the same cluster key.
• Management IP—Change the management address for each module to be a unique IP address on
the same network as the other cluster members.
Click OK.
g) Click Save.
The chassis deploys the logical device by downloading the specified software version and pushing the
bootstrap configuration and management interface settings to the application instance. Check the Logical
Devices page for each cluster member for the status of the new logical device. When the logical device
for each cluster member shows its Status as online, you can start configuring the cluster in the application.
You may see the "Security module not responding" status as part of the process; this status is normal and
is temporary.
Step 13 Add the control unit to the management center using the management IP address.
All cluster units must be in a successfully-formed cluster on FXOS prior to adding them to management
center.
Note The FXOS steps in this procedure only apply to adding a new chassis; if you are adding a new module to a
Firepower 9300 where clustering is already enabled, the module will be added automatically.
Procedure
Step 1 If you previously upgraded the threat defense image using the management center, perform the following
steps on each chassis in the cluster.
When you upgraded from the management center, the startup version in the FXOS configuration was not
updated, and the standalone package was not installed on the chassis. Both of these items need to be set
manually so the new node can join the cluster using the correct image version.
Note
If you only applied a patch release, you can skip this step. Cisco does not provide standalone packages for
patches.
a) Install the running threat defense image on the chassis using the System > Updates page.
b) Click Logical Devices and click the Set Version icon ( ). For a Firepower 9300 with multiple modules,
set the version for each module.
The Startup Version shows the original package you deployed with. The Current Version shows the
version you upgraded to.
c) In the New Version drop-down menu, choose the version that you uploaded. This version should match
the Current Version displayed, and will set the startup version to match the new version.
d) On the new chassis, make sure the new image package is installed.
Step 2 On an existing cluster chassis chassis manager, click Logical Devices.
Step 3 Click the Show Configuration icon at the top right; copy the displayed cluster configuration.
Step 4 Connect to the chassis manager on the new chassis, and click Add > Cluster.
Step 5 For the Device Name, provide a name for the logical device.
• Site ID—For inter-site clustering, enter the site ID for this chassis between 1 and 8. This feature is only
configurable using the management center FlexConfig feature.
• Cluster Key—Enter the same cluster key.
• Management IP—Change the management address for each module to be a unique IP address on the
same network as the other cluster members.
• Fully Qualified Hostname—Enter the same hostname.
• Password—Enter the same password.
• Registration Key—Enter the same registration key.
Click OK.
Procedure
Step 1 In the management center, choose Devices > Device Management, and then choose Add > Add Device to
add the control unit using the unit's management IP address you assigned when you deployed the cluster.
Figure 305: Add Device
a) In the Host field, enter the IP address or hostname of the control unit.
We recommend adding the control unit for the best performance, but you can add any unit of the cluster.
If you used a NAT ID during device setup, you may not need to enter this field. For more information,
see NAT Environments, on page 7.
b) In the Display Name field, enter a name for the control unit as you want it to display in the management
center.
This display name is not for the cluster; it is only for the control unit you are adding. You can later change
the name of other cluster members and the cluster display name.
c) In the Registration Key field, enter the same registration key that you used when you deployed the cluster
in FXOS. The registration key is a one-time-use shared secret.
d) (Optional) Add the device to a device Group.
e) Choose an initial Access Control Policy to deploy to the device upon registration, or create a new policy.
If you create a new policy, you create a basic policy only. You can later customize the policy as needed.
You can monitor cluster unit registration by clicking the Notifications icon and choosing Tasks. The
management center updates the Cluster Registration task as each unit registers. If any units fail to register,
see Reconcile Cluster Members, on page 734.
Step 2 Configure device-specific settings by clicking the Edit ( ) for the cluster.
Most configuration can be applied to the cluster as a whole, and not member units in the cluster. For example,
you can change the display name per unit, but you can only configure interfaces for the whole cluster.
Step 3 On the Devices > Device Management > Cluster screen, you see General, License, System, and Health
settings.
• General > View cluster status—Click the View cluster status link to open the Cluster Status dialog
box.
The Cluster Status dialog box also lets you retry data unit registration by clicking Reconcile.
• General > Troubleshoot—You can generate and download troubleshooting logs, and you can view
cluster CLIs. See Management Center: Troubleshooting the Cluster, on page 739.
Figure 306: Troubleshoot
Step 4 On the Devices > Device Management > Devices, you can choose each member in the cluster from the top
right drop-down menu and configure the following settings.
• General > Name—Change the cluster member display name by clicking the Edit ( ).
• Management > Host—If you change the management IP address in the device configuration, you must
match the new address in the management center so that it can reach the device on the network; edit the
Host address in the Management area.
Note When using Spanned EtherChannels for clustering on multiple chassis, the port-channel interface will not
come up until clustering is fully enabled. This requirement prevents traffic from being forwarded to a unit
that is not an active unit in the cluster.
Procedure
Step 1 Choose Devices > Device Management, and click Edit ( ) next to the cluster.
d) For clustering on multiple chassis, set a unique. manual global MAC address for the EtherChannel. Click
Advanced, and in the Active Mac Address field, enter a MAC address in H.H.H format, where H is a
16-bit hexadecimal digit.
For example, the MAC address 00-0C-F1-42-4C-DE would be entered as 000C.F142.4CDE. The MAC
address must not have the multicast bit set, that is, the second hexadecimal digit from the left cannot be
an odd number.
Do not set the Standby Mac Address; it is ignored.
You must configure a unique MAC address not currently in use on your network for a Spanned
EtherChannel to avoid potential network connectivity problems. With a manually-configured MAC
address, the MAC address stays with the current control unit. If you do not configure a MAC address,
then if the control unit changes, the new control unit uses a new MAC address for the interface, which
can cause a temporary network outage.
e) Click OK. Repeat the above steps for other data interfaces.
Step 5 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
Field Description
Timeouts
Hold Time Between .3 and 45 seconds; The default is 3 seconds. To determine node system
health, the cluster nodes send heartbeat messages on the cluster control link
to other nodes. If a node does not receive any heartbeat messages from a peer
node within the hold time period, the peer node is considered unresponsive or
dead.
Interface Debounce Time Between 300 and 9000 ms. The default is 500 ms. The interface debounce time
is the amount of time before the node considers an interface to be failed, and
the node is removed from the cluster.
Field Description
Monitored Interfaces The interface health check monitors for link failures. If all physical ports for
a given logical interface fail on a particular node, but there are active ports
under the same logical interface on other nodes, then the node is removed from
the cluster. The amount of time before the node removes a member from the
cluster depends on the type of interface and whether the node is an established
node or is joining the cluster.
Service Application Shows whether the Snort and disk-full processes are monitored.
Auto-Rejoin Settings
Cluster Interface Shows the auto-rejoin settings after a cluster control link failure.
Attempts Between -1 and 65535. The default is -1 (unlimited). Sets the number of rejoin
attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 1x the interval duration. Defines if the interval
duration increases at each attempt.
Data Interfaces Shows the auto-rejoin settings after a data interface failure.
Attempts Between -1 and 65535. The default is 3. Sets the number of rejoin attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 2x the interval duration. Defines if the interval
duration increases at each attempt.
System Shows the auto-rejoin settings after internal errors. Internal failures include:
application sync timeout; inconsistent application statuses; and so on.
Attempts Between -1 and 65535. The default is 3. Sets the number of rejoin attempts.
Interval Between Attempts Between 2 and 60. The default is 5 minutes. Defines the interval duration in
minutes between rejoin attempts.
Interval Variation Between 1 and 3. The default is 2x the interval duration. Defines if the interval
duration increases at each attempt.
Note If you disable the system health check, fields that do not apply when the system health check is disabled will
not show.
You can monitor any port-channel ID, single physical interface ID, as well as the Snort and disk-full processes.
Health monitoring is not performed on VLAN subinterfaces or virtual interfaces such as VNIs or BVIs. You
cannot configure monitoring for the cluster control link; it is always monitored.
Procedure
When any topology changes occur (such as adding or removing a data interface, enabling or disabling an
interface on the node or the switch, or adding an additional switch to form a VSS or vPC or VNet) you should
disable the system health check feature and also disable interface monitoring for the disabled interfaces. When
the topology change is complete, and the configuration change is synced to all nodes, you can re-enable the
system health check feature and monitored interfaces.
Step 7 Customize the auto-rejoin cluster settings after a health check failure.
Figure 309: Configure Auto-Rejoin Settings
Set the following values for the Cluster Interface, Data Interface, and System (internal failures include:
application sync timeout; inconsistent application statuses; and so on):
• Attempts—Sets the number of rejoin attempts, between -1 and 65535. 0 disables auto-rejoining. The
default for the Cluster Interface is -1 (unlimited). The default for the Data Interface and System is 3.
• Interval Between Attempts—Defines the interval duration in minutes between rejoin attempts, between
2 and 60. The default value is 5 minutes. The maximum total time that the node attempts to rejoin the
cluster is limited to 14400 minutes (10 days) from the time of last failure.
• Interval Variation—Defines if the interval duration increases. Set the value between 1 and 3: 1 (no
change); 2 (2 x the previous duration), or 3 (3 x the previous duration). For example, if you set the interval
duration to 5 minutes, and set the variation to 2, then the first attempt is after 5 minutes; the 2nd attempt
is 10 minutes (2 x 5); the 3rd attempt 20 minutes (2 x 10), and so on. The default value is 1 for the Cluster
Interface and 2 for the Data Interface and System.
Step 8 Configure monitored interfaces by moving interfaces in the Monitored Interfaces or Unmonitored Interfaces
window. You can also check or uncheck Enable Service Application Monitoring to enable or disable
monitoring of the Snort and disk-full processes.
The interface health check monitors for link failures. If all physical ports for a given logical interface fail on
a particular node, but there are active ports under the same logical interface on other nodes, then the node is
removed from the cluster. The amount of time before the node removes a member from the cluster depends
on the type of interface and whether the node is an established node or is joining the cluster. Health check is
enabled by default for all interfaces and for the Snort and disk-full processes.
You might want to disable health monitoring of non-essential interfaces.
When any topology changes occur (such as adding or removing a data interface, enabling or disabling an
interface on the node or the switch, or adding an additional switch to form a VSS or vPC or VNet) you should
disable the system health check feature and also disable interface monitoring for the disabled interfaces. When
the topology change is complete, and the configuration change is synced to all nodes, you can re-enable the
system health check feature and monitored interfaces.
Temporary Removal
A cluster node will be automatically removed from the cluster due to a hardware or network failure, for
example. This removal is temporary until the conditions are rectified, and it can rejoin the cluster. You can
also manually disable clustering.
To check whether a device is currently in the cluster, check the cluster status on the chassis manager Logical
Devices page:
For threat defense using the management center, you should leave the device in the management center device
list so that it can resume full functionality after you reenable clustering.
• Disable clustering in the application—You can disable clustering using the application CLI. Enter the
cluster remove unit name command to remove any node other than the one you are logged into. The
bootstrap configuration remains intact, as well as the last configuration synced from the control node,
so you can later re-add the node without losing your configuration. If you enter this command on a data
node to remove the control node, a new control node is elected.
When a device becomes inactive, all data interfaces are shut down; only the Management interface can
send and receive traffic. To resume traffic flow, re-enable clustering. The Management interface remains
up using the IP address the node received from the bootstrap configuration. However if you reload, and
the node is still inactive in the cluster , the Management interface is disabled.
To reenable clustering, on the threat defense enter cluster enable.
• Disable the application instance—In the chassis manager on the Logical Devices page, click the Slider
Permanent Removal
You can permanently remove a cluster node using the following methods.
For threat defense using the management center, be sure to remove the node from the management center
device list after you disable clustering on the chassis.
• Delete the logical device—In the chassis manager on the Logical Devices page, click the Delete ( ).
You can then deploy a standalone logical device, a new cluster, or even add a new logical device to the
same cluster.
• Remove the chassis or security module from service—If you remove a device from service, you can add
replacement hardware as a new node of the cluster.
Procedure
Step 1 Add the new unit to the cluster in FXOS. See the FXOS configuration guide.
Wait for the new unit to be added to the cluster. Refer to the chassis manager Logical Devices screen or use
the threat defense show cluster info command to view cluster status.
Step 2 The new cluster member is added automatically. To monitor the registration of the replacement unit, view
the following:
• Cluster Status dialog box (which is available from the Devices > Device Management More ( ) icon
or from the Devices > Device Management > Cluster tab > General area > Cluster Live Status link)—A
unit that is joining the cluster on the chassis shows "Joining cluster..." After it joins the cluster, the
management center attempts to register it, and the status changes to "Available for Registration". After
it completes registration, the status changes to "In Sync." If the registration fails, the unit will stay at
"Available for Registration". In this case, force a re-registration by clicking Reconcile.
• System status > Tasks —The management center shows all registration events and failures.
• Devices > Device Management—When you expand the cluster on the devices listing page, you can see
when a unit is registering when it has the loading icon to the left.
Procedure
Step 1 For a new chassis, if possible, backup and restore the configuration from the old chassis in FXOS.
If you are replacing a module in a Firepower 9300, you do not need to perform these steps.
If you do not have a backup FXOS configuration from the old chassis, first perform the steps in Add a New
Cluster Member, on page 729.
For information about all of the below steps, see the FXOS configuration guide.
a) Use the configuration export feature to export an XML file containing logical device and platform
configuration settings for your Firepower 4100/9300 chassis.
b) Import the configuration file to the replacement chassis.
c) Accept the license agreement.
d) If necessary, upgrade the logical device application instance version to match the rest of the cluster.
Step 2 In the management center for the old unit, choose Devices > Device Management > More ( ) > Delete .
Step 4 The new or reinitialized cluster member is added automatically. To monitor the registration of the replacement
unit, view the following:
• Cluster Status dialog box (Devices > Device Management > More ( ) icon or Devices > Device
Management > Cluster page > General area > Cluster Live Status link)—A unit that is joining the
cluster on the chassis shows "Joining cluster..." After it joins the cluster, the management center attempts
to register it, and the status changes to "Available for Registration". After it completes registration, the
status changes to "In Sync." If the registration fails, the unit will stay at "Available for Registration". In
this case, force a re-registration by clicking Reconcile All.
• System ( ) > Tasks—The management center shows all registration events and failures.
• Devices > Device Management—When you expand the cluster on the devices listing page, you can see
when a unit is registering when it has the loading icon to the left.
Deactivate a Member
You may want to deactivate a member in preparation for deleting the unit, or temporarily for maintenance.
This procedure is meant to temporarily deactivate a member; the unit will still appear in the management
center device list.
Note When a unit becomes inactive, all data interfaces are shut down; only the Management interface can send and
receive traffic. To resume traffic flow, reenable clustering. The Management interface remains up using the
IP address the unit received from the bootstrap configuration. However if you reload, and the unit is still
inactive in the cluster, the management interface is disabled. You must use the console for any further
configuration.
Procedure
Step 1 For the unit you want to deactivate, choose Devices > Device Management > More ( ) > Disable Clustering.
You can also deactivate a unit from the Cluster Status dialog box (Devices > Device Management > More
( ) > Cluster Live Status).
Procedure
Step 1 For the unit you want to reactivate, choose Devices > Device Management > More ( ) > Enable Clustering.
You can also reactivate a unit from the Cluster Status dialog box (Devices > Device Management > More
( ) > Cluster Live Status).
Procedure
Step 1 Make sure the node is ready to be unregistered from the management center. On Devices > Device
Management, make sure the node shows (Disabled).
You can also view each node's status on the Cluster Status dialog box available from More ( ). If the status
is stale, click Reconcile All on the Cluster Status dialog box to force an update.
Step 2 In the management center for the data node you want to delete, choose Devices > Device Management >
More ( ) > Unregister.
Step 3 Confirm that you want to unregister the node.
The node is removed from the cluster and from the management center devices list.
Caution The best method to change the control unit is to disable clustering on the control unit, wait for a new control
election, and then re-enable clustering. If you must specify the exact unit you want to become the control unit,
use the procedure in this section. Note that for centralized features, if you force a control unit change, then
all connections are dropped, and you have to re-establish the connections on the new control unit.
Procedure
Step 1 Open the Cluster Status dialog box by choosing Devices > Device Management > More ( ) > Cluster Live
Status.
You can also access the Cluster Status dialog box from Devices > Device Management > Cluster page >
General area > Cluster Live Status link.
Step 2 For the unit you want to become the control unit, choose More ( ) > Change Role to Control.
Step 3 You are prompted to confirm the role change. Check the checkbox, and click OK.
Procedure
Step 1 Choose Devices > Device Management > More ( ) for the cluster, and then choose Cluster Live Status to
open the Cluster Status dialog box.
You can also open the Cluster Status dialog box from the Devices > Device Management > Cluster page
> General area > Cluster Live Status link.
For each unit, you can view the Summary or the History.
For each unit from the More ( ) menu , you can perform the following status changes:
• Disable Clustering
• Enable Clustering
• Change Role to Control
Note The CPU and memory metrics display the individual average of the data plane
and snort usage.
• The metric charts, namely, CPU Usage, Memory Usage, Throughput, and Connections,
diagrammatically display the statistics of the cluster over the specified time period.
• Load Distribution dashboard―Displays load distribution across the cluster nodes in two widgets:
• The Distribution widget displays the average packet and connection distribution over the time range
across the cluster nodes. This data depicts how the load is being distributed by the nodes. Using this
widget, you can easily identify any abnormalities in the load distribution and rectify it.
• The Node Statistics widget displays the node level metrics in table format. It displays metric data
on CPU usage, memory usage, input rate, output rate, active connections, and NAT translations
across the cluster nodes. This table view enables you to correlate data and easily identify any
discrepancies.
• Member Performance dashboard―Displays current metrics of the cluster nodes. You can use the selector
to filter the nodes and view the details of a specific node. The metric data include CPU usage, memory
usage, input rate, output rate, active connections, and NAT translations.
• CCL dashboard―Displays, graphically, the cluster control link data namely, the input, and output rate.
• Troubleshooting and Links ― Provides convenient links to frequently used troubleshooting topics and
procedures.
• Time range―An adjustable time window to constrain the information that appears in the various cluster
metrics dashboards and widgets.
• Custom Dashboard―Displays data on both cluster-wide metrics and node-level metrics. However, node
selection only applies for the threat defense metrics and not for the entire cluster to which the node
belongs.
Procedure
Step 2 In the device list, click Expand( ) and Collapse ( ) to expand and collapse the list of managed cluster
devices.
Step 3 To view the cluster health statistics, click on the cluster name. The cluster monitor reports health and
performance metrics in several predefined dashboards by default. The metrics dashboards include:
• Overview ― Highlights key metrics from the other predefined dashboards, including its nodes, CPU,
memory, input and output rates, connection statistics, and NAT translation information.
• Load Distribution ― Traffic and packet distribution across the cluster nodes.
• Member Performance ― Node-level statistics on CPU usage, memory usage, input throughput, output
throughput, active connection, and NAT translation.
• CCL ― Interface status and aggregate traffic statistics.
You can navigate through the various metrics dashboards by clicking on the labels. For a comprehensive list
of the supported cluster metrics, see Cisco Secure Firewall Threat Defense Health Metrics.
Step 4 You can configure the time range from the drop-down in the upper-right corner. The time range can reflect a
period as short as the last hour (the default) or as long as two weeks. Select Custom from the drop-down to
configure a custom start and end date.
Click the refresh icon to set auto refresh to 5 minutes or to toggle off auto refresh.
Step 5 Click on deployment icon for a deployment overlay on the trend graph, with respect to the selected time range.
The deployment icon indicates the number of deployments during the selected time-range. A vertical band
indicates the deployment start and end time. For multiple deployments, multiple bands/lines appear. Click on
the icon on top of the dotted line to view the deployment details.
Step 6 (For node-specific health monitor) View the Health Alerts for the node in the alert notification at the top of
page, directly to the right of the device name.
Hover your pointer over the Health Alerts to view the health summary of the node. The popup window shows
a truncated summary of the top five health alerts. Click on the popup to open a detailed view of the health
alert summary.
Step 7 (For node-specific health monitor) The device monitor reports health and performance metrics in several
predefined dashboards by default. The metrics dashboards include:
• Overview ― Highlights key metrics from the other predefined dashboards, including CPU, memory,
interfaces, connection statistics; plus disk usage and critical process information.
• CPU ― CPU utilization, including the CPU usage by process and by physical cores.
• Memory ― Device memory utilization, including data plane and Snort memory usage.
• Interfaces ― Interface status and aggregate traffic statistics.
• Connections ― Connection statistics (such as elephant flows, active connections, peak connections, and
so on) and NAT translation counts.
• Snort ― Statistics that are related to the Snort process.
• ASP drops ― Statistics related to the dropped packets against various reasons.
You can navigate through the various metrics dashboards by clicking on the labels. See Cisco Secure Firewall
Threat Defense Health Metrics for a comprehensive list of the supported device metrics.
Step 8 Click the plus sign Add New Dashboard( ) in the upper right corner of the health monitor to create a custom
dashboard by building your own variable set from the available metric groups.
For cluster-wide dashboard, choose Cluster metric group, and then choose the metric.
Cluster Metrics
The cluster health monitor tracks statistics that are related to a cluster and its nodes, and aggregate of load
distribution, performance, and CCL traffic statistics.
Data Throughput Incoming and outgoing data traffic statistics for a bytes
cluster.
CCL Throughput Incoming and outgoing CCL traffic statistics for a bytes
cluster.
• show arp
• show int ip brief
• show blocks
• show cpu detailed
• show interface ccl_interface
• ping ccl_ip size ccl_mtu repeat 2
You can also enter any show command in the Command field. See View CLI Output, on page 130 for
more information.
Procedure
Step 1 Choose Devices > Device Management, click the More ( ) icon next to the cluster, and choose > Cluster
Live Status.
Figure 311: Cluster Status
The node sends a ping on the cluster control link to every other node using a packet size that matches the
maximum MTU.
Firewall on a Stick
Data traffic from different security domains are associated with different VLANs, for example, VLAN 10 for
the inside network and VLAN 20 for the outside network. Each has a single physical port connected to the
external switch or router. Trunking is enabled so that all packets on the physical link are 802.1q encapsulated.
The is the firewall between VLAN 10 and VLAN 20.
When using Spanned EtherChannels, all data links are grouped into one EtherChannel on the switch side. If
the becomes unavailable, the switch will rebalance traffic between the remaining units.
Traffic Segregation
You may prefer physical separation of traffic between the inside and outside network.
As shown in the diagram above, there is one Spanned EtherChannel on the left side that connects to the inside
switch, and the other on the right side to outside switch. You can also create VLAN subinterfaces on each
EtherChannel if desired.
Note To view FlexConfig features that are also not supported with clustering, for example WCCP inspection, see
the ASA general operations configuration guide. FlexConfig lets you configure many ASA features that are
not present in the management center GUI. See FlexConfig Policies, on page 2617.
Note Traffic for centralized features is forwarded from member nodes to the control node over the cluster control
link.
If you use the rebalancing feature, traffic for centralized features may be rebalanced to non-control nodes
before the traffic is classified as a centralized feature; if this occurs, the traffic is then sent back to the control
node.
For centralized features, if the control node fails, all connections are dropped, and you have to re-establish
the connections on the new control node.
Note To view FlexConfig features that are also centralized with clustering, for example RADIUS inspection, see
the ASA general operations configuration guide. FlexConfig lets you configure many ASA features that are
not present in the management center GUI. See FlexConfig Policies, on page 2617.
• SUNRPC
• TFTP
• XDMCP
• Site-to-site VPN
• IGMP multicast control plane protocol processing (data plane forwarding is distributed across the cluster)
• PIM multicast control plane protocol processing (data plane forwarding is distributed across the cluster)
• Dynamic routing
Connection Settings
Connection limits are enforced cluster-wide. Each node has an estimate of the cluster-wide counter values
based on broadcast messages. Due to efficiency considerations, the configured connection limit across the
cluster might not be enforced exactly at the limit number. Each node may overestimate or underestimate the
cluster-wide counter value at any given time. However, the information will get updated over time in a
load-balanced cluster.
After the data units learn the routes from the control unit, each unit makes forwarding decisions independently.
The OSPF LSA database is not synchronized from the control unit to data units. If there is a control unit
switchover, the neighboring router will detect a restart; the switchover is not transparent. The OSPF process
picks an IP address as its router ID. Although not required, you can assign a static router ID to ensure a
consistent router ID is used across the cluster. See the OSPF Non-Stop Forwarding feature to address the
interruption.
• NAT pool address distribution for dynamic PAT—When you configure a PAT pool, the cluster divides
each IP address in the pool into port blocks. By default, each block is 512 ports, but if you configure port
block allocation rules, your block setting is used instead. These blocks are distributed evenly among the
nodes in the cluster, so that each node has one or more blocks for each IP address in the PAT pool. Thus,
you could have as few as one IP address in a PAT pool for a cluster, if that is sufficient for the number
of PAT’ed connections you expect. Port blocks cover the 1024-65535 port range, unless you configure
the option to include the reserved ports, 1-1023, on the PAT pool NAT rule.
• Reusing a PAT pool in multiple rules—To use the same PAT pool in multiple rules, you must be careful
about the interface selection in the rules. You must either use specific interfaces in all rules, or "any" in
all rules. You cannot mix specific interfaces and "any" across the rules, or the system might not be able
to match return traffic to the right node in the cluster. Using unique PAT pools per rule is the most reliable
option.
• No round-robin—Round-robin for a PAT pool is not supported with clustering.
• No extended PAT—Extended PAT is not supported with clustering.
• Dynamic NAT xlates managed by the control node—The control node maintains and replicates the xlate
table to data nodes. When a data node receives a connection that requires dynamic NAT, and the xlate
is not in the table, it requests the xlate from the control node. The data node owns the connection.
• Stale xlates—The xlate idle time on the connection owner does not get updated. Thus, the idle time might
exceed the idle timeout. An idle timer value higher than the configured timeout with a refcnt of 0 is an
indication of a stale xlate.
• No static PAT for the following inspections—
• FTP
• RSH
• SQLNET
• TFTP
• XDMCP
• SIP
• If you have an extremely large number of NAT rules, over ten thousand, you should enable the
transactional commit model using the asp rule-engine transactional-commit nat command in the device
CLI. Otherwise, the node might not be able to join the cluster.
VPN functionality is limited to the control unit and does not take advantage of the cluster high availability
capabilities. If the control unit fails, all existing VPN connections are lost, and VPN users will see a disruption
in service. When a new control unit is elected, you must reestablish the VPN connections.
When you connect a VPN tunnel to a Spanned interface address, connections are automatically forwarded to
the control unit.
VPN-related keys and certificates are replicated to all units.
2. Any other units with a higher priority respond to the election request; the priority is set when you deploy
the cluster and is not configurable.
3. If after 45 seconds, a unit does not receive a response from another unit with a higher priority, then it
becomes the control unit.
Note If multiple units tie for the highest priority, the cluster unit name and then the serial number is used to determine
the control unit.
4. If a unit later joins the cluster with a higher priority, it does not automatically become the control unit;
the existing control unit always remains as the control unit unless it stops responding, at which point a
new control unit is elected.
5. In a "split brain" scenario when there are temporarily multiple control units, then the unit with highest
priority retains the role while the other units return to data unit roles.
Note You can manually force a unit to become the control unit. For centralized features, if you force a control unit
change, then all connections are dropped, and you have to re-establish the connections on the new control
unit.
Chassis-Application Monitoring
Chassis-application health monitoring is always enabled. The Firepower 4100/9300 chassis supervisor checks
the threat defense application periodically (every second). If the threat defense device is up and cannot
communicate with the Firepower 4100/9300 chassis supervisor for 3 seconds, the threat defense device
generates a syslog message and leaves the cluster.
If the Firepower 4100/9300 chassis supervisor cannot communicate with the application after 45 seconds, it
reloads the threat defense device. If the threat defense device cannot communicate with the supervisor, it
removes itself from the cluster.
in this scenario. After the cluster control link is restored, then the control node that has the higher priority will
keep the control node’s role. See Control Unit Election, on page 748 for more information.
Interface Monitoring
Each node monitors the link status of all hardware interfaces in use, and reports status changes to the control
node. For clustering on multiple chassis, Spanned EtherChannels use the cluster Link Aggregation Control
Protocol (cLACP). Each chassis monitors the link status and the cLACP protocol messages to determine if
the port is still active in the EtherChannel, and informs the threat defense application if the interface is down.
When you enable health monitoring, all physical interfaces are monitored by default (including the main
EtherChannel for EtherChannel interfaces). Only named interfaces that are in an Up state can be monitored.
For example, all member ports of an EtherChannel must fail before a named EtherChannel is removed from
the cluster. You can optionally disable monitoring per interface.
If a monitored interface fails on a particular node, but it is active on other nodes, then the node is removed
from the cluster. The amount of time before the threat defense device removes a node from the cluster depends
on whether the node is an established member or is joining the cluster. The threat defense device does not
monitor interfaces for the first 90 seconds that a node joins the cluster. Interface status changes during this
time will not cause the threat defense device to be removed from the cluster. For an established member, the
node is removed after 500 ms.
For clustering on multiple chassis, if you add or delete an EtherChannel from the cluster, interface
health-monitoring is suspended for 95 seconds to ensure that you have time to make the changes on each
chassis.
Note When the threat defense becomes inactive and fails to automatically rejoin the cluster, all data interfaces are
shut down; only the Management interface can send and receive traffic.
• Failed cluster control link when initially joining—After you resolve the problem with the cluster control
link, you must manually rejoin the cluster by re-enabling clustering.
• Failed cluster control link after joining the cluster—The threat defense automatically tries to rejoin every
5 minutes, indefinitely.
• Failed data interface—The threat defense automatically tries to rejoin at 5 minutes, then at 10 minutes,
and finally at 20 minutes. If the join is not successful after 20 minutes, then the threat defense application
disables clustering. After you resolve the problem with the data interface, you have to manually enable
clustering.
• Failed node—If the node was removed from the cluster because of a node health check failure, then
rejoining the cluster depends on the source of the failure. For example, a temporary power failure means
the node will rejoin the cluster when it starts up again as long as the cluster control link is up. The threat
defense application attempts to rejoin the cluster every 5 seconds.
• Internal error—Internal failures include: application sync timeout; inconsistent application statuses; and
so on.
• Failed configuration deployment—If you deploy a new configuration from management center, and the
deployment fails on some cluster members but succeeds on others, then the nodes that failed are removed
from the cluster. You must manually rejoin the cluster by re-enabling clustering. If the deployment fails
on the control node, then the deployment is rolled back, and no members are removed. If the deployment
fails on all data nodes, then the deployment is rolled back, and no members are removed.
• Failed Chassis-Application Communication—When the threat defense application detects that the
chassis-application health has recovered, it tries to rejoin the cluster automatically.
SNMP Engine ID No —
Connection Roles
See the following roles defined for each connection:
• Owner—Usually, the node that initially receives the connection. The owner maintains the TCP state and
processes packets. A connection has only one owner. If the original owner fails, then when new nodes
receive packets from the connection, the director chooses a new owner from those nodes.
• Backup owner—The node that stores TCP/UDP state information received from the owner, so that the
connection can be seamlessly transferred to a new owner in case of a failure. The backup owner does
not take over the connection in the event of a failure. If the owner becomes unavailable, then the first
node to receive packets from the connection (based on load balancing) contacts the backup owner for
the relevant state information so it can become the new owner.
As long as the director (see below) is not the same node as the owner, then the director is also the backup
owner. If the owner chooses itself as the director, then a separate backup owner is chosen.
For clustering on the Firepower 9300, which can include up to 3 cluster nodes in one chassis, if the
backup owner is on the same chassis as the owner, then an additional backup owner will be chosen from
another chassis to protect flows from a chassis failure.
• Director—The node that handles owner lookup requests from forwarders. When the owner receives a
new connection, it chooses a director based on a hash of the source/destination IP address and ports (see
below for ICMP hash details), and sends a message to the director to register the new connection. If
packets arrive at any node other than the owner, the node queries the director about which node is the
owner so it can forward the packets. A connection has only one director. If a director fails, the owner
chooses a new director.
As long as the director is not the same node as the owner, then the director is also the backup owner (see
above). If the owner chooses itself as the director, then a separate backup owner is chosen.
ICMP/ICMPv6 hash details:
• For Echo packets, the source port is the ICMP identifier, and the destination port is 0.
• For Reply packets, the source port is 0, and the destination port is the ICMP identifier.
• For other packets, both source and destination ports are 0.
• Forwarder—A node that forwards packets to the owner. If a forwarder receives a packet for a connection
it does not own, it queries the director for the owner, and then establishes a flow to the owner for any
other packets it receives for this connection. The director can also be a forwarder. Note that if a forwarder
receives the SYN-ACK packet, it can derive the owner directly from a SYN cookie in the packet, so it
does not need to query the director. (If you disable TCP sequence randomization, the SYN cookie is not
used; a query to the director is required.) For short-lived flows such as DNS and ICMP, instead of
querying, the forwarder immediately sends the packet to the director, which then sends them to the owner.
A connection can have multiple forwarders; the most efficient throughput is achieved by a good
load-balancing method where there are no forwarders and all packets of a connection are received by
the owner.
• Fragment Owner—For fragmented packets, cluster nodes that receive a fragment determine a fragment
owner using a hash of the fragment source IP address, destination IP address, and the packet ID. All
fragments are then forwarded to the fragment owner over the cluster control link. Fragments may be
load-balanced to different cluster nodes, because only the first fragment includes the 5-tuple used in the
switch load balance hash. Other fragments do not contain the source and destination ports and may be
load-balanced to other cluster nodes. The fragment owner temporarily reassembles the packet so it can
determine the director based on a hash of the source/destination IP address and ports. If it is a new
connection, the fragment owner will register to be the connection owner. If it is an existing connection,
the fragment owner forwards all fragments to the provided connection owner over the cluster control
link. The connection owner will then reassemble all fragments.
1. The SYN packet originates from the client and is delivered to one threat defense (based on the load
balancing method), which becomes the owner. The owner creates a flow, encodes owner information into
a SYN cookie, and forwards the packet to the server.
2. The SYN-ACK packet originates from the server and is delivered to a different threat defense (based on
the load balancing method). This threat defense is the forwarder.
3. Because the forwarder does not own the connection, it decodes owner information from the SYN cookie,
creates a forwarding flow to the owner, and forwards the SYN-ACK to the owner.
4. The owner sends a state update to the director, and forwards the SYN-ACK to the client.
5. The director receives the state update from the owner, creates a flow to the owner, and records the TCP
state information as well as the owner. The director acts as the backup owner for the connection.
6. Any subsequent packets delivered to the forwarder will be forwarded to the owner.
7. If packets are delivered to any additional nodes, it will query the director for the owner and establish a
flow.
8. Any state change for the flow results in a state update from the owner to the director.
The first UDP packet originates from the client and is delivered to one threat defense (based on the load
balancing method).
2. The node that received the first packet queries the director node that is chosen based on a hash of the
source/destination IP address and ports.
3. The director finds no existing flow, creates a director flow and forwards the packet back to the previous
node. In other words, the director has elected an owner for this flow.
4. The owner creates the flow, sends a state update to the director, and forwards the packet to the server.
5. The second UDP packet originates from the server and is delivered to the forwarder.
6. The forwarder queries the director for ownership information. For short-lived flows such as DNS, instead
of querying, the forwarder immediately sends the packet to the director, which then sends it to the owner.
7. The director replies to the forwarder with ownership information.
8. The forwarder creates a forwarding flow to record owner information and forwards the packet to the
owner.
9. The owner forwards the packet to the client.
Cluster control link ping 7.2.6/7.4.1 Any You can check to make sure all the cluster nodes can reach each other over the
tool. cluster control link by performing a ping. One major cause for the failure of a
node to join the cluster is an incorrect cluster control link configuration; for
example, the cluster control link MTU may be set higher than the connecting
switch MTUs.
New/modified screens: Devices > Device Management > More( ) > Cluster
Live Status
Other version restrictions: Not supported with management center Version
7.3.x or 7.4.0.
Troubleshooting file 7.4.1 7.4.1 You can generate and download troubleshooting files for each device on the
generation and download Device page and also for all cluster nodes on the Cluster page. For a cluster,
available from Device you can download all files as a single compressed file. You can also include
and Cluster pages. cluster logs for the cluster for cluster nodes. You can alternatively trigger file
generation from the Devices > Device Management > More( ) > Troubleshoot
Files menu.
New/modified screens:
• Devices > Device Management > Device > General
• Devices > Device Management > Cluster > General
View CLI output for a 7.4.1 Any You can view a set of pre-defined CLI outputs that can help you troubleshoot
device or device cluster. the device or cluster. You can also enter any show command and see the output.
New/modified screens: Devices > Device Management > Cluster > General
Cluster health monitor 7.3.0 Any You can now edit cluster health monitor settings.
settings.
New/Modified screens: Devices > Device Management > Cluster > Cluster
Health Monitor Settings
Note
If you previously configured these settings using FlexConfig, be sure to remove
the FlexConfig configuration before you deploy. Otherwise the FlexConfig
configuration will overwrite the management center configuration.
Cluster health monitor 7.3.0 Any You can now view cluster health on the cluster health monitor dashboard.
dashboard.
New/Modified screens: System( ) > Health > Monitor
Support for 16-node 7.2.0 7.2.0 You can now configure 16 node clusters for the Firepower 4100/9300.
clusters. Previously, the maximum was 6 units.
New/Modified screens: none.
Supported platforms: Firepower 4100/9300
Cluster deployment for 7.1.0 7.1.0 Cluster deployment for firewall changes now completes faster.
firewall changes
New/Modified screens: none.
completes faster.
Improved PAT port block 7.0.0 7.0.0 The improved PAT port block allocation ensures that the control unit keeps
allocation for clustering. ports in reserve for joining nodes, and proactively reclaims unused ports. To
best optimize the allocation, you can set the maximum nodes you plan to have
in the cluster using the cluster-member-limit command using FlexConfig.
The control unit can then allocate port blocks to the planned number of nodes,
and it will not have to reserve ports for extra nodes you don't plan to use. The
default is 16 nodes. You can also monitor syslog 747046 to ensure that there
are enough ports available for a new node.
New/Modified commands: cluster-member-limit (FlexConfig), show nat
pool cluster [summary], show nat pool ip detail
Cluster deployment for 6.7.0 6.7.0 Cluster deployment for Snort changes now completes faster. Also, when a
Snort changes completes cluster has an event that causes a management center deployment to fail, the
faster, and fails faster failure now occurs more quickly.
when there is an event.
New/Modified screens: none.
Improved cluster 6.7.0 6.7.0 Management Center has improved cluster management functionality that
management. formerly you could only accomplish using the CLI, including:
• Enable and disable cluster units
• Show cluster status from the Device Management page, including History
and Summary per unit
• Change the role to the control unit
New/Modified screens:
• Devices > Device Management > More menu
• Devices > Device Management > Cluster > General area > Cluster
Live Status link Cluster Status
Multi-instance clustering. 6.6.0 6.6.0 You can now create a cluster using container instances. On the Firepower 9300,
you must include one container instance on each module in the cluster. You
cannot add more than one container instance to the cluster per security
engine/module. We recommend that you use the same security module or
chassis model for each cluster instance. However, you can mix and match
container instances on different Firepower 9300 security module types or
Firepower 4100 models in the same cluster if required. You cannot mix
Firepower 9300 and 4100 instances in the same cluster.
New/Modified FXOS commands: set port-type cluster
New/modified Firepower Chassis Manager screens:
• Logical Devices > Add Cluster
• Interfaces > All Interfaces > Add New drop-down menu > Subinterface
> Type field
Configuration sync to 6.6.0 6.6.0 The control unit now syncs configuration changes with data units in parallel
data units in parallel. by default. Formerly, synching occurred sequentially.
New/Modified screens: none.
Messages for cluster join 6.6.0 6.6.0 New messages were added to the show cluster history command for when a
failure or eviction added cluster unit either fails to join the cluster or leaves the cluster.
to show cluster history.
New/Modified commands: show cluster history
New/Modified screens: none.
Initiator and responder 6.5.0 6.5.0 If you enable Dead Connection Detection (DCD), you can use the show conn
information for Dead detail command to get information about the initiator and responder. Dead
Connection Detection Connection Detection allows you to maintain an inactive connection, and the
(DCD), and DCD support show conn output tells you how often the endpoints have been probed. In
in a cluster. addition, DCD is now supported in a cluster.
New/Modified commands: show conn (output only).
Supported platforms: threat defense on the Firepower 4100/9300
Adding clusters is easier. 6.3.0 6.3.0 You can now add any unit of a cluster to the management center, and the other
cluster units are detected automatically. Formerly, you had to add each cluster
unit as a separate device, and then group them into a cluster. Adding a cluster
unit is also now automatic. Note that you must delete a unit manually.
New/Modified screens:
Devices > Device Management > Add drop-down menu > Device > Add
Device dialog box
Devices > Device Management > Cluster tab > General area > Cluster
Registration Status > Current Cluster Summary link > Cluster Status
dialog box
Supported platforms: threat defense on the Firepower 4100/9300
Support for site-to-site [Link] [Link] You can now configure site-to-site VPN with clustering. Site-to-site VPN is a
VPN with clustering as a centralized feature; only the control unit supports VPN connections.
centralized feature.
Supported platforms: threat defense on the Firepower 4100/9300
Automatically rejoin the 6.2.3 6.2.3 Formerly, many internal error conditions caused a cluster unit to be removed
cluster after an internal from the cluster, and you were required to manually rejoin the cluster after
failure. resolving the issue. Now, a unit will attempt to rejoin the cluster automatically
at the following intervals: 5 minutes, 10 minutes, and then 20 minutes. Internal
failures include: application sync timeout; inconsistent application statuses;
and so on.
New/Modified command: show cluster info auto-join
No modified screens.
Supported platforms: threat defense on the Firepower 4100/9300
Clustering on multiple 6.2.0 6.2.0 With FXOS 2.1.1, you can now enable clustering on multiple chassis of the
chassis for 6 modules; Firepower 9300 and 4100. For the Firepower 9300, you can include up to 6
Firepower 4100 support. modules. For example, you can use 1 module in 6 chassis, or 2 modules in 3
chassis, or any combination that provides a maximum of 6 modules. For the
Firepower 4100, you can include up to 6 chassis.
Note
Inter-site clustering is also supported. However, customizations to enhance
redundancy and stability, such as site-specific MAC and IP addresses, director
localization, site redundancy, and cluster flow mobility, are only configurable
using the FlexConfig feature.
No modified screens.
Supported platforms: threat defense on the Firepower 4100/9300
Clustering on multiple 6.0.1 6.0.1 You can cluster up to 3 security modules within the Firepower 9300 chassis.
modules with one All modules in the chassis must belong to the cluster.
Firepower 9300 chassis.
New/Modified screens:
Devices > Device Management > Add > Add Cluster
Devices > Device Management > Cluster
Supported platforms: threat defense on the Firepower 9300
Management Interface
In Version 7.3 and earlier, the physical management interface is shared between the Diagnostic logical interface
and the Management logical interface. In Version 7.4 and later, the Diagnostic interface is merged with
Management for a simplified user experience.
Management Interface
The Management interface is separate from the other interfaces on the device. It is used to set up and register
the device to the management center. It uses its own IP address and static routing. You can configure its
settings at the CLI using the configure network command. You can also view its status on the Devices >
Device Management > Devices > Interfaces page. If you change the IP address at the CLI after you add it
to the management center, you can match the IP address in the Secure Firewall Management Center in the
Devices > Device Management > Devices > Management area.
You can alternatively manage the threat defense using a data interface instead of the Management interface.
Diagnostic Interface
For new devices using 7.4 and later, you cannot use the legacy Diagnostic interface. Only the merged
Management interface is available.
If you upgraded to 7.4 or later, and you did not have any configuration for the Diagnostic interface, then the
interfaces will merge automatically.
If you upgraded to 7.4 or later, and you have configuration for the Diagnostic interface, then you have the
choice to merge the interfaces manually, or you can continue to use the separate Diagnostic interface. Note
that support for the Diagnostic interface will be removed in a later release, so you should plan to merge the
interfaces as soon as possible. To manually merge the Management and Diagnostic interfaces, see Merge the
Management and Diagnostic Interfaces, on page 795. Configurations that prevent an automatic merge include
the following:
• A data interface named "management"—This name is reserved for use with the merged Management
interface.
• IP Address on Diagnostic
• DNS enabled on Diagnostic
• Syslog, SNMP, RADIUS or AD (for remote access VPN) source interface is Diagnostic
• RADIUS or AD (for remote access VPN) with no source interface specified, and there is at least one
interface configured as management-only (including Diagnostic)—The default route lookup for these
services has changed from the management-only routing table to the data routing table, with no fallback
to management. Therefore, you cannot use a management-only interface other than Management.
• Static routes on Diagnostic
• Dynamic routing on Diagnostic
• HTTP server on Diagnostic
• ICMP on Diagnostic
• DDNS for Diagnostic
• FlexConfig using Diagnostic
For more information about how the legacy Diagnostic interface operates, see the 7.3 version of this guide.
• Routed mode interfaces (routed firewall mode only)—Each interface that you want to route between is
on a different subnet.
• Bridge group interfaces (routed and transparent firewall mode)—You can group together multiple
interfaces on a network, and the threat defense device uses bridging techniques to pass traffic between
the interfaces. Each bridge group includes a Bridge Virtual Interface (BVI) to which you assign an IP
address on the network. In routed mode, the threat defense device routes between BVIs and regular routed
interfaces. In transparent mode, each bridge group is separate and cannot communicate with each other.
IPS-Only Mode
You can configure your device in either a passive or inline IPS deployment. In a passive deployment, you
deploy the system out-of-band from the flow of network traffic. In an inline deployment, you configure the
system transparently on a network segment by binding two interfaces together.
Note Policies that apply to any zone (a global policy) apply to interfaces in zones as well as any interfaces that are
not assigned to a zone.
Note The Management interface does not belong to a zone or interface group.
Some policies only support security zones, while other policies support zones and groups. Unless you need
the functionality an interface group provides, you should default to using security zones because security
zones are supported for all features.
You cannot change an existing security zone to an interface group or vice-versa; instead you must create a
new interface object.
Note Although tunnel zones are not interface objects, you can use them in place of security zones in certain
configurations; see Tunnel Zones and Prefiltering, on page 1906.
All interfaces in an interface object must be of the same type. After you create an interface object, you cannot
change the type of interfaces it contains.
Interface Names
Note that the interface (or zone name) itself does not provide any default behavior in regards to the security
policy. We recommend using names that are self-describing to avoid mistakes in future configuration. A good
name signifies a logical segment or traffic specification, for example:
• Names of internal interfaces—InsideV110, InsideV160, InsideV195
• Names of DMZ interfaces—DMZV11, DMZV12, DMZV-TEST
• Names of external interfaces—Outside-ASN78, Outside-ASN91
Auto-MDI/MDIX Feature
For RJ-45 interfaces, the default auto-negotiation setting also includes the Auto-MDI/MDIX feature.
Auto-MDI/MDIX eliminates the need for crossover cabling by performing an internal crossover when a
straight cable is detected during the auto-negotiation phase. Either the speed or duplex must be set to
auto-negotiate to enable Auto-MDI/MDIX for the interface. If you explicitly set both the speed and duplex
to a fixed value, thus disabling auto-negotiation for both settings, then Auto-MDI/MDIX is also disabled. For
Gigabit Ethernet, when the speed and duplex are set to 1000 and full, then the interface always auto-negotiates;
therefore Auto-MDI/MDIX is always enabled and you cannot disable it.
Note For the Firepower 4100/9300, you can administratively enable and disable interfaces in both the chassis and
in the management center. For an interface to be operational, the interface must be enabled in both operating
systems. Because the interface state is controlled independently, you may have a mismatch between the chassis
and management center.
Tip You can create empty interface objects and add interfaces to them later. To add an interface, the interface
must have a name. You can also create security zones (but not interface groups) while configuring interfaces.
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
This procedure only covers a small subset of Interface settings. Refrain from setting other parameters at this
point. For example, you cannot name an interface that you want to use as part of an EtherChannel interface.
Note For the Firepower 4100/9300, you configure basic interface settings in FXOS. See Configure a Physical
Interface, on page 324 for more information.
Note For Firepower 1010 and Secure Firewall 1210/1220 switch ports, see Configure Firepower 1010 and Secure
Firewall 1210/1220 Switch Ports, on page 808.
Secure Firewall 3100/4200, which supports hot swapping, see Manage the Network Module for the Secure
Firewall 3100/4200, on page 780 before you change interfaces on a device.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 Enable the interface by checking the Enabled check box.
Step 4 (Optional) Add a description in the Description field.
The description can be up to 200 characters on a single line, without carriage returns.
Step 5 (Optional) Set the duplex and speed by clicking Hardware Configuration > Speed.
• Duplex—Choose Full or Half. SFP interfaces only support Full duplex.
• Speed—Choose a speed (varies depending on the model). (Secure Firewall 3100/4200 only) Choose
Detect SFP to detect the speed of the installed SFP module and use the appropriate speed. Duplex is
always Full, and auto-negotiation is always enabled. This option is useful if you later change the network
module to a different model, and want the speed to update [Link] Secure Firewall 1250, you
can configure a maximum interface speed of 2.5gbps.
• Auto-negotiation—Set the interface to negotiate the speed, link status, and flow control.
• Forward Error Correction Mode—(Secure Firewall 3100/4200 only) For 25 Gbps and higher interfaces,
enable Forward Error Correction (FEC). For an EtherChannel member interface, you must configure
FEC before you add it to the EtherChannel. The setting chosen when you use Auto depends on the
transceiver type and whether the interface is fixed (built-in) or on a network module.
Transceiver Type Fixed Port Default FEC (Ethernet Network Module Default FEC
1/9 through 1/16)
Step 6 (Optional) (Firepower 1100/Secure Firewall 1200/3100/4200) Enable Link Layer Discovery Protocol (LLDP)
by clicking Hardware Configuration > Network Connectivity.
• Enable LLDP Receive—Enables the firewall to receive LLDP packets from its peers.
• Enable LLDP Transmit—Enables the firewall to send LLDP packets to its peers.
Step 7 (Optional) (Secure Firewall 3100/4200) Enable pause (XOFF) frames for flow control by clicking Hardware
Configuration > Network Connectivity, and checking Flow Control Send.
Flow control enables connected Ethernet ports to control traffic rates during congestion by allowing congested
nodes to pause link operation at the other end. If the threat defense port experiences congestion (exhaustion
of queuing resources on the internal switch) and cannot receive any more traffic, it notifies the other port by
sending a pause frame to stop sending until the condition clears. Upon receipt of a pause frame, the sending
device stops sending any data packets, which prevents any loss of data packets during the congestion period.
Note
The threat defense supports transmitting pause frames so that the remote peer can rate-control the traffic.
However, receiving of pause frames is not supported.
The internal switch has a global pool of 8000 buffers of 250 bytes each, and the switch allocates buffers
dynamically to each port. A pause frame is sent out every interface with flowcontrol enabled when the buffer
usage exceeds the global high-water mark (2 MB (8000 buffers)); and a pause frame is sent out of a particular
interface when its buffer exceeds the port high-water mark (.3125 MB (1250 buffers)). After a pause is sent,
an XON frame can be sent when the buffer usage is reduced below the low-water mark (1.25 MB globally
(5000 buffers); .25 MB per port (1000 buffers)). The link partner can resume traffic after receiving an XON
frame.
Only flow control frames defined in 802.3x are supported. Priority-based flow control is not supported.
Note For the Firepower 4100/9300, you configure EtherChannels in FXOS. See Add an EtherChannel (Port Channel),
on page 325 for more information.
About EtherChannels
This section describes EtherChannels.
About EtherChannels
An 802.3ad EtherChannel is a logical interface (called a port-channel interface) consisting of a bundle of
individual Ethernet links (a channel group) so that you increase the bandwidth for a single network. A port
channel interface is used in the same way as a physical interface when you configure interface-related features.
You can configure up to 48 EtherChannels, depending on how many interfaces your model supports.
Note If the threat defense device is in transparent firewall mode, and you place the threat defense device between
two sets of VSS/vPC switches, then be sure to disable Unidirectional Link Detection (UDLD) on any switch
ports connected to the threat defense device with an EtherChannel. If you enable UDLD, then a switch port
may receive UDLD packets sourced from both switches in the other VSS/vPC pair. The receiving switch will
place the receiving interface in a down state with the reason "UDLD Neighbor mismatch".
If you use the threat defense device in an Active/Standby failover deployment, then you need to create separate
EtherChannels on the switches in the VSS/vPC, one for each threat defense device. On each threat defense
device, a single EtherChannel connects to both switches. Even if you could group all switch interfaces into a
single EtherChannel connecting to both threat defense devices (in this case, the EtherChannel will not be
established because of the separate threat defense system IDs), a single EtherChannel would not be desirable
because you do not want traffic sent to the standby threat defense device.
Figure 316: Active/Standby Failover and VSS/vPC
• Active—Sends and receives LACP updates. An active EtherChannel can establish connectivity with
either an active or a passive EtherChannel. You should use the active mode unless you need to minimize
the amount of LACP traffic.
• Passive—Receives LACP updates. A passive EtherChannel can only establish connectivity with an active
EtherChannel. Not supported on hardware models.
• On—The EtherChannel is always on, and LACP is not used. An “on” EtherChannel can only establish
a connection with another “on” EtherChannel.
LACP coordinates the automatic addition and deletion of links to the EtherChannel without user intervention.
It also handles misconfigurations and checks that both ends of member interfaces are connected to the correct
channel group. “On” mode cannot use standby interfaces in the channel group when an interface goes down,
and the connectivity and configurations are not checked.
Load Balancing
The threat defense device distributes packets to the interfaces in the EtherChannel by hashing the source and
destination IP address of the packet (this criteria is configurable). The resulting hash is divided by the number
of active links in a modulo operation where the resulting remainder determines which interface owns the flow.
All packets with a hash_value mod active_links result of 0 go to the first interface in the EtherChannel, packets
with a result of 1 go to the second interface, packets with a result of 2 go to the third interface, and so on. For
example, if you have 15 active links, then the modulo operation provides values from 0 to 14. For 6 active
links, the values are 0 to 5, and so on.
If an active interface goes down and is not replaced by a standby interface, then traffic is rebalanced between
the remaining links. The failure is masked from both Spanning Tree at Layer 2 and the routing table at Layer
3, so the switchover is transparent to other network devices.
Note Member interfaces only use the Internal-Data 0/1 MAC address after a reboot. Prior to rebooting, the member
interface uses its own MAC address. If you add a new member interface after a reboot, you will have to
perform another reboot to update its MAC address.
High Availability
• When you use an EtherChannel interface as a High Availability link, it must be pre-configured on both
units in the High Availability pair; you cannot configure it on the primary unit and expect it to replicate
to the secondary unit because the High Availability link itself is required for replication.
• If you use an EtherChannel interface for the state link, no special configuration is required; the
configuration can replicate from the primary unit as normal. For the Firepower 4100/9300 chassis, all
interfaces, including EtherChannels, need to be pre-configured on both units.
• You can monitor EtherChannel interfaces for High Availability. When an active member interface fails
over to a standby interface, this activity does not cause the EtherChannel interface to appear to be failed
when being monitored for device-level High Availability. Only when all physical interfaces fail does the
EtherChannel interface appear to be failed (for an EtherChannel interface, the number of member interfaces
allowed to fail is configurable).
• If you use an EtherChannel interface for a High Availability or state link, then to prevent out-of-order
packets, only one interface in the EtherChannel is used. If that interface fails, then the next interface in
the EtherChannel is used. You cannot alter the EtherChannel configuration while it is in use as a High
Availability link. To alter the configuration, you need to temporarily disable High Availability, which
prevents High Availability from occurring for the duration.
Model Support
• You cannot add EtherChannels in the management center for the Firepower 4100/9300 or the threat
defense virtual. The Firepower 4100/9300 supports EtherChannels, but you must perform all hardware
configuration of EtherChannels in FXOS on the chassis.
• You cannot use Firepower 1010 or Secure Firewall 1210/1220 switch ports or VLAN interfaces in
EtherChannels.
• The device to which you connect the threat defense EtherChannel must also support 802.3ad
EtherChannels.
• The threat defense device does not support LACPDUs that are VLAN-tagged. If you enable native VLAN
tagging on the neighboring switch using the Cisco IOS vlan dot1Q tag native command, then the threat
defense device will drop the tagged LACPDUs. Be sure to disable native VLAN tagging on the neighboring
switch.
• The LACP rate depends on the model. When you set the rate (normal or fast), the device requests that
rate from the connecting switch. In return, the device will send at the rate requested by the connecting
switch. We recommend that you set the same rate on both sides.
• Firepower 4100/9300—The LACP rate is set to fast by default in FXOS, but you can configure it
as normal (also known as slow).
• Secure Firewall 3100/4200—The LACP rate is set to normal (slow) by default, but you can configure
it as fast on the device.
• All other models—The LACP rate set to normal (also known as slow), and it is not configurable,
which means the device will always request a slow rate from the connecting switch. We recommend
setting the rate on the switch to slow, so both sides send LACP messages at the same rate.
• In Cisco IOS software versions earlier than 15.1(1)S2, threat defense did not support connecting an
EtherChannel to a switch stack. With default switch settings, if the threat defense EtherChannel is
connected cross stack, and if the primary switch is powered down, then the EtherChannel connected to
the remaining switch will not come up. To improve compatibility, set the stack-mac persistent timer
command to a large enough value to account for reload time; for example, 8 minutes or 0 for indefinite.
Or, you can upgrade to more a more stable switch software version, such as 15.1(1)S2.
• All the threat defense configuration refers to the logical EtherChannel interface instead of the member
physical interfaces.
Configure an EtherChannel
This section describes how to create an EtherChannel port-channel interface, assign interfaces to the
EtherChannel, and customize the EtherChannel.
Guidelines
• You can configure up to 48 EtherChannels, depending on the number of interfaces for your model.
• Each channel group can have up to 8 active interfaces, except for the ISA 3000, which supports 16 active
interfaces. For switches that support only 8 active interfaces, you can assign up to 16 interfaces to a
channel group: while only 8 interfaces can be active, the remaining interfaces can act as standby links
in case of interface failure.
• All interfaces in the channel group must be the same media type and speed capacity. The media type can
be either RJ-45 or SFP; SFPs of different types (copper and fiber) can be mixed. You cannot mix interface
capacities (for example 1GB and 10GB interfaces) by setting the speed to be lower on the larger-capacity
interface, except for the Secure Firewall 1200/3100/4200, which supports different interface capacities
as long as the speed is set to Detect SFP; in this case the lowest common speed is used.
Note For the Firepower 4100/9300, you configure EtherChannels in FXOS. See Add an EtherChannel (Port Channel),
on page 325 for more information.
Note If you are using a physical interface already in your configuration, removing the
name will clear any configuration that refers to the interface.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Enable the member interfaces according to Enable the Physical Interface and Configure Ethernet Settings, on
page 768.
Step 3 Click Add Interfaces > Ether Channel Interface.
Step 4 On the General tab, set the Ether Channel ID to a number between 1 and 48 (1 and 8 for the Firepower 1010
and Secure Firewall 1210, 1 and 10 for the Secure Firewall 1220).
Step 5 In the Available Interfaces area, click an interface and then click Add to move it to the Selected Interfaces
area. Repeat for all interfaces that you want to make members.
Make sure all interfaces are the same type and speed capability.
Step 6 (Optional) Click the Advanced tab to customize the EtherChannel. Set the following parameters on the
Information sub-tab:
Figure 319: Advanced
• (ISA 3000 only) Load Balancing—Select the criteria used to load balance the packets across the group
channel interfaces. By default, the threat defense device balances the packet load on interfaces according
to the source and destination IP address of the packet. If you want to change the properties on which the
packet is categorized, choose a different set of criteria. For example, if your traffic is biased heavily
towards the same source and destination IP addresses, then the traffic assignment to interfaces in the
EtherChannel will be unbalanced. Changing to a different algorithm can result in more evenly distributed
traffic. For more information about load balancing, see Load Balancing, on page 773.
• LACP Mode—Choose Active, Passive, or On. We recommend using Active mode (the default). Passive
mode is only available for the ISA 3000 only.
• (Secure Firewall 3100/4200 only) LACP Rate—Choose Default, Normal, or Fast. The defualt is Normal
(also known as slow). Sets the LACP data unit receive rate for a physical interface in the channel group.
We recommend that you set the same rate on both sides.
• (ISA 3000 only) Active Physical Interface: Range—From the left drop-down list, choose the minimum
number of active interfaces required for the EtherChannel to be active, between 1 and 16. The default is
1. From the right drop-down list, choose the maximum number of active interfaces allowed in the
EtherChannel, between 1 and 16. The default is 16. If your switch does not support 16 active interfaces,
be sure to set this command to 8 or fewer.
• Active Mac Address—Set a manual MAC address if desired. The mac_address is in H.H.H format,
where H is a 16-bit hexadecimal digit. For example, the MAC address 00-0C-F1-42-4C-DE is entered
as 000C.F142.4CDE.
Step 7 Click the Hardware Configuration tab and set the Duplex and Speed for all member interfaces.
For Secure Firewall 1250, you can configure a maximum interface speed of 2.5gbps.
Step 10 (Optional) For regular firewall interfaces, add a VLAN subinterface. See Add a Subinterface, on page 826.
Step 11 For regular firewall interfaces, configure the routed or transparent mode interface parameters: Configure
Routed Mode Interfaces, on page 846 or Configure Bridge Group Interfaces, on page 850. For IPS-only interfaces,
see Inline Sets and Passive Interfaces, on page 883.
Adding a new interface, or deleting an unused interface has minimal impact on the threat defense configuration.
However, deleting an interface that is used in your security policy will impact the configuration. Interfaces
can be referenced directly in many places in the threat defense configuration, including access rules, NAT,
SSL, identity rules, VPN, DHCP server, and so on. Deleting an interface will delete any configuration associated
with that interface. Policies that refer to security zones are not affected. You can also edit the membership of
an allocated EtherChannel without affecting the logical device or requiring a sync on the management center.
When the management center detects changes, the Interface page shows status (removed, changed, or added)
to the left of each interface.
This procedure describes how to manually sync interface changes if required. If interface changes are temporary,
you should not save the changes in the management center; you should wait until the device is stable, and
then re-sync.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 If required, click Sync Interfaces on the top left of Interfaces.
Step 3 After the changes are detected, see the following steps.
a) You will see a red banner on Interfaces indicating that the interface configuration has changed. Click the
Click to know more link to view the interface changes.
b) Click Validate Changes to make sure your policy will still work with the interface changes.
If there are any errors, you need to change your policy and rerun the validation.
c) Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices.
Click Refresh to refresh interface status. Click Sync Modules if you made a hardware change on the device
that you need to detect.
If you need to make changes to your network module installation after initial bootup, then see the following
procedures.
• Breaking or rejoining and interface that is used directly in your security policy can impact the
configuration; however, the action is not blocked.
Procedure
Step 1 From Devices > Device Management, click Manage in the Chassis column. For clustering or High
Availability, this option is only available for the control node/active unit; network module changes are replicated
to all nodes.
Figure 321: Manage Chassis
The Chassis Operations page opens for the device (in multi-instance mode, this page is called Chassis
Manager). This page shows physical interface details for the device.
b) Click the link in the message at the top of the screen to go to the Interfaces page to save the interface
changes.
c) At the top of the Interfaces page, click Click to know more. The Interface Changes dialog box opens.
Figure 324: View Interface Changes
d) Click Validate Changes to make sure your policy will still work with the interface changes.
If there are any errors, you need to change your policy and rerun the validation.
Replacing the parent interface that is used in your security policy can impact the configuration. Interfaces
can be referenced directly in many places in the configuration, including access rules, NAT, SSL, identity
rules, VPN, DHCP server, and so on. Deleting an interface will delete any configuration associated with
that interface. Policies that refer to security zones are not affected.
e) Click Close to return to the Interfaces page.
f) Click Save to save the interface changes to the firewall.
g) If you had to change any configuration, go to Deploy > Deployment and deploy the policy.
You do not need to deploy just to save the breakout port changes.
c) At the top of the Interfaces page, click Click to know more. The Interface Changes dialog box opens.
Figure 327: View Interface Changes
d) Click Validate Changes to make sure your policy will still work with the interface changes.
If there are any errors, you need to change your policy and rerun the validation.
Replacing the child interfaces that are used in your security policy can impact the configuration. Interfaces
can be referenced directly in many places in the configuration, including access rules, NAT, SSL, identity
rules, VPN, DHCP server, and so on. Deleting an interface will delete any configuration associated with
that interface. Policies that refer to security zones are not affected.
e) Click Close to return to the Interfaces page.
f) Click Save to save the interface changes to the firewall.
g) If you had to change any configuration, go to Deploy > Deployment and deploy the policy.
You do not need to deploy just to save the breakout port changes.
Procedure
Step 1 Install the network module according to the hardware installation guide.
For clustering or High Availability, install the network module on all nodes.
Step 2 Reboot the firewall; see Shut Down or Restart the Device, on page 62.
For clustering or High Availability, reboot the data nodes/standby unit first, and wait for them to come back
up. Then you can change the control node (see Change the Control Node, on page 486) or active unit (see
Switch the Active Peer in the Threat Defense High Availability Pair, on page 437), and reboot the former
control node/active unit.
Step 3 From Devices > Device Management, click Manage in the Chassis column. For clustering or High
Availability, this option is only available for the control node/active unit; network module changes are replicated
to all nodes.
Figure 329: Manage Chassis
The Chassis Operations page opens for the device. This page shows physical interface details for the device.
Step 4 Click Sync Modules to update the page with the new network module details.
Step 5 On the interfaces graphic, click the slider ( ) to enable the network module.
Figure 330: Enable the Network Module
Step 6 You are prompted to confirm that you want to turn the network module on. Click Yes.
Step 7 You see a message at the top of the screen; click the link to go to the Interfaces page to save the interface
changes.
Figure 332: Go to Interface Page
Step 8 (Optional) At the top of the Interfaces page, you see a message that the interface configuration has changed.
You can click Click to know more to open the Interface Changes dialog box to view the changes.
Figure 333: View Interface Changes
Click Close to return to the Interfaces page. (Because you are adding a new module, there shouldn't be any
configuration impact, so you do not need to click Validate Changes.)
Procedure
Step 2 From Devices > Device Management, click Manage in the Chassis column. For clustering or High
Availability, this option is only available for the control node/active unit; network module changes are replicated
to all nodes.
Figure 335: Manage Chassis
The Chassis Operations page opens for the device. This page shows physical interface details for the device.
Step 3 On the interfaces graphic, click the slider ( ) to disable the network module.
Do not save any changes on the Interfaces page. Because you are replacing the network module, you do not
want to disrupt any existing configuration.
Step 4 You are prompted to confirm that you want to turn the network module off. Click Yes.
Figure 337: Confirm Disable
Step 5 On the device, remove the old network module and replace it with the new network module according to the
hardware installation guide.
Step 6 In the management center, enable the new module by clicking the slider ( ).
Figure 338: Enable the Network Module
Step 7 You are prompted to confirm that you want to turn the network module on. Click Yes.
Procedure
• High Availability—To avoid failing over when you replace the network module, disable interface
monitoring for interfaces on the network module. See Configure Standby IP Addresses and Interface
Monitoring, on page 435.
Step 2 From Devices > Device Management, click Manage in the Chassis column. For clustering or High
Availability, this option is only available for the control node/active unit; network module changes are replicated
to all nodes.
Figure 340: Manage Chassis
The Chassis Operations page opens for the device. This page shows physical interface details for the device.
Step 3 On the interfaces graphic, click the slider ( ) to disable the network module.
Figure 341: Disable the Network Module
Do not save any changes on the Interfaces page. Because you are replacing the network module, you do not
want to disrupt any existing configuration.
Step 4 You are prompted to confirm that you want to turn the network module off. Click Yes.
Figure 342: Confirm Disable
Step 5 On the device, remove the old network module and replace it with the new network module according to the
hardware installation guide.
Step 6 Reboot the firewall; see Shut Down or Restart the Device, on page 62.
For clustering or High Availability, reboot the data nodes/standby unit first, and wait for them to come back
up. Then you can change the control node (see Change the Control Node, on page 486) or active unit (see
Switch the Active Peer in the Threat Defense High Availability Pair, on page 437), and reboot the former
control node/active unit.
Step 7 In the management center, click Sync Modules to update the page with the new network module details.
Step 8 Enable the new module by clicking the slider ( ).
Figure 343: Enable the Network Module
Step 9 You are prompted to confirm that you want to turn the network module on. Click Yes.
Figure 344: Confirm Enable
Step 10 Click the link in the message at the top of the screen to go to the Interfaces page to save the interface changes.
Figure 345: Go to Interface Page
b) Click Validate Changes to make sure your policy will still work with the interface changes.
If there are any errors, you need to change your policy and rerun the validation.
Deleting an interface that is used in your security policy can impact the configuration. Interfaces can be
referenced directly in many places in the configuration, including access rules, NAT, SSL, identity rules,
VPN, DHCP server, and so on. Deleting an interface will delete any configuration associated with that
interface. Policies that refer to security zones are not affected.
c) Click Close to return to the Interfaces page.
Step 12 To change the interface speed, see Enable the Physical Interface and Configure Ethernet Settings, on page
768.
The default speed is set to Detect SFP, which detects the correct speed from the SFP installed. You only need
to fix the speed if you manually set the speed to a particular value and you now need a new speed.
Procedure
Step 1 From Devices > Device Management, click Manage in the Chassis column. For clustering or High
Availability, this option is only available for the control node/active unit; network module changes are replicated
to all nodes.
Figure 348: Manage Chassis
The Chassis Operations page opens for the device. This page shows physical interface details for the device.
Step 2 On the interfaces graphic, click the slider ( ) to disable the network module.
Figure 349: Disable the Network Module
Step 3 You are prompted to confirm that you want to turn the network module off. Click Yes.
Figure 350: Confirm Disable
Step 4 You see a message at the top of the screen; click the link to go to the Interfaces page to save the interface
changes.
Step 5 At the top of the Interfaces page, you see a message that the interface configuration has changed.
Figure 352: View Interface Changes
a) Click Click to know more to open the Interface Changes dialog box to view the changes.
Figure 353: Interface Changes
b) Click Validate Changes to make sure your policy will still work with the interface changes.
If there are any errors, you need to change your policy and rerun the validation.
Deleting an interface that is used in your security policy can impact the configuration. Interfaces can be
referenced directly in many places in the configuration, including access rules, NAT, SSL, identity rules,
VPN, DHCP server, and so on. Deleting an interface will delete any configuration associated with that
interface. Policies that refer to security zones are not affected.
c) Click Close to return to the Interfaces page.
Step 6 Click Save to save the interface changes to the firewall.
Step 7 If you had to change any configuration, go to Deploy > Deployment and deploy the policy.
Step 8 Reboot the firewall; see Shut Down or Restart the Device, on page 62.
For clustering or High Availability, reboot the data nodes/standby unit first, and wait for them to come back
up. Then you can change the control node (see Change the Control Node, on page 486) or active unit (see
Switch the Active Peer in the Threat Defense High Availability Pair, on page 437), and reboot the former
control node/active unit.
Interfaces The "management" interface is now shown in read-only mode on the Interfaces
page.
Note
The merged Management interface does not support Secure Syslogs.
The following output shows that the Management interfaces are not merged:
• For High Availability pairs and clusters, perform this task on the active/control unit. The merged
configuration will be replicated automatically to the standby/data units.
Procedure
Step 1 Choose Devices > Device Management, and click Edit ( ) for your threat defense. The Interfaces page is
selected by default. .
Step 2 Edit the Diagnostic interface, and remove the IP address.
You cannot complete the merge until after you have removed the Diagnostic IP address.
Step 3 Click Management Interface Merge in the Management Interface action needed area.
The Management Interface Merge dialog box shows all the occurrences of the Diagnostic interface in the
configuration. For any occurrences that require you to manually remove or change the configuration, they
will appear with a warning icon. Platform Settings that will no longer work on your device are marked with
a caution icon and require your acknowledgement.
Step 4 If you need to manually remove or change any listed configurations, do the following.
a) Click Cancel to close the Management Interface Merge dialog box.
b) Navigate to the feature area. You can then delete the item, or choose a data interface instead.
c) Reopen the Management Interface Merge dialog box.
There should no longer be any warnings.
Step 5 For each configuration caution, click the box in Do you acknowledge the change? column, and then click
Proceed.
After the merge, the Management interface is shown on the Interfaces page, although it is read-only.
Step 7 After the merge, if you had any external services that communicated with the Diagnostic interface, you need
to change their configuration to use the Management interface IP address.
For example:
• SNMP client
• RADIUS server—RADIUS servers often verify the IP address for incoming traffic, so you need to change
that IP address to the Management address. Moreover, for a High Availability pair, you need to allow
both the primary and secondary Management IP addresses; the Diagnostic interface used to support a
single "floating" IP address that stayed with the active unit, but Management does not support that
functionality.
The following output shows that the Management interfaces are not merged:
• For High Availability pairs and clusters, perform this task on the active/control unit. The merged
configuration will be replicated automatically to the standby/data units.
Procedure
Step 1 Choose Devices > Device Management, and click Edit ( ) for your threat defense. The Interfaces page is
selected by default. .
Step 2 For the Management interface, click Unmerge Management Interface ( ).
Figure 354: Management Interface Selection
Step 3 Click Yes to confirm that you want to unmerge the interface.
Figure 355: Unmerge Confirmation
After the merge, the Management interface is no longer shown on the Interfaces page.
Sync Device is now 7.7.0 7.7.0 Sync Device was changed to Sync Interfaces to indicate that this function is
called Sync Interfaces only for interface changes. This function no longer detects changes made to
the manager access interface; see Devices > Device Management > Device >
Management > Manager Access Details: Configuration.
Other out-of-band configuration changes performed at the diagnostic CLI in
recovery-config mode need to be discovered at Devices > Device
Management > Device > Health > Out of Band Status.
New/Modified screens: Devices > Device Management > Interfaces
Loopback and 7.4.0 7.4.0 You can now create interface group objects that include only management-only
Management type interfaces or only loopback interfaces. You can then use these groups for
interface group objects management features such as DNS servers, HTTP access, or SSH. Loopback
groups are supported for any feature that supports loopback interfaces. Note
that DNS does not support management interfaces.
New/Modified screens: Objects > Object Management > Interface > Add >
Interface Group
Merged Management and 7.4.0 7.4.0 For new devices using 7.4 and later, you cannot use the legacy Diagnostic
Diagnostic interfaces interface. Only the merged Management interface is available. If you upgraded
to 7.4 or later, and you did not have any configuration for the Diagnostic
interface, then the interfaces will merge automatically.
If you upgraded to 7.4 or later, and you have configuration for the Diagnostic
interface, then you have the choice to merge the interfaces manually, or you
can continue to use the separate Diagnostic interface. Note that support for the
Diagnostic interface will be removed in a later release, so you should plan to
merge the interfaces as soon as possible.
Merged mode also changes the behavior of AAA traffic to use the data routing
table by default. The management-only routing table can now only be used if
you specify the management-only interface (including Management) in the
configuration.
New/Modified screens: Devices > Device Management > Interfaces
New/Modified commands: show management-interface convergence
Default Forward Error 7.2.4 7.2.4 When you set the FEC to Auto on the Secure Firewall 3100 fixed ports, the
Correction (FEC) on default type is now set to Clause 108 RS-FEC instead of Clause 74 FC-FEC
Secure Firewall 3100 for 25 GB+ SR, CSR, and LR transceivers.
fixed ports changed to
Clause 108 RS-FEC from
Clause 74 FC-FEC for 25
GB+ SR, CSR, and LR
transceivers
LLDP support for the 7.2.0 7.2.0 You can enable Link Layer Discovery Protocol (LLDP) for Firepower 2100
Firepower 2100, Secure and Secure Firewall 3100 interfaces.
Firewall 3100
New/Modified screens:
Devices > Device Management > Interfaces > Hardware Configuration >
Network Connectivity
New/Modified commands: show lldp status, show lldp neighbors, show lldp
statistics
Pause Frames for Flow 7.2.0 7.2.0 If you have a traffic burst, dropped packets can occur if the burst exceeds the
Control for the Secure buffering capacity of the FIFO buffer on the NIC and the receive ring buffers.
Firewall 3100 Enabling pause frames for flow control can alleviate this issue.
New/Modified screens: Devices > Device Management > Interfaces >
Hardware Configuration > Network Connectivity
Support for hot swapping 7.1.0 7.1.0 You can add or remove the network module on the Secure Firewall 3100 while
the network module for the firewall is powered up. To replace a module with another module of the
the Secure Firewall 3100 same type, you do not need to reboot. After initial bootup, adding a module,
permanently removing a module, or replacing a module with a new type requires
a reboot.
New/Modified screens:
Devices > Device Management > Chassis Operations
Support for Forward 7.1.0 7.1.0 Secure Firewall 3100 25 Gbps interfaces support Forward Error Correction
Error Correction for the (FEC). FEC is enabled by default and set to Auto.
Secure Firewall 3100
New/Modified screens: Devices > Device Management > Interfaces > Edit
Physical Interface > Hardware Configuration
Support for setting the 7.1.0 7.1.0 The Secure Firewall 3100 supports speed detection for interfaces based on the
speed based on the SFP SFP installed. Detect SFP is enabled by default. This option is useful if you
for the Secure Firewall later change the network module to a different model, and want the speed to
3100 update automatically.
New/Modified screens: Devices > Device Management > Interfaces > Edit
Physical Interface > Hardware Configuration
LLDP support for the 7.1.0 7.1.0 You can enable Link Layer Discovery Protocol (LLDP) for Firepower 1100
Firepower 1100. interfaces.
New/Modified screens: Devices > Device Management > Interfaces >
Hardware Configuration > LLDP
New/Modified commands: show lldp status, show lldp neighbors, show lldp
statistics
Interface auto-negotiation 7.1.0 7.1.0 Interface auto-negotiation is now set independently from speed and duplex.
is now set independently Also, when you sync the interfaces in management center, hardware changes
from speed and duplex, are detected more effectively.
interface sync improved.
New/Modified screens: Devices > Device Management > Interfaces >
Hardware Configuration > Speed
Supported platforms: Firepower 1000, 2100, Secure Firewall 3100
Firepower 1100/2100 6.7.0 6.7.0 You can now configure a Firepower 1100/2100 series fiber interface to disable
series fiber interfaces flow control and link status negotiation.
now support disabling
Previously, when you set the fiber interface speed (1000 or 10000 Mbps) on
auto-negotiation.
these devices, flow control and link status negotiation was automatically
enabled. You could not disable it.
Now, you can deselect Auto-negotiation and set the speed to 1000 to disable
flow control and link status negotiation. You cannot disable negotiation at
10000 Mbps.
New/modified screens: Devices > Device Management > Interfaces >
Hardware Configuration > Speed
Note For initial interface configuration on the Firepower 4100/9300, see Configure Interfaces, on page 323.
User Roles
• Admin
• Access Admin
• Network Admin
PoE+ or higher uses Link Layer Discovery Protocol (LLDP) to negotiate the power level. Power is only
supplied when needed.
If you shut down the interface, then you disable power to the device.
Auto-MDI/MDIX Feature
For all switch ports, the default auto-negotiation setting also includes the Auto-MDI/MDIX feature.
Auto-MDI/MDIX eliminates the need for crossover cabling by performing an internal crossover when a
straight cable is detected during the auto-negotiation phase. Either the speed or duplex must be set to
auto-negotiate to enable Auto-MDI/MDIX for the interface. If you explicitly set both the speed and duplex
to a fixed value, thus disabling auto-negotiation for both settings, then Auto-MDI/MDIX is also disabled.
When the speed and duplex are set to 1000 and full, then the interface always auto-negotiates; therefore
Auto-MDI/MDIX is always enabled and you cannot disable it.
• MAC Addresses:
• Routed firewall mode—All VLAN interfaces share a MAC address. Ensure that any connected
switches can support this scenario. If the connected switches require unique MAC addresses, you
can manually assign MAC addresses. See Configure the MAC Address, on page 871.
• Transparent firewall mode—Each VLAN interface has a unique MAC address. You can override
the generated MAC addresses if desired by manually assigning MAC addresses. See Configure the
MAC Address, on page 871.
Bridge Groups
You cannot mix logical VLAN interfaces and physical firewall interfaces in the same bridge group.
Default Settings
• Ethernet 1/1 is a firewall interface.
• On the 1010/1210, Ethernet 1/2 through Ethernet 1/8 are switch ports assigned to VLAN 1.
• On 1220, Ethernet 1/2 through Ethernet 1/10 are switch ports assigned to VLAN 1.
• Default Speed and Duplex—By default, the speed and duplex are set to auto-negotiate.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Set the switch port mode by clicking the slider in the SwitchPort column so it shows as Slider enabled ( )
or Slider disabled ( ).
By default, switch ports are set to access mode in VLAN 1. You must manually add a logical VLAN 1 interface
(or whichever VLAN you set for these switch ports) for traffic to be routed and to participate in the threat
defense security policy (see Configure a VLAN Interface, on page 811). You cannot set the Management
interface to switch port mode. When you change the switch port mode, all unsupported configuration is
removed:
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Add Interfaces > VLAN Interface.
Step 3 On General, set the following VLAN-specific parameters:
If you are editing an existing VLAN interface, the Associated Interface table shows switch ports on this
VLAN.
a) Set the VLAN ID, between 1 and 4070, excluding IDs in the range 3968 to 4047, which are reserved for
internal use.
You cannot change the VLAN ID after you save the interface; the VLAN ID is both the VLAN tag used,
and the interface ID in your configuration.
b) (Optional) Choose a VLAN ID for Disable Forwarding on Interface VLAN to disable forwarding to
another VLAN.
For example, you have one VLAN assigned to the outside for internet access, one VLAN assigned to an
inside business network, and a third VLAN assigned to your home network. The home network does not
need to access the business network, so you can disable forwarding on the home VLAN; the business
network can access the home network, but the home network cannot access the business network.
Step 4 To complete the interface configuration, see one of the following procedures:
• Configure Routed Mode Interfaces, on page 846
• Configure General Bridge Group Member Interface Parameters, on page 850
Note The device does not support Spanning Tree Protocol for loop detection in the network. Therefore you must
ensure that any connection with the threat defense does not end up in a network loop.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 7 (Optional) Check the Protected check box to set this switch port as protected, so you can prevent the switch
port from communicating with other protected switch ports on the same VLAN.
You might want to prevent switch ports from communicating with each other if: the devices on those switch
ports are primarily accessed from other VLANs; you do not need to allow intra-VLAN access; and you want
to isolate the devices from each other in case of infection or other security breach. For example, if you have
a DMZ that hosts three web servers, you can isolate the web servers from each other if you enable Protected
on each switch port. The inside and outside networks can both communicate with all three web servers, and
vice versa, but the web servers cannot communicate with each other.
Step 8 (Optional) Set the duplex and speed by clicking Hardware Configuration.
Check the Auto-negotiation check box (the default) to auto-detect the speed and duplex. If you uncheck it,
you can set the speed and duplex manually:
• Duplex—Choose Full or Half.
• Speed—Choose 10mbps, 100mbps, or 1gbps.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 7 In the Allowed VLAN IDs field, enter the VLANs for this trunk port between 1 and 4070.
You can identify up to 20 IDs in one of the following ways:
• A single number (n)
• A range (n-x)
• Numbers and ranges separated by commas, for example:
5,7-10,13,45-100
You can enter spaces instead of commas.
If you include the native VLAN in this field, it is ignored; the trunk port always removes the VLAN tagging
when sending native VLAN traffic out of the port. Moreover, it will not receive traffic that still has native
VLAN tagging.
Step 8 (Optional) Check the Protected check box to set this switch port as protected, so you can prevent the switch
port from communicating with other protected switch ports on the same VLAN.
You might want to prevent switch ports from communicating with each other if: the devices on those switch
ports are primarily accessed from other VLANs; you do not need to allow intra-VLAN access; and you want
to isolate the devices from each other in case of infection or other security breach. For example, if you have
a DMZ that hosts three web servers, you can isolate the web servers from each other if you enable Protected
on each switch port. The inside and outside networks can both communicate with all three web servers, and
vice versa, but the web servers cannot communicate with each other.
Step 9 (Optional) Set the duplex and speed by clicking Hardware Configuration.
Check the Auto-negotiation check box (the default) to auto-detect the speed and duplex. If you uncheck it,
you can set the speed and duplex manually:
• Duplex—Choose Full or Half.
• Speed—Choose 10mbps, 100mbps, or 1gbps.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for Ethernet1/7 or 1/8 on Firepower 1010 or for any interface from Ethernet 1/5-1/8 on Secure
Firewall 1210CP.
Step 3 Click PoE.
Figure 359: PoE
The threat defense can distribute the loopback address using dynamic routing protocols, or you can configure
a static route on the peer device to reach the loopback IP address through one of the threat defense's physical
interfaces. You cannot configure a static route on the threat defense that specifies the loopback interface.
Related Topics
Guidelines and Limitations for Loopback Interfaces, on page 819
Configure a Loopback Interface, on page 820
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 From the Add Interfaces drop-down list, choose Loopback Interface.
Step 3 In the General tab, configure the following parameters:
a) Name—Enter a name for the loopback interface.
b) Enabled—Check the check box to enable the loopback interface.
c) Loopback ID—Enter the loopback ID between 1 to 1024.
d) Description—Enter a description for the loopback interface.
Step 4 Configure the routed mode interface parameters. See Configure Routed Mode Interfaces, on page 846.
Procedure
Step 1 Create an extended access list identifying traffic to the loopback interface IP address(es).
a) Choose Objects > Object Management and choose Access Control Lists > Extended from the table
of contents.
b) Click Add Extended Access List to create a new ACL.
c) In the New Extended Access List Object dialog box, enter a name for the ACL (no spaces allowed), and
click Add to create a new entry.
Figure 360: Name ACL and Add Entry
d) Configure the source (any) and destination addresses (loopback IP addresses) on the Network tab.
Note
Keep the default Action as Allow (match) and other settings as-is.
• Source—Select any from the Available Networks list, and click Add to Source. You can also
narrow this access list by specifying the source IP addresses instead of any.
• Destination—Type an address in the edit box below the Destination Networks list and click Add.
Repeat for each loopback interface.
Step 2 Choose Policies > Access Control > Access Control, and click Edit ( ) for the access control policy assigned
to your device.
Step 3 Click Advanced Settings from the More drop-down arrow at the end of the packet flow line.
Figure 363: Advanced Settings
The service policy rule wizard opens to step you through the process of configuring the rule.
Step 6 In the Interface Object step, click Global to create a global rule, which applies to all interfaces, then click
Next.
Figure 366: Global Policy
Step 7 In the Traffic Flow step, select the extended access list object you created in Step 1, on page 820, and then
click Next.
Figure 367: Choose Extended Access List
Set the Maximum TCP & UDP connections to the expected number of connections for the loopback interface,
and the Maximum Embryonic connections to a lower number. For example, you can set it to 5/2, or 10/5,
or 1024/512, depending on the expected loopback interface sessions you need.
Setting the embryonic connection limit enables TCP Intercept, which protects the system from a DoS attack
perpetrated by flooding an interface with TCP SYN packets.
Additional Guidelines
• Preventing untagged packets on the physical interface—If you use subinterfaces, you typically do not
also want the physical interface to pass traffic, because the physical interface passes untagged packets.
This property is also true for the active physical interface in a redundant interface pair and for EtherChannel
links. Because the physical, redundant, or EtherChannel interface must be enabled for the subinterface
to pass traffic, ensure that the physical, redundant, or EtherChannel interface does not pass traffic by not
configuring a name for the interface. If you want to let the physical, redundant, or EtherChannel interface
pass untagged packets, you can configure the name as usual.
• You cannot configure subinterfaces on the Management interface, either the dedicated Management
interface configured at the CLI nor a data interface used for manager access.
• All subinterfaces on the same parent interface must be either bridge group members or routed interfaces;
you cannot mix and match.
• The threat defense does not support the Dynamic Trunking Protocol (DTP), so you must configure the
connected switch port to trunk unconditionally.
• You might want to assign unique MAC addresses to subinterfaces defined on the threat defense, because
they use the same burned-in MAC address of the parent interface. For example, your service provider
might perform access control based on the MAC address. Also, because IPv6 link-local addresses are
generated based on the MAC address, assigning unique MAC addresses to subinterfaces allows for unique
IPv6 link-local addresses, which can avoid traffic disruption in certain instances on the threat defense.
Note If you manually assign a MAC address, be sure to assign MAC addresses to all
subinterfaces on the same physical interface to avoid unexpected behavior and
outages.
Firepower 1010 60
Add a Subinterface
Add one or more subinterfaces to a physical, redundant, or port-channel interface.
For the Firepower 4100/9300, you can configure subinterfaces in FXOS for use with container instances; see
Add a VLAN Subinterface for Container Instances, on page 327. These subinterfaces appear in the management
center interface list. You can also add subinterfaces in management center, but only on parent interfaces that
do not already have subinterfaces defined in FXOS.
Note The parent physical interface passes untagged packets. You may not want to pass untagged packets, so be
sure not to include the parent interface in your security policy.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Enable the parent interface according to Enable the Physical Interface and Configure Ethernet Settings, on
page 768.
Step 3 Click Add Interfaces > Sub Interface.
Step 4 On General, set the following parameters:
a) Interface—Choose the physical, redundant, or port-channel interface to which you want to add the
subinterface.
b) Sub-Interface ID—Enter the subinterface ID as an integer between 1 and 4294967295. The number of
subinterfaces allowed depends on your platform. You cannot change the ID after you set it.
c) VLAN ID—Enter the VLAN ID between 1 and 4094 that will be used to tag the packets on this
subinterface.
This VLAN ID must be unique.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
Step 7 Configure the routed or transparent mode interface parameters. See Configure Routed Mode Interfaces, on
page 846 or Configure Bridge Group Interfaces, on page 850.
This section describes how VXLAN works. For detailed information about VXLAN, see RFC 7348. For
detailed information about Geneve, see RFC 8926.
Encapsulation
The threat defense supports two types of VXLAN encapsulation:
• VXLAN (all models)—VXLAN uses MAC Address-in-User Datagram Protocol (MAC-in-UDP)
encapsulation. The original Layer 2 frame has a VXLAN header added and is then placed in a UDP-IP
packet.
• Geneve (threat defense virtual only)—Geneve has a flexible inner header that is not limited to the MAC
address. Geneve encapsulation is required for transparent routing of packets between an Amazon Web
Services (AWS) Gateway Load Balancer and appliances, and for sending extra information.
The underlying IP network between VTEPs is independent of the VXLAN overlay. Encapsulated packets are
routed based on the outer IP address header, which has the initiating VTEP as the source IP address and the
terminating VTEP as the destination IP address. For VXLAN encapsulation: The destination IP address can
be a multicast group when the remote VTEP is not known. With Geneve, the threat defense only supports
static peers. The destination port for VXLAN is UDP port 4789 by default (user configurable). The destination
port for Geneve is 6081.
VNI Interfaces
VNI interfaces are similar to VLAN interfaces: they are virtual interfaces that keep network traffic separated
on a given physical interface by using tagging. You apply your security policy directly to each VNI interface.
You can only add one VTEP interface, and all VNI interfaces are associated with the same VTEP interface.
There is an exception for threat defense virtual clustering on AWS or Azure. For AWS clustering, you can
have two VTEP source interfaces: a VXLAN interface is used for the cluster control link, and a Geneve
interface can be used for the AWS Gateway Load Balancer. For Azure clustering, you can have two VTEP
source interfaces: a VXLAN interface is used for the cluster control link, and a second VXLAN interface can
be used for the Azure Gateway Load Balancer.
VXLAN
Traffic entering and exiting the VTEP source interface is subject to VXLAN processing, specifically
encapsulation or decapsulation.
Encapsulation processing includes the following tasks:
• The VTEP source interface encapsulates the inner MAC frame with the VXLAN header.
• The UDP checksum field is set to zero.
• The Outer frame source IP is set to the VTEP interface IP.
• The Outer frame destination IP is decided by a remote VTEP IP lookup.
Geneve
Traffic entering and exiting the VTEP source interface is subject to Geneve processing, specifically
encapsulation or decapsulation.
Encapsulation processing includes the following tasks:
• The VTEP source interface encapsulates the inner MAC frame with the Geneve header.
• The UDP checksum field is set to zero.
• The Outer frame source IP is set to the VTEP interface IP.
• The Outer frame destination IP is set the peer IP address that you configured.
Peer VTEPs
When the threat defense sends a packet to a device behind a peer VTEP, the threat defense needs two important
pieces of information:
• The destination MAC address of the remote device
The threat defense maintains a mapping of destination MAC addresses to remote VTEP IP addresses for the
VNI interfaces.
VXLAN Peer
There are two ways in which the threat defense can find this information:
• A single peer VTEP IP address can be statically configured on the threat defense.
For IPv4: The threat defense then sends a VXLAN-encapsulated ARP broadcast to the VTEP to learn
the end node MAC address.
For IPv6: The threat defense then sends an IPv6 Neighbor Solicitation message to the IPv6 solicited-node
multicast address. The peer VTEP responds with an IPv6 Neighbor Advertisement message with its
link-local address.
• A group of peer VTEP IP addresses can be statically configured on the threat defense.
For IPv4: The threat defense then sends a VXLAN-encapsulated ARP broadcast to the VTEP to learn
the end node MAC addresses.
For IPv6: The threat defense then sends an IPv6 Neighbor Solicitation message to the IPv6 solicited-node
multicast address. The peer VTEP responds with an IPv6 Neighbor Advertisement message with its
link-local address.
• A multicast group can be configured on each VNI interface (or on the VTEP as a whole).
For IPv4: The threat defense sends a VXLAN-encapsulated ARP broadcast packet within an IP multicast
packet through the VTEP source interface. The response to this ARP request enables the threat defense
to learn both the remote VTEP IP address along with the destination MAC address of the remote end
node.
For IPv6: The threat defense sends a Multicast Listener Discovery (MLD) Report message through the
VTEP source interface to indicate that the threat defense is listening on the VTEP interface for the
multicast address traffic.
This option is not supported with Geneve.
Geneve Peer
The threat defense virtual only supports statically defined peers. You can define the threat defense virtual
peer IP address on the AWS Gateway Load Balancer. Because the threat defense virtual never initiates traffic
to the Gateway Load Balancer, you do not also have to specify the Gateway Load Balancer IP address on the
threat defense virtual; it learns the peer IP address when it receives Geneve traffic. Multicast groups are not
supported with Geneve.
source interface, the threat defense strips out the VXLAN header and forwards it to a physical interface
connected to a non-VXLAN network based on the destination MAC address of the inner Ethernet frame.
The threat defense always processes VXLAN packets; it does not just forward VXLAN packets untouched
between two other VTEPs.
VXLAN Bridge
When you use a bridge group (transparent firewall mode, or optionally routed mode), the threat defense can
serve as a VXLAN bridge between a (remote) VXLAN segment and a local segment where both are in the
same network. In this case, one member of the bridge group is a regular interface while the other member is
a VNI interface.
Note The threat defense must use dynamic VTEP peer discovery because it has multiple VTEP peers in this scenario.
5. The threat defense encapsulates the packets again with the VXLAN tag for VNI 2 and sends the packets
to Virtual Server 1. Before encapsulation, the threat defense changes the inner frame destination MAC
address to be the MAC of VM1 (multicast-encapsulated ARP might be needed for the threat defense to
learn the VM1 MAC address).
6. When Virtual Server 1 receives the VXLAN packets, it decapsulates the packets and delivers the inner
frames to VM1.
Note This use case is the only currently supported use case for Geneve interfaces.
The AWS Gateway Load Balancer combines a transparent network gateway and a load balancer that distributes
traffic and scales virtual appliances on demand. The threat defense virtual supports the Gateway Load Balancer
centralized control plane with a distributed data plane (Gateway Load Balancer endpoint). The following
figure shows traffic forwarded to the Gateway Load Balancer from the Gateway Load Balancer endpoint. The
Gateway Load Balancer balances traffic among multiple threat defense virtuals, which inspect the traffic
before either dropping it or sending it back to the Gateway Load Balancer (U-turn traffic). The Gateway Load
Balancer then sends the traffic back to the Gateway Load Balancer endpoint and to the destination.
Figure 370: Geneve Single-Arm Proxy
Note This use case is the only supported use case for Geneve interfaces.
The threat defense virtual supports the Gateway Load Balancer centralized control plane with a distributed
data plane (Gateway Load Balancer endpoint) in single-arm and dual-arm mode. The following figure shows
outbound traffic (traffic inspected by threat defense virtual) directly forwarded to the destination (internet)
without the need for traffic hop to the GWLB and GWLB endpoint. The threat defense virtual inspect the
outbound traffic and perform NAT before either dropping it or sending it back to the internet through NAT
gateway. Dual-arm proxy provides a common egress path for multi-VPC deployment. The firewall inspects
the outbound traffic from multiple VPCs, and it exits from a single point to the internet, making it a
cost-effective infrastructure solution.
Figure 371: Geneve Dual-Arm Proxy: Egress Traffic from Single VPC
Figure 372: Geneve Dual-Arm Proxy: Egress Traffic from Multiple VPCs
Load Balancer on the internal VXLAN segment. The Azure Gateway Load Balancer then sends the traffic
back to the Public Gateway Load Balancer and to the destination.
Figure 373: Azure Gateway Load Balancer with Paired Proxy
• Firepower 1010 and Secure Firewall 1210/1220 switch ports and VLAN interfaces are not supported as
VTEP interfaces.
• Paired proxy VXLAN interfaces are only supported in routed firewall mode.
IPv6
• The VNI interface supports both IPv4 and IPv6 traffic.
• For VXLAN encapsulation, the VTEP source interface supports both IPv4 and IPv6. The threat defense
virtual cluster control link VTEP source interface only supports IPv4.
For Geneve, the VTEP source interface only supports IPv4.
Clustering
• Clustering does not support VXLAN in Individual Interface mode except for the cluster control link
(threat defense virtual only) Only Spanned EtherChannel mode supports VXLAN.
An exception is made for AWS, which can use an additional Geneve interface for use with the GWLB
and for Azure, which can use an additional paired proxy VXLAN interface for use with the GWLB.
Routing
• Only static routing or Policy Based Routing is supported on the VNI interface; dynamic routing protocols
are not supported.
VPN
You cannot configure the VTEP source interface for VPN or use it as a VTI.
MTU
• VXLAN encapsulation—If the source interface MTU is less than 1554 bytes for IPv4 or 1574 bytes for
IPv6, then the threat defense automatically raises the MTU to 1554 bytes or 1574 bytes. In this case, the
entire Ethernet datagram is being encapsulated, so the new packet is larger and requires a larger MTU.
If the MTU used by other devices is larger, then you should set the source interface MTU to be the
network MTU + 54 bytes for IPv4 or +64 bytes for IPv6. For the threat defense virtual, this MTU requires
a restart to enable jumbo frame reservation.
• Geneve encapsulation—If the source interface MTU is less than 1806 bytes, then the threat defense
automatically raises the MTU to 1806 bytes. In this case, the entire Ethernet datagram is being
encapsulated, so the new packet is larger and requires a larger MTU. If the MTU used by other devices
is larger, then you should set the source interface MTU to be the network MTU + 306 bytes. This MTU
requires a restart to enable jumbo frame reservation.
Note You can configure either VXLAN or Geneve (threat defense virtual only). For Geneve interfaces, see Configure
Geneve Interfaces, on page 840.
Note For Azure GWLB, the VXLAN interface is configured when you deploy the VM using the ARM template.
You can use this section to change your configuration.
Procedure
Step 1 If you want to specify a group of peer VTEPs, add a network object with the peer IP addresses. See Creating
Network Objects, on page 1383.
Step 2 Choose Devices > Device Management.
Step 3 Click Edit ( ) next to the device on which you want to configure VXLAN.
Step 4 (Optional) Specify that the source interface is NVE-only.
This setting is optional for routed mode where this setting restricts traffic to VXLAN and common management
traffic only on this interface. This setting is automatically enabled for transparent firewall mode.
a) Click Interfaces.
b) Click Edit ( ) for the VTEP source interface.
c) On the General page, check the check box of NVE Only.
Step 5 Click VTEP if it is not already displaying.
Step 6 Check Enable NVE.
Step 7 Click Add VTEP.
Step 8 For the Encapsulation Type, choose VxLAN.
For AWS, you can choose between VxLAN and Geneve. Other platforms have VxLAN chosen automatically.
Step 9 Enter the value for the Encapsulation port within the specified range.
The default value is 4789.
Select from the list of available physical interfaces present on the device. If the source interface MTU is less
than 1554 bytes for IPv4 or 1574 bytes for IPv6, then the management center automatically raises the MTU
to 1554 bytes or 1574 bytes.
Procedure
Step 9 (Paired Proxy VXLAN for Azure GWLB) Enable proxy paired mode and set the required parameters.
a) Check Proxy Paired.
b) Set the Internal Port between 1024 and 65535.
c) Set the Internal Segment ID between 1 and 16777215.
d) Set the External Port between 1024 and 65535.
e) Set the External Segment ID between 1 and 16777215.
Step 10 (Regular VXLAN) Enter a value for the VNI Segment ID between 1 and 16777215.
Note You can configure either VXLAN or Geneve. For information about VXLAN interfaces, see Configure
VXLAN Interfaces, on page 837.
Procedure
Procedure
This option enables single-arm proxy mode or dual-arm proxy mode. Single-arm proxy mode allows traffic
to exit the same interface it entered (U-turn traffic) while the dual-arm proxy mode enables the virtual devices
to perform the NAT of the inspected traffic and then directly forward the outbound traffic to the internet
without returning it to the GWLB and GWLB endpoint. If you edit the interface later, you cannot disable
single-arm proxy mode or dual-arm proxy mode. To do that, you need to delete the existing interface and
create a new VNI.
This option is only available for a Geneve VTEP.
Step 8 From the Proxy type drop-down list, choose the proxy mode you want to enable for the interface. If you do
not specify the proxy mode for the interface, then by default, single-arm proxy mode is considered.
Step 9 Select NVE Mapped to VTEP Interface.
This option associates this interface with the VTEP source interface.
What to do next
Configure the routed interface parameters. See Configure Routed Mode Interfaces.
Procedure
Step 2 Configure HTTP(S) Redirection Using Static Interface NAT with Port Translation.
You can configure the threat defense virtual to redirect health checks to a metadata HTTP(S) server. For
HTTP(S) health checks, the HTTP(S) server must reply to the GWLB with a status code in the range 200 to
399. Because the threat defense virtual has limits on the number of simultaneous management connections,
you may choose to offload the health check to an external server.
Static interface NAT with port translation lets you redirect a connection to a port (such as port 80) to a different
IP address. For example, translate an HTTP packet from the GWLB with a destination of the threat defense
virtual outside interface so that it appears to be from the threat defense virtual outside interface with a destination
of the HTTP server. The threat defense virtual then forwards the packet to the mapped destination address.
The HTTP server responds to the threat defense virtual outside interface, and then the threat defense virtual
forwards the response back to the GWLB. You need an access rule that allows traffic from the GWLB to the
HTTP server.
a) Permit HTTP(S) traffic on the outside interface from the GWLB network in an access rule. See Access
Control Rules, on page 1747.
b) For HTTP(S), translate the source GWLB IP address to the threat defense virtual outside interface IP
address; then translate the destination of the outside interface IP address to the HTTP(S) server IP address.
See Configure Static Manual NAT, on page 1046.
IPv6
• IPv6 is supported on all interfaces.
• You can only configure IPv6 addresses manually in transparent mode.
• The threat defense device does not support IPv6 anycast addresses.
• DHCPv6 and prefix delegation options are not supported with transparent mode, clustering, or High
Availability.
Model Guidelines
• For the threat defense virtual on VMware with bridged ixgbevf interfaces, bridge groups are not supported.
Note Not all fields are supported for all interface types.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 In the Name field, enter a name up to 48 characters in length.
You cannot start the name with the phrase "cluster". It is reserved for internal use.
Step 8 From the Security Zone drop-down list, choose a security zone or add a new one by clicking New.
The routed interface is a Routed-type interface, and can only belong to Routed-type zones.
Step 9 See Configure the MTU, on page 870 for information about the MTU.
Step 10 In the Priority field, enter a number ranging from 0–65535.
This value is used in the policy based routing configuration. The priority is used to determine how you want
to route the traffic across multiple egress interfaces. For more information, see Configure Policy-Based Routing
Policy, on page 1317.
Step 11 Click the IPv4 tab. To set the IP address, use one of the following options from the IP Type drop-down list.
High Availability, clustering, and loopback interfaces only support static IP address configuration; DHCP
and PPPoE are not supported.
• Use Static IP—Enter the IP address and subnet mask. For point-to-point connections, you can specify
a 31-bit subnet mask ([Link] or /31). In this case, no IP addresses are reserved for the network
or broadcast addresses. You cannot set the standby IP address in this case. For High Availability, you
can only use a static IP address. Set the standby IP address on the Devices > Device Management >
High Availability tab in the Monitored Interfaces area. If you do not set the standby IP address, the
active unit cannot monitor the standby interface using network tests; it can only track the link state.
• Use DHCP—Configure the following optional parameters:
• Obtain default route using DHCP—Obtains the default route from the DHCP server.
• DHCP route metric—Assigns an administrative distance to the learned route, between 1 and 255.
The default administrative distance for the learned routes is 1.
• Use PPPoE—If the interface is connected to a DSL, cable modem, or other connection to your ISP, and
your ISP uses PPPoE to provide your IP address, configure the following parameters:
• VPDN Group Name—Specify a group name of your choice to represent this connection.
• PPPoE User Name—Specify the username provided by your ISP.
• PPPoE Password/Confirm Password—Specify and confirm the password provided by your ISP.
• PPP Authentication—Choose PAP, CHAP, or MSCHAP.
PAP passes a cleartext username and password during authentication and is not secure. With CHAP,
the client returns the encrypted [challenge plus password], with a cleartext username in response to
the server challenge. CHAP is more secure than PAP, but it does not encrypt data. MSCHAP is
similar to CHAP but is more secure because the server stores and compares only encrypted passwords
rather than cleartext passwords as in CHAP. MSCHAP also generates a key for data encryption by
MPPE.
• PPPoE route metric—Assign an administrative distance to the learned route. Valid values are from
1 to 255. By default, the administrative distance for the learned routes is 1.
• Enable Route Settings—To manually configure the PPPoE IP address, check this box and then
enter the IP Address.
If you select the Enable Route Settings check box and leave the IP Address blank, the ip address
pppoe setroute command is applied as shown in this example:
interface GigabitEthernet0/2
nameif inside2_pppoe
cts manual
propagate sgt preserve-untag
policy static sgt disabled trusted
security-level 0
pppoe client vpdn group test
pppoe client route distance 10
ip address pppoe setroute
• Store Username and Password in Flash—Stores the username and password in flash memory.
The threat defense device stores the username and password in a special location of NVRAM.
Step 12 (Optional) See Configure IPv6 Addressing, on page 854 to configure IPv6 addressing on the IPv6 tab.
Step 13 (Optional) See Configure the MAC Address, on page 871 to manually configure the MAC address on the
Advanced tab.
Step 14 (Optional) Set the duplex and speed by clicking Hardware Configuration > Speed.
• Duplex—Choose Full or Half. SFP interfaces only support Full duplex.
• Speed—Choose a speed (varies depending on the model). (Secure Firewall 3100/4200 only) Choose
Detect SFP to detect the speed of the installed SFP module and use the appropriate speed. Duplex is
always Full, and auto-negotiation is always enabled. This option is useful if you later change the network
module to a different model, and want the speed to update [Link] Secure Firewall 1250, you
can configure a maximum interface speed of 2.5gbps.
• Auto-negotiation—Set the interface to negotiate the speed, link status, and flow control.
• Forward Error Correction Mode—(Secure Firewall 3100/4200 only) For 25 Gbps and higher interfaces,
enable Forward Error Correction (FEC). For an EtherChannel member interface, you must configure
FEC before you add it to the EtherChannel. The setting chosen when you use Auto depends on the
transceiver type and whether the interface is fixed (built-in) or on a network module.
Transceiver Type Fixed Port Default FEC (Ethernet Network Module Default FEC
1/9 through 1/16)
Transceiver Type Fixed Port Default FEC (Ethernet Network Module Default FEC
1/9 through 1/16)
Step 15 (Optional) Enable management center manager access on a data interface on the Manager Access page.
You can enable manager access from a data interface when you first setup the threat defense. If you want to
enable or disable manager access after you added the threat defense to the management center, see:
• Enable manager access: Change the Manager Access Interface from Management to Data, on page 156
Note
You cannot enable manager access unless you first initiate the manager interface migration from
Management to a data interface. After you initiate the migration, you can enable manager access on the
Manager Access page and save the configuration successfully.
• Disable manager access: Change the Manager Access Interface from Data to Management, on page 161
If you want to change the manager access interface from one data interface to another data interface, you must
disable manager access on the original data interface, but do not disable the interface itself yet; the original
data interface must be used to perform the deployment. If you want to use the same IP address on the new
manager access interface, you can delete or change the IP configuration on the original interface; this change
should not affect the deployment. If you use a different IP address for the new interface, then also change the
device IP address shown in the management center; see Update the Hostname or IP Address in the Management
Center, on page 150. Be sure to also update related configuration to use the new interface such as static routes,
DDNS, and DNS settings.
Manager access from a data interface has the following limitations:
• You can only enable manager access on a physical, data interface. You cannot use a subinterface or
EtherChannel, nor can you create a subinterface on the manager access interface. You can also use the
management center to enable manager access on a single secondary interface for redundancy.
• This interface cannot be management-only.
• Routed firewall mode only, using a routed interface.
• PPPoE is not supported. If your ISP requires PPPoE, you will have to put a router with PPPoE support
between the threat defense and the WAN modem.
• The interface must be in the global VRF only.
• SSH is not enabled by default for data interfaces, so you will have to enable SSH later using the
management center. Because the Management interface gateway will be changed to be the data interfaces,
you also cannot SSH to the Management interface from a remote network unless you add a static route
for the Management interface using the configure network static-routes command. For threat defense
virtual on Amazon Web Services, a console port is not available, so you should maintain your SSH access
to the Management interface: add a static route for Management before you continue with your
configuration. Alternatively, be sure to finish all CLI configuration (including the configure manager
add command) before you configure the data interface for manager access and you are disconnected.
• You cannot use separate management and event-only interfaces.
• Clustering is not supported. You must use the Management interface in this case.
• Check Enable management on this interface for the manager to use this data interface for management
instead of the dedicated Management interface.
• (Optional) In the Allowed Management Networks box, add the networks from which you want to allow
manager access. By default, any networks are allowed.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 In the Name field, enter a name up to 48 characters in length.
You cannot start the name with the phrase "cluster". It is reserved for internal use.
Step 8 From the Security Zone drop-down list, choose a security zone or add a new one by clicking New.
The bridge group member interface is a Switched-type interface, and can only belong to Switched-type zones.
Do not configure any IP address settings for this interface. You will set the IP address for the Bridge Virtual
Interface (BVI) only. Note that the BVI does not belong to a zone, and you cannot apply access control policies
to the BVI.
Step 9 See Configure the MTU, on page 870 for information about the MTU.
Step 10 (Optional) Set the duplex and speed by clicking Hardware Configuration > Speed.
• Duplex—Choose Full or Half. SFP interfaces only support Full duplex.
• Speed—Choose a speed (varies depending on the model). (Secure Firewall 3100/4200 only) Choose
Detect SFP to detect the speed of the installed SFP module and use the appropriate speed. Duplex is
always Full, and auto-negotiation is always enabled. This option is useful if you later change the network
module to a different model, and want the speed to update [Link] Secure Firewall 1250, you
can configure a maximum interface speed of 2.5gbps.
• Auto-negotiation—Set the interface to negotiate the speed, link status, and flow control.
• Forward Error Correction Mode—(Secure Firewall 3100/4200 only) For 25 Gbps and higher interfaces,
enable Forward Error Correction (FEC). For an EtherChannel member interface, you must configure
FEC before you add it to the EtherChannel. The setting chosen when you use Auto depends on the
transceiver type and whether the interface is fixed (built-in) or on a network module.
Transceiver Type Fixed Port Default FEC (Ethernet Network Module Default FEC
1/9 through 1/16)
Step 11 (Optional) See Configure IPv6 Addressing, on page 854 to configure IPv6 addressing on the IPv6 tab.
Step 12 (Optional) See Configure the MAC Address, on page 871 to manually configure the MAC address on the
Advanced tab.
Step 13 Click OK.
Step 14 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
For routed mode, if you provide a name for the BVI, then the BVI participates in routing. Without a name,
the bridge group remains isolated as in transparent firewall mode.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Choose Add Interfaces > Bridge Group Interface.
Step 3 (Routed Mode) In the Name field, enter a name up to 48 characters in length.
You must name the BVI if you want to route traffic outside the bridge group members, for example, to the
outside interface or to members of other bridge groups. The name is not case-sensitive.
Step 4 In the Bridge Group ID field, enter the bridge group ID between 1 and 250.
Step 5 In the Description field, enter a description for this bridge group.
Step 6 On the Interfaces tab, click an interface and then click Add to move it to the Selected Interfaces area. Repeat
for all interfaces that you want to make members of the bridge group.
Step 7 (Transparent Mode) Click the IPv4 tab. In the IP Address field, enter the IPv4 address and subnet mask.
Do not assign a host address (/32 or [Link]) to the BVI. Also, do not use other subnets that contain
fewer than 3 host addresses (one each for the upstream router, downstream router, and transparent firewall)
such as a /30 subnet ([Link]). The threat defense device drops all ARP packets to or from the first
and last addresses in a subnet. For example, if you use a /30 subnet and assign a reserved address from that
subnet to the upstream router, then the threat defense device drops the ARP request from the downstream
router to the upstream router.
For High Availability, set the standby IP address on the Devices > Device Management > High Availability
tab in the Monitored Interfaces area. If you do not set the standby IP address, the active unit cannot monitor
the standby interface using network tests; it can only track the link state.
Step 8 (Routed Mode) Click the IPv4 tab. To set the IP address, use one of the following options from the IP Type
drop-down list.
High Availability and clustering interfaces only support static IP address configuration; DHCP is not supported.
• Use Static IP—Enter the IP address and subnet mask. For High Availability, you can only use a static
IP address. Set the standby IP address on the Devices > Device Management > High Availability tab
in the Monitored Interfaces area. If you do not set the standby IP address, the active unit cannot monitor
the standby interface using network tests; it can only track the link state.
• Use DHCP—Configure the following optional parameters:
• Obtain default route using DHCP—Obtains the default route from the DHCP server.
• DHCP route metric—Assigns an administrative distance to the learned route, between 1 and 255.
The default administrative distance for the learned routes is 1.
Step 9 (Optional) See Configure IPv6 Addressing, on page 854 to configure IPv6 addressing.
Step 10 (Optional) See Add a Static ARP Entry, on page 872 and Add a Static MAC Address and Disable MAC
Learning for a Bridge Group, on page 873 (for transparent mode only) to configure the ARP and MAC settings.
Step 11 Click OK.
Step 12 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
About IPv6
This section includes information about IPv6.
IPv6 Addressing
You can configure two types of unicast addresses for IPv6:
• Global—The global address is a public address that you can use on the public network. For a bridge
group, this address needs to be configured for the BVI, and not per member interface. You can also
configure a global IPv6 address for the management interface in transparent mode.
• Link-local—The link-local address is a private address that you can only use on the directly-connected
network. Routers do not forward packets using link-local addresses; they are only for communication
on a particular physical network segment. They can be used for address configuration or for the Neighbor
Discovery functions such as address resolution. In a bridge group, only member interfaces have link-local
addresses; the BVI does not have a link-local address.
At a minimum, you need to configure a link-local address for IPv6 to operate. If you configure a global address,
a link-local address is automatically configured on the interface, so you do not also need to specifically
configure a link-local address. For bridge group member interfaces, when you configure the global address
on the BVI, the threat defense device automatically generates link-local addresses for member interfaces. If
you do not configure a global address, then you need to configure the link-local address, either automatically
or manually.
The address format verification is only performed when a flow is created. Packets from an existing flow are
not checked. Additionally, the address verification can only be performed for hosts on the local link.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 Click the IPv6 page, and then click DHCP.
Step 4 Click Client PD Prefix Name and enter a name for this prefix.
Figure 375: Enable the Prefix Delegation Client
Step 5 (Optional) Enter the prefix and prefix length in the Client PD Hint Prefixes field to provide one or more
hints to the DHCP server about the delegated prefix you want to receive, then click Add.
Typically you want to request a particular prefix length, such as ::/60, or if you have received a particular
prefix before and want to ensure you get it again when the lease expires, you can enter the whole prefix as
the hint. If you enter multiple hints (different prefixes or lengths), then it is up to the DHCP server which hint
to honor, or whether to honor the hint at all.
Note Configuring the global address automatically configures the link-local address, so you do not need to configure
it separately. For bridge groups, configuring the global address on the BVI automatically configures link-local
addresses on all member interfaces.
For subinterfaces defined on the threat defense, we recommend that you also set the MAC address manually,
because they use the same burned-in MAC address of the parent interface. IPv6 link-local addresses are
generated based on the MAC address, so assigning unique MAC addresses to subinterfaces allows for unique
IPv6 link-local addresses, which can avoid traffic disruption in certain instances on the threat defense. See
Configure the MAC Address, on page 871.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 Click the IPv6 page.
For routed mode, the Basic page is selected by default. For transparent mode, the Address page is selected
by default.
Step 5 Configure the global IPv6 address using one of the following methods.
For failover and clustering, and for loopback interfaces, you must set the IP address manually. For clustering,
manually configuring the link-local address is also not supported.
• (Routed interface) Stateless autoconfiguration—Check the Autoconfiguration check box.
Enabling stateless autoconfiguration on the interface configures IPv6 addresses based upon prefixes
received in Router Advertisement messages. A link-local address, based on the Modified EUI-64 interface
ID, is automatically generated for the interface when stateless autoconfiguration is enabled.
Although RFC 4862 specifies that hosts configured for stateless autoconfiguration do not send Router
Advertisement messages, the threat defense device does send Router Advertisement messages in this
case. Uncheck the IPv6 > Settings > Enable RA check box to suppress messages.
• Manual configuration—To manually configure a global IPv6 address:
b. In the Address field, enter either a full global IPv6 address, including the interface ID, or enter the
IPv6 prefix, along with the IPv6 prefix length. (Routed Mode) If you only enter the prefix, then be
sure to check the Enforce EUI 64 check box to generate the interface ID using the Modified EUI-64
format. For example, [Link]/48 (full address) or [Link]/48 (prefix, with
EUI 64 checked).
For High Availability (if you did not set Enforce EUI 64), set the standby IP address on the Devices >
Device Management > High Availability page in the Monitored Interfaces area. If you do not set
the standby IP address, the active unit cannot monitor the standby interface using network tests; it
can only track the link state.
• (Routed interface) Use a delegated prefix—To assign an IPv6 address using the delegated prefix:
This feature requires the threat defense to have the DHCPv6 Prefix Delegation client enabled on a different
interface. See Enable the IPv6 Prefix Delegation Client, on page 857.
a. Click the DHCP page.
b. Click ( ).
c. Enter the Prefix Name that you specified for the Prefix Delegation client (see Enable the IPv6 Prefix
Delegation Client, on page 857) on another interface.
Figure 378: Specify the Prefix Name and Address
f. Optionally enable the DHCPv6 stateless server on this interface (see Enable the DHCPv6 Stateless
Server, on page 907). If you do so, we recommend that you also check the Enable DHCP for
non-address config option.
Step 6 For Routed interfaces, you can optionally set the following values on the Basic page:
• To enforce the use of Modified EUI-64 format interface identifiers in IPv6 addresses on a local link,
check the Enforce EUI-64 check box.
• To manually set the link-local address, enter an address in the Link-Local address field.
A link-local address should start with FE8, FE9, FEA, or FEB, for example fe80::20d:88ff:feee:6a82. If
you do not want to configure a global address, and only need to configure a link-local address, you have
the option of manually defining the link-local address. Note that we recommend automatically assigning
the link-local address based on the Modified EUI-64 format. For example, if other devices enforce the
use of the Modified EUI-64 format, then a manually-assigned link-local address may cause packets to
be dropped.
Clustering does not support manual link-local addresses.
Step 7 For Routed interfaces, you can optionally set the following values on the DHCP page:
• Check the Enable DHCP for address config check box to set the Managed Address Config flag in the
IPv6 router advertisement packet.
This flag in IPv6 router advertisements informs IPv6 autoconfiguration clients that they should use
DHCPv6 to obtain addresses, in addition to the derived stateless autoconfiguration address.
• Check the Enable DHCP for non-address config check box to set the Other Address Config flag in the
IPv6 router advertisement packet.
This flag in IPv6 router advertisements informs IPv6 autoconfiguration clients that they should use
DHCPv6 to obtain additional information from DHCPv6, such as the DNS server address. Use this option
when using the DHCPv6 stateless server with DHCPv6 prefix delegation.
Step 8 For Routed interfaces, see Configure IPv6 Neighbor Discovery, on page 863 to configure settings on the
Prefixes and Settings pages. For BVI interfaces, see the following parameters on the Settings page:
• DAD attempts—The maximum number of DAD attempts, between 1 and 600. Set the value to 0 to
disable duplicate address detection (DAD) processing. This setting configures the number of consecutive
neighbor solicitation messages that are sent on an interface while DAD is performed on IPv6 addresses.
1 attempt is the default.
• NS Interval—The interval between IPv6 neighbor solicitation retransmissions on an interface, between
1000 and 3600000 ms. The default value is 1000 ms.
• Reachable Time—The amount of time that a remote IPv6 node is considered reachable after a reachability
confirmation event has occurred, between 0 and 3600000 ms. The default value is 0 ms. When 0 is used
for the value, the reachable time is sent as undetermined. It is up to the receiving devices to set and track
the reachable time value. The neighbor reachable time enables detecting unavailable neighbors. Shorter
configured times enable detecting unavailable neighbors more quickly, however, shorter times consume
more IPv6 network bandwidth and processing resources in all IPv6 network devices. Very short configured
times are not recommended in normal IPv6 operation.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 Click IPv6, and then Prefixes.
Step 4 (Optional) To configure which IPv6 prefixes are included in IPv6 router advertisements, perform the following
steps:
a) Click ( )Add Prefix.
b) In the Address field, enter the IPv6 address with the prefix length or check the Default check box to use
the default prefix.
c) (Optional) Uncheck the Advertisement check box to indicate that the IPv6 prefix is not advertised. For
the Default prefix, this setting only applies to on-link prefixes. Off-link prefixes will still be advertised
unless you uncheck Advertisement for a specific off-link prefix.
d) Check the Off Link check box to indicate that the specified prefix is assigned to the link. Nodes sending
traffic to addresses that contain the specified prefix consider the destination to be locally reachable on the
link. This prefix should not be used for on-link determination.
e) To use the specified prefix for autoconfiguration, check the Autoconfiguration check box.
f) For the Prefix Lifetime, click Duration or Expiration Date.
• Duration—Enter a Preferred Lifetime for the prefix in seconds. This setting is the amount of time
that the specified IPv6 prefix is advertised as being valid. The maximum value represents infinity.
Valid values are from 0 to 4294967295. The default is 2592000 (30 days). Enter a Valid Lifetime
for the prefix in seconds. This setting is the amount of time that the specified IPv6 prefix is advertised
as being preferred. The maximum value represents infinity. Valid values are from 0 to 4294967295.
The default setting is 604800 (seven days). Alternatively, check the Infinite check box to set an
unlimited duration.
• Expiration Date—Choose a Valid and Preferred date and time.
g) Click OK.
Step 5 Click Settings.
Step 6 (Optional) Set the maximum number of DAD attempts, between 1 and 600. 1 attempt is the default. Set the
value to 0 to disable duplicate address detection (DAD) processing.
This setting configures the number of consecutive neighbor solicitation messages that are sent on an interface
while DAD is performed on IPv6 addresses.
During the stateless autoconfiguration process, Duplicate Address Detection verifies the uniqueness of new
unicast IPv6 addresses before the addresses are assigned to interfaces.
When a duplicate address is identified, the state of the address is set to DUPLICATE, the address is not used,
and the following error message is generated:
If the duplicate address is the link-local address of the interface, the processing of IPv6 packets is disabled
on the interface. If the duplicate address is a global address, the address is not used.
Step 7 (Optional) Configure the interval between IPv6 neighbor solicitation retransmissions in the NS Interval field,
between 1000 and 3600000 ms.
The default value is 1000 ms.
Neighbor solicitation messages (ICMPv6 Type 135) are sent on the local link by nodes attempting to discover
the link-layer addresses of other nodes on the local link. After receiving a neighbor solicitation message, the
destination node replies by sending a neighbor advertisement message (ICPMv6 Type 136) on the local link.
After the source node receives the neighbor advertisement, the source node and destination node can
communicate. Neighbor solicitation messages are also used to verify the reachability of a neighbor after the
link-layer address of a neighbor is identified. When a node wants to verifying the reachability of a neighbor,
the destination address in a neighbor solicitation message is the unicast address of the neighbor.
Neighbor advertisement messages are also sent when there is a change in the link-layer address of a node on
a local link.
Step 8 (Optional) Configure the amount of time that a remote IPv6 node is considered reachable after a reachability
confirmation event has occurred in the Reachable Time field, between 0 and 3600000 ms.
The default value is 0 ms. When 0 is used for the value, the reachable time is sent as undetermined. It is up
to the receiving devices to set and track the reachable time value.
The neighbor reachable time enables detecting unavailable neighbors. Shorter configured times enable detecting
unavailable neighbors more quickly, however, shorter times consume more IPv6 network bandwidth and
processing resources in all IPv6 network devices. Very short configured times are not recommended in normal
IPv6 operation.
Step 9 (Optional) To suppress the router advertisement transmissions, uncheck the Enable RA check box. If you
enable router advertisement transmissions, you can set the RA lifetime and interval.
Router advertisement messages (ICMPv6 Type 134) are automatically sent in response to router solicitation
messages (ICMPv6 Type 133). Router solicitation messages are sent by hosts at system startup so that the
host can immediately autoconfigure without needing to wait for the next scheduled router advertisement
message.
You may want to disable these messages on any interface for which you do not want the threat defense to
supply the IPv6 prefix (for example, the outside interface).
• RA Lifetime—Configure the router lifetime value in IPv6 router advertisements, between 0 and 9000
seconds.
The default is 1800 seconds.
• RA Interval—Configure the interval between IPv6 router advertisement transmissions, between 3 and
1800 seconds.
The default is 200 seconds.
To prevent synchronization with other IPv6 nodes, the firewall randomly adjusts the value that you set
(jitter).
Note You might want to assign unique MAC addresses to subinterfaces defined on the threat defense, because they
use the same burned-in MAC address of the parent interface. For example, your service provider might perform
access control based on the MAC address. Also, because IPv6 link-local addresses are generated based on
the MAC address, assigning unique MAC addresses to subinterfaces allows for unique IPv6 link-local addresses,
which can avoid traffic disruption in certain instances on the threat defense device.
Note For container instances, even if you are not sharing a subinterface, if you manually configure MAC addresses,
make sure you use unique MAC addresses for all subinterfaces on the same parent interface to ensure proper
classification.
• MAC addresses for all interfaces are taken from a MAC address pool. For subinterfaces, if you decide
to manually configure MAC addresses, make sure you use unique MAC addresses for all subinterfaces
on the same parent interface to ensure proper classification. See Automatic MAC Addresses for Container
Instance Interfaces, on page 311.
Default MTU
The default MTU on the threat defense device is 1500 bytes. This value does not include the 18-22 bytes for
the Ethernet header, VLAN tagging, or other overhead.
Note The threat defense device can receive frames larger than the configured MTU as long as there is room in
memory.
• Accommodating jumbo frames—You can set the MTU 9000 bytes or higher when you enable jumbo
frames. The maximum depends on the model.
Note Even if you explicitly set an MSS, if a component such as TLS/SSL decryption or server discovery needs a
particular MSS, it will set that MSS based on the interface MTU and ignore your MSS setting.
• Normal traffic—Disable the TCP MSS limit and accept the value established between connection
endpoints. Because connection endpoints typically derive the TCP MSS from the MTU, non-IPsec packets
usually fit this TCP MSS.
• IPv4 IPsec endpoint traffic—Set the maximum TCP MSS to the MTU - 120. For example, if you use
jumbo frames and set the MTU to 9000, then you need to set the TCP MSS to 8880 to take advantage
of the new MTU.
• IPv6 IPsec endpoint traffic—Set the maximum TCP MSS to the MTU - 140.
Note The dedicated Management interface never floods packets even if this parameter
is set to flood.
Default Settings
• If you enable ARP inspection, the default setting is to flood non-matching packets.
• The default timeout value for dynamic MAC address table entries is 5 minutes.
• By default, each interface automatically learns the MAC addresses of entering traffic, and the threat
defense device adds corresponding entries to the MAC address table.
Note Secure Firewall Threat Defense device generates a reset packet to reset a
connection that is denied by a stateful inspection engine. Here, the destination
MAC address of the packet is not determined based on the ARP table lookup but
instead it is taken directly from the packets (connections) that are being denied.
Caution Changing the highest MTU value on the device for a data interface restarts the Snort process when you deploy
configuration changes, temporarily interrupting traffic inspection. Inspection is interrupted on all data interfaces,
not just the interface you modified. Whether this interruption drops traffic or passes it without further inspection
depends on the model of the managed device and the interface type. This caution does not apply to
management-only interfaces. See Snort Restart Traffic Behavior, on page 246 for more information.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 On the General tab, set the MTU. The minimum and maximum depends on your platform.
The default is 1500 bytes.
Step 6 For the ISA 3000 and the threat defense virtual, if you set the MTU above 1500 bytes, restart the system to
enable jumbo-frame reservation. See Shut Down or Restart the Device, on page 62.
Note For container instances, even if you are not sharing a subinterface, if you manually configure MAC addresses,
make sure you use unique MAC addresses for all subinterfaces on the same parent interface to ensure proper
classification.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 Click the Advanced tab.
The Information tab is selected.
Step 4 (For clustering in individual interface mode) Choose a MAC address pool from the drop-down list.
You can add MAC address pools according to Address Pools, on page 1354.
Step 5 (For other modes) Set the active and standby MAC addresses.
a) In the Active MAC Address field, enter a MAC address in H.H.H format, where H is a 16-bit hexadecimal
digit.
For example, the MAC address 00-0C-F1-42-4C-DE would be entered as 000C.F142.4CDE. The MAC
address must not have the multicast bit set, that is, the second hexadecimal digit from the left cannot be
an odd number.
b) In the Standby MAC Address field, enter a MAC address for use with High Availability.
If the active unit fails over and the standby unit becomes active, the new active unit starts using the active
MAC addresses to minimize network disruption, while the old active unit uses the standby address.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 Click the Advanced tab, and then click the ARP tab (called ARP and MAC for transparent mode).
Step 4 Click ( )Add ARP Config.
The Add ARP Config dialog box appears.
Step 5 In the IP Address field, enter the IP address of the host.
Step 6 In the MAC Address field, enter the MAC address of the host; for example, 00e0.1e4e.3d8b.
Step 7 To perform proxy ARP for this address, check the Enable Alias check box.
If the threat defense device receives an ARP request for the specified IP address, then it responds with the
specified MAC address.
Step 8 Click OK, and then click OK again to exit the Advanced settings.
Step 9 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
Add a Static MAC Address and Disable MAC Learning for a Bridge Group
Normally, MAC addresses are added to the MAC address table dynamically as traffic from a particular MAC
address enters an interface. You can disable MAC address learning; however, unless you statically add MAC
addresses to the table, no traffic can pass through the threat defense device. You can also add static MAC
addresses to the MAC address table. One benefit to adding static entries is to guard against MAC spoofing.
If a client with the same MAC address as a static entry attempts to send traffic to an interface that does not
match the static entry, then the threat defense device drops the traffic and generates a system message. When
you add a static ARP entry (see Add a Static ARP Entry, on page 872), a static MAC address entry is
automatically added to the MAC address table.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 Click the Advanced tab, and then click the ARP and MAC tab.
Step 4 (Optional) Disable MAC learning by unchecking the Enable MAC Learning check box.
Step 5 To add a static MAC address, click Add MAC Config.
The Add MAC Config dialog box appears.
Step 6 In the MAC Address field, enter the MAC address of the host; for example, 00e0.1e4e.3d8b. Click OK.
Step 7 Click OK to exit the Advanced settings.
Step 8 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 Click the Advanced tab, and then click the Security Configuration tab.
Step 4 To enable Unicast Reverse Path Forwarding, check the Enable Anti Spoofing check box.
Step 5 To enable full fragment reassembly, check the Allow Full Fragment Reassembly check box.
Step 6 To change the number of fragments allowed per packet, check the Override Default Fragment Setting check
box, and set the following values:
• Size—Set the maximum number of packets that can be in the IP reassembly database waiting for
reassembly. The default is 200. Set this value to 1 to disable fragments.
• Chain—Set the maximum number of packets into which a full IP packet can be fragmented. The default
is 24 packets.
• Timeout—Set the maximum number of seconds to wait for an entire fragmented packet to arrive. The
timer starts after the first fragment of a packet arrives. If all fragments of the packet do not arrive by the
number of seconds specified, all fragments of the packet that were already received will be discarded.
The default is 5 seconds.
Secure Firewall 1210CP 7.7.0 7.7.0 See the following improvements related to support for IEEE 802.3bt:
IEEE 802.3bt support
• PoE++ and Hi-PoE—Up to 90W per port.
(PoE++ and Hi-PoE)
• Single- and dual-signature powered devices (PDs).
• Power budgeting is done on a first-come, first-served basis.
• Power budget fields were added to show power inline.
Secure Firewall supports 7.6 7.6 The Secure Firewall supports the dual-arm deployment mode on AWS with
Dual-Arm Deployment GWLB. This mode enables the firewall to directly forward internet-bound
Mode on AWS with traffic to the internet through the internet gateway after traffic inspection, while
GWLB also performing network address translation (NAT).
Secure Firewall 7.6 7.6 The Secure Firewall 1210/1220 supports setting each Ethernet interface to be
1210/1220 hardware a switch port or a firewall interface
switch support
Secure Firewall 1210CP 7.6 7.6 The Secure Firewall 1210CP supports Power over Ethernet+ (PoE+) on Ethernet
PoE+ support on Ethernet ports 1/5-1/8.
ports 1/5-1/8
VXLAN VTEP IPv6 7.4 Any You can now specify an IPv6 address for the VXLAN VTEP interface. IPv6
support is not supported for the threat defense virtual cluster control link or for Geneve
encapsulation.
New/Modified screens:
• Devices > Device Management > Edit > VTEP > Add VTEP
Devices > Device Management > Edit > Interfaces > Add Interfaces >
VNI Interface
Loopback interface 7.4 Any You can use a loopback interface for:
support for BGP and
• AAA
management traffic
• BGP
• DNS
• HTTP
• ICMP
• IPsec Flow Offload
• NetFlow
• SNMP
• SSH
• Syslog
Loopback interface 7.3 Any You can now add a loopback interface. The loopback interface helps to
support for VTI overcome path failures. If an interface goes down, you can access all interfaces
through the IP address assigned to the loopback interface. For VTI, in addition
to setting a loopback interface as the source interface, support has also been
added to inherit the IP address from a loopback interface instead of a statically
configured IP address.
New/Modified screens:
Devices > Device Management > Interfaces > Add Interfaces > Add
Loopback Interface
IPv6 DHCP 7.3 Any The threat defense now supports the following features for IPv6 addressing:
• DHCPv6 Address client—The threat defense obtains an IPv6 global
address and optional default route from the DHCPv6 server.
• DHCPv6 Prefix Delegation client—The threat defense obtains delegated
prefix(es) from a DHCPv6 server. The threat defense can then use these
prefixes to configure other threat defense interface addresses so that
StateLess Address Auto Configuration (SLAAC) clients can autoconfigure
IPv6 addresses on the same network.
• BGP router advertisement for delegated prefixes
• DHCPv6 stateless server—The threat defense provides other information
such as the domain name to SLAAC clients when they send Information
Request (IR) packets to the threat defense. The threat defense only accepts
IR packets, and does not assign addresses to the clients.
New/Modified screens:
• Devices > Device Management > Interfaces > Add/Edit Interfaces >
IPv6 > DHCP
• Objects > Object Management > DHCP IPv6 Pool
New/Modified commands: show bgp ipv6 unicast, show ipv6 dhcp, show
ipv6 general-prefix
Paired proxy VXLAN for 7.3 Any You can configure a paired proxy mode VXLAN interface for the threat defense
the threat defense virtual virtual in Azure for use with the Azure Gateway Load Balancer (GWLB). The
for the Azure Gateway threat defense virtual defines an external interface and an internal interface on
Load Balancer a single NIC by utilizing VXLAN segments in a paired proxy.
New/Modified screens:
• Devices > Device Management > Device > Interfaces > Add
Interfaces > VNI Interface
Geneve support for the 7.1 Any Geneve encapsulation support was added for the threat defense virtual to support
Threat Defense Virtual single-arm proxy for the Amazon Web Services (AWS) Gateway Load Balancer.
The AWS Gateway Load Balancer combines a transparent network gateway
(with a single entry and exit point for all traffic) and a load balancer that
distributes traffic and scales threat defense virtual to match the traffic demand.
This feature requires Snort 3.
New/Modified screens:
• Devices > Device Management > Device > VTEP
• Devices > Device Management > Device > Interfaces > Add
Interfaces > VNI Interface
• Devices > Device Management > Device > Interfaces edit physical
interface > General
31-bit Subnet Mask 7.0 Any For routed interfaces, you can configure an IP address on a 31-bit subnet for
point-to-point connections. The 31-bit subnet includes only 2 addresses;
normally, the first and last address in the subnet is reserved for the network
and broadcast, so a 2-address subnet is not usable. However, if you have a
point-to-point connection and do not need network or broadcast addresses, a
31-bit subnet is a useful way to preserve addresses in IPv4. For example, the
failover link between 2 FTDs only requires 2 addresses; any packet that is
transmitted by one end of the link is always received by the other, and
broadcasting is unnecessary. You can also have a directly-connected
management station running SNMP or Syslog. This feature is not supported
for BVIs for bridge groups or with multicast routing.
New/Modified screens:
Devices > Device Management > Interfaces
Synchronization between 6.7 Any The Firepower 4100/9300 chassis can now synchronize the threat defense
the threat defense operational link state with the physical link state for data interfaces. Currently,
operational link state and interfaces will be in an Up state as long as the FXOS admin state is up and the
the physical link state for physical link state is up. The threat defense application interface admin state
the Firepower 4100/9300 is not considered. Without synchronization from threat defense, data interfaces
can be in an Up state physically before the threat defense application has
completely come online, for example, or can stay Up for a period of time after
you initiate an threat defense shutdown. For inline sets, this state mismatch can
result in dropped packets because external routers may start sending traffic to
the threat defense before the threat defense can handle it. This feature is disabled
by default, and can be enabled per logical device in FXOS.
Note
This feature is not supported for clustering, container instances, or threat
defense with a Radware vDP decorator. It is also not supported for ASA.
Firepower 1010 hardware 6.5 Any The Firepower 1010 supports setting each Ethernet interface to be a switch
switch support port or a firewall interface.
New/Modified screens:
• Devices > Device Management > Interfaces
• Devices > Device Management > Interfaces > Edit Physical Interface
• Devices > Device Management > Interfaces > Add VLAN Interface
Firepower 1010 PoE+ 6.5 Any The Firepower 1010 supports Power over Ethernet+ (PoE+) on Ethernet 1/7
support on Ethernet 1/7 and Ethernet 1/8 when they are configured as switch ports.
and Ethernet 1/8
New/Modified screens:
Devices > Device Management > Interfaces > Edit Physical Interface >
PoE
VLAN subinterfaces for 6.3.0 Any To provide flexible physical interface use, you can create VLAN subinterfaces
use with container in FXOS and also share interfaces between multiple instances.
instances
New/Modified Secure Firewall Management Center screens:
Devices > Device Management > Edit icon > Interfaces tab
New/Modified Secure Firewall chassis manager screens:
Interfaces > All Interfaces > Add New drop-down menu > Subinterface
New/Modified FXOS commands: create subinterface, set vlan, show
interface,show subinterface
Supported platforms: Firepower 4100/9300
Data-sharing interfaces 6.3.0 Any To provide flexible physical interface use, you can share interfaces between
for container instances multiple instances.
New/Modified Secure Firewall chassis manager screens:
Interfaces > All Interfaces > Type
New/Modified FXOS commands: set port-type data-sharing, show interface
Supported platforms: Firepower 4100/9300
Integrated Routing and 6.2.0 Any Integrated Routing and Bridging provides the ability to route between a bridge
Bridging group and a routed interface. A bridge group is a group of interfaces that the
threat defense bridges instead of routes. The threat defense is not a true bridge
in that the threat defense continues to act as a firewall: access control between
interfaces is controlled, and all of the usual firewall checks are in place.
Previously, you could only configure bridge groups in transparent firewall
mode, where you cannot route between bridge groups. This feature lets you
configure bridge groups in routed firewall mode, and to route between bridge
groups and between a bridge group and a routed interface. The bridge group
participates in routing by using a Bridge Virtual Interface (BVI) to act as a
gateway for the bridge group. Integrated Routing and Bridging provides an
alternative to using an external Layer 2 switch if you have extra interfaces on
the threat defense to assign to the bridge group. In routed mode, the BVI can
be a named interface and can participate separately from member interfaces in
some features, such as access rules and DHCP server.
The following features that are supported in transparent mode are not supported
in routed mode: clustering. The following features are also not supported on
BVIs: dynamic routing and multicast routing.
New/Modified screens:
• Devices > Device Management > Interfaces > Edit Physical Interface
• Devices > Device Management > Interfaces > Add Interfaces > Bridge
Group Interface
Supported platforms: All except for the Firepower 2100 and the threat defense
virtual
Note The firewall mode only affects regular firewall interfaces, and not IPS-only interfaces such as inline sets or
passive interfaces. IPS-only interfaces can be used in both firewall modes.
Inline Sets
An inline set acts like a bump on the wire, and binds one or more interface pairs together to slot into an existing
network. This function allows the threat defense to be installed in any network environment without the
configuration of adjacent network devices. Inline interfaces receive all traffic unconditionally, but all traffic
received on these interfaces is retransmitted out of the other interface in the inline pair unless explicitly
dropped. When you have multiple inline pairs in an inline set, traffic can only pass between the interfaces in
the pair; it can't pass between interfaces in different pairs.
With tap mode, the threat defense is deployed inline, but the network traffic flow is undisturbed. Instead, the
threat defense makes a copy of each packet so that it can analyze the packets. Note that rules of these types
do generate intrusion events when they are triggered, and the table view of intrusion events indicates that the
triggering packets would have dropped in an inline deployment. There are benefits to using tap mode with
FTDs that are deployed inline. For example, you can set up the cabling between the threat defense and the
network as if the threat defense were inline and analyze the kinds of intrusion events the threat defense
generates. Based on the results, you can modify your intrusion policy and add the drop rules that best protect
your network without impacting its efficiency. When you are ready to deploy the threat defense inline, you
can disable tap mode and begin dropping suspicious traffic without having to reconfigure the cabling between
the threat defense and the network.
Note Tap mode significantly impacts threat defense performance, depending on the traffic.
Note Inline sets might be familiar to you as "transparent inline sets," but the inline interface type is unrelated to the
transparent firewall mode or the firewall-type interfaces.
Note If you assign multiple inline pairs to a single inline set, but you experience issues with duplicate traffic, you
might need to reassign your inline pairs to separate inline sets or modify your security zones.
If fragments of a packet are received on different interface pairs, they are not reassembled and get dropped.
Make sure all the fragments of the packet are received and sent on the same interface pair.
Passive Interfaces
Passive interfaces monitor traffic flowing across a network using a switch SPAN or mirror port. The SPAN
or mirror port allows for traffic to be copied from other ports on the switch. This function provides the system
visibility within the network without being in the flow of network traffic. When you configure the threat
defense in a passive deployment, the threat defense cannot take certain actions such as blocking or shaping
traffic. Passive interfaces receive all traffic unconditionally. and no traffic received on these interfaces is
retransmitted. Encapsulated remote switched port analyzer (ERSPAN) interfaces allow you to monitor traffic
from source ports distributed over multiple switches, and uses GRE to encapsulate the traffic. ERSPAN
interfaces are only allowed when the threat defense is in routed firewall mode.
Note Using SR-IOV interfaces as passive interfaces on NGFWv is not supported on some Intel network adapters
(such as Intel X710 or 82599) using SR-IOV drivers due to a promiscuous mode restriction. In such cases,
use a network adapter that supports this functionality. See Intel Ethernet Products for more information on
Intel network adapters.
Note Hardware bypass is intended for unplanned/unexpected failure scenarios, and is not automatically triggered
during planned software upgrades. Hardware bypass only engages at the end of a planned upgrade process,
when the threat defense application reboots.
Note The ISA 3000 has a separate implementation for Hardware Bypass, which you can enable using FlexConfig
only (see FlexConfig Policies, on page 2617). Do not use this chapter to configure ISA 3000 Hardware Bypass.
Note You can use Hardware Bypass interfaces as regular interfaces without the Hardware Bypass feature enabled.
The supported Hardware Bypass network modules for these models include:
• Secure Firewall 3100:
• 6-port 1G SFP Fail-to-Wire Network Module, SX (multimode) (FPR3K-XNM-6X1SXF)
• 6-port 10G SFP Fail-to-Wire Network Module, SR (multimode) (FPR3K-XNM-6X10SRF)
• 6-port 10G SFP Fail-to-Wire Network Module, LR (single mode) (FPR3K-XNM-6X10LRF)
• 6-port 25G SFP Fail-to-Wire Network Module, SR (multimode) (FPR3K-XNM-X25SRF)
• 6-port 25G Fail-to-Wire Network Module, LR (single mode) (FPR3K-XNM-6X25LRF)
• 8-port 1G Copper Fail-to-Wire Network Module, RJ45 (copper) (FPR3K-XNM-8X1GF)
• Firepower 4100:
• Firepower 6-port 1G SX FTW Network Module single-wide (FPR4K-NM-6X1SX-F)
• Firepower 6-port 10G SR FTW Network Module single-wide (FPR4K-NM-6X10SR-F)
• Firepower 6-port 10G LR FTW Network Module single-wide (FPR4K-NM-6X10LR-F)
• Firepower 2-port 40G SR FTW Network Module single-wide (FPR4K-NM-2X40G-F)
• Firepower 8-port 1G Copper FTW Network Module single-wide (FPR-NM-8X1G-F)
• Firepower 9300:
• Firepower 6-port 10G SR FTW Network Module single-wide (FPR9K-NM-6X10SR-F)
• Firepower 6-port 10G LR FTW Network Module single-wide (FPR9K-NM-6X10LR-F)
• Firepower 2-port 40G SR FTW Network Module single-wide (FPR9K-NM-2X40G-F)
Clustering
• Link State Propagation for an inline set is not supported with clustering.
• IPS-only interfaces are not supported in Individual interface mode.
Multi-Instance Mode
• Multi-instance shared interfaces are not supported. You must use an unshared interface.
• Multi-instance chassis-defined subinterfaces are not supported. You must use a physical interface or
EtherChannel.
General Guidelines
• Inline sets and passive interfaces support physical interfaces and EtherChannels only, and cannot use
VLANs or other virtual interfaces, including multi-instance chassis-defined subinterfaces.
• Since IPS interfaces do not support regular firewall protections, the IPS security policy (Snort) requires
that traffic flows pass through the same threat defense so that all traffic can be inspected.
• Bidirectional Forwarding Detection (BFD) echo packets are not allowed through the threat defense when
using inline sets. If there are two neighbors on either side of the threat defense running BFD, then the
threat defense will drop BFD echo packets because they have the same source and destination IP address
and appear to be part of a LAND attack.
• For inline sets and passive interfaces, the threat defense supports up to two 802.1Q headers in a packet
(also known as Q-in-Q support), with the exception of the Firepower 4100/9300, which only supports
one 802.1Q header. Note: Firewall-type interfaces do not support Q-in-Q, and only support one 802.1Q
header.
• DHCP client
• TCP Intercept
• Routing
• NAT
• VPN
• Application inspection
• QoS
• NetFlow
• VXLAN
Note For the Secure Firewall Threat Defense on the FXOS chassis, you configure basic interface settings on the
Firepower 4100/9300. See Configure a Physical Interface, on page 324 for more information.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 In the Mode drop-down list, choose Passive or Erspan.
Step 4 Enable the interface by checking the Enabled check box.
Step 5 In the Name field, enter a name up to 48 characters in length.
Step 6 From the Security Zone drop-down list, choose a security zone or add a new one by clicking New.
Step 7 (Optional) Add a description in the Description field.
The description can be up to 200 characters on a single line, without carriage returns.
Step 8 (Optional) On General, set the MTU between 64 and 9198 bytes; for the Secure Firewall Threat Defense
Virtual and Secure Firewall Threat Defense on the FXOS chassis, the maximum is 9000 bytes.
The default is 1500 bytes.
Step 10 For ERSPAN interfaces, set the IPv4 address and mask on IPv4.
Step 11 (Optional) Set the duplex and speed by clicking Hardware Configuration.
The exact speed and duplex options depend on your hardware.
• Duplex—Choose Full, Half, or Auto. Auto is the default.
• Speed—Choose 10, 100, 1000, or Auto. Auto is the default.
Note For the Firepower 4100/9300, you configure basic interface settings in FXOS on the chassis. See Configure
a Physical Interface, on page 324 for more information.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 For each interface in the inline pair, name the interface and enable it. You can also configure other hardware
settings. Be sure to match the hardware settings for each interface in the inline pair. You can configure multiple
pairs of interfaces.
a) Click Edit ( ) for the interface you want to edit.
b) In the Name field, enter a name up to 48 characters in length.
c) Enable the interface by checking the Enabled check box.
d) (Optional) Add a description in the Description field.
The description can be up to 200 characters on a single line, without carriage returns.
e) Leave the Mode as None.
After you add this interface to an inline set, this field will show Inline for the mode.
f) Do not set the security zone yet; you must set it after you create the inline set later in this procedure.
g) (Optional) Set the duplex and speed by clicking Hardware Configuration.
The exact speed and duplex options depend on your hardware.
• Duplex—Choose Full, Half, or Auto. Auto is the default.
• Speed—Choose 10, 100, 1000, or Auto. Auto is the default.
h) Click OK.
Do not set any other settings for this interface.
The Add Inline Set dialog box appears with General selected.
Step 5 In the Name field, enter a name for the set.
Step 6 (Optional) Change the MTU to enable jumbo frames.
For inline sets, the MTU setting is not used. However, the jumbo frame setting is relevant to inline sets; jumbo
frames enable the inline interfaces to receive packets up to 9000 bytes. To enable jumbo frames, you must
set the MTU of any interface on the device above 1500 bytes.
b) In the Available Interfaces Pairs area, click a pair and then click Add to move it to the Selected Interface
Pair area.
All possible pairings between named and enabled interfaces with the mode set to None show in this area.
Note that you cannot enable this option and strict TCP enforcement on the same inline set.
Note
If you need to enable or disable the Tap mode, you should do so during a maintenance window. Changing
the mode while the device is passing traffic can cause traffic disruption.
Note
Tap mode significantly impacts the threat defense performance, depending on the traffic.
• Snort Fail Open—Enable or disable either or both of the Busy and Down options if you want new and
existing traffic to pass without inspection (enabled) or drop (disabled) when the Snort process is busy or
down.
By default, traffic passes without inspection when the Snort process is down, and drops when it is busy.
When the Snort process is:
• Busy—It cannot process traffic fast enough because traffic buffers are full, indicating that there is
more traffic than the device can handle, or because of other software resource issues.
• Down—It is restarting because you deployed a configuration that requires it to restart. See
Configurations that Restart the Snort Process When Deployed or Activated, on page 248.
When the Snort process is down and comes back up, it inspects new connections. To prevent false positives
and false negatives, it does not inspect existing connections on inline, routed, or transparent interfaces
because initial session information might have been lost while it was down.
Note
When Snort fails open, features that rely on the Snort process do not function. These include application
control and deep inspection. The system performs only basic access control using simple, easily determined
transport and network layer characteristics.
Note
The Strict TCP Enforcement option is not supported.
You can only set the zone after you add the interface to the inline set; adding it to an inline set configures
the mode to Inline and lets you choose inline-type security zones.
d) Click OK.
Step 10 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
Hardware bypass support 7.4.0 7.4.0 The Secure Firewall 4200 supports hardware bypass functionality when using
on the Secure Firewall the hardware bypass network modules.
4200 for supported
New/Modified screens:
network modules
Devices > Device Management > Interfaces > Edit Physical Interface
Supported platforms: Secure Firewall 4200
Hardware bypass support 7.2 Any The Secure Firewall 3100 now supports hardware bypass functionality when
on the Secure Firewall using the hardware bypass network modules.
3100 for supported
New/Modified screens:
network modules
Devices > Device Management > Interfaces > Edit Physical Interface
Supported platforms: Secure Firewall 3100
Synchronization between 6.7 Any The Firepower 4100/9300 chassis can now synchronize the threat defense
the threat defense operational link state with the physical link state for data interfaces. Currently,
operational link state and interfaces will be in an Up state as long as the FXOS admin state is up and the
the physical link state for physical link state is up. The threat defense application interface admin state
the Firepower 4100/9300 is not considered. Without synchronization from threat defense, data interfaces
can be in an Up state physically before the threat defense application has
completely come online, for example, or can stay Up for a period of time after
you initiate a shutdown. For inline sets, this state mismatch can result in dropped
packets because external routers may start sending traffic to the threat defense
before the threat defense can handle it. This feature is disabled by default, and
can be enabled per logical device in FXOS.
Note
This feature is not supported for clustering, container instances, or threat
defense with a Radware vDP decorator. It is also not supported for ASA.
Hardware bypass support 6.3.0 Any The Firepower 2130 and 2140 now support hardware bypass functionality
on the Firepower 2130 when using the hardware bypass network modules.
and 2140 for supported
New/Modified screens:
network modules
Devices > Device Management > Interfaces > Edit Physical Interface
Supported platforms: Firepower 2130 and 2140
Support for 6.2.0 Any You can now use EtherChannels in a threat defense inline set or passive
EtherChannels in threat interface.
defense inline sets or
passive interface
Hardware bypass support 6.1.0 Any Hardware Bypass ensures that traffic continues to flow between an inline
on the Firepower interface pair during a power outage. This feature can be used to maintain
4100/9300 for supported network connectivity in the case of software or hardware failures.
network modules
New/Modified screens:
Devices > Device Management > Interfaces > Edit Physical Interface
Supported platforms: Firepower 4100/9300
Inline set link state 6.1.0 Any When you configure an inline set in the threat defense application and enable
propagation support for link state propagation, the threat defense sends inline set membership to the
the threat defense FXOS chassis. Link state propagation means that the chassis automatically
brings down the second interface in the inline interface pair when one of the
interfaces in an inline set goes down.
New/Modified FXOS commands: show fault |grep link-down, show interface
detail
DHCP Options
DHCP provides a framework for passing configuration information to hosts on a TCP/IP network. The
configuration parameters are carried in tagged items that are stored in the Options field of the DHCP message
and the data are also called options. Vendor information is also stored in Options, and all of the vendor
information extensions can be used as DHCP options.
For example, Cisco IP Phones download their configuration from a TFTP server. When a Cisco IP Phone
starts, if it does not have both the IP address and TFTP server IP address preconfigured, it sends a request
with option 150 or 66 to the DHCP server to obtain this information.
• DHCP option 150 provides the IP addresses of a list of TFTP servers.
• DHCP option 66 gives the IP address or the hostname of a single TFTP server.
• DHCP option 3 sets the default route.
A single request might include both options 150 and 66. In this case, the DHCP server provides values for
both options in the response if they are already configured on the threat defense.
You can use advanced DHCP options to provide DNS, WINS, and domain name parameters to DHCP clients;
DHCP option 15 is used for the DNS domain suffix. You can also use the DHCP automatic configuration
setting to obtain these values or define them manually. When you use more than one method to define this
information, it is passed to DHCP clients in the following sequence:
1. Manually configured settings.
2. Advanced DHCP options settings.
3. DHCP automatic configuration settings.
For example, you can manually define the domain name that you want the DHCP clients to receive and then
enable DHCP automatic configuration. Although DHCP automatic configuration discovers the domain together
with the DNS and WINS servers, the manually defined domain name is passed to DHCP clients with the
discovered DNS and WINS server names, because the domain name discovered by the DHCP automatic
configuration process is superseded by the manually defined domain name.
User Roles
• Admin
• Access Admin
• Network Admin
Firewall Mode
• DHCP Relay is not supported in transparent firewall mode or in routed mode on the BVI or bridge group
member interface.
• DHCP Server is supported in transparent firewall mode on a bridge group member interface. In routed
mode, the DHCP server is supported on the BVI interface, not the bridge group member interface. The
BVI must have a name for the DHCP server to operate.
• DDNS is not supported in transparent firewall mode or in routed mode on the BVI or bridge group
member interface.
• DHCPv6 stateless server is not supported in transparent firewall mode or in routed mode on the BVI or
bridge group member interface.
Clustering
• DHCPv6 stateless server is not supported with clustering.
IPv6
Supports IPv6 for DHCP stateless server and DHCP Relay.
DHCPv4 Server
• The maximum available DHCP pool is 256 addresses.
• You can configure a DHCP server on any interface with a name and IP address, such as a physical
interface, a subinterface, or a BVI in routed mode.
• You can configure only one DHCP server on each interface. Each interface can have its own pool of
addresses to use. However the other DHCP settings, such as DNS servers, domain name, options, ping
timeout, and WINS servers, are configured globally and used by the DHCP server on all interfaces.
• You cannot configure an interface as a DHCP client if that interface also has DHCP server enabled; you
must use a static IP address.
• You cannot configure both a DHCP server and DHCP relay on the same device, even if you want to
enable them on different interfaces; you can only configure one type of service.
• The threat defense does not support QIP DHCP servers for use with the DHCP proxy service.
DHCPv6 Server
The DHCPv6 Stateless server cannot be configured on an interface where the DHCPv6 address, Prefix
Delegation client, or DHCPv6 relay is configured.
DHCP Relay
• You can configure a maximum of 10 DHCPv4 relay servers per virtual router, global (VRF) and
interface-specific servers combined, with a maximum of 4 servers per interface.
• You can configure a maximum of 10 DHCPv6 relay servers per virtual router. Interface-specific servers
for IPv6 are not supported.
• You cannot configure both a DHCP server and DHCP relay on the same device, even if you want to
enable them on different interfaces; you can only configure one type of service.
• DHCP relay services are not available in transparent firewall mode or in routed mode on the BVI or
bridge group member interface. You can, however, allow DHCP traffic through using an access rule. To
allow DHCP requests and replies through the threat defense, you need to configure two access rules, one
that allows DCHP requests from the inside interface to the outside (UDP destination port 67), and one
that allows the replies from the server in the other direction (UDP destination port 68).
• For IPv4, clients must be directly-connected to the threat defense and cannot send requests through
another relay agent or a router. For IPv6, the threat defense supports packets from another relay server.
• The DHCP clients must be on different interfaces from the DHCP servers to which the threat defense
relays requests.
• You cannot enable DHCP Relay on an interface in a traffic zone.
DDNS Service
The firewall's DDNS supports only DynDNS service. Hence, ensure that the DDNS is configured with update
URL in the following syntax:
[Link]
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Select DHCP > DHCP Server.
Step 3 Configure the following DHCP server options:
• Ping Timeout—The amount of time in milliseconds that threat defense device waits to time out a DHCP
ping attempt. Valid values range from 10 to 10000 milliseconds. The default value is 50 milliseconds.
To avoid address conflicts, the threat defense device sends two ICMP ping packets to an address before
assigning that address to a DHCP client.
• Lease Length—The amount of time in seconds that the client may use its allocated IP address before
the lease expires. Valid values range from 300 to 1048575 seconds. The default value is 3600 seconds
(1 hour).
• (Routed mode) Auto-configuration—Enables DHCP auto configuration on the threat defense device.
Auto-configuration enables the DHCP server to provide the DHCP clients with the DNS server, domain
name, and WINS server information obtained from a DHCP client running on the specified interface.
Otherwise, you can disable auto configuration and add the values yourself in Step 4.
• (Routed mode) Interface—Specifies the interface to be used for auto configuration. For a device with
virtual routing capability, this interface can only be a global virtual router interface.
Step 5 Select Server, click Add, and configure the following options:
• Interface—Choose the interface from the drop-down list. In transparent mode, specify a named bridge
group member interface. In routed mode, specify a named routed interface or a named BVI; do not specify
the bridge group member interface. Note that each bridge group member interface for the BVI must also
be named for the DHCP server to operate.
• Address Pool—The range of IP addresses from lowest to highest that is used by the DHCP server. The
range of IP addresses must be on the same subnet as the selected interface and cannot include the IP
address of the interface itself.
• Enable DHCP Server—Enables the DHCP server on the selected interface.
• Type—DHCP option type. Available options include IP, ASCII, and HEX. If you chose IP, you must
add IP addresses in the IP Address fields. If you chose ASCII, you must add the ASCII value in the
ASCII field. If you chose HEX, you must add the HEX value in the HEX field.
• IP Address 1 and IP Address 2—The IP address(es) to be returned with this option code. To add a new
IP address, see Creating Network Objects, on page 1383.
• ASCII—The ASCII value that is returned to the DHCP client. The string cannot include spaces.
• HEX—The HEX value that is returned to the DHCP client. The string must have an even number of
digits and no spaces. You do not need to use a 0x prefix.
Procedure
You can mix and match manually-configured parameters with imported parameters; however, you cannot
configure the same parameter manually and also use Import.
Figure 382: Manually Define Values
a) Click Add ( ).
b) Choose the server type under Option, and either manually define the Domain Name and Address, or
check Import.
Figure 385: Define Server Domain Name and Address
Import uses one or more parameters that the threat defense obtained from the DHCPv6 server on the
Prefix Delegation client interface. You can mix and match manually-configured parameters with imported
parameters; however, you cannot configure the same parameter manually and also use Import.
c) Click Save.
d) Repeat for each server type.
Step 6 Click Save.
Step 7 Use this pool with the DHCPv6 server. See Enable the DHCPv6 Stateless Server, on page 907.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 Click the IPv6 page, and then click DHCP.
Step 4 Click DHCP Server Pool, and choose the object you created earlier.
Figure 386: Enable the DHCPv6 Server
Step 5 Check Enable DHCP for non-address config to inform SLAAC clients about the DHCPv6 server.
This flag informs IPv6 autoconfiguration clients that they should use DHCPv6 to obtain additional information
from DHCPv6, such as the DNS server address.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Select DHCP > DHCP Relay.
Step 3 In the IPv4 Relay Timeout and IPv6 Relay Timeout fields, enter the amount of time in seconds that the
threat defense device waits to time out the DHCP relay agent. Valid values range from 1 to 3600 seconds.
The default value is 60 seconds.
The timeout is for address negotiation through the local DHCP Relay agent.
Step 4 (Optional) Check Trust All Information to set all client interfaces as trusted.
You can configure interfaces as trusted interfaces to preserve DHCP Option 82. DHCP Option 82 is used by
downstream switches and routers for DHCP snooping and IP Source Guard. Normally, if the threat defense
DHCP relay agent receives a DHCP packet with Option 82 already set, but the giaddr field (which specifies
the DHCP relay agent address that is set by the relay agent before it forwards the packet to the server) is set
to 0, then the threat defense will drop that packet by default. You can preserve Option 82 and forward the
packet by identifying an interface as a trusted interface.
Step 5 On DHCP Relay Agent, click Add, and configure the following options:
• Interface—The interface connected to the DHCP clients.
• Enable IPv4 Relay—Enables IPv4 DHCP Relay for this interface.
• Set Route—(For IPv4) Changes the default gateway address in the DHCP message from the server to
that of the threat defense device interface that is closest to the DHCP client, which relayed the original
DHCP request. This action allows the client to set its default route to point to the threat defense device
even if the DHCP server specifies a different router. If there is no default router option in the packet, the
threat defense device adds one containing the interface address.
You can configure different ownership depending on your security needs and the requirements of the
main DNS server. For example, for a static address, the threat defense should own the updates for both
records.
• Web—The Web update method uses the DynDNS Remote API specification
([Link]
With this method when the IP address or hostname changes, the threat defense sends an HTTP request
directly to a DNS provider with which you have an account.
Note For devices that were registered using zero-touch provisioning from the outside interface, DDNS is
automatically enabled using the "fmcOnly" method, which is similar to the Web method. This method is only
available for zero-touch provisioning devices. You can edit some options for this method using this screen,
or delete the method and configure a different one. For more information about zero-touch provisioning, see
Add a Device Using the Serial Number (Zero-Touch Provisioning)—Basic Configuration, on page 44.
The DDNS page also supports setting DHCP server settings relating to DDNS.
Note DDNS is not supported on the BVI or bridge group member interfaces.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose DHCP > DDNS.
Step 3 Standard DDNS method: Configure a DDNS update method to enable DNS requests from the threat defense.
You do not need to configure a DDNS update method if the DHCP server will perform all requests.
a) On DDNS Update Methods, click Add.
b) Set the Method Name.
c) Click DDNS.
d) (Optional) Configure the Update Interval between DNS requests. By default when all values are set to
0, update requests are sent whenever the IP address or hostname changes. To send requests regularly, set
the Days (0-364), Hours, Minutes, and Seconds.
e) Set the Update Records you want the threat defense to update.
This setting only affects the records you want to update directly from the threat defense; to determine the
records you want the DHCP server to update, configure the DHCP client settings per interface or globally.
See, Step 5, on page 911.
• Not Defined—Disables DNS updates from the threat defense.
• Both A and PTR Records—Sets the threat defense to update both A and PTR RRs. Use this option
for static or PPPoE IP addressing.
• A Records—Sets the threat defense to update the A RR only. Use this option if you want the DHCP
server to update the PTR RR.
f) Click OK.
g) Assign this method to the interface in Step 5, on page 911.
Step 4 Web method: Configure a DDNS update method to enable HTTP update requests from the threat defense.
a) On DDNS Update Methods, click Add.
b) Set the Method Name.
c) Click Web.
d) Set the Web Update Type to update IPv4, IPv6, or both types of addresses.
e) Set the Web URL. Specify the update URL. Check with your DNS provider for the URL required.
Use the following syntax:
[Link]
Example:
[Link]
f) (Optional) Configure the Update Interval between DNS requests. By default when all values are set to
0, update requests are sent whenever the IP address or hostname changes. To send requests regularly, set
the Days (0-364), Hours, Minutes, and Seconds.
g) Click OK.
h) Assign this method to the interface in Step 5, on page 911.
i) The web type method for DDNS also requires you to identify the DDNS server root CA to validate the
DDNS server certificate for the HTTPS connection. See, Step 9, on page 913.
Step 5 Configure interface settings for DDNS, including setting the update method, DHCP client settings, and the
hostname for this interface.
a) On DDNS Interface Settings, click Add.
b) Choose the Interface from the drop-down list.
c) Choose the Method Name that you created on the DDNS Update Methods page.
(Standard DDNS method) You do not need to assign a method if you want the DHCP server to perform
all updates.
d) Set the Host Name for this interface.
If you do not set the hostname, the device hostname is used. If you do not specify an FQDN, then the
default domain from the DNS server group is appended (for static or PPPoE IP addressing) or the domain
name from the DHCP server is appended (for DHCP IP addressing).
e) Standard DDNS method: Configure the DHCP Client requests DHCP server to update requests to
determine which records you want the DHCP server to update.
The threat defense sends DHCP client requests to the DHCP server. Note that the DHCP server must also
be configured to support DDNS. The server can be configured to honor the client requests, or it can
override the client (in which case, it will reply to the client so the client does not also try to perform updates
that the server is performing).
For static or PPPoE IP addressing, these settings are ignored.
Note
You can also set these values globally for all interfaces on the DDNS page. The per-interface settings
take precedence over the global settings.
• Not Selected—Disables DDNS requests to the DHCP server. Even if the client does not request
DDNS updates, the DHCP server can be configured to send updates anyway.
• No Update—Requests the DHCP server not to perform updates. This setting works in conjunction
with a DDNS update method with Both A and PTR Records enabled.
• Only PTR—Requests that the DHCP server perform the PTR RR update. This setting works in
conjunction with a DDNS update method with A Records enabled.
• Both A and PTR Records—Requests that the DHCP server perform both A and PTR RR updates.
This setting does not require a DDNS update method to be associated with the interface.
f) Click OK.
Note
The Dynamic DNS Update settings relate to DHCP server settings when you enable a DHCP server on the
threat defense. See, Step 6, on page 912 for more information.
Step 6 If you enable the DHCP server on an threat defense, you can configure DHCP server settings for DDNS.
To enable the DHCP server, see Configure the DHCPv4 Server, on page 902). You can configure the server
behavior when DHCP clients use the standard DDNS update method. If the server performs any updates, then
if the client lease expires (and is not renewed), the server will request that the DNS server remove the RRs
for which it was responsible.
a) You can configure server settings globally or per interface. For global settings, see the main DDNS page.
For per-interface settings, see the DDNS Interface Settings page. Interface settings take precedence over
global settings.
b) Configure which DNS RRs you want the DHCP server to update under Dynamic DNS Update.
• Not Selected—DDNS updates are disabled, even if the client requests them.
• Only PTR—Enables DDNS updates. If you enable the Override DHCP Client Requests setting,
then the server will only update the PTR RR. Otherwise, the server will update RRs that the client
requests. If the client does not send an update request with the FQDN option, the server will request
an update for both A and PTR RRs using the hostname discovered in DHCP option 12.
• Both A and PTR Records—Enables DDNS updates. If you enable the Override DHCP Client
Requests setting, then the server will update both the A and PTR RRs. Otherwise, the server will
update RRs that the client requests. If the client does not send an update request with the FQDN
option, the server will request an update for both A and PTR RRs using the hostname discovered in
DHCP option 12.
c) To override the update actions requested by the DHCP client, check Override DHCP Client Requests.
The server will reply to the client that the request was overridden, so the client does not also try to perform
updates that the server is performing.
Step 7 (Optional) Configure general DHCP client settings. These settings are not related to DDNS, but are related
to how the DHCP client behaves.
a) On the DDNS page, check Enable DHCP Client Broadcast to request that the DHCP server broadcast
the DHCP reply (DHCP option 1).
b) To force a MAC address to be stored inside a DHCP request packet for option 61 instead of the default
internally generated string, on DDNS > DHCP Client ID Interface, choose the interface from the
Available Interfaces list, and then click Add to move it to the Selected Interfaces list.
Some ISPs expect option 61 to be the interface MAC address. If the MAC address is not included in the
DHCP request packet, then an IP address will not be assigned. This setting does not directly relate to
DDNS, but is a general DHCP client setting.
• Enter a Name.
• Choose Enrollment Type > Manual.
• Click CA Only.
• Paste in the CA text from step 9.a, on page 913.
e) Click Save.
Configure DHCP relay 7.2.6/7.4.1 Any Upgrade impact. Redo any related FlexConfigs after upgrade.
trusted interfaces from
You can now use the management center web interface to configure interfaces
the management center
as trusted interfaces to preserve DHCP Option 82. If you do this, these settings
web interface.
override any existing FlexConfigs, although you should remove them.
DHCP Option 82 is used by downstream switches and routers for DHCP
snooping and IP Source Guard. Normally, if the threat defense DHCP relay
agent receives a DHCP packet with Option 82 already set, but the giaddr field
(which specifies the DHCP relay agent address that is set by the relay agent
before it forwards the packet to the server) is set to 0, then threat defense will
drop that packet by default. You can preserve Option 82 and forward the packet
by identifying an interface as a trusted interface.
New/modified screens: Devices > Device Management > Add/Edit Device >
DHCP > DHCP Relay
Other version restrictions: Not supported with management center Version
7.3.x or 7.4.0. If you upgrade to an unsupported version, redo your FlexConfigs.
DHCPv6 Stateless Server 7.3.0 7.3.0 The threat defense now supports a light DHCPv6 stateless server when using
the DHCPv6 Prefix Delegation client. The threat defense provides other
information such as the domain name to SLAAC clients when they send
Information Request (IR) packets to the threat defense. The threat defense only
accepts IR packets and does not assign addresses to the clients.
New/modified screens:
• Devices > Device Management > Interfaces > Add/Edit Interfaces >
IPv6 > DHCP
• Objects > Object Management > DHCP IPv6 Pool
The Firepower 1000 chassis supports SNMPv1, SNMPv2c and SNMPv3. Both SNMPv1 and SNMPv2c use
a community-based form of security; SNMPv3 use username and password for security.
Procedure
Name Description
Admin State check box Whether SNMP is enabled or disabled. Enable this service only if your
system includes integration with an SNMP server.
Port field The port on which the Firepower chassis communicates with the SNMP
host. You cannot change the default port.
Note that if the Community field is already set, the text to the right of
the empty field reads Set: Yes. If the Community field is not yet
populated with a value, the text to the right of the empty field reads Set:
No.
System Admin Name field The contact person responsible for the SNMP implementation.
Enter a string of up to 255 characters, such as an email address or a
name and telephone number.
Location field The location of the host on which the SNMP agent (server) runs.
Enter an alphanumeric string up to 510 characters.
What to do next
Create SNMP traps and users.
Procedure
Name Description
Host Name field The hostname or IP address of the SNMP host to which the Firepower
chassis should send the trap.
Community field The SNMP v1 or v2 community name or the SNMP v3 username the
Firepower chassis includes when it sends the trap to the SNMP host.
This must be the same as the community or username that is configured
for the SNMP service.
Enter an alphanumeric string between 1 and 32 characters. Do not use
@ (at sign), \ (backslash), " (double quote), ? (question mark) or an
empty space.
Port field The port on which the Firepower chassis communicates with the SNMP
host for the trap.
Enter an integer between 1 and 65535.
Version field The SNMP version and model used for the trap. This can be one of the
following:
• V1
• V2
• V3
Name Description
Type field If you select V2 or V3 for the version, the type of trap to send. This can
be one of the following:
• Traps
• Informs
Privilege field If you select V3 for the version, the privilege associated with the trap.
This can be one of the following:
• Auth—Authentication but no encryption
• Noauth—No authentication or encryption
• Priv—Authentication and encryption
Procedure
Name Description
Username field The username assigned to the SNMP user.
Enter up to 32 letters or numbers. The name must begin with a letter
and you can also specify _ (underscore), . (period), @ (at sign), and -
(hyphen).
Name Description
Use AES-128 checkbox If checked, this user uses AES-128 encryption.
Note
SNMPv3 does not support DES. If you leave the AES-128 box
unchecked, no privacy encryption will be done and any configured
privacy password will have no effect.
Introduction to QoS
Quality of Service, or QoS, rate limits (polices) network traffic that is allowed or trusted by access control.
The system does not rate limit traffic that was fastpathed.
Though QoS is supported only on the routed interfaces of threat defense devices, it is not supported on
site-to-site VPN and VTI interfaces.
Note The total number of rules including QoS rules on the device cannot exceed 255. When this threshold is reached,
a deployment warning message is displayed. You need to reduce the number of rules for a successful
deployment.
You must constrain QoS rules by source or destination (routed) interfaces. The system enforces rate limiting
independently on each of those interfaces; you cannot specify an aggregate rate limit for a set of interfaces.
QoS rules can also rate limit traffic by other network characteristics, as well as contextual information such
as application, URL, user identity, and custom Security Group Tags (SGTs).
You can rate limit download and upload traffic independently. The system determines download and upload
directions based on the connection initiator.
Note QoS is not subordinate to a main access control configuration; you configure QoS independently. However,
the access control and QoS policies deployed to the same device share identity configurations; see Associating
Other Policies with Access Control, on page 1737.
Supported Domains
Any
User Roles
Admin
Access Admin
Network Admin
Procedure
Step 3 Configure QoS rules; see Configuring QoS Rules, on page 926 and QoS Rule Conditions, on page 928.
The Rules in the QoS policy editor lists each rule in evaluation order, and displays a summary of the rule
conditions and rate limiting configurations. A right-click menu provides rule management options, including
moving, enabling, and disabling.
Helpful in larger deployments, you can Filter by Device to display only the rules that affect a specific device
or group of devices. You can also search for and within rules; the system matches text you enter in the Search
Rules field to rule names and condition values, including objects and object groups.
Note
Properly creating and ordering rules is a complex task, but one that is essential to building an effective
deployment. If you do not plan carefully, rules can preempt other rules, require additional licenses, or contain
invalid configurations. Icons represent comments, warnings, and errors. If issues exist, click Show Warnings
to display a list. For more information, see Best Practices for Access Control Rules, on page 1714.
Step 4 Click Policy Assignments to identify the managed devices targeted by the policy; see Setting Target Devices
for a QoS Policy, on page 926.
If you identified target devices during policy creation, verify your choices.
Procedure
What to do next
• Configure and deploy the QoS policy; see Rate Limiting with QoS Policies, on page 924.
Procedure
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Procedure
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Related Topics
Best Practices for Access Control Rules, on page 1714
State (Enabled/Disabled)
By default, rules are enabled. If you disable a rule, the system does not use it and stops generating warnings
and errors for that rule.
You can rate limit traffic by Mbits per second. The default value of Unlimited prevents matching traffic from
being rate limited.
You can rate limit download and upload traffic independently. The system determines download and upload
directions based on the connection initiator.
If you specify a limit greater than the maximum throughput of an interface, the system does not rate limit
matching traffic. Maximum throughput may be affected by an interface’s hardware configuration, which you
specify in each device’s properties (Devices > Device Management).
Conditions
Conditions specify the specific traffic the rule handles. You can configure each rule with multiple conditions.
Traffic must match all conditions to match the rule. Each condition type has its own tab in the rule editor. For
more information, see QoS Rule Conditions, on page 928.
Comments
Each time you save changes to a rule you can add comments. For example, you might summarize the overall
configuration for the benefit of other users, or note when you change a rule and the reason for the change.
In the policy editor, the system displays how many comments a rule has. In the rule editor, use the Comments
tab to view existing comments and add new ones.
Tip Constraining rules by interface is one of the best ways to improve system performance. If a rule excludes all
of a device’s interfaces, that rule does not affect that device's performance.
Just as all interfaces in an interface object must be of the same type (all inline, passive, switched, routed, or
ASA FirePOWER), all interface objects used in an interface condition must be of the same type. Because
devices deployed passively do not transmit traffic, in passive deployments you cannot constrain rules by
destination interface.
For access control rules only, you must first associate an identity policy with the access control policy as
discussed in Associating Other Policies with Access Control, on page 1737.
exist, the system enables the most recently modified user-defined detector for the application. For more
information about application detectors, see Application Detector Fundamentals, on page 2574.
You can use both application filters and individually specified applications to ensure complete coverage.
However, understand the following note before you order your access control rules.
Application Characteristics
The system characterizes each application that it detects using the criteria described in the following table.
Use these characteristics as application filters.
Type Application protocols represent communications between hosts. HTTP and SSH are application protocols.
Clients represent software running on a host. Web browsers and email clients are clients.
Web applications represent the content or requested URL for MPEG video and Facebook are web
HTTP traffic. applications.
Risk The likelihood that the application is being used for purposes that Peer-to-peer applications tend to have a
might be against your organization’s security policy. very high risk.
Business Relevance The likelihood that the application is being used within the context Gaming applications tend to have a very
of your organization’s business operations, as opposed to low business relevance.
recreationally.
Category A general classification for the application that describes its most Facebook is in the social networking
essential function. Each application belongs to at least one category.
category.
Tag Additional information about the application. Applications can Video streaming web applications often are
have any number of tags, including none. tagged high bandwidth and
displays ads.
Related Topics
Best Practices for Configuring Application Control, on page 1711
Minimize the number of matching criteria whenever possible, especially those for security zones, network
objects, and port objects. When you specify multiple criteria, the system must match against every combination
of the contents of the criteria you specify.
Minimize the number of matching criteria whenever possible, especially those for security zones, network
objects, and port objects. When you specify multiple criteria, the system must match against every combination
of the contents of the criteria you specify.
Note If you use ISE SGTs to match traffic, even if a packet does not have an assigned SGT attribute, the packet
still matches an ISE SGT rule if the SGT associated with the packet's source IP address is known in ISE.
ISE SGT ISE identity source SGTs obtained by querying the ISE server, with
automatically updated metadata
If you configure ISE, Cisco recommends that you delete or disable existing rules with custom SGT conditions.
Instead, use ISE attribute conditions to match traffic with SGT attributes.
Deprecated: 7.2.5 7.2.5 FlexConfig was used to configure priority-queue in threat defense. This
priority-queue with command was removed.
FlexConfig.
Ability to specify 6.7.0 Any For details, see History for URL Filtering, on page 1860.
handling of URLs having
New/modified screens: QoS rule editor
unknown reputation.
Rate limit increased. 6.2.1 Any Raised the maximum rate limit from 1,000 Mbps to 100,000 Mbps.
New/modified screens: QoS rule editor
Custom SGT and original 6.2.1 Any Rate limit traffic using custom Security Group Tags (SGTs) and original client
client network filtering. network information (XFF, True-Client-IP, or custom-defined HTTP headers).
New/modified screens: QoS rule editor
QoS (rate limiting) 6.1.0 Any FTD can rate limit (police) network traffic that is allowed or trusted by access
introduced. control.
New/modified screens: Devices > QoS
Note In 7.4 and later, the Management and Diagnostic interfaces are merged. If Platform Settings for syslog servers
or SNMP hosts specify the Diagnostic interface by name, then you must use separate Platform Settings policies
for merged and non-merged devices (7.3 and earlier, and some upgraded 7.4 devices).
User Roles
Admin
Access Admin
Network Admin
Procedure
Step 4 To change the target devices for a policy, click Edit ( ) next to the platform settings policy that you want to
edit.
a) Click Policy Assignment.
b) To assign a device, high-availability pair, or device group to the policy, select it in the Available Devices
or Available Chassis list and click Add. You can also drag and drop.
c) To remove a device assignment, click Delete ( ) next to a device, high-availability pair, or device group
in the Selected Devices or Selected Chassis list.
d) Click OK.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
ARP Inspection
By default, all ARP packets are allowed between bridge group members. You can control the flow of ARP
packets by enabling ARP inspection.
ARP inspection prevents malicious users from impersonating other hosts or routers (known as ARP spoofing).
ARP spoofing can enable a “man-in-the-middle” attack. For example, a host sends an ARP request to the
gateway router; the gateway router responds with the gateway router MAC address. The attacker, however,
sends another ARP response to the host with the attacker MAC address instead of the router MAC address.
The attacker can now intercept all the host traffic before forwarding it on to the router.
ARP inspection ensures that an attacker cannot send an ARP response with the attacker MAC address, so
long as the correct MAC address and the associated IP address are in the static ARP table.
When you enable ARP inspection, the threat defense device compares the MAC address, IP address, and
source interface in all ARP packets to static entries in the ARP table, and takes the following actions:
• If the IP address, MAC address, and source interface match an ARP entry, the packet is passed through.
• If there is a mismatch between the MAC address, the IP address, or the interface, then the threat defense
device drops the packet.
• If the ARP packet does not match any entries in the static ARP table, then you can set the threat defense
device to either forward the packet out all interfaces (flood), or to drop the packet.
Note The dedicated Management interface never floods packets even if this parameter
is set to flood.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select ARP Inspection.
Step 3 Add entries to the ARP inspection table.
a) Click Add to create a new entry, or click Edit if the entry already exists.
b) Select the desired options.
• Inspect Enabled—To perform ARP inspection on the selected interfaces and zones.
• Flood Enabled—Whether to flood ARP requests that do not match static ARP entries out all interfaces
other than the originating interface or the dedicated management interface. This is the default behavior.
If you do not elect to flood ARP requests, then only those requests that exactly match static ARP
entries are allowed.
• Security Zones—Add the zones that contain the interfaces on which to perform the selected actions.
The zones must be switched zones. For interfaces not in a zone, you can type the interface name into
the field below the Selected Security Zone list and click Add. These rules will be applied to a device
only if the device includes the selected interfaces or zones.
c) Click OK.
Step 4 Add static ARP entries according to Add a Static ARP Entry, on page 872.
Step 5 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
Banner
You can configure messages to show users when they connect to the device command line interface (CLI).
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select Banner.
Step 3 Configure the banner.
Following are some tips and requirements for banners.
• Only ASCII characters are allowed. You can use line returns (press Enter), but you cannot use tabs.
• You can dynamically add the hostname or domain name of the device by including the variables
$(hostname) or $(domain).
• Although there is no absolute length restriction on banners, Telnet or SSH sessions will close if there is
not enough system memory available to process the banner messages.
• From a security perspective, it is important that your banner discourage unauthorized access. Do not use
the words "welcome" or "please," as they appear to invite intruders in. The following banner sets the
correct tone for unauthorized access:
DNS
The Domain Name System (DNS) servers are used to resolve hostnames to IP addresses. There are two DNS
server settings that apply to different types of traffic: data and special management traffic. Data traffic includes
any services that use FQDNs for which a DNS lookup is necessary, such as access control rules and remote
access VPN. Special management traffic includes traffic originating on the Management interface such as
configuration and database updates. This procedure only applies to data DNS servers. For management DNS
settings, see the CLI configure network dns servers and configure network dns searchdomains commands.
To determine the correct interface for DNS server communications, the managed device uses a routing lookup,
but which routing table is used depends on the interfaces for which you enable DNS. See the interface settings
below for more information.
You can optionally configure multiple DNS server groups and use them to resolve different DNS domains.
For example, you could have a catch-all default group that uses public DNS servers, for use with connections
to the Internet. You could then configure a separate group to use internal DNS servers for internal traffic, for
example, any connection to a machine in the [Link] domain. Thus, connections to an FQDN using
your organization’s domain name would be resolved using your internal DNS servers, whereas connections
to public servers use external DNS servers. These resolutions are used by any feature that uses data DNS
resolution, such as NAT and access control rules.
You can configure trusted DNS services for DNS snooping using the Trusted DNS Servers tab. DNS snooping
is used to map the application domains to IPs in order to detect the application on the first packet. Apart from
configuring the trusted DNS servers, you can include the already configured servers in DNS group, DHCP
pool, DHCP relay and DHCP client as trusted DNS servers.
Note For an application-based PBR, you must configure trusted DNS servers. You must also ensure that the DNS
traffic passes through threat defense in a clear-text format (encrypted DNS is not supported) so that domains
can be resolved to detect applications.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit a Threat Defense policy.
Step 2 Click DNS.
Step 3 Click the DNS Settings tab.
Step 4 Check Enable DNS name resolution by device.
Step 5 Configure the DNS server groups.
a) Do any of the following in the DNS server group list:
• To add a group to the list, click Add. You cannot add another group once there are 30 filter domains
configured within the existing list of server groups.
• To edit the settings for a group, click Edit ( ) next to the group.
• To remove a group, click Delete ( ) next to the group. Removing a group does not delete the DNS
server group object, it simply removes it from this list.
b) When adding or editing a group, configure the following settings, then click OK:
• Select DNS Group—Select an existing DNS server group object, or click + to create a new one.
• Make as default—Select this option to make this group the default group. Any DNS resolution
request that does not match the filters for other groups will be resolved using the servers in this group.
• Filter Domains—For non-default groups only, a comma-separated list of domain names, such as
[Link],[Link]. Do not include spaces.
The group will be used for DNS resolutions for these domains only. You can enter a maximum of
30 separate domains across all groups added to this DNS platform settings policy. Each name can
be a maximum of 127 characters.
Note that these filter domains are not related to the default domain name for the group. The filter list
can be different from the default domain.
Step 6 (Optional) Enter the Expiry Entry Timer and Poll Timer values in minutes.
These options apply to FQDNs that are specified in network objects only. These do not apply to FQDNs used
in other features.
• Expire Entry Timer specifies the minimum time-to-live (TTL) for the DNS entry, in minutes. If the
expiration timer is longer than the entry's TTL, the TTL is increased to the expire entry time value. If
the TTL is longer than the expiration timer, the expire entry time value is ignored: no additional time is
added to the TTL in this case. Upon expiration, the entry is removed from the DNS lookup table. Removing
an entry requires that the table be recompiled, so frequent removals can increase the processing load on
the device. Because some DNS entries can have very short TTL (as short as three seconds), you can use
this setting to virtually extend the TTL. The default is 1 minute (that is, the minimum TTL for all
resolutions is 1 minute). The range is 1 to 65535 minutes.
Note that for systems running 7.0 or earlier, the expiration time is actually added to the TTL: it does not
specify a minimum value.
• Poll Timer specifies the time limit after which the device queries the DNS server to resolve the FQDN
that was defined in a network object. An FQDN is resolved periodically either when the poll timer has
expired, or when the TTL of the resolved IP entry has expired, whichever occurs first.
Step 7 Enable DNS lookups on all interfaces or on specific interfaces. These choices also affect which routing tables
are used.
Note that enabling DNS lookups on an interface is not the same as specifying the source interface for lookups.
The threat defense always uses a route lookup to determine the source interface. Management-only interfaces
other than the dedicated Management interface cannot be used.
• No interfaces selected—Enables DNS lookups on all interfaces. The threat defense checks the data routing
table only.
• Specific interfaces selected but not the Enable DNS Lookup via diagnostic/management interface
also option—Enables DNS lookups on the specified interfaces. The threat defense checks the data routing
table only.
• Specific interfaces selected plus the Enable DNS Lookup via diagnostic/management interface also
option—Enables DNS lookups on the specified interfaces and the Management interface. The threat
defense checks the data routing table, and if no route is found, falls back to the management-only routing
table.
• Only the Enable DNS Lookup via diagnostic/management interface also option—Enables DNS
lookups on Management. The threat defense checks only the management-only routing table.
Step 8 To configure the trusted DNS servers, click the Trusted DNS Servers tab.
Step 9 By default, the existing DNS servers that are configured in DHCP pool, DHCP relay, DHCP client, or DNS
server group are included as trusted DNS servers. If you want to exclude any of them, uncheck the appropriate
check boxes.
Step 10 To add trusted DNS servers, under Specify DNS Servers, click Edit.
Step 11 In the Select DNS Servers dialog box, either choose a host object as the trusted DNS server or directly specify
the IP address of the trusted DNS server:
a) To choose existing host objects, under Available Host Objects, select the required host object and click
Add to include it to Selected DNS Servers. For information on adding the host objects, see Creating
Network Objects, on page 1383.
b) To directly provide the IP address(IPv4 or IPv6) of the trusted DNS server, enter the address in the given
text field, and click Add to include it to Selected DNS Servers.
c) Click Save. The added DNS servers are displayed in the Trusted DNS Servers page.
Note
You can configure a maximum of 12 DNS servers per policy.
Step 12 (Optional) To search for a DNS server that was added, using either the host name or the IP address, use the
search field under Specify DNS Servers.
Step 13 Click Save.
What to do next
To use FQDN objects for access control rules, create an FQDN network object which can then be assigned
to an access control rule. For instructions see, Creating Network Objects, on page 1383.
External Authentication
When you enable external authentication for management users, the threat defense verifies the user credentials
with an LDAP or RADIUS server as specified in an external authentication object.
Sharing External Authentication Objects
External authentication objects can be used by the management center and threat defense devices. You can
share the same object between the management center and devices, or create separate objects. Note that the
threat defense supports defining users on the RADIUS server, while the management center requires you to
predefine the user list in the external authentication object. You can choose to use the predefined list method
for the threat defense, but if you want to define users on the RADIUS server, you must create separate objects
for the threat defense and the management center.
Note The timeout range is different for the threat defense and the management center, so if you share an object, be
sure not to exceed the threat defense's smaller timeout range (1-30 seconds for LDAP, and 1-300 seconds for
RADIUS). If you set the timeout to a higher value, the threat defense external authentication configuration
will not work.
For the management center, enable the external authentication objects directly on System > Users > External
Authentication; this setting only affects management center usage, and it does not need to be enabled for
managed device usage. For threat defense devices, you must enable the external authentication object in the
platform settings that you deploy to the devices, and you can only activate one external authentication object
per policy. An LDAP object with CAC authentication enabled cannot also be used for CLI access. Be sure
that both the threat defense and the management center can reach the LDAP server, even if you are not sharing
the object. The management center is essential to retrieving the user list and downloading it to the device.
Threat Defense Supported Fields
Only a subset of fields in the external authentication object are used for threat defense SSH access. If you fill
in additional fields, they are ignored. If you also use this object for the management center, those fields will
be used. This procedure only covers the supported fields for the threat defense. For other fields, see Configure
External Authentication for the Management Center in the Cisco Secure Firewall Management Center
Administration Guide.
Usernames
Usernames must be Linux-valid usernames and be lower-case only, using alphanumeric characters plus period
(.) or hyphen (-). Other special characters such as at sign (@) and slash (/) are not supported. You cannot add
the admin user for external authentication. You can only add external users (as part of the External
Authentication object) in the management center; you cannot add them at the CLI. Note that internal users
can only be added at the CLI, not in the management center.
If you previously configured the same username for an internal user using the configure user add command,
the threat defense first checks the password against the internal user, and if that fails, it checks the AAA server.
Note that you cannot later add an internal user with the same name as an external user; only pre-existing
internal users are supported. For users defined on the RADIUS server, be sure to set the privilege level to be
the same as any internal users; otherwise you cannot log in using the external user password.
Privilege Level
LDAP users always have Config privileges. RADIUS users can be defined as either Config or Basic users.
• Similarly, if the user’s Service-Type authorization was changed since the last login, the user will
need to re-authenticate. The user will see a message similar to the following: "Your authorization
privilege has changed. Please log in again to start a session."
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Click External Authentication.
Step 3 Click the Manage External Authentication Server link.
You can also open the External Authentication screen by clicking System > Users > External Authentication.
• User Name—Enter a distinguished name for a user who has sufficient credentials to browse the
LDAP server. For example, if you are connecting to an OpenLDAP server where user objects have
a uid attribute, and the object for the administrator in the Security division at our example company
has a uid value of NetworkAdmin, you might enter
uid=NetworkAdmin,ou=security,dc=example,dc=com.
• Password and Confirm Password—Enter and confirm the password for the user.
• (Optional) Show Advanced Options—Configure the following advanced options.
• Encryption—Click None, TLS, or SSL.
Note
If you change the encryption method after specifying a port, you reset the port to the default
value for that method. For None or TLS, the port resets to the default value of 389. If you choose
SSL encryption, the port resets to 636.
• SSL Certificate Upload Path—For SSL or TLS encryption, you must choose a certificate by
clicking Choose File.
• (Not Used) User Name Template—Not used by the threat defense.
• Timeout—Enter the number of seconds before rolling over to the backup connection between
1 and 30. The default is 30.
Note
The timeout range is different for the threat defense and the management center, so if you share
an object, be sure not to exceed the threat defense's smaller timeout range (1-30 seconds). If
you set the timeout to a higher value, the threat defense external authentication configuration
will not work.
i) (Optional) Set the CLI Access Attribute if you want to use a shell access attribute other than the user
distinguished type. For example, on a Microsoft Active Directory Server, use the sAMAccountName shell
access attribute to retrieve shell access users by typing sAMAccountName in the CLI Access Attribute
field.
j) Set the CLI Access Filter.
Choose one of the following methods:
• To use the same filter you specified when configuring authentication settings, choose Same as Base
Filter.
• To retrieve administrative user entries based on attribute value, enter the attribute name, a comparison
operator, and the attribute value you want to use as a filter, enclosed in parentheses. For example, if
all network administrators have a manager attribute which has an attribute value of shell, you can
set a base filter of (manager=shell).
k) Click Save.
Step 5 For LDAP, if you later add or delete users on the LDAP server, you must refresh the user list and redeploy
the Platform Settings.
a) Choose System > Users > External Authentication.
b) Click Refresh ( ) next to the LDAP server.
If the user list changed, you will see a message advising you to deploy configuration changes for your
device. The Firepower Theat Defense Platform Settings will also show that it is "Out-of-Date on x targeted
devices."
c) Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Alternatively, you can predefine users in the external authentication object (see Step 6.k, on page 947).
To use the same RADIUS server for the threat defense and management center while using the Service-Type
attribute method for the threat defense, create two external authentication objects that identify the same
RADIUS server: one object includes the predefined CLI Access Filter users (for use with the management
center), and the other object leaves the CLI Access Filter empty (for use with threat defenses).
b) In management center, click Add External Authentication Object.
c) Set the Authentication Method to RADIUS.
d) Check the RADIUS Server-Enabled Message Authenticator check box to require the
Message-Authenticator attribute in all RADIUS responses, ensuring that every response from the RADIUS
server is securely verified by the Threat Defense.
This feature is enabled by default for new RADIUS servers. We recommend you enable it for existing
servers after the upgrade. Disabling message authenticators may expose your firewalls to potential attacks.
Ensure that your RADIUS server has the Message-Authenticator configuration.
e) Enter a Name and optional Description.
f) For the Primary Server, enter a Host Name/IP Address.
Note
If you are using a certificate to connect via TLS or SSL, the host name in the certificate must match the
host name used in this field. In addition, IPv6 addresses are not supported for encrypted connections.
k) (Optional) Instead of using RADIUS-defined users, under CLI Access Filter, enter a comma-separated
list of usernames in the Administrator CLI Access User List field. For example, enter jchrichton,
aerynsun, rygel.
You may want to use the CLI Access Filter method for threat defense so you can use the same external
authentication object with threat defense and other platform types. Note that if you want to use
RADIUS-defined users, you must leave the CLI Access Filter empty.
Make sure that these usernames match usernames on the RADIUS server. The names must be Linux-valid
usernames:
• Maximum 32 alphanumeric characters, plus hyphen (-) and underscore (_)
• All lowercase
• Cannot start with hyphen (-); cannot be all numbers; cannot include a period (.), at sign (@), or slash
(/)
Note
If you want to only define users on the RADIUS server, you must leave this section empty.
l) Click Save.
Step 7 Return to Devices > > Platform Settings > External Authentication.
Step 8 Click Refresh ( ) to view any newly-added objects.
For LDAP when you specify SSL or TLS encryption, you must upload a certificate for the connection;
otherwise, the server will not be listed on this window.
Step 9 Click Slider enabled ( ) next to the External Authentication object you want to use. You can only enable
one object.
Step 10 Click Save.
Step 11 Deploy configuration changes; see Deploy Configuration Changes, on page 251.
To use a virtual-router-aware interface for external authentication of a threat defense device, modify its external
authentication policy by associating the authentication servers with the virtual-router-aware interface of the
device.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Click External Authentication and edit the external authentication policy.
Step 3 In the External Authentication dialog box, the available security zone and interface groups are listed. To
associate a virtual-router-aware interface with the external authentication servers, select the security zone or
interface group having a single virtual-router-aware interface, and then do the following:
a) To associate the interface object with the primary authentication server, click Add to Primary Server.
b) (Optional) To associate the interface object with the backup authentication server, click Add to Backup
Server. If the Add to Backup Server button is inactive, it means that a backup server for external
authentication is not configured in the device. Configure a backup server from System > Users > External
Authentication. For information about configuring a backup authentication server, see Configure External
Authentication for the Threat Defense, on page 211.
Step 4 Click Ok.
Step 5 Save and deploy the changes.
Fragment Settings
By default, the threat defense device allows up to 24 fragments per IP packet, and up to 200 fragments awaiting
reassembly. You might need to let fragments on your network if you have an application that routinely
fragments packets, such as NFS over UDP. However, if you do not have an application that fragments traffic,
we recommend that you do not allow fragments by setting Chain to 1. Fragmented packets are often used as
Denial of Service (DoS) attacks.
Note These settings establish the defaults for devices assigned this policy. You can override these settings for
specific interfaces on a device by selecting Override Default Fragment Setting in the interface configuration.
When you edit an interface, you can find the option on Advanced > Security Configuration. Select Devices >
Device Management, edit a threat defense device, and select Interfaces to edit interface properties..
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select Fragment Settings.
Step 3 Configure the following options. Click Reset to Defaults if you want to use the default settings.
• Size (Block)—The maximum number of packet fragments from all connections collectively that can be
waiting for reassembly. The default is 200 fragments.
• Chain (Fragment)—The maximum number of packets into which a full IP packet can be fragmented.
The default is 24 packets. Set this option to 1 to disallow fragments.
• Timeout (Sec)—The maximum number of seconds to wait for an entire fragmented packet to arrive.
The default is 5 seconds. If all fragments are not received within this time, all fragments are discarded.
HTTP Access
You can enable the HTTPS server to provide a health check mechanism for a cloud load balancer, for example,
for the threat defense virtual on AWS using an Application Load Balancer.
Other uses for HTTPs on the threat defense are not supported; for example, the threat defense does not have
a web interface for configuration in this management mode.
This configuration only applies to data interfaces, including any you have configured as management-only.
It does not apply to the dedicated Management interface. The Management interface is separate from the other
interfaces on the device. It is used to set up and register the device to the management center. It has a separate
IP address and static routing.
To use HTTPS, you do not need an access rule allowing the host IP address. You only need to configure
HTTPS access according to this section.
You can only use HTTPS to a reachable interface; if your HTTPS host is located on the outside interface, you
can only initiate a management connection directly to the outside interface.
interface, you cannot also open the outside interface for HTTPS connections on port 443. If you must
configure both features on the same interface, use different ports. For example, open HTTPS on port
4443.
• You need network objects that define the hosts or networks you will allow to make HTTPS connections
to the device. You can add objects as part of the procedure, but if you want to use object groups to identify
a group of IP addresses, ensure that the groups needed in the rules already exist. Select Objects > Object
Management to configure objects.
Note You cannot use the system-provided any network object group. Instead, use
any-ipv4 or any-ipv6.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select HTTP Access.
Step 3 Check the Enable HTTP Server check box to enable the HTTP server.
Step 4 (Optional) Change the HTTP port. The default is 443.
Step 5 Identify the interfaces and IP addresses that allow HTTP connections.
Use this table to limit which interfaces will accept HTTP connections, and the IP addresses of the clients who
are allowed to make those connections. You can use network addresses rather than individual IP addresses.
a) Click Add to add a new rule, or click Edit to edit an existing rule.
b) Configure the rule properties:
• IP Address—The network object or group that identifies the hosts or networks you are allowing to
make HTTP connections. Choose an object from the drop-down menu, or click + to add a new
network object.
• Available Zones/Interfaces—Add the zones that contain the interfaces to which you will allow
HTTP connections. For interfaces not in a zone, you can type the interface name into the field below
the Selected Zones/Interfaces list and click Add. These rules will be applied to a device only if the
device includes the selected interfaces or zones.
c) Click OK.
Step 6 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
ICMP Access
By default, you can send ICMP packets to any interface using either IPv4 or IPv6, with these exceptions:
• The threat defense does not respond to ICMP echo requests directed to a broadcast address.
• The threat defense only responds to ICMP traffic sent to the interface that traffic comes in on; you cannot
send ICMP traffic through an interface to a far interface.
To protect the device from attacks, you can use ICMP rules to limit ICMP access to interfaces to particular
hosts, networks, or ICMP types. ICMP rules function like access rules, where the rules are ordered, and the
first rule that matches a packet defines the action.
If you configure any ICMP rule for an interface, an implicit deny ICMP rule is added to the end of the ICMP
rule list, changing the default behavior. Thus, if you want to simply deny a few message types, you must
include a permit any rule at the end of the ICMP rule list to allow the remaining message types.
We recommend that you always grant permission for the ICMP unreachable message type (type 3). Denying
ICMP unreachable messages disables ICMP path MTU discovery, which can halt IPsec and PPTP traffic.
Additionally ICMP packets in IPv6 are used in the IPv6 neighbor discovery process.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select ICMP Access.
Step 3 Configure ICMP rules.
a) Click Add to add a new rule, or click Edit to edit an existing rule.
b) Configure the rule properties:
• Action—Whether to permit (allow) or deny (drop) matching traffic.
• ICMP Service—The port object that identifies the ICMP message type.
• Network—The network object or group that identifies the hosts or networks whose access you are
controlling.
• Available Zones/Interfaces—Add the zones that contain the interfaces that you are protecting. For
interfaces not in a zone, you can type the interface name into the field below the Selected
Zones/Interfaces list and click Add. These rules will be applied to a device only if the device includes
the selected interfaces or zones.
c) Click OK.
Step 4 (Optional.) Set rate limits on ICMPv4 Unreachable messages.
• Rate Limit—Sets the rate limit of unreachable messages, between 1 and 100 messages per second. The
default is 1 message per second.
• Burst Size—Sets the burst rate, between 1 and 10. The system sends this number of replies, but subsequent
replies are not sent until the rate limit is reached.
NetFlow
The NetFlow feature enables you to collect IP network traffic information as it enters or exits an interface.
The collected traffic information is sent as collected records to a NetFlow Collector server or NetFlow Analyzer.
You can analyze the data from NetFlow and determine information, such as source and destination of traffic,
class of service, traffic pattern, bandwidth usage, type of traffic, traffic volume, and the causes of the congestion.
With the native NetFlow configuration support, the traffic information collection that was enabled through
syslogs flow exports has to be disabled.
The NetFlow provides the option to configure the flow exporter and collectors along with flow event types
that must be monitored.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select NetFlow.
Step 3 Enable the Enable Flow Export toggle to enable NetFlow data export.
Step 4 Configure the general NetFlow parameters that controls the frequency of events pushed to the collector.
a) Active Refresh Interval—For active connections, specify the time interval (in minutes) between
flow-update events.
b) Delay Flow Create—Specify the delay (in seconds) before sending a flow-create event. If you do not
enter any value, there is no delay and the flow-create event is exported as soon as the flow is created.
c) Template Timeout Rate—Specify the time interval (in minutes) at which the template records are sent
to the collectors.
Step 5 Click Add Collector to configure the collector. See Add Collector in NetFlow, on page 953.
Step 6 Click Add Traffic Class to configure the traffic class. See Add Traffic Class to NetFlow, on page 953.
Step 7 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Choose NetFlow.
Step 3 Enable the Enable Flow Export toggle to enable NetFlow data export.
Step 4 Click Add Collector to configure the collector. You can configure a maximum of five collectors.
Step 5 From the Host dropdown list, choose the collector host IP address (IPv4 only) of the NetFlow event collector
or server to which the NetFlow packets must be sent. Alternatively, you can click the ( ) icon to create a
new network host.
Step 6 In the Port field, enter the UDP port on the collector to which the NetFlow packets must be sent.
Step 7 From Available Interfaces or Interface Groups, choose the interface or interface group through which the
collector must be reached. You can choose multiple interfaces or interface groups. The Interface Group object
can contain only one interface for a given device. A collector can be reached only through one interface. The
object can include a virtual-router-aware interface.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select NetFlow.
Step 3 Enable the Enable Flow Export toggle to enable NetFlow data export.
Step 4 Click Add Traffic Class to configure the traffic class.
Step 5 In the Name field, enter the name of the traffic class that must match the NetFlow events.
Step 6 In the Type field, choose the traffic class to filter the type of traffic you want to capture:
• Default—The traffic class that is matched if none of the traffic classes matches the traffic.
• Access List—The specific traffic class that must match the traffic captured for the NetFlow events.
Step 7 If you chose Access List as the Type, then you must choose the access list object from the Access List Object
dropdown list.
Note
You can also click the ( ) icon to create a new extended access list object. See Configure Extended ACL
Objects, on page 1349.
Step 8 In Event Types, check the checkboxes for the different NetFlow events that you want to capture and send to
the collectors.
Step 9 Click OK.
SSH Access
If you enabled management center access on a data interface, such as outside, you should enable SSH on that
interface using this procedure. This section describes how to enable SSH connections to one or more data
interfaces on the threat defense.
The threat defense uses the CiscoSSH stack, which is based on OpenSSH. CiscoSSH supports FIPS compliance
and regular updates, including updates from Cisco and the open source community.
Note SSH is enabled by default on the Management interface; however, this screen does not affect Management
SSH access.
The Management interface is separate from the other interfaces on the device. It is used to set up and register
the device to the management center. SSH for data interfaces shares the internal and external user list with
SSH for the Management interface. Other settings are configured separately: for data interfaces, enable SSH
and access lists using this screen; SSH traffic for data interfaces uses the regular routing configuration, and
not any static routes configured at setup or at the CLI.
For the Management interface, to configure an SSH access list, see the configure ssh-access-list command
in the Cisco Secure Firewall Threat Defense Command Reference. To configure a static route, see the configure
network static-routes command. By default, you configure the default route through the Management interface
at initial setup.
To use SSH, you do not also need an access rule allowing the host IP address. You only need to configure
SSH access according to this section.
You can SSH only to a reachable interface (including an interface in a user-defined virtual router); if your
SSH host is located on the outside interface, you can only initiate a management connection directly to the
outside interface. When you enable SSH in a user-defined virtual router, and you want VPN users to access
SSH, be sure to terminate the VPN on the same virtual router. If the VPN is terminated on another virtual
router, then you must configure route leaks between the virtual routers.
SSH supports the following ciphers and key exchange:
• Encryption—aes128-cbc, aes192-cbc, aes256-cbc, aes128-ctr, aes192-ctr, aes256-ctr
• Integrity—hmac-sha2-256
• Key exchange—dh-group14-sha256
Note After you make three consecutive failed attempts to log into the CLI using SSH, the device terminates the
SSH connection.
Note You cannot use the system-provided any network object. Instead, use any-ipv4
or any-ipv6.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select SSH Access.
Step 3 Identify the interfaces and IP addresses that allow SSH connections.
Use this table to limit which interfaces will accept SSH connections, and the IP addresses of the clients who
are allowed to make those connections. You can use network addresses rather than individual IP addresses.
a) Click Add to add a new rule, or click Edit to edit an existing rule.
b) Configure the rule properties:
• IP Address—The network object or group that identifies the hosts or networks you are allowing to
make SSH connections. Choose an object from the drop-down menu, or click + to add a new network
object.
• Available Zones/Interfaces—Add the zones that contain the interfaces to which you will allow SSH
connections. For interfaces not in a zone, you can type the interface name into the field below the
Selected Zones/Interfaces list and click Add. You can also add loopback interfaces and
virtual-router-aware interfaces. These rules will be applied to a device only if the device includes
the selected interfaces or zones.
c) Click OK.
Step 4 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
SMTP Server
You must identity an SMTP server if you configure email alerts in the Syslog settings. The source email
address you configure for Syslog must be a valid account on the SMTP servers.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Click SMTP Server.
Step 3 Select the network objects that identify the Primary Server IP Address and optionally, the Secondary Server
IP Address.
Step 4 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
SNMP
Simple Network Management Protocol (SNMP) defines a standard way for network management stations
running on PCs or workstations to monitor the health and status of many types of devices, including switches,
routers, and security appliances. You can use the SNMP page to configure a firewall device for monitoring
by SNMP management stations.
The Simple Network Management Protocol (SNMP) enables monitoring of network devices from a central
location. Cisco security appliances support network monitoring using SNMP versions 1, 2c, and 3, as well as
traps and SNMP read access; SNMP write access is not supported.
SNMPv3 supports read-only users and encryption with DES (deprecated), 3DES, AES256, AES192, and
AES128.
Note The DES option has been deprecated. If your deployment includes SNMP v3 users using DES encryption that
were created using a version previous to 6.5, you can continue to use those users for threat defenses running
versions 6.6 and previous. However, you cannot edit those users and retain DES encryption, or create new
users with DES encryption. If your management center manages any threat defenses running Versions 7.0+,
deploying a platform settings policy that uses DES encryption to those threat defenses will fail.
Note To create an alert to an external SNMP server, access Policies > Action > Alerts
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select SNMP.
Step 3 Enable SNMP and configure basic options.
• Enable SNMP Servers—Whether to provide SNMP information to the configured SNMP hosts. You
can deselect this option to disable SNMP monitoring while retaining the configuration information.
• Read Community String, Confirm—Enter the password used by a SNMP management station when
sending requests to the threat defense device. The SNMP community string is a shared secret among the
SNMP management stations and the network nodes being managed. The security device uses the password
to determine if the incoming SNMP request is valid. The password is a case-sensitive alphanumeric string
of up to 32 characters; spaces and special characters are not permitted.
• System Administrator Name—Enter the name of the device administrator or other contact person. This
string is case-sensitive and can be up to 127 characters. Spaces are accepted, but multiple spaces are
shortened to a single space.
• Location—Enter the location of this security device (for example, Building 42,Sector 54). This string
is case-sensitive and can be up to 127 characters. Spaces are accepted, but multiple spaces are shortened
to a single space.
• Port—Enter the UDP port on which incoming requests will be accepted. The default is 161.
About SNMP
SNMP is an application-layer protocol that facilitates the exchange of management information between
network devices and is part of the TCP/IP protocol suite. Threat Defense provides support for network
monitoring using SNMP Versions 1, 2c, and 3, and support the use of all three versions simultaneously. The
SNMP agent running on the threat defense interface lets you monitor the network devices through network
management systems (NMSes), such as HP OpenView. Threat Defense supports SNMP read-only access
through issuance of a GET request. SNMP write access is not allowed, so you cannot make changes with
SNMP. In addition, the SNMP SET request is not supported.
You can configure the threat defense to send traps, which are unsolicited messages from the managed device
to the management station for certain events (event notifications) to an NMS, or you can use the NMS to
browse the Management Information Bases (MIBs) on the security devices. MIBs are a collection of definitions,
and the threat defense maintain a database of values for each definition. Browsing a MIB means issuing a
series of GET-NEXT or GET-BULK requests of the MIB tree from the NMS to determine values.
An SNMP agent notifies the designated management stations if events occur that are predefined to require a
notification, for example, when a link in the network goes up or down. The notification it sends includes an
SNMP OID, which identifies itself to the management stations. The agent also replies when a management
station asks for information.
SNMP Terminology
The following table lists the terms that are commonly used when working with SNMP.
Term Description
Agent The SNMP server running on the Secure Firewall Threat Defense. The SNMP agent has the following features:
• Responds to requests for information and actions from the network management station.
• Controls access to its Management Information Base, the collection of objects that the SNMP manager can
view or change.
• Does not allow SET operations.
Browsing Monitoring the health of a device from the network management station by polling required information from
the SNMP agent on the device. This activity may include issuing a series of GET-NEXT or GET-BULK requests
of the MIB tree from the network management station to determine values.
Management Standardized data structures for collecting information about packets, connections, buffers, failovers, and so on.
Information MIBs are defined by the product, protocols, and hardware standards used by most network devices. SNMP
Bases (MIBs) network management stations can browse MIBs and request specific data or events be sent as they occur.
Network The PCs or workstations set up to monitor SNMP events and manage devices.
management
stations (NMSs)
Object identifier The system that identifies a device to its NMS and indicates to users the source of information monitored and
(OID) displayed.
Term Description
Trap Predefined events that generate a message from the SNMP agent to the NMS. Events include alarm conditions
such as linkup, linkdown, coldstart, warmstart, authentication, or syslog messages.
coldStart—The coldStart trap occurs when the SNMP agent starts after the SNMP configuration. This trap also
occurs when the agent starts after a system reboot.
Note
For cluster and HA nodes, post a reload, if the interfaces reboot time exceeds 5 minutes (preset threshold), the
trap is dropped. When the cluster and HA nodes have rebooted sucessfully, all other traps are sent as expected.
The snmp-server enable traps snmp coldstart command is used to enable and disable transmission of these
traps.
Connection Polling
Individual CPU Core Associated parameters and values of Individual CPU core
Utilization cpmCPUTotal1minRev utilization values for the
last one minute, where 'n'
[Link].[Link].[Link].1.7.2 to
represents the number of
[Link].[Link].[Link].1.7.(n+1)
cores.
Examples:
• .[Link].[Link].[Link].7.(n+2)
- Aggregate system
CPU utilization %
(This value is same
as the system cpu
usage from
.[Link].[Link].[Link].7.1
in single context
mode).
• .[Link].[Link].[Link].7.(n+3)
- Snort average CPU
utilization % (total
aggregate value of all
snort instances)
• .[Link].[Link].[Link].7.(n+4)
- System process
average % (average
of "Sysproc" cores)
Note The SNMP OIDs [Link].[Link].3 and [Link].[Link].4 pertaining to CPU monitoring (hrProcessorTable
and hrNetworkTable) were removed on ASA FirePOWER. You can view and monitor the CPU health details
of the device only through its device manager.
In ENTITY-MIB, two new vendor OIDs were added for the dual EPM 2X100G and 4X200G cards of Secure
Firewall 4200 for slot 2 and slot 3—cevFPRNM4X200Gng and cevFPRNM2X100Gng.
Note You create users for SNMPv3 only. These steps are not applicable for SNMPv1 or SNMPv2c.
Note When using SNMPv3 with clustering or High Availability, if you add a new cluster unit after the initial cluster
formation or you replace a High Availability unit, then SNMPv3 users are not replicated to the new unit. You
must remove the users, re-add them, and then redeploy your configuration to force the users to replicate to
the new unit.
* If your deployment includes SNMP v3 users using the MD5 authentication algorithm that were created
using a version previous to 6.5, you can continue to use those users for threat defense devices running versions
6.7 and previous. However, you cannot edit those users and retain the MD5 authentication algorithm, or create
new users with the MD5 authentication algorithm. If your management center manages any threat
defensedevices running versions 7.0+, deploying a platform settings policy that uses the MD5 authentication
algorithm to those devices will fail.
** If your deployment includes SNMP v3 users using DES encryption that were created using a version
previous to 6.5, you can continue to use those users for threat defensedevices running versions 6.7 and previous.
However, you cannot edit those users and retain DES encryption, or create new users with DES encryption.
If your management center manages any threat defense devices running versions 7.0+, deploying a platform
settings policy that uses DES encryption to those devices will fail.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Click SNMP > Users.
Step 3 Click Add.
Step 4 Select the security level for the user from the Security Level drop-down list.
• Auth—Authentication but No Privacy, which means that messages are authenticated.
• No Auth—No Authentication and No Privacy, which means that no security is applied to messages.
• Priv—Authentication and Privacy, which means that messages are authenticated and encrypted.
Step 5 Enter the name of the SNMP user in the Username field. Usernames must be 32 characters or less.
Step 6 Select the type of password, you want to use in the Encryption Password Type drop-down list.
• Clear text—The threat defense device will still encrypt the password when deploying to the device.
• Encrypted—The threat defense device will directly deploy the encrypted password.
Step 7 In the Auth Algorithm Type drop-down list, select the type of authentication you want to use: SHA, SHA224,
SHA256, or SHA384.
Note
The MD5 option has been deprecated. If your deployment includes SNMP v3 users using the MD5
authentication algorithm that were created using a version previous to 6.5, you can continue to use those users
for FTDs running versions 6.7 and previous. However, you cannot edit those users and retain the MD5
authentication algorithm, or create new users with the MD5 authentication algorithm. If your management
center manages any threat defenses running Versions 7.0+, deploying a platform settings policy that uses the
MD5 authentication algorithm to those threat defenses will fail.
Step 8 In the Authentication Password field, enter the password to use for authentication. If you selected Encrypted
as the Encrypt Password Type, the password must be formatted as xx:xx:xx..., where xx are hexadecimal
values.
Note
The length of the password will depend on the authentication algorithm selected. For all passwords, the length
must be 256 characters or less.
If you selected Clear Text as the Encrypt Password Type, repeat the password in the Confirm field.
Step 9 In the Encryption Type drop-down list, select the type of encryption you want to use: AES128, AES192,
AES256, 3DES.
Note
To use AES or 3DES encryption, you must have the appropriate license installed on the device.
Note
The DES option has been deprecated. If your deployment includes SNMP v3 users using DES encryption that
were created using a version previous to 6.5, you can continue to use those users for threat defenses running
versions 6.7 and previous. However, you cannot edit those users and retain DES encryption, or create new
users with DES encryption. If your management center manages any threat defenses running Versions 7.0+,
deploying a platform settings policy that uses DES encryption to those threat defenses will fail.
Step 10 Enter the password to use for encryption in the Encryption Password field. If you selected Encrypted as the
Encrypt Password Type, the password must be formatted as xx:xx:xx..., where xx are hexadecimal values.
For encrypted passwords, the length of the password depends on the encryption type selected. The password
sizes are as follows (where each xx is one octal):
• AES 128 requires 16 octals
Note
For all passwords, the length must be 256 characters or less.
If you selected Clear Text as the Encrypt Password Type, repeat the password in the Confirm field.
Note In 7.4 and later, the Management and Diagnostic interfaces are merged. If Platform Settings for syslog servers
or SNMP hosts specify the Diagnostic interface by name, then you must use separate Platform Settings policies
for merged and non-merged devices (7.3 and earlier, and some upgraded 7.4 FTDs).
Note The supported network objects include IPv6 hosts, IPv4 hosts, IPv4 range and IPv4 subnet addresses.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Click SNMP > Hosts.
Step 3 Click Add.
Step 4 In the IP Address field, either enter a valid IPv6 or IPv4 host or select the network object that defines the
SNMP management station's host address.
The IP address can be an IPv6 host, IPv4 host, IPv4 range or IPv4 subnet.
Step 5 Select the appropriate SNMP version from the SNMP version drop-down list.
Step 6 (SNMPv3 only.) Select the username of the SNMP user that you configured from the User Name drop-down
list.
Note
You can associate up to 23 SNMP users per SNMP host.
Step 7 (SNMPv1, 2c only.) In the Read Community String field, enter the community string that you have already
configured, for read access to the device. Re-enter the string to confirm it.
Note
This string is required, only if the string used with this SNMP station is different from the one already defined
in the Enable SNMP Server section.
Step 8 Select the type of communication between the device and the SNMP management station. You can select
both types.
• Poll—The management station periodically requests information from the device.
• Trap—The device sends trap events to the management station as they occur.
Note
When the SNMP host IP address is either an IPv4 range or an IPv4 subnet, you can configure either Poll or
Trap, not both.
Step 9 In the Port field, enter a UDP port number for the SNMP host. The default value is 162. The valid range is
1 to 65535.
Step 10 Select the interface type for communication between the device and the SNMP management station under the
Reachable By options. You can select either the device's Management interface or an available security
zone/named interface.
• Device Management Interface—Communication between the device and the SNMP management
station occurs over the Management interface.
• When you choose this interface for SNMPv3 polling, all configured SNMPv3 users are allowed to
poll and are not restricted to the user chosen in Step 6, on page 967. Here, SNMPv1 and SNMPv2c
are not allowed from an SNMPv3 host.
• When you choose this interface for SNMPv1 and SNMPv2c polling, the polling is not restricted at
all to the version selected in Step 5, on page 967.
• Security Zones or Named Interface—Communication between the device and the SNMP management
station occurs over a security zone or interface.
• Search for zones in the Available Zones field.
• Add the zones that contain the interfaces through which the device communicates with the
management station to the Selected Zone/Interface field. For interfaces not in a zone, you can
type the interface name into the field below the Selected Zone/Interface list and click Add. You
can also choose a loopback interface and virtual-router-aware interfaces. The host will be configured
on a device only if the device includes the selected interfaces or zones.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Click SNMP > SNMP Traps to configure SNMP traps (event notifications) for the threat defense device.
Step 3 Select the appropriate Enable Traps options. You can select either or both options.
a) Check Enable All SNMP Traps to quickly select all traps in the subsequent four sections.
b) Check Enable All Syslog Traps to enable transmission of trap-related syslog messages.
Note
SNMP traps are of higher priority than other notification messages from the threat defense as they are expected
to be near real-time. When you enable all SNMP or syslog traps, it is possible for the SNMP process to
consume excess resources in the agent and in the network, causing the system to hang. If you notice system
delays, unfinished requests, or timeouts, you can selectively enable SNMP and syslog traps. You can also
limit the rate at which syslog messages are generated by severity level or message ID. For example, all syslog
message IDs that begin with the digits 212 are associated with the SNMP class; see Limit the Rate of Syslog
Message Generation, on page 986.
Step 4 The event-notification traps in the Standard section are enabled by default for an existing policy:
• Authentication – Unauthorized SNMP access. This authentication failure occurs for packets with an
incorrect community string.
• Link Up – One of the device’s communication links has become available (it has “come up”), as indicated
in the notification.
• Link Down – One of the device’s communication links has failed, as indicated in the notification.
• Cold Start – The device is reinitializing itself such that its configuration or the protocol entity
implementation may be altered.
• Warm Start – The device is reinitializing itself such that its configuration and the protocol entity
implementation is unaltered.
Step 5 Select the desired event-notification traps in the Entity MIB section:
• Field Replaceable Unit Insert – A Field Replaceable Unit (FRU) has been inserted, as indicated. (FRUs
include assemblies such as power supplies, fans, processor modules, interface modules, etc.)
• Field Replaceable Unit Delete – A Field Replaceable Unit (FRU) has been removed, as indicated in
the notification
• Configuration Change – There has been a hardware change, as indicated in the notification
• Memory Rising Threshold – This notification is generated when rising memory utilization exceeds a
predefined threshold, thus reducing available memory. Check this option to enable memory rising
threshold notifications:
• Percentage – The default value is 70 percent for the high threshold notification; the range is between
50 and 95 percent.
• Failover – This notification is generated when there is a change in the failover state as reported by the
CISCO-UNIFIED-FIREWALL-MIB.
• Cluster – This notification is generated when there is a change in the cluster health as reported by the
CISCO-UNIFIED-FIREWALL-MIB.
• Peer Flap – This notification is generated when there is BGP route flapping, a situation in which BGP
systems send an excessive number of update messages to advertise network reachability information.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
SSL
Note You must have administrator privileges and be in a leaf domain to perform this task.
You must make sure that you are running a fully licensed version of the Secure Firewall Management Center.
The SSL Settings will be disabled if you are running Secure Firewall Management Center in evaluation mode.
Additionally, the SSL Settings will be disabled when the licensed Secure Firewall Management Center version
does not meet the export-compliance criteria. If you are using Remote Access VPN with SSL, your Smart
Account must have the strong-crypto features enabled. For more information, see License Types and Restrictions
in the Cisco Secure Firewall Management Center Administration Guide.
Procedure
Step 1 Select Devices > Platform Settings and create or edit a threat defense policy.
Step 2 Select SSL.
Step 3 Add entries to the Add SSL Configuration table.
a) Click Add to create a new entry, or click Edit if the entry already exists.
b) Select the required security configurations from the drop-down list .
• Protocol Version—Specifies the TLS protocols to be used while establishing remote access VPN sessions.
• Security Level—Indicates the kind of security positioning you would like to set up for the SSL.
Step 4 Select the Available Algorithms based on the protocol version that you select and click Add to include them
for the selected protocol. For more information, see About SSL Settings, on page 970.
The algorithms are listed based on the protocol version that you select. Each security protocol identifies unique
algorithm for setting up the security level.
What to do next
Select Deploy > Deployment and click Deploy to deploy the policy to the assigned devices.
Settings window lets you configure SSL versions and encryption algorithms that will be negotiated and used
for message transmission during remote VPN access over SSL.
Note Though you configure management center and threat defense to operate in a security certifications (UCAPL,
CC, or FIPS) compliance mode, the management center allows configuration of unsupported ciphers. For
example, in a FIPS enabled mode, management center allows configuring DH Group 5 which is not
FIPS-compliant. However, VPN tunnel does not negotiate due to the non-compliant cipher usage.
Fields
Minimum SSL Version as Server—Specify the minimum SSL/TLS protocol version that the threat defense
device uses when acting as a server. For example, when it functions as a Remote Access VPN Gateway.
TLS Version—Select one of the following TLS versions from the drop-down list:
TLS V1 Accepts SSLv2 client hellos and negotiates TLSv1 (or greater).
TLSV1.1 Accepts SSLv2 client hellos and negotiates TLSv1.1 (or greater).
TLSV1.2 Accepts SSLv2 client hellos and negotiates TLSv1.2 (or greater).
TLSV1.3 Accepts SSLv2 client hellos and negotiates TLSv1.3 (or greater).
Note TLS 1.3 in remote access VPN requires Cisco Secure Client, Version 5.0 and above.
DTLS Version—Select the DTLS versions from the drop-down list, based on the selected TLS version. By
default, DTLSv1 is configured on threat defense devices, you can choose the DTLS version as per your
requirement.
Note Ensure that the TLS protocol version is higher than or equal to the DTLS protocol version selected. TLS
protocol versions support the following DTLS versions:
TLS V1 DTLSv1
TLSV1.1 DTLSv1
Diffie-Hellman Group—Choose a group from the drop-down list. Available options are Group1 - 768-bit
modulus, Group2 - 1024-bit modulus, Group5 - 1536-bit modulus, Group14 - 2048-bit modulus, 224-bit prime
order, and Group24 - 2048-bit modulus, 256-bit prime order. The default is Group1.
Elliptical Curve Diffie-Hellman Group—Choose a group from the drop-down list. Available options are
Group19 - 256-bit EC, Group20 - 384-bit EC, and Group21 - 521-bit EC. The default value is Group19.
TLSv1.2 adds support for the following ciphers:
• ECDHE-ECDSA-AES256-GCM-SHA384
• ECDHE-RSA-AES256-GCM-SHA384
• DHE-RSA-AES256-GCM-SHA384
• AES256-GCM-SHA384
• ECDHE-ECDSA-AES256-SHA384
• ECDHE-RSA-AES256-SHA384
• ECDHE-ECDSA-AES128-GCM-SHA256
• ECDHE-RSA-AES128-GCM-SHA256
• DHE-RSA-AES128-GCM-SHA256
• RSA-AES128-GCM-SHA256
• ECDHE-ECDSA-AES128-SHA256
• ECDHE-RSA-AES128-SHA256
The SSL configuration table can be used to specify the protocol version, security level, and Cipher algorithms
that you want to support on the Secure Firewall Threat Defense devices.
Protocol Version—Lists the protocol version that the Secure Firewall Threat Defense device supports and
uses for SSL connections. Available protocol versions are:
• Default
• TLSV1
• TLSV1.1
• TLSV1.2
• TLSV1.3
• DTLSv1
• DTLSv1.2
Security Level—Lists the cipher security levels that threat defense device supports and uses for SSL
connections.
If you have threat defense devices with evaluation license, the security level is Low by default. With threat
defense smart license, the default security level is High. You can choose one of the following options to
configure the required security level:
• All includes all ciphers, including NULL-SHA.
• Low includes all ciphers, except NULL-SHA.
• Medium includes all ciphers, except NULL-SHA, DES-CBC-SHA, RC4-SHA, and RC4-MD5 (this is
the default).
• Fips includes all FIPS-compliant ciphers, except NULL-SHA, DES-CBC-SHA, RC4-MD5, RC4-SHA,
and DES-CBC3-SHA, TLS_CHACHA20_POLY1305_SHA256.
• High includes only AES-256 with SHA-2 ciphers and applies to TLS version 1.2 and the default version.
• Custom includes one or more ciphers that you specify in the Cipher algorithms/custom string box. This
option provides you with full control of the cipher suite using OpenSSL cipher definition strings.
Cipher Algorithms/Custom String—Lists the cipher algorithms that the threat defense device supports and
uses for SSL connections. For more information about ciphers using OpenSSL, see [Link]
docs/apps/[Link]
The threat defense device specifies the order of priority for supported ciphers as:
Ciphers supported by TLSv1.2 only
ECDHE-ECDSA-AES256-GCM-SHA384
ECDHE-RSA-AES256-GCM-SHA384
DHE-RSA-AES256-GCM-SHA384
AES256-GCM-SHA384
ECDHE-ECDSA-AES256-SHA384
ECDHE-RSA-AES256-SHA384
DHE-RSA-AES256-SHA256
AES256-SHA256
ECDHE-ECDSA-AES128-GCM-SHA256
ECDHE-RSA-AES128-GCM-SHA256
DHE-RSA-AES128-GCM-SHA256
AES128-GCM-SHA256
ECDHE-ECDSA-AES128-SHA256
ECDHE-RSA-AES128-SHA256
DHE-RSA-AES128-SHA256
AES128-SHA256
RC4-SHA
RC4-MD5
DES-CBC-SHA
NULL-SHA
Syslog
You can enable system logging (syslog) for threat defense devices. Logging information can help you identify
and isolate network or device configuration problems. You can also send some security events to a syslog
server. The following topics explain logging and how to configure it.
About Syslog
System logging is a method of collecting messages from devices to a server running a syslog daemon. Logging
to a central syslog server helps in aggregation of logs and alerts. Cisco devices can send their log messages
to a UNIX-style syslog service. A syslog service accepts messages and stores them in files, or prints them
according to a simple configuration file. This form of logging provides protected long-term storage for logs.
Logs are useful both in routine troubleshooting and in incident handling.
Device and This syslog configuration generates messages for features running on Platform
system health, the data plane, that is, features that are defined in the CLI configuration Settings
network that you can view with the show running-config command. This
configuration includes features such as routing, VPN, data interfaces, DHCP server,
NAT, and so forth. Data plane syslog messages are numbered, and they
are the same as those generated by devices running ASA software.
However, Secure Firewall Threat Defense does not necessarily generate
every message type that is available for ASA Software. For information
on these messages, see Cisco Secure Firewall Threat Defense Syslog
Messages at [Link]
Syslogs/b_fptd_syslog_guide.html. This configuration is explained in
the following topics.
Security events This syslog configuration generates alerts for file and malware, Platform
connection, Security Intelligence, and intrusion events. For details, see Settings and the
About Sending Syslog Messages for Security Events and subtopics in Logging in an
the Cisco Secure Firewall Management Center Administration Guide. access control
policy
(All devices) This syslog configuration generates alerts for access control rules, Alert Responses
intrusion rules, and other advanced services as described in and the Logging
Policies, rules,
Configurations Supporting Alert Responses in the Cisco Secure Firewall in an access
and events
Management Center Administration Guide. These messages are not control policy
numbered. For information on configuring this type of syslog, see
Creating a Syslog Alert Response in the Cisco Secure Firewall
Management Center Administration Guide.
You can configure more than one syslog server, and control the messages and events sent to each server. You
can also configure different destinations, such as console, email, internal buffer, and so forth.
Severity Levels
The following table lists the syslog message severity levels.
Note ASA and Threat Defense do not generate syslog messages with a severity level of zero (emergencies).
You customize these criteria by creating a message list that you can specify when you set the output destination.
Alternatively, you can configure the threat defense device to send a particular message class to each type of
output destination independently of the message list.
(Message lists do not apply to syslog messages for security events such as connection and intrusion events.)
Note This topic does not apply to messages for security events (connection, intrusion, etc.)
The syslog message class provides a method of categorizing syslog messages by type, equivalent to a feature
or function of the device. For example, the rip class denotes RIP routing.
All syslog messages in a particular class share the same initial three digits in their syslog message ID numbers.
For example, all syslog message IDs that begin with the digits 611 are associated with the vpnc (VPN client)
class. Syslog messages associated with the VPN client feature range from 611101 to 611323.
In addition, most of the ISAKMP syslog messages have a common set of prepended objects to help identify
the tunnel. These objects precede the descriptive text of a syslog message when available. If the object is not
known at the time that the syslog message is generated, the specific heading = value combination does not
appear.
The objects are prefixed as follows:
Group = groupname, Username = user, IP = IP_address
Where the group is the tunnel-group, the username is the username from the local database or AAA server,
and the IP address is the public IP address of the remote access client or Layer 2 peer.
The following table lists the message classes and the range of message IDs in each class.
session User Session 106, 108, 201, 202, 204, 302, 303,
304, 305, 314, 405, 406, 407, 500,
502, 607, 608, 609, 616, 620, 703,
710
vpn IKE and IPsec 316, 320, 402, 404, 501, 602, 702,
713, 714, 715
IPv6 Guidelines
• IPv6 is supported. Syslogs can be sent using TCP or UDP.
• Ensure that the interface configured for sending syslogs is enabled, IPv6 capable, and the syslog server
is reachable through the designated interface.
• Secure logging over IPv6 is not supported.
Additional Guidelines
• Do not configure management center as a primary syslog server. The management center can log some
syslogs. However, it does not have adequate storage provision to accommodate voluminous information
from connection events for every sensor, especially when multiple sensors are used and all send syslogs.
• The syslog server must run a server program called syslogd. Windows provides a syslog server as part
of its operating system.
• The syslog server operates based on the syslog-ng process of the firewall system. Do not use external
configuration files, like the [Link] file from SecureWorks. Such files are not compatible with the
device. Using them will lead to parsing error and eventually the syslog-ng process will fail.
• To view logs generated by the threat defense device, you must specify a logging output destination. If
you enable logging without specifying a logging output destination, the threat defense device generates
messages but does not save them to a location from which you can view them. You must specify each
different logging output destination separately.
• If you use TCP as the transport protocol, the system opens 4 connections to the syslog server to ensure
that messages are not lost. If you are using the syslog server to collect messages from a very large number
of devices, and the combined connection overhead is too much for the server, use UDP instead.
• It is not possible to have two different lists or classes being assigned to different syslog servers or same
locations.
Tip If you are configuring devices to send syslog messages about security events (such as connection and intrusion
events), most threat defense platform settings do not apply to these messages. See Threat Defense Platform
Settings That Apply to Security Event Syslog Messages, on page 981.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Click Syslog from the table of contents.
Step 3 Click Logging Setup to enable logging, specify FTP Server settings, and specify Flash usage. For more
information, see Enable Logging and Configure Basic Settings, on page 981
Step 4 Click Logging Destinations to enable logging to specific destinations and to specify filtering on message
severity level, event class, or on a custom event list. For more information, see Enable Logging Destinations,
on page 983
You must enable a logging destination to see messages at that destination.
Step 5 Click E-mail Setup to specify the e-mail address that is used as the source address for syslog messages that
are sent as e-mail messages. For more information, see Send Syslog Messages to an E-mail Address, on page
984
Step 6 Click Events List to define a custom event list that includes an event class, a severity level, and an event ID.
For more information, see Create a Custom Event List, on page 985
Step 7 Click Rate Limit to specify the volume of messages being sent to all configured destinations and define the
message severity level to which you want to assign rate limits. For more information, see Limit the Rate of
Syslog Message Generation, on page 986
Step 8 Click Syslog Settings to specify the logging facility, enable the inclusion of a time stamp, and enable other
settings to set up a server as a syslog destination. For more information, see Configure Syslog Settings, on
page 987
Step 9 Click Syslog Servers to specify the IP address, protocol used, format, and security zone for the syslog server
that is designated as a logging destination. For more information, see Configure a Syslog Server, on page 988
Threat Defense Platform Settings That Apply to Security Event Syslog Messages
"Security events" include connection, Security Intelligence, intrusion, and file and malware events.
Some of the syslog settings on the Devices > Platform Settings > Threat Defense Settings > Syslog page
and its tabs apply to syslog messages for security events, but most apply only to messages for events related
to system health and networking.
The following settings apply to syslog messages for security events:
• Logging Setup tab:
• Send syslogs in EMBLEM format
Tip If you are configuring devices to send syslog messages about security events (such as connection and intrusion
events), most threat defense platform settings do not apply to these messages. See Threat Defense Platform
Settings That Apply to Security Event Syslog Messages, on page 981.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select Syslog > Logging Setup.
Step 3 Enable logging and configure basic logging settings.
• Enable Logging—Turns on the data plane system logging for the threat defense device.
• Enable Logging on the Failover Standby Unit—Turns on logging for the standby for the threat defense
device, if available.
• Send syslogs in EMBLEM format—Enables EMBLEM format logging for every logging destination.
If you enable EMBLEM, you must use the UDP protocol to publish syslog messages; EMBLEM is not
compatible with TCP.
Note
Syslog messages in RFC5424 format, typically displays the priority value (PRI). However, in management
center, if you want to display the PRI value in the syslog messages of the managed threat defense device,
ensure to enable the EMBLEM format. Also, the device ID does not appear in EMBLEM-formatted
syslog messages. For more information on PRI, see RFC5424.
• Send debug messages as syslogs—Redirects all the debug trace output to the syslog. The syslog message
does not appear in the console if this option is enabled. Therefore, to see debug messages, you must
enable logging at the console and configure it as the destination for the debug syslog message number
and logging level. The syslog message number used is 711001. The default logging level for this syslog
is debug.
• Memory Size of Internal Buffer—Specify the size of the internal buffer to which syslog messages are
saved if the logging buffer is enabled. When the buffer fills up, it is overwritten. The default is 4096
bytes. The range is 4096 to 52428800.
Step 4 (Optional) Configure the syslog message logging to the management center.
a) Click the All Logs radio button to enable logging all the troubleshooting syslog messages corresponding
to the selected severity level or click the VPN Logs radio button to enable logging only the VPN
troubleshooting messages corresponding to the selected severity level.
b) Choose the syslog severity level for the logging messages from the Logging Level drop-down list.
• The logging level for All Logs is set to critical by default. You can choose to send syslog messages
with severity levels critical, alerts, or emergencies to the management center.
• The logging level for the VPN messages is set to errors by default.
VPN troubleshooting syslogs can add excessive load on the management center. Hence, enable this
option with caution. Also, when you configure a device with site-to-site or remote access VPN, it
automatically enables sending VPN syslogs to the management center by default. We recommend
that you limit the logging level to error and above to restrict the excessive flow of syslogs to the
management center, especially in case of RAVPN, where multiple devices are involved.
Step 5 (Optional) Configure an FTP server if you want to save log buffer contents to the server before the buffer is
overwritten. Specify the FTP Server information.
• FTP Server Buffer Wrap—To save the buffer contents to the FTP server before it is overwritten, check
this box and enter the necessary destination information in the following fields. To remove the FTP
configuration, deselect this option.
• IP Address—Select the host network object that contains the IP address of the FTP server.
• User Name—Enter the username to use when connecting to the FTP server.
• Path—Enter the path, relative to the FTP root, where the buffer contents should be saved.
• Password/ Confirm—Enter and confirm the password used to authenticate the username to the FTP
server.
Step 6 (Optional) Specify Flash size if you want to save log buffer contents to flash before the buffer is overwritten.
• Flash—To save the buffer contents to the flash memory before it is overwritten, check this box.
• Maximum flash to be used by logging (KB)—Specify the maximum space to be used in the flash
memory for logging (in kilobytes). The range is 4-8044176 kilobytes.
• Minimum free space to be preserved (KB)—Specifies the minimum free space to be preserved in flash
memory (in KB). The range is 0-8044176 kilobytes.
Tip If you are configuring devices to send syslog messages about security events (such as connection and intrusion
events), most threat defense platform settings do not apply to these messages. See Threat Defense Platform
Settings That Apply to Security Event Syslog Messages, on page 981.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select Syslog > Logging Destinations.
Step 3 Click Add to enable a destination and apply a logging filter, or edit an existing destination.
Step 4 In the Logging Destinations dialog box, select a destination and configure the filter to use for a destination:
a) Choose the destination you are enabling in the Logging Destination drop-down list. You can create one
filter per destination: Console, E-Mail, Internal buffer, SNMP trap, SSH Sessions, and Syslog servers.
Note
Console and SSH session logging works in the diagnostic CLI only. Enter system support diagnostic-cli.
b) In Event Class, choose the filter that will apply to all classes not listed in the table.
You can configure these filters:
• Filter on severity —Select the severity level. Messages at this level or higher are sent to the
destination
• Use Event List —Select the event list that defines the filter. You create these lists on the Event Lists
page.
• Disable Logging —Prevents messages from being sent to this destination.
c) If you want to create filters per event class, click Add to create a new filter, or edit an existing filter, and
select the event class and severity level to limit messages in that class. Click OK to save the filter.
For an explanation of the event classes, see Syslog Message Classes, on page 976.
d) Click OK .
Step 5 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
Tip If you are configuring devices to send syslog messages about security events (such as connection and intrusion
events), most threat defense platform settings do not apply to these messages. See Threat Defense Platform
Settings That Apply to Security Event Syslog Messages, on page 981.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select Syslog > Email Setup.
Step 3 Specify the e-mail address that is used as the source address for syslog messages that are sent as e-mail
messages.
Step 4 Click Add to enter a new e-mail address recipient of the specified syslog messages.
Step 5 Choose the severity level of the syslog messages that are sent to the recipient from the drop-down list.
The syslog message severity filter used for the destination e-mail address causes messages of the specified
severity level and higher to be sent. For information on the levels, see Severity Levels, on page 975.
Tip If you are configuring devices to send syslog messages about security events (such as connection and intrusion
events), most threat defense platform settings do not apply to these messages. See Threat Defense Platform
Settings That Apply to Security Event Syslog Messages, on page 981.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select Syslog > Events List.
Step 3 Configure an event list.
a) Click Add to add a new list, or edit an existing list.
b) Enter a name for the event list in the Name field. Spaces are not allowed.
c) To identify messages based on severity or event class, select the Severity/Event Class tab and add or edit
entries.
For information on the available classes see Syslog Message Classes, on page 976.
For information on the levels, see Severity Levels, on page 975.
Certain event classes are not applicable for the device in transparent mode. If such options are configured
then they will be bypassed and not deployed.
d) To identify messages specifically by message ID, select the Message ID and add or edit the IDs.
You can enter a range of IDs using a hyphen, for example, 100000-200000. IDs are six digits. For
information on how the initial three digits map to features, see Syslog Message Classes, on page 976.
For specific message numbers, see Cisco ASA Series Syslog Messages.
e) Click OK to save the event list.
Step 4 Click Logging Destinations and add or edit the destination that should use the filter.
See Enable Logging Destinations, on page 983.
Tip If you are configuring devices to send syslog messages about security events (such as connection and intrusion
events), most threat defense platform settings do not apply to these messages. See Threat Defense Platform
Settings That Apply to Security Event Syslog Messages, on page 981.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select Syslog > Rate Limit.
Step 3 To limit message generation by severity level, click Logging Level > Add and configure the following options:
• Logging Level—The severity level you are rate limiting. For information on the levels, see Severity
Levels, on page 975.
• Number of messages—The maximum number of messages of the specified type allowed in the specified
time period.
• Interval—The number of seconds before the rate limit counter resets.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select Syslog > Syslog Settings.
Step 3 Select a system log facility for syslog servers to use as a basis to file messages in the Facility drop-down list.
The default is LOCAL4(20), which is what most UNIX systems expect. However, because your network
devices share available facilities, you might need to change this value for system logs.
Facility values are not typically relevant for security events. If you need to include Facility values in messages,
see Facility in Security Event Syslog Messages in the Cisco Secure Firewall Management Center Administration
Guide.
Step 4 Select the Enable timestamp on each syslog message check box to include the date and time a message was
generated in the syslog message.
Step 5 Select the Timestamp Format for the syslog message:
• The Legacy (MMM dd yyyy HH:mm:ss) format is the default format for syslog messages.
When this timestamp format is selected, the messages do not indicate the time zone, which is always
UTC.
• RFC 5424 (yyyy-MM-ddTHH:mm:ssZ) uses the ISO 8601 timestamp format as specified in the RFC
5424 syslog format.
If you select the RFC 5424 format, a “Z” is appended to the end of each timestamp to indicate that the
timestamp uses the UTC time zone.
Step 6 If you want to add a device identifier to syslog messages (which is placed at the beginning of the message),
check the Enable Syslog Device ID check box and then select the type of ID.
• Interface—To use the IP address of the selected interface, regardless of the interface through which the
appliance sends the message. Select the security zone that identifies the interface. The zone must map
to a single interface.
• User Defined ID—To use a text string (up to 16 characters) of your choice.
• Host Name—To use the hostname of the device.
Step 7 Use the Syslog Message table to alter the default settings for specific syslog messages. You need to configure
rules in this table only if you want to change the default settings. You can change the severity assigned to a
message, or you can disable the generation of a message.
By default, Netflow is enabled and the entries are shown in the table.
a) To suppress syslog messages that are redundant because of Netflow, select Netflow Equivalent Syslogs.
This adds the messages to the table as suppressed messages.
Note
If any of these syslog equivalents are already in the table, your existing rules are not overwritten.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Note In 7.4 and later, the Management and Diagnostic interfaces are merged. If Platform Settings for syslog servers
or SNMP hosts specify the Diagnostic interface by name, then you must use separate Platform Settings policies
for merged and unmerged devices (7.3 and earlier, and some upgraded 7.4 threat defenses).
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select Syslog > Syslog Server.
Step 3 Check the Allow user traffic to pass when TCP syslog server is down (Recommended) check box, to allow
traffic if any syslog server that is using the TCP protocol is down.
Note
• This option is enabled by default. Unless required, we recommend that you allow connections through
the threat defense device when the external TCP syslog server is unreachable by the device.
• When the Allow user traffic to pass when TCP syslog server is down option is disabled in management
center version 6.2.x or earlier, it persist to be in the Disable state even after upgrading to version 6.3 or
later. Ensure that you manually enable it.
• With this option disabled, and when more than one TCP syslog server configured in the device, the user
traffic is allowed to pass if atleast one of the servers is reacheable by the threat defense device. Thus, the
disabled option is applied only when none of the TCP syslog servers configured in the device are reachable.
The device generates the following syslog that describes the root cause of the denied traffic through the
device:
%FTD-3-414003: TCP Syslog Server intf : IP_Address /port not responding. New connections
are denied based on logging permit-hostdown policy
Step 4 In the Message queue size (messages) field, enter a size of the queue for storing syslog messages on the
security appliance when syslog server is busy. The minimum is 1 message. The default is 512. Specify 0 to
allow an unlimited number of messages to be queued (subject to available block memory).
When the messages exceed the configured queue size, they are dropped and result in missing syslog. To
determine the ideal queue size, you need to identify the available block memory. Use the show blocks command
to know the current memory utilization. For more information on the command and its attributes, see Cisco
Secure Firewall ASA Series Command Reference Guide. For further assistance, contact Cisco TAC.
d) Check the Enable Secure Syslog check box to encrypt the connection between the device and server
using SSL/TLS over TCP.
Note
You must select TCP as the protocol and its port value ranging between 1025 and 65535 to use this option.
You must also upload the certificate required to communicate with the syslog server on the Devices >
Certificates page. Finally, upload the certificate from the threat defense device to the syslog server to
complete the secure relationship and allow it to decrypt the traffic. The Enable Secure Syslog option is
not supported on the device Management interface.
e) Select Device Management Interface or Security Zones or Named Interfaces to communicate with
the syslog server.
• Device Management Interface: Send syslogs out of the Management interface. We recommend
that you use this option when configuring syslog on Snort events.
Note
The Device Management Interface option does not support the Enable Secure Syslog option.
• Security Zones or Named Interfaces: Select the interfaces from the list of Available Zones and
click Add. You can also add virtual-router-aware interfaces.
Important
The threat defense data plane (Lina) syslog messages cannot be sent out through the diagnostic
interface. Configure other interfaces or the Management interface (Br1/Management0) to send out
the data plane syslog messages.
f) Click OK.
Step 6 Click Save.
You can now go to Deploy > Deployment and deploy the policy to assigned devices. The changes are not
active until you deploy them.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Timeouts
You can set the global idle timeout durations for the connection and translation slots of various protocols. If
the slot has not been used for the idle time specified, the resource is returned to the free pool.
You can also set a time out for console sessions with the device.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select Timeouts.
Step 3 Configure the timeouts you want to change.
For any given setting, select Custom to define your own value, Default to return to the system default value.
In most cases, the maximum timeout is 1193 hours.
You can disable some timeouts by selecting Disable.
• Console Timeout—The idle time until a connection to the console is closed, range is 0 or 5 to 1440
minutes. The default is 0, which means the session does not time out. If you change the value, existing
console sessions use the old timeout value. The new value applies to new connections only.
• Translation Slot (xlate)—The idle time until a NAT translation slot is freed. This duration must be at
least 1 minute. The default is 3 hours.
• Connection (Conn)—The idle time until a connection slot is freed. This duration must be at least 5
minutes. The default is 1 hour.
• Half-Closed—The idle time until a TCP half-closed connection closes. A connection is considered
half-closed if both the FIN and FIN-ACK have been seen. If only the FIN has been seen, the regular
connection timeout applies. The minimum is 30 seconds. The default is 10 minutes.
• UDP—The idle time until a UDP connection closes. This duration must be at least 1 minute. The default
is 2 minutes.
• ICMP—The idle time after which general ICMP states are closed. The default (and minimum) is 2
seconds.
• RPC/Sun RPC—The idle time until a SunRPC slot is freed. This duration must be at least 1 minute.
The default is 10 minutes.
In a Sun RPC-based connection, when the parent connection is deleted or timed-out, a new child connection
may not be considered as a part of the parent-child connection, and thereby the new connection could
be evaluated as per the policy or rules set in the system. After the parent connection has timed-out the
existing child connections are valid only until the timeout value set is reached.
• H.225—The idle time until an H.225 signaling connection closes. The default is 1 hour. To close a
connection immediately after all calls are cleared, a timeout of 1 second ([Link]) is recommended.
• H.323—The idle time after which H.245 (TCP) and H.323 (UDP) media connections close. The default
(and minimum) is 5 minutes. Because the same connection flag is set on both H.245 and H.323 media
connections, the H.245 (TCP) connection shares the idle timeout with the H.323 (RTP and RTCP) media
connection.
• SIP—The idle time until a SIP signaling port connection closes. This duration must be at least 5 minutes.
The default is 30 minutes.
• SIP Media—The idle time until a SIP media port connection closes. This duration must be at least 1
minute. The default is 2 minutes. The SIP media timer is used for SIP RTP/RTCP with SIP UDP media
packets, instead of the UDP inactivity timeout.
• SIP Disconnect—The idle time after which SIP session is deleted if the 200 OK is not received for a
CANCEL or a BYE message, between [Link] and [Link]. The default is 2 minutes ([Link]).
• SIP Invite—The idle time after which pinholes for PROVISIONAL responses and media xlates will be
closed, between [Link] and [Link]. The default is 3 minutes ([Link]).
• SIP Provisional Media—The timeout value for SIP provisional media connections, between 1 and 30
minutes. The default is 2 minutes.
• Floating Connection—When multiple routes exist to a network with different metrics, the system uses
the one with the best metric at the time of connection creation. If a better route becomes available, then
this timeout lets connections be closed so a connection can be reestablished to use the better route. The
default is 0 (the connection never times out). To make it possible to use better routes, set the timeout to
a value between [Link] and [Link]. This timer does not apply to connections through virtual tunnel
interfaces (VTI). If a connection through a VTI gets stuck, you must manually clear it.
• Xlate PAT—The idle time until a PAT translation slot is freed, between [Link] and [Link]. The default
is 30 seconds. You may want to increase the timeout if upstream routers reject new connections using a
freed PAT port because the previous connection might still be open on the upstream device.
• TCP Proxy Reassembly—The idle timeout after which buffered packets waiting for reassembly are
dropped, between [Link] and [Link]. The default is 1 minute ([Link]).
• ARP Timeout—The number of seconds between ARP table rebuilds, from 60 to 4294967. The default
is 14,400 seconds (4 hours).
Time Synchronization
Use a Network Time Protocol (NTP) server to synchronize the clock settings on your devices. We recommend
you configure all threat defenses managed by a management center to use the same NTP server as the
management center. The threat defense gets its time directly from the configured NTP server. If the threat
defense's configured NTP servers are not reachable for any reason, it synchronizes its time with the management
center.
The device supports NTPv4.
Note If you are deploying threat defense on the Firepower 4100/9300 chassis, you must configure NTP on the
Firepower 4100/9300 chassis so that Smart Licensing will work properly and to ensure proper timestamps on
device registrations. You should use the same NTP server for the Firepower 4100/9300 chassis and the
management center.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select Time Synchronization.
Step 3 Configure one of the following clock options:
• Via NTP from Defense Center—(Default). The managed device gets time from the NTP servers you
configured for the management center (except for authenticated NTP servers) and synchronizes time
with those servers directly. However, if any of the following are true, the managed device synchronizes
time from the management center:
• The management center’s NTP servers are not reachable by the device.
• The management center has no unauthenticated servers.
• Via NTP from—If your management center is using NTP servers on the network, select this option and
enter the fully-qualified DNS name (such as [Link]), or IPv4 or IPv6 address, of the same
NTP servers you specified in System > Configuration > Time Synchronization. If the NTP servers
are not reachable, the management center acts as an NTP server.
When multiple NTP servers are configured, the device uses the NTP server that is deemed appropriate based
on the criteria defined in RFC. Thus, the status of "Being used" for a specific NTP server indicates that the
server is currently used by the device.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Time Zone
By default, the system uses the UTC time zone. To designate a different time zone for a device, use this
procedure.
The time zone you specify will be used only for time-based policy application in policies that support this
functionality.
Note Time-based ACLs is supported in Snort 3 also from management center 7.0 onwards.
Procedure
Step 1 Select Devices > Platform Settings and create or edit an threat defense policy.
You can also create time zone objects from the Objects > Object Management > Time Zone page.
What to do next
• Create time range objects, select applicable time ranges in access control and prefilter rules, and assign
the parent policies to devices associated with the correct time zone.
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
UCAPL/CC Compliance
For more information about this setting and how to enable it for the management center, see the Cisco Secure
Firewall Management Center Administration Guide.
Caution After you enable this setting, you cannot disable it. If you need to take the appliance out of CC or UCAPL
mode, you must reimage.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Click UCAPL/CC Compliance.
Step 3 To permanently enable security certifications compliance on the appliance, you have two choices:
• To enable security certifications compliance in Common Criteria mode, choose CC from the drop-down
list.
• To enable security certifications compliance in Unified Capabilities Approved Products List mode, choose
UCAPL from the drop-down list.
Performance Profile
The performance profile determines how the CPU cores on the device are assigned to two of the main system
processes: the data plane (Lina) and Snort. The data plane handles VPN connections, routing, and other basic
layer 3/4 processing. Snort provides advanced inspection, including intrusion and malware prevention, URL
filtering, application filtering, and other features that require deep packet inspection.
If you use a balance of basic and advanced features, do not change the performance profile. The system is
designed to provide a balanced assignment of cores to these processes. The assignment differs based on the
hardware model.
However, if you use the device primarily for VPN, or for intrusion and other advanced inspection, you can
skew the performance profile so that more cores are assigned to the more heavily used features. This might
improve system performance.
• Changing the performance profile is not supported on units in a cluster or high-availability group, or
those configured for multi-instance. Deployment is blocked if you assign the profile to anything but
standalone devices.
• The minimum number for core allocation is 2. Cores are assigned in even numbers based on the selected
performance profile.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select Performance Profile.
Step 3 Select a profile:
• Default—This is the recommended setting and is the best option if you configure both VPN and intrusion
inspection.
• VPN Heavy with prefilter fastpath—If you primarily use the device as a VPN endpoint or headend,
and you configure rules in the prefilter policy to fastpath VPN traffic, you can choose this option to
assign the majority of CPU cores to the data plane. The allocation is 90% data place, 10% Snort.
• VPN Heavy with inspection—If you primarily use the device as a VPN endpoint or headend, but do
not use the prefilter policy to fastpath VPN traffic, you can choose this option to assign the majority of
CPU cores to the data plane. This option assumes that you leave intrusion inspection, URL filtering, and
other advanced functions that use Snort, to a different device in the network. The allocation is 60% data
plane, 40% Snort.
• IPS Heavy—If you do not configure VPN, but you do use the device for intrusion prevention, you can
choose this option to assign the majority of CPU core to the Snort process. The allocation is 30% data
plane, 70% Snort.
Device management 7.6.0 7.6.0 Device access management is now supported on user-defined Virtual Routing
services supported on and Forwarding (VRF) interfaces.
user-defined VRF
See: Platform Settings
interfaces.
View diagnostic syslog 7.6.0 Any You can now configure threat defense devices to send all device syslogs to
messages in the Unified your management center. Go to the threat defense platform settings policy
Events table. assigned to your managed devices and select All Logs under the Logging to
Secure Firewall Management Center setting. Once you have enabled the
logging settings, you can view the device syslogs as a new event type called
Troubleshoot Events in the Unified Events table.
Support for Firepower 7.6.0 7.6.0 The provision to manage a Firepower Platform Settings policy is removed.
Platform Settings policy
is removed.
Device management 7.4.1 7.4.1 Device management services configured in the threat defense platform settings
services supported on (NetFlow, SSH access, SNMP hosts, syslog servers) are now supported on
user-defined VRF user-defined Virtual Routing and Forwarding (VRF) interfaces.
interfaces.
Platform restrictions: Not supported with container instances or clustered
devices.
Chassis platform settings 7.4.1 7.4.1 New platform settings for multi-instance chassis on the Secure Firewall 3100.
for the Secure Firewall
New/modified screens:
3100.
• Devices > Platform Settings > Add > Chassis Platform Settings
• Devices > Platform Settings > Edit > Chassis Platform Settings > DNS
• Devices > Platform Settings > Edit > Chassis Platform Settings > SSH
• Devices > Platform Settings > Edit > Chassis Platform Settings > Time
Synchronization
• Devices > Platform Settings > Edit > Chassis Platform Settings > Time
Zones
• Devices > Platform Settings > Edit > Chassis Platform Settings >
Syslog
Performance profile 7.4.0 7.4.0 The performance profile settings available in the platform settings policy now
support for the Secure apply to Secure Firewall 3100/4200 devices.
Firewall 3100/4200.
Loopback interface 7.4.0 7.4.0 You can create a loopback interface and use it for:
support for DNS, HTTP,
• DNS
ICMP, NetFlow, SNMP
and SSH. • HTTP
• ICMP
• NetFlow
• SNMP
• SSH
New/modified screens:
• Devices > Platform Settings > DNS > DNS Settings
Devices > Platform Settings > HTTP Access > Add
Devices > Platform Settings > ICMP Access > Add
• Devices > Platform Settings > NetFlow > Add Collector
• Devices > Platform Settings > SNMP > Hosts > Add
• Devices > Platform Settings > SSH Access > Add
Merged Management and 7.4.0 7.4.0 For new devices using 7.4 and later, you cannot use the legacy Diagnostic
Diagnostic interfaces. interface. Only the merged Management interface is available. If you upgraded
to 7.4 or later, and you did not have any configuration for the Diagnostic
interface, then the interfaces will merge automatically.
If you upgraded to 7.4 or later, and you have configuration for the Diagnostic
interface, then you have the choice to merge the interfaces manually, or you
can continue to use the separate Diagnostic interface. Note that support for the
Diagnostic interface will be removed in a later release, so you should plan to
merge the interfaces as soon as possible.
Merged mode also changes the behavior of AAA traffic to use the data routing
table by default. The management-only routing table can now only be used if
you specify the management-only interface (including Management) in the
configuration.
For platform settings, this means:
• You can no longer enable HTTP, ICMP, or SMTP for Diagnostic.
• For SNMP, you can allow hosts on Management instead of Diagnostic.
• For Syslog servers, you can reach them on Management instead of
Diagnostic.
• If Platform Settings for syslog servers or SNMP hosts specify the
Diagnostic interface by name, then you must use separate Platform Settings
policies for merged and non-merged devices.
• DNS lookups no longer fall back to the management-only routing table
if you do not specify interfaces.
New/modified screens:
• Devices > Device Management > Interfaces
Performance profile for 7.3.0 7.3.0 You can adjust the percentage of system cores assigned to the data plane and
CPU core allocation. Snort to adjust system performance. The adjustment is based on your relative
use of VPN and intrusion policies. If you use both, leave the core allocation to
the default values. If you use the system primarily for VPN (without applying
intrusion policies), or as an IPS (with no VPN configuration), you can skew
the core allocation to the data plane (for VPN) or Snort (for intrusion
inspection).
We added the Performance Profile page to the platform settings policy.
TLS 1.3 in Remote 7.3.0 7.3.0 You can now use TLS 1.3 to encrypt remote access VPN connections.
Access VPN.
Use threat defense platform settings to specify that the device must use TLS
1.3 protocol when acting as a remote access VPN server.
TLS 1.3 adds support for the following ciphers:
• TLS_AES_128_GCM_SHA256
• TLS_CHACHA20_POLY1305_SHA256
• TLS_AES_256_GCM_SHA384
This feature requires Cisco Secure Client, Version 5.0 and above.
New/modified screens: Devices > Platform Settings > New Policy > Add/Edit
Threat Defense Settings > SSL > TLS Version
Multiple DNS server 7.2.0 7.2.0 You can configure multiple DNS groups for the resolution of DNS requests
groups for resolving DNS from client systems. You can use these DNS server groups to resolve requests
requests. for different DNS domains. For example, you could have a catch-all default
group that uses public DNS servers, for use with connections to the Internet.
You could then configure a separate group to use internal DNS servers for
internal traffic, for example, any connection to a machine in the [Link]
domain. Thus, connections to an FQDN using your organization’s domain
name would be resolved using your internal DNS servers, whereas connections
to public servers use external DNS servers.
We changed the Platform Settings > DNS page.
Network object support 7.1.0 7.1.0 You can now use network object groups that contain network objects for hosts
for HTTP, ICMP, and or networks when configuring the IP addresses in the Threat Defense Platform
SSH platform settings. Settings policy.
Supported platforms: Threat Defense
Support to specify trusted 7.1.0 7.1.0 The option to specify DNS servers that you can trust for address resolution
DNS servers. while using direct internet access was introduced.
We added a tab for configuring the trusted DNS servers when configuring
direct internet access: Devices > Platform Settings > DNS > Trusted DNS
Servers.
Supported platforms: Threat Defense
Platform settings using 7.0.0 7.0.0 The MD5 authentication algorithm and DES encryption for SNMPv3 users on
the MD5 authentication threat defense were deprecated in Version 6.5. If your deployment includes
algorithm or DES SNMPv3 users using the MD5 authentication algorithm or DES encryption
encryption for SNMPv3 that were created using Version 6.4 or earlier, you can continue to use those
users can not be deployed users for threat defense devices running Version 6.7 or earlier. However, you
to threat defense devices cannot edit those users and retain the MD5 or DES settings, and you cannot
running Versions 7.0+. create new users with the MD5 or DES settings. If your management center
manages any threat defenses running Versions 7.0+, deploying a platform
settings policy with SNMP v3 users using the MD5 authentication algorithm
or DES encryption to those threat defenses will fail.
New/modified screens: Devices > Platform Settings > SNMP > Hosts
Supported platforms: Threat Defense
Specify SHA224 or 7.0.0 7.0.0 You can now select SHA224 or SHA384 for SNMPv3 users' authorization
SHA384 for SNMPv3 algorithm.
users' authorization
New/modified screens: Devices > Platform Settings > SNMP > Users
algorithm.
Supported platforms: Threat Defense
Specify time zone for 6.6.0 6.6.0 Specify a local time zone for a managed device, for use in time-based policy
device. application.
New/modified screens: Devices > Platform Settings > Time Zone
Supported platforms: Threat Defense
Specify the Management 6.6.0 6.6.0 You can now select the Management interface for communication between the
interface for SNMP device and the SNMP management station.
communication.
New/modified screens: Devices > Platform Settings > SNMP > Hosts
Supported platforms: Threat Defense
Specify SHA256 for 6.6.0 6.6.0 You can now select SHA256 for SNMPv3 users' authorization algorithm.
SNMPv3 users'
New/modified screens: Devices > Platform Settings > SNMP > Users
authorization algorithm.
Supported platforms: Threat Defense
DES encryption and the 6.5.0 Any We recommend that you not use the MD5 authentication algorithm or DES
MD5 authentication encryption for SNMPv3 users on threat defense devices, as these options have
algorithm for SNMPv3 been deprecated. If your deployment includes SNMPv3 users using the MD5
users on threat defense authentication algorithm or DES encryption that were created using a Version
have been deprecated. 6.4 or earlier, you can continue to use those users. However, you cannot edit
those users and retain the MD5 or DES settings, and you cannot create new
users with the MD5 or DES settings.
New/modified screens: Devices > Platform Settings > SNMP > Users
Supported platforms: Threat Defense
Allow user traffic to pass 6.3.0 6.3.0 We recommend that you allow connections through the threat defense device
when TCP syslog server when the external TCP syslog server is unreachable by the device. The Allow
is down. user traffic to pass when TCP syslog server is down (Recommended to be
enabled) option in the Platform Settings is Enabled by default.
Limit number of SSH 6.3.0 6.3.0 When a user accesses any device via SSH and fails three successive login
login failures. attempts, the device terminates the SSH session.
External authentication 6.2.3 6.2.3 You can now configure external authentication for SSH access to the threat
added for SSH. defense using LDAP or RADIUS.
New/modified screens: Devices > Platform Settings > External
Authentication
Supported platforms: Threat Defense
Support for UC/APPL 6.2.1 6.2.1 You can enable security certifications compliance in CC mode or UCAPL
compliance mode. mode. Enabling security certifications compliance does not guarantee strict
compliance with all requirements of the security mode selected. For more
information on hardening procedures, refer to the guidelines for this product
provided by the certifying entity.
New/modified screens: Devices > Platform Settings > UC/APPL Compliance
Supported platforms: Any device
SSL settings for remote 6.2.1 6.2.1 The threat defense device uses the Secure Sockets Layer (SSL) protocol and
access VPN. Transport Layer Security (TLS) to support secure message transmission for
Remote Access VPN connection from remote clients. You can configure SSL
versions and encryption algorithms that will be negotiated and used for message
transmission during remote VPN access over SSL.
New/modified screens: Devices > Platform Settings > SSL
Supported platforms: Threat Defense
External authentication 6.1.0 6.1.0 Due to changes to support converged management access, only local users are
for SSH and HTML supported for SSH and HTML to data interfaces. Also, you can no longer SSH
removed. to the logical Diagnostic interface; instead you can SSH to the logical
Management interface (which shares the same physical port). Previously, only
external authentication was supported for SSH and HTML access to Diagnostic
and data interfaces, while only local users were supported to the Management
interface.
New/modified screens: Devices > Platform Settings > External
Authentication
Supported platforms: Threat Defense
One of the main functions of NAT is to enable private IP networks to connect to the Internet. NAT replaces
a private IP address with a public IP address, translating the private addresses in the internal private network
into legal, routable addresses that can be used on the public Internet. In this way, NAT conserves public
addresses because it can be configured to advertise at a minimum only one public address for the entire network
to the outside world.
Other functions of NAT include:
• Security—Keeping internal IP addresses hidden discourages direct attacks.
• IP routing solutions—Overlapping IP addresses are not a problem when you use NAT.
• Flexibility—You can change internal IP addressing schemes without affecting the public addresses
available externally; for example, for a server accessible to the Internet, you can maintain a fixed IP
address for Internet use, but internally, you can change the server address.
• Translating between IPv4 and IPv6 (Routed mode only) —If you want to connect an IPv6 network to
an IPv4 network, NAT lets you translate between the two types of addresses.
Note NAT is not required. If you do not configure NAT for a given set of traffic, that traffic will not be translated,
but will have all of the security policies applied as normal.
NAT Basics
The following topics explain some of the basics of NAT.
NAT Terminology
This document uses the following terminology:
• Real address/host/network/interface—The real address is the address that is defined on the host, before
it is translated. In a typical NAT scenario where you want to translate the inside network when it accesses
the outside, the inside network would be the “real” network. Note that you can translate any network
connected to the device, not just an inside network. Therefore if you configure NAT to translate outside
addresses, “real” can refer to the outside network when it accesses the inside network.
• Mapped address/host/network/interface—The mapped address is the address that the real address is
translated to. In a typical NAT scenario where you want to translate the inside network when it accesses
the outside, the outside network would be the “mapped” network.
Note During address translation, IP addresses configured for the device interfaces are
not translated.
NAT Types
You can implement NAT using the following methods:
• Dynamic NAT—A group of real IP addresses are mapped to a (usually smaller) group of mapped IP
addresses, on a first come, first served basis. Only the real host can initiate traffic. See Dynamic NAT,
on page 1026.
• Dynamic Port Address Translation (PAT)—A group of real IP addresses are mapped to a single IP address
using a unique source port of that IP address. See Dynamic PAT, on page 1031.
• Static NAT—A consistent mapping between a real and mapped IP address. Allows bidirectional traffic
initiation. See Static NAT, on page 1041.
• Identity NAT—A real address is statically translated to itself, essentially bypassing NAT. You might
want to configure NAT this way when you want to translate a large group of addresses, but then want
to exempt a smaller subset of addresses. See Identity NAT, on page 1049.
1. When the inside host at [Link] sends a packet to a web server, the real source address of the packet,
[Link], is translated to a mapped address, [Link].
2. When the server responds, it sends the response to the mapped address, [Link], and the threat
defense device receives the packet because the threat defense device performs proxy ARP to claim the
packet.
3. The threat defense device then changes the translation of the mapped address, [Link], back to
the real address, [Link], before sending it to the host.
The following figure shows a typical NAT scenario in transparent mode, with the same network on the inside
and outside interfaces. The transparent firewall in this scenario is performing the NAT service so that the
upstream router does not have to perform NAT.
Figure 388: NAT Example: Transparent Mode
1. When the inside host at [Link] sends a packet to a web server, the real source address of the packet,
[Link], is changed to a mapped address, [Link].
2. When the server responds, it sends the response to the mapped address, [Link], and the threat
defense receives the packet because the upstream router includes this mapped network in a static route
directed to the threat defense management IP address.
3. The threat defense then undoes the translation of the mapped address, [Link], back to the real
address, [Link].75. Because the real address is directly-connected, the threat defense sends it directly
to the host.
4. For host [Link], the same process occurs, except for returning traffic, the threat defense looks up
the route in its routing table and sends the packet to the downstream router at [Link] based on the threat
defense static route for [Link]/24.
Auto NAT
All NAT rules that are configured as a parameter of a network object are considered to be auto NAT rules.
This is a quick and easy way to configure NAT for a network object. You cannot create these rules for a group
object, however.
Although these rules are configured as part of the object itself, you cannot see the NAT configuration in the
object definition through the object manager.
When a packet enters an interface, both the source and destination IP addresses are checked against the auto
NAT rules. The source and destination address in the packet can be translated by separate rules if separate
matches are made. These rules are not tied to each other; different combinations of rules can be used depending
on the traffic.
Because the rules are never paired, you cannot specify that sourceA/destinationA should have a different
translation than sourceA/destinationB. Use manual NAT for that kind of functionality, where you can identify
the source and destination address in a single rule.
Manual NAT
Manual NAT lets you identify both the source and destination address in a single rule. Specifying both the
source and destination addresses lets you specify that sourceA/destinationA can have a different translation
than sourceA/destinationB.
Note For static NAT, the rule is bidirectional, so be aware that “source” and “destination” are used in commands
and descriptions throughout this guide even though a given connection might originate at the “destination”
address. For example, if you configure static NAT with port address translation, and specify the source address
as a Telnet server, and you want all traffic going to that Telnet server to have the port translated from 2323
to 23, then you must specify the source ports to be translated (real: 23, mapped: 2323). You specify the source
ports because you specified the Telnet server address as the source address.
The destination address is optional. If you specify the destination address, you can either map it to itself
(identity NAT), or you can map it to a different address. The destination mapping is always a static mapping.
Note There is also a Section 0, which contains any NAT rules that the system creates for its own use. These rules
have priority over all others. The system automatically creates these rules and clears xlates as needed. You
cannot add, edit, or modify rules in Section 0.
Section 1 Manual NAT Applied on a first match basis, in the order they appear in the
configuration. Because the first match is applied, you must ensure
that specific rules come before more general rules, or the specific
rules might not be applied as desired. By default, manual NAT
rules are added to section 1.
By "specific rules first," we mean:
• Static rules should come before dynamic rules.
• Rules that include destination translation should come before
rules with source translation only.
Section 2 Auto NAT If a match in section 1 is not found, section 2 rules are applied in
the following order:
1. Static rules.
2. Dynamic rules.
Section 3 Manual NAT If a match is still not found, section 3 rules are applied on a first
match basis, in the order they appear in the configuration. This
section should contain your most general rules. You must also
ensure that any specific rules in this section come before general
rules that would otherwise apply.
For section 2 rules, for example, you have the following IP addresses defined within network objects:
• [Link]/24 (static)
• [Link]/24 (dynamic)
• [Link]/24 (static)
• [Link]/32 (static)
• [Link]/24 (dynamic) (object def)
• [Link]/24 (dynamic) (object abc)
NAT Interfaces
Except for bridge group member interfaces, you can configure a NAT rule to apply to any interface (in other
words, all interfaces), or you can identify specific real and mapped interfaces. You can also specify any
interface for the real address, and a specific interface for the mapped address, or vice versa.
For example, you might want to specify any interface for the real address and specify the outside interface
for the mapped address if you use the same private addresses on multiple interfaces, and you want to translate
them all to the same global pool when accessing the outside.
Figure 389: Specifying Any Interface
However, the concept of “any” interface does not apply to bridge group member interfaces. When you specify
“any” interface, all bridge group member interfaces are excluded. Thus, to apply NAT to bridge group members,
you must specify the member interface. This could result in many similar rules where only one interface is
different. You cannot configure NAT for the Bridge Virtual Interface (BVI) itself, you can configure NAT
for member interfaces only.
Note You cannot configure NAT for interfaces operating in inline, inline tap, or passive modes. When specifying
interfaces, you do so indirectly by selecting the interface object that contains the interface.
NAT Exemption
When internet edge devices have a site-to-site VPN configured on an interface and also have NAT rules for
that interface, you must exempt the VPN traffic from the NAT rules. If you do not exempt the VPN traffic
from NAT translation, the traffic gets dropped or is not routed through the VPN tunnel to the remote peer.
NAT exemption allows you to exclude traffic from being translated by NAT rules. When you create a
policy-based site-to-site VPN using the management center VPN wizard, you can select the NAT Exempt
option to create the rules automatically (Device > Site To Site). You can view the NAT exemptions for a
device in the NAT policy page (Device > NAT > NAT Exemptions).
The management center supports NAT exemption for all policy-based site-to-site VPN topology types. For
more information, see Configure a Policy-based Site-to-Site VPN, on page 1496.
Consider the following example, which shows a site-to-site VPN tunnel connecting Site A and Site B. For
traffic that must go to the Internet, NAT translates the private IPs to a public IP address to access the Internet.
For traffic that must go over the VPN tunnel, you must configure NAT exemption for the device in the VPN
wizard.
Figure 390: Site-to-site VPN Topology with NAT Exemption
available addresses on the outside network is small, this method can be used. For PAT, you can even use the
IP address of the mapped interface.
Note If you configure the mapped interface to be any interface, and you specify a mapped address on the same
network as one of the mapped interfaces, then if an ARP request for that mapped address comes in on a
different interface, then you need to manually configure an ARP entry for that network on the ingress interface,
specifying its MAC address. Typically, if you specify any interface for the mapped interface, then you use a
unique network for the mapped addresses, so this situation would not occur. Configure the ARP table in the
ingress interface's Advanced settings.
User Roles
Admin
Access Admin
Network Admin
Note You cannot configure NAT for interfaces operating in inline, inline tap, or passive modes.
• For static NAT, you can specify an IPv6 subnet up to /64. Larger subnets are not supported.
• When using FTP with NAT46, when an IPv4 FTP client connects to an IPv6 FTP server, the client must
use either the extended passive mode (EPSV) or extended port mode (EPRT); PASV and PORT commands
are not supported with IPv6.
The following table lists the inspected protocols that apply NAT rewrite and their NAT limitations. Keep
these limitations in mind when writing NAT rules that include these protocols. Inspected protocols not listed
here do not apply NAT rewrite. These inspections include GTP, HTTP, IMAP, POP, SMTP, SSH, and SSL.
Note NAT rewrite is supported on the listed ports only. For some of these protocols, you can extend inspection to
other ports using Network Analysis Policies, but NAT rewrite is not extended to those ports. This includes
DCERPC, DNS, FTP, and Sun RPC inspection. If you use these protocols on non-standard ports, do not use
NAT on the connections.
DNS over UDP UDP/53 No NAT support is available for name resolution No
through WINS.
You cannot include an FQDN object in a network group that is used for manual NAT destination. In NAT,
an FQDN object must be used alone, as only a single destination host makes sense for this type of NAT rule.
If the FQDN cannot be resolved to an IP address, the rule is not functional until a DNS resolution is obtained.
Note If you remove a dynamic NAT or PAT rule, and then add a new rule with mapped
addresses that overlap the addresses in the removed rule, then the new rule will
not be used until all connections associated with the removed rule time out or are
cleared using the clear xlate or clear conn commands. This safeguard ensures
that the same address is not assigned to multiple hosts.
• You cannot use an object group with both IPv4 and IPv6 addresses; the object group must include only
one type of address.
• A network object used in NAT cannot include more than 131,838 IP addresses, either explicitly or implied
in a range of addresses or a subnet. Break up the address space into smaller ranges and write separate
rules for the smaller objects.
• (Manual NAT only.) When using any as the source address in a NAT rule, the definition of “any” traffic
(IPv4 vs. IPv6) depends on the rule. Before the threat defense device performs NAT on a packet, the
packet must be IPv6-to-IPv6 or IPv4-to-IPv4; with this prerequisite, the threat defense device can
determine the value of any in a NAT rule. For example, if you configure a rule from “any” to an IPv6
server, and that server was mapped from an IPv4 address, then any means “any IPv6 traffic.” If you
configure a rule from “any” to “any,” and you map the source to the interface IPv4 address, then any
means “any IPv4 traffic” because the mapped interface address implies that the destination is also IPv4.
• You can use the same mapped object or group in multiple NAT rules.
• The mapped IP address pool cannot include:
• The mapped interface IP address. If you specify “any” interface for the rule, then all interface IP
addresses are disallowed. For interface PAT (routed mode only), specify the interface name instead
of the interface address.
• The failover interface IP address.
• (Transparent mode.) The management IP address.
• (Dynamic NAT.) The standby interface IP address when VPN is enabled.
• Avoid using overlapping addresses in static and dynamic NAT policies. For example, with overlapping
addresses, a PPTP connection can fail to get established if the secondary connection for PPTP hits the
static instead of dynamic xlate.
• You cannot use overlapping addresses in the source address of a NAT rule and a remote access VPN
address pool.
• If you specify a destination interface in a rule, then that interface is used as the egress interface rather
than looking up the route in the routing table. However, for identity NAT, you have the option to use a
route lookup instead.
• If you use PAT on Sun RPC traffic, which is used to connect to NFS servers, be aware that the NFS
server might reject connections if the PAT'ed port is above 1024. The default configuration of NFS
servers is to reject connections from ports higher than 1024. The error is typically "Permission Denied."
Mapping ports above 1024 happens if you do not select the option to include the reserved ports (1-1023)
in the port range of a PAT pool. You can avoid this problem by changing the NFS server configuration
to allow all port numbers.
• NAT applies to through traffic only. Traffic generated by the system is not subject to NAT.
• Do not name a network object or group pat-pool, using any combination of upper- or lower-case letters.
• The unidirectional option is mainly useful for testing purposes and might not work with all protocols.
For example, SIP requires protocol inspection to translate SIP headers using NAT, but this will not occur
if you make the translation unidirectional.
• You cannot use NAT on the internal payload of Protocol Independent Multicast (PIM) registers.
• (Manual NAT) When writing NAT rules for a dual ISP interface setup (primary and backup interfaces
using service level agreements in the routing configuration), do not specify destination criteria in the
rule. Ensure the rule for the primary interface comes before the rule for the backup interface. This allows
the device to choose the correct NAT destination interface based on the current routing state when the
primary ISP is unavailable. If you specify destination objects, the NAT rule will always select the primary
interface for the otherwise duplicate rules.
• If you get the ASP drop reason nat-no-xlate-to-pat-pool for traffic that should not match the NAT rules
defined for the interface, configure identity NAT rules for the affected traffic so the traffic can pass
untranslated.
• If you configure NAT for GRE tunnel endpoints, you must disable keepalives on the endpoints or the
tunnel cannot be established. The endpoints send keepalives to the original addresses.
• DHCP and BOOTP share ports UDP/67-68. Because BOOTP is obsolete, writing NAT rules for the
bootps port can cause port allocation problems when also running DHCP. Consider using DHCP relay
instead for transmitting DHCP requests between network segments.
Procedure
• Copy—Click Copy ( ) next to the policy you want to copy. You are prompted to give the copy a new,
unique name. The copy includes all policy rules and configurations, but does not include device
assignments.
• Report—Click Report ( ) for the policy. You are prompted to save the PDF report, which includes
policy attributes, device assignments, rules, and object usage information.
• Edit—Click Edit ( ) next to the policy you want to edit. See Configure NAT for Threat Defense, on
page 1021.
• Delete—Click Delete ( ) next to the policy you want to delete, then click OK. When prompted whether
to continue, you are also informed if another user has unsaved changes in the policy.
Caution
After you have deployed a NAT policy to a managed device, you cannot delete the policy from the device.
Instead, you must deploy a NAT policy with no rules to remove the NAT rules already present on the
managed device. You also cannot delete a policy that is the last deployed policy on any of its target
devices, even if it is out of date. Before you can delete the policy completely, you must deploy a different
policy to those targets.
the policy. If you apply a NAT policy with no rules to a device, the system removes all NAT rules from that
device.
Procedure
Procedure
Procedure
To accomplish the above, you would do the following. Although this example rule is for dynamic auto NAT,
you can generalize the technique for any type of NAT rule.
Procedure
Step 1 Create the security zones for the inside and outside interfaces.
a) Choose Objects > Object Management.
b) Select Interface Objects from the table of contents and click Add > Security Zone. (You can use interface
groups instead of zones.)
c) Configure the inside zone properties.
• Name—Enter a name, for example, inside-zone.
• Type—Select Routed for routed-mode devices, Switched for transparent mode.
• Selected Interfaces—Add the FTD-A/inside and FTD-B/inside interfaces to the selected list.
d) Click Save.
e) Click Add > Security Zone and define the outside zone properties.
• Name—Enter a name, for example, outside-zone.
• Interface Type—Select Routed for routed-mode devices, Switched for transparent mode.
• Selected Interfaces—Add the FTD-A/outside and FTD-B/outside interfaces to the selected list.
f) Click Save.
Step 2 Create the network object for the original inside network on the Object Management page.
a) Select Network from the table of contents and click Add Network > Add Object.
b) Configure the inside network properties.
• Name—Enter a name, for example, inside-network.
• Network—Enter the network address, for example, [Link]/24.
c) Click Save.
Step 3 Create the network object for the translated NAT pool and define overrides.
a) Click Add Network > Add Object.
b) Configure the NAT pool properties for FTD-A.
• Name—Enter a name, for example, NAT-pool.
• Network—Enter the range of addresses to include in the pool for FTD-A, for example,
[Link]-[Link].
Note
The interface objects control on which devices the rule is configured. Because in this example the zones
contain interfaces for FTD-A and FTD-B only, even if the NAT policy were assigned to additional devices,
the rule would be deployed to those 2 devices only.
f) Click Save.
You now have a single rule that will be interpreted differently for FTD-A and FTD-B, providing unique
translations for the inside networks protected by each firewall.
table relative to hidden rules. Filtering simply changes what you can see to help you locate rules that interest
you.
When editing the NAT policy, you can use the fields above the table to do the following types of search/filter:
• Filter by Device—Click Filter by Device, then select the devices whose rules you want to see and click
OK. Whether a rule applies to a device is determined by the rule's interface constraints. If you specify
a security zone or interface group for either the source or destination interface, the rule applies to a device
if at least one interface for the device is in the zone or group. If a NAT rule applies to any source and
any destination interface, then it applies to all devices.
If you also do a text or multiple-attribute search, the results are constrained to the selected devices.
To remove this filter, click Filter by Device and deselect the devices, or select All, and click OK.
• Simple Text Search—In the Filter box, type a string and press Enter. The string is compared to all
values in the rules. For example, if you enter “network-object-1,” which is the name of a network object,
you would get rules that use the object in source, destination, and PAT pool attributes.
For network and port objects, the string is also compared to the contents of the objects used in the rule.
For example, if a PAT pool object includes the range [Link]-[Link], searching on either
[Link] or [Link] (or a partial 10.100.10) will include rules that use that PAT pool object.
However, the match must be exact: searching on [Link] will not match this PAT pool object, even
though the IP address is within the object’s IP address range.
To remove the filter, click the x on the right side of the Filter box.
• Multiple-Attribute Search—If a simple text search gives you too many hits, you can configure multiple
values for the search. Click in the Filter box to open the list of attributes, then select or enter strings for
the attributes you intend to search and click the Filter button. These attributes are the same as the ones
you would configure within a NAT rule. The attributes are AND’ed, so filtered results include only those
rules that match all attributes you configured.
• For binary attributes, such as the rule state (enabled/disabled), whether a PAT pool is configured
(enabled/disabled), the direction of the rule (uni/bi), or rule type (static/dynamic), simply check or
uncheck the boxes as appropriate. Select both boxes if you do not care about the attribute value. If
you deselect both boxes, no rules will match the filter.
• For string attributes, type a full or partial string relevant to that attribute. These will be object names,
either for security zones/interface groups, network objects, or port objects. It can also be the network
or port object contents, which are matched the same way they are for simple text searches.
To remove the filter, click the x on the right side of the Filter box, or click in the Filter box to open the
drop-down list, and click the Clear button.
Procedure
Step 1 Select Devices > NAT, and edit a threat defense NAT policy.
Step 2 (Optional.) Filter the NAT rules to locate the ones you want to change.
Filtering is especially useful if you have a large NAT policy. For example, you could search on disabled rules
to find ones that need to be enabled.
Your selection is preserved as you go from page to page. However, in practice, it makes most sense to perform
your actions on the rules selected on a page before going to the next page.
Step 4 Perform the desired action. When selecting multiple rules, you are asked to confirm the action.
Note that these actions are also available on the right-click menu.
• To enable all rules, click Select Bulk Action > Enable.
• To disable all rules, click Select Bulk Action > Disable.
• To delete all rules, click Select Bulk Action > Delete.
Dynamic NAT
The following topics explain dynamic NAT and how to configure it.
Note For the duration of the translation, a remote host can initiate a connection to the translated host if an access
rule allows it. Because the address is unpredictable, a connection to the host is unlikely. Nevertheless, in this
case you can rely on the security of the access rule. A successful connection from a remote host can reset the
idle timer for the connection.
The following figure shows a typical dynamic NAT scenario. Only real hosts can create a NAT session, and
responding traffic is allowed back.
Figure 391: Dynamic NAT
The following figure shows a remote host attempting to initiate a connection to a mapped address. This address
is not currently in the translation table; therefore, the packet is dropped.
Figure 392: Remote Host Attempts to Initiate a Connection to a Mapped Address
The advantage of dynamic NAT is that some protocols cannot use PAT. PAT does not work with the following:
Procedure
Step 1 Select Devices > NAT and create or edit the threat defense NAT policy.
Step 2 Do one of the following:
• Click the Add Rule button to create a new rule.
• Click Edit ( ) to edit an existing rule.
The right click menu also has options to cut, copy, paste, insert, and delete rules.
• Translate DNS replies that match this rule—Whether to translate the IP address in DNS replies. For
DNS replies traversing from a mapped interface to a real interface, the Address (the IPv4 A or IPv6
AAAA) record is rewritten from the mapped value to the real value. Conversely, for DNS replies traversing
from a real interface to a mapped interface, the record is rewritten from the real value to the mapped
value. This option is used in specific circumstances, and is sometimes needed for NAT64/46 translation,
where the rewrite also converts between A and AAAA records. For more information, see Rewriting
DNS Queries and Responses Using NAT, on page 1105.
• Fallthrough to Interface PAT (Destination Interface)—Whether to use the IP address of the destination
interface as a backup method when the other mapped addresses are already allocated (interface PAT
fallback). This option is available only if you select a destination interface that is not a member of a
bridge group. To use the IPv6 address of the interface, also check the IPv6 option.
• IPv6—Whether to use the IPv6 address of the destination interface for interface PAT.
You can also create network objects or groups for the Original Destination and Translated Destination if
you are configuring a static translation for those addresses in the rule.
For dynamic NAT, you can also perform port translation on the destination. In the Object Manager, ensure
that there are port objects you can use for the Original Destination Port and Translated Destination Port.
If you specify the source port, it will be ignored.
Procedure
Step 1 Select Devices > NAT and create or edit the threat defense NAT policy.
Step 2 Do one of the following:
• Click the Add Rule button to create a new rule.
• Click Edit ( ) to edit an existing rule.
The right click menu also has options to cut, copy, paste, insert, and delete rules.
Step 5 (On the Translation page.) Identify the original packet addresses, either IPv4 or IPv6; namely, the packet
addresses as they appear in the original packet.
See the following figure for an example of the original packet vs. the translated packet.
• Original Source—The network object or group that contains the addresses you are translating.
• Original Destination—(Optional.) The network object or group that contains the addresses of the
destinations. If you leave this blank, the source address translation applies regardless of destination. If
you do specify the destination address, you can configure a static translation for that address or just use
identity NAT for it.
You can select Source Interface IP to base the original destination on the source interface (which cannot
be Any). If you select this option, you must also select a translated destination object. To implement a
static interface NAT with port translation for the destination addresses, select this option and also select
the appropriate port objects for the destination ports.
Step 6 Identify the translated packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear on
the destination interface network. You can translate between IPv4 and IPv6 if desired.
• Translated Source—The network object or group that contains the mapped addresses.
• Translated Destination—(Optional.) The network object or group that contains the destination addresses
used in the translated packet. If you selected an object for Original Destination, you can set up identity
NAT (that is, no translation) by selecting the same object.
Step 7 (Optional.) Identify the destination service ports for service translation: Original Destination Port, Translated
Destination Port.
Dynamic NAT does not support port translation, so leave the Original Source Port and Translated Source
Port fields empty. However, because the destination translation is always static, you can perform port translation
for the destination port.
NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and mapped service
objects are identical (both TCP or both UDP). For identity NAT, you can use the same service object for both
the real and mapped ports.
Dynamic PAT
The following topics describe dynamic PAT.
For the duration of the translation, a remote host on the destination network can initiate a connection to the
translated host if an access rule allows it. Because the port address (both real and mapped) is unpredictable,
a connection to the host is unlikely. Nevertheless, in this case you can rely on the security of the access rule.
After the connection expires, the port translation also expires.
Note We recommend that you use different PAT pools for each interface. If you use the same pool for multiple
interfaces, especially if you use it for "any" interface, the pool can be quickly exhausted, with no ports available
for new translations.
• If you enable block allocation for a PAT pool, port blocks are allocated in the 1024-65535 range only.
Thus, if an application requires a low port number (1-1023), it might not work. For example, an application
requesting port 22 (SSH) will get a mapped port within the range of 1024-65535 and within the block
allocated to the host.
• If you use the same PAT pool object in two separate rules, then be sure to specify the same options for
each rule. For example, if one rule specifies extended PAT, then the other rule must also specify extended
PAT.
• If a host has an existing connection, then subsequent connections from that host use the same PAT IP
address. If no ports are available, this can prevent the connection. Use the round robin option to avoid
this problem.
• For best performance, limit the number of IP addresses within a PAT pool to 10,000.
Procedure
Step 1 Select Devices > NAT and create or edit the threat defense NAT policy.
Step 2 Do one of the following:
• Click the Add Rule button to create a new rule.
• Click Edit ( ) to edit an existing rule.
The right click menu also has options to cut, copy, paste, insert, and delete rules.
Step 6 If you are using a PAT pool, select the PAT Pool page and do the following:
a) Select Enable PAT pool.
b) Select the network object group that contains the addresses for the pool in the PAT > Address field.
You can alternatively select Destination Interface IP, which is another way to implement interface PAT.
c) (Optional) Select the following options as needed:
• Use Round Robin Allocation—To assign addresses/ports in a round-robin fashion. By default
without round robin, all ports for a PAT address will be allocated before the next PAT address is
used. The round-robin method assigns one address/port from each PAT address in the pool before
returning to use the first address again, and then the second address, and so on.
• Extended PAT Table—To use extended PAT. Extended PAT uses 65535 ports per service, as
opposed to per IP address, by including the destination address and port in the translation information.
Normally, the destination port and address are not considered when creating PAT translations, so
you are limited to 65535 ports per PAT address. For example, with extended PAT, you can create a
translation of [Link]:1027 when going to [Link]:23 as well as a translation of [Link]:1027
when going to [Link]:80. You cannot use this option with interface PAT or interface PAT
fallback.
• Flat Port Range, Include Reserved Ports—To use the 1024 to 65535 port range as a single flat
range when allocating TCP/UDP ports. (Pre-6.7) When choosing the mapped port number for a
translation, PAT uses the real source port number if it is available. However, without this option, if
the real port is not available, by default the mapped ports are chosen from the same range of ports
as the real port number: 1 to 511, 512 to 1023, and 1024 to 65535. To avoid running out of ports at
the low ranges, configure this setting. To use the entire range of 1 to 65535, also check the Include
Reserved Ports option. For the threat defense devices running version 6.7 or higher, the flat port
range is always configured, whether you select the option or not. You can still select the Include
Reserved Ports option for these systems, and that setting is honored.
• Block Allocation—To enable port block allocation. For carrier-grade or large-scale PAT, you can
allocate a block of ports for each host, rather than have NAT allocate one port translation at a time.
If you allocate a block of ports, subsequent connections from the host use new randomly selected
ports within the block. If necessary, additional blocks are allocated if the host has active connections
for all ports in the original block. Port blocks are allocated in the 1024-65535 range only. Port block
allocation is compatible with round robin, but you cannot use it with the extended PAT or flat port
range options. You also cannot use interface PAT fallback.
You can also create network objects or groups for the Original Destination and Translated Destination if
you are configuring a static translation for those addresses in the rule.
For dynamic NAT, you can also perform port translation on the destination. In the Object Manager, ensure
that there are port objects you can use for the Original Destination Port and Translated Destination Port.
If you specify the source port, it will be ignored.
Procedure
Step 1 Select Devices > NAT and create or edit the threat defense NAT policy.
Step 2 Do one of the following:
• Click the Add Rule button to create a new rule.
• Click Edit ( ) to edit an existing rule.
The right click menu also has options to cut, copy, paste, insert, and delete rules.
Step 5 (On the Translation page.) Identify the original packet addresses, either IPv4 or IPv6; namely, the packet
addresses as they appear in the original packet.
See the following figure for an example of the original packet vs. the translated packet.
• Original Source—The network object or group that contains the addresses you are translating.
• Original Destination—(Optional.) The network object or group that contains the addresses of the
destinations. If you leave this blank, the source address translation applies regardless of destination. If
you do specify the destination address, you can configure a static translation for that address or just use
identity NAT for it.
You can select Source Interface IP to base the original destination on the source interface (which cannot
be Any). If you select this option, you must also select a translated destination object. To implement a
static interface NAT with port translation for the destination addresses, select this option and also select
the appropriate port objects for the destination ports.
Step 6 Identify the translated packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear on
the destination interface network. You can translate between IPv4 and IPv6 if desired.
• Translated Source—One of the following:
• (Interface PAT.) To use the address of the destination interface, select Destination Interface IP.
You must also select a specific destination interface object. To use the IPv6 address of the interface,
you must also select the IPv6 option on Advanced. Skip the step for configuring a PAT pool.
• To use a single address other than the destination interface address, select the host network object
you created for this purpose. Skip the step for configuring a PAT pool.
• To use a PAT pool, leave Translated Source empty.
• Translated Destination—(Optional.) The network object or group that contains the destination addresses
used in the translated packet. If you selected an object for Original Destination, you can set up identity
NAT (that is, no translation) by selecting the same object.
Step 7 (Optional.) Identify the destination service ports for service translation: Original Destination Port, Translated
Destination Port.
Dynamic NAT does not support port translation, so leave the Original Source Port and Translated Source
Port fields empty. However, because the destination translation is always static, you can perform port translation
for the destination port.
NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and mapped service
objects are identical (both TCP or both UDP). For identity NAT, you can use the same service object for both
the real and mapped ports.
Step 8 If you are using a PAT pool, select the PAT Pool page and do the following:
a) Select Enable PAT pool.
b) Select the network object group that contains the addresses for the pool in the PAT > Address field.
You can alternatively select Destination Interface IP, which is another way to implement interface PAT.
c) (Optional) Select the following options as needed:
• Use Round Robin Allocation—To assign addresses/ports in a round-robin fashion. By default
without round robin, all ports for a PAT address will be allocated before the next PAT address is
used. The round-robin method assigns one address/port from each PAT address in the pool before
returning to use the first address again, and then the second address, and so on.
• Extended PAT Table—To use extended PAT. Extended PAT uses 65535 ports per service, as
opposed to per IP address, by including the destination address and port in the translation information.
Normally, the destination port and address are not considered when creating PAT translations, so
you are limited to 65535 ports per PAT address. For example, with extended PAT, you can create a
translation of [Link]:1027 when going to [Link]:23 as well as a translation of [Link]:1027
when going to [Link]:80. You cannot use this option with interface PAT or interface PAT
fallback.
• Flat Port Range, Include Reserved Ports—To use the 1024 to 65535 port range as a single flat
range when allocating TCP/UDP ports. (Pre-6.7) When choosing the mapped port number for a
translation, PAT uses the real source port number if it is available. However, without this option, if
the real port is not available, by default the mapped ports are chosen from the same range of ports
as the real port number: 1 to 511, 512 to 1023, and 1024 to 65535. To avoid running out of ports at
the low ranges, configure this setting. To use the entire range of 1 to 65535, also check the Include
Reserved Ports option. For the threat defense devices running version 6.7 or higher, the flat port
range is always configured, whether you select the option or not. You can still select the Include
Reserved Ports option for these systems, and that setting is honored.
• Block Allocation—To enable port block allocation. For carrier-grade or large-scale PAT, you can
allocate a block of ports for each host, rather than have NAT allocate one port translation at a time.
If you allocate a block of ports, subsequent connections from the host use new randomly selected
ports within the block. If necessary, additional blocks are allocated if the host has active connections
for all ports in the original block. Port blocks are allocated in the 1024-65535 range only. Port block
allocation is compatible with round robin, but you cannot use it with the extended PAT or flat port
range options. You also cannot use interface PAT fallback.
Note If you are switching between a regular PAT and block allocation PAT rule, for
object NAT, you must first delete the rule, then clear xlates. You can then create
the new object NAT rule. Otherwise, you will see pat-port-block-state-mismatch
drops in the show asp drop output.
• For a given PAT pool, you must specify (or not specify) block allocation for all rules that use the pool.
You cannot allocate blocks in one rule and not in another. PAT pools that overlap also cannot mix block
allocation settings. You also cannot overlap static NAT with port translation rules with the pool.
Procedure
a) Select Objects > Object Management > FlexConfig > FlexConfig Object and create a new object.
b) Configure the block allocation size, which is the number of ports in each block.
xlate block-allocation size value
The range is 32-4096. The default is 512. Use the “no” form to return to the default.
If you do not use the default, ensure that the size you choose divides evenly into 64,512 (the number of
ports in the 1024-65535 range). Otherwise, there will be ports that cannot be used. For example, if you
specify 100, there will be 12 unused ports.
c) Configure the maximum blocks that can be allocated per host.
xlate block-allocation maximum-per-host number
The limit is per protocol, so a limit of 4 means at most 4 UDP blocks, 4 TCP blocks, and 4 ICMP blocks
per host. The range is 1-8, the default is 4. Use the “no” form to return to the default.
d) (Optional.) Enable interim syslog generation.
xlate block-allocation pba-interim-logging seconds
By default, the system generates syslog messages during port block creation and deletion. If you enable
interim logging, the system generates the following message at the interval you specify. The messages
report all active port blocks allocated at that time, including the protocol (ICMP, TCP, UDP) and source
and destination interface and IP address, and the port block. You can specify an interval from 21600-604800
seconds (6 hours to 7 days).
%ASA-6-305017: Pba-interim-logging: Active protocol block of ports for translation from
real_interface:real_host_ip to mapped_interface:mapped_ip_address/start_port_num-end_port_num
Example:
The following example sets the block allocation size to 64, the per-host maximum to 8, and enables interim
logging every 6 hours.
Step 2 Add NAT rules that use PAT pool port block allocation.
a) Select Devices > NAT and add or edit the threat defense NAT policy.
b) Add or edit a NAT rule and configure at least the following options.
• Type = Dynamic
• In Translation > Original Source, select the object that defines the source address.
• On PAT Pool, configure the following options:
• Select Enable PAT Pool
• In PAT > Address, select a network object or group that defines the pat pool.
• Select the Block Allocation option.
Static NAT
The following topics explain static NAT and how to implement it.
The following figure shows a typical static NAT with port translation scenario showing both a port that is
mapped to itself and a port that is mapped to a different value; the IP address is mapped to a different value
in both cases. The translation is always active so both translated and remote hosts can initiate connections.
Figure 395: Typical Static NAT with Port Translation Scenario
Static NAT-with-port-translation rules limit access to the destination IP address for the specified port only.
If you try to access the destination IP address on a different port not covered by a NAT rule, then the connection
is blocked. In addition, for manual NAT, traffic that does not match the source IP address of the NAT rule
will be dropped if it matches the destination IP address, regardless of the destination port. Therefore, you
must add additional rules for all other traffic allowed to the destination IP address. For example, you can
configure a static NAT rule for the IP address, without port specification, and place it after the port translation
rule.
Note For applications that require application inspection for secondary channels (for example, FTP and VoIP),
NAT automatically translates the secondary ports.
Following are some other uses of static NAT with port translation.
Static NAT with Identity Port Translation
You can simplify external access to internal resources. For example, if you have three separate servers
that provide services on different ports (such as FTP, HTTP, and SMTP), you can give external users a
single IP address to access those services. You can then configure static NAT with identity port translation
to map the single external IP address to the correct IP addresses of the real servers based on the port they
are trying to access. You do not need to change the port, because the servers are using the standard ones
(21, 80, and 25 respectively).
Static NAT with Port Translation for Non-Standard Ports
You can also use static NAT with port translation to translate a well-known port to a non-standard port
or vice versa. For example, if inside web servers use port 8080, you can allow outside users to connect
to port 80, and then undo translation to the original port 8080. Similarly, to provide extra security, you
can tell web users to connect to non-standard port 6785, and then undo translation to port 80.
Static Interface NAT with Port Translation
You can configure static NAT to map a real address to an interface address/port combination. For example,
if you want to redirect Telnet access for the device's outside interface to an inside host, then you can map
the inside host IP address/port 23 to the outside interface address/port 23.
static NAT, when the real host initiates traffic, it always uses the first mapped address. However, for traffic
initiated to the host, you can initiate traffic to any of the mapped addresses, and they will be untranslated to
the single real address.
The following figure shows a typical one-to-many static NAT scenario. Because initiation by the real host
always uses the first mapped address, the translation of real host IP/first mapped IP is technically the only
bidirectional translation.
Figure 396: One-to-Many Static NAT
For example, you have a load balancer at [Link]. Depending on the URL requested, it redirects traffic to
the correct web server.
Figure 397: One-to-Many Static NAT Example
For a many-to-few or many-to-one configuration, where you have more real addresses than mapped addresses,
you run out of mapped addresses before you run out of real addresses. Only the mappings between the lowest
real IP addresses and the mapped pool result in bidirectional initiation. The remaining higher real addresses
can initiate traffic, but traffic cannot be initiated to them (returning traffic for a connection is directed to the
correct real address because of the unique 5-tuple (source IP, destination IP, source port, destination port,
protocol) for the connection).
Note Many-to-few or many-to-one NAT is not PAT. If two real hosts use the same source port number and go to
the same outside server and the same TCP destination port, and both hosts are translated to the same IP address,
then both connections will be reset because of an address conflict (the 5-tuple is not unique).
Instead of using a static rule this way, we suggest that you create a one-to-one rule for the traffic that needs
bidirectional initiation, and then create a dynamic rule for the rest of your addresses.
Procedure
Step 1 Select Devices > NAT and create or edit the threat defense NAT policy.
Step 2 Do one of the following:
• Click the Add Rule button to create a new rule.
• Click Edit ( ) to edit an existing rule.
The right click menu also has options to cut, copy, paste, insert, and delete rules.
• Original Source—The network object that contains the addresses you are translating.
• Translated Source—One of the following:
• To use a set group of addresses, select Address and the network object or group that contains the
mapped addresses. Typically, you configure the same number of mapped addresses as real addresses
for a one-to-one mapping. You can, however, have a mismatched number of addresses.
• (Static interface NAT with port translation.) To use the address of the destination interface, select
Destination Interface IP. You must also select a specific destination interface object. To use the
IPv6 address of the interface, you must also select the IPv6 option on Advanced. This configures
static interface NAT with port translation: the source address/port is translated to the interface's
address and the same port number.
• (Optional.) Original Port, Translated Port—If you need to translate a TCP or UDP port, select the
protocol in Original Port, and type the original and translated port numbers. For example, you can
translate TCP/80 to 8080 if necessary.
You can also create network objects or groups for the Original Destination and Translated Destination if
you are configuring a static translation for those addresses in the rule. If you want to configure destination
static interface NAT with port translation only, you can skip adding an object for the destination mapped
addresses and specify the interface in the rule.
You can also perform port translation on the source, destination, or both. In the Object Manager, ensure that
there are port objects you can use for the original and translated ports.
Procedure
Step 1 Select Devices > NAT and create or edit the threat defense NAT policy.
Step 2 Do one of the following:
• Click the Add Rule button to create a new rule.
• Click Edit ( ) to edit an existing rule.
The right click menu also has options to cut, copy, paste, insert, and delete rules.
exits the device. By default, the rule applies to all interfaces (Any) except for bridge group member
interfaces.
Step 5 (On the Translation page.) Identify the original packet addresses, either IPv4 or IPv6; namely, the packet
addresses as they appear in the original packet.
See the following figure for an example of the original packet vs. the translated packet.
• Original Source—The network object or group that contains the addresses you are translating.
• Original Destination—(Optional.) The network object or group that contains the addresses of the
destinations. If you leave this blank, the source address translation applies regardless of destination. If
you do specify the destination address, you can configure a static translation for that address or just use
identity NAT for it.
You can select Source Interface IP to base the original destination on the source interface (which cannot
be Any). If you select this option, you must also select a translated destination object. To implement a
static interface NAT with port translation for the destination addresses, select this option and also select
the appropriate port objects for the destination ports.
Step 6 Identify the translated packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear on
the destination interface network. You can translate between IPv4 and IPv6 if desired.
• Translated Source—One of the following:
• To use a set group of addresses, select Address and the network object or group that contains the
mapped addresses. Typically, you configure the same number of mapped addresses as real addresses
for a one-to-one mapping. You can, however, have a mismatched number of addresses.
• (Static interface NAT with port translation.) To use the address of the destination interface, select
Destination Interface IP. You must also select a specific destination interface object. To use the
IPv6 address of the interface, you must also select the IPv6 option on Advanced. This configures
static interface NAT with port translation: the source address/port is translated to the interface's
address and the same port number.
• Translated Destination—(Optional.) The network object or group that contains the destination addresses
used in the translated packet. If you selected an object for Original Destination, you can set up identity
NAT (that is, no translation) by selecting the same object.
Step 7 (Optional.) Identify the source or destination service ports for service translation.
If you are configuring static NAT with port translation, you can translate ports for the source, destination, or
both. For example, you can translate between TCP/80 and TCP/8080.
NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and mapped service
objects are identical (both TCP or both UDP). For identity NAT, you can use the same service object for both
the real and mapped ports.
• Original Source Port, Translated Source Port—Defines a port translation for the source address.
• Original Destination Port, Translated Destination Port—Defines a port translation for the destination
address.
Identity NAT
You might have a NAT configuration in which you need to translate an IP address to itself. For example, if
you create a broad rule that applies NAT to every network, but want to exclude one network from NAT, you
can create a static NAT rule to translate an address to itself.
The following figure shows a typical identity NAT scenario.
Procedure
Step 1 Select Devices > NAT and create or edit the threat defense NAT policy.
Step 2 Do one of the following:
• Click the Add Rule button to create a new rule.
• Click Edit ( ) to edit an existing rule.
The right click menu also has options to cut, copy, paste, insert, and delete rules.
You can also create network objects or groups for the Original Destination and Translated Destination if
you are configuring a static translation for those addresses in the rule. If you want to configure destination
static interface NAT with port translation only, you can skip adding an object for the destination mapped
addresses and specify the interface in the rule.
You can also perform port translation on the source, destination, or both. In the Object Manager, ensure that
there are port objects you can use for the original and translated ports. You can use the same object for identity
NAT.
Procedure
Step 1 Select Devices > NAT and create or edit the threat defense NAT policy.
Step 2 Do one of the following:
• Click the Add Rule button to create a new rule.
• Click Edit ( ) to edit an existing rule.
The right click menu also has options to cut, copy, paste, insert, and delete rules.
Step 5 Identify the original packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear in the
original packet.
See the following figure for an example of the original packet vs. the translated packet where you perform
identity NAT on the inside host but translate the outside host.
• Original Source—The network object or group that contains the addresses you are translating.
• Original Destination—(Optional.) The network object or group that contains the addresses of the
destinations. If you leave this blank, the source address translation applies regardless of destination. If
you do specify the destination address, you can configure a static translation for that address or just use
identity NAT for it.
You can select Interface Object to base the original destination on the source interface (which cannot
be Any). If you select this option, you must also select a translated destination object. To implement a
static interface NAT with port translation for the destination addresses, select this option and also select
the appropriate port objects for the destination ports.
Step 6 Identify the translated packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear on
the destination interface network. You can translate between IPv4 and IPv6 if desired.
• Translated Source—The same object or group as the original source. Optionally, you can select a
different object that has the exact same contents.
• Translated Destination—(Optional.) The network object or group that contains the destination addresses
used in the translated packet. If you selected an object for Original Destination, you can set up identity
NAT (that is, no translation) by selecting the same object.
Step 7 (Optional.) Identify the source or destination service ports for service translation.
If you are configuring static NAT with port translation, you can translate ports for the source, destination, or
both. For example, you can translate between TCP/80 and TCP/8080.
NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and mapped service
objects are identical (both TCP or both UDP). For identity NAT, you can use the same service object for both
the real and mapped ports.
• Original Source Port, Translated Source Port—Defines a port translation for the source address.
• Original Destination Port, Translated Destination Port—Defines a port translation for the destination
address.
the object matches traffic. When configuring static NAT with destination translation, use interface objects
that include at most one interface per device assigned to the NAT policy to ensure you are getting the
desired results.
• Identity NAT—The same object as the original source. Optionally, you can select a different object
that has the exact same contents.
• Identity NAT—The same object as the original source. Optionally, you can select a different object
that has the exact same contents.
Original Destination
The network object or group that contains the addresses of the destinations. If you leave this blank, the
source address translation applies regardless of destination. If you do specify the destination address,
you can configure a static translation for that address or just use identity NAT for it.
You can select Source Interface IP to base the original destination on the source interface (which cannot
be Any). If you select this option, you must also select a translated destination object. To implement a
static interface NAT with port translation for the destination addresses, select this option and also select
the appropriate port objects for the destination ports.
Translated Destination
The network object or group that contains the destination addresses used in the translated packet. If you
selected an object for Original Destination, you can set up identity NAT (that is, no translation) by
selecting the same object.
You can use a network object that specifies a fully-qualified domain name as the translated destination;
for more information, see FQDN Destination Guidelines, on page 1016.
Original Source Port, Translated Source Port, Original Destination Port, Translated Destination Port
The port objects that define the source and destination services for the original and translated packets.
You can translate the ports, or select the same object to make the rule sensitive to the service without
translating the ports. Keep the following rules in mind when configuring services:
• (Dynamic NAT or PAT.) You cannot do translation on the Original Source Port and Translated
Source Port. You can do translation on the destination port only.
• NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and
mapped service objects are identical (both TCP or both UDP). For identity NAT, you can use the
same service object for both the real and mapped ports.
Round Robin
To assign addresses/ports in a round-robin fashion. By default without round robin, all ports for a PAT
address will be allocated before the next PAT address is used. The round-robin method assigns one
address/port from each PAT address in the pool before returning to use the first address again, and then
the second address, and so on.
Extended PAT Table
To use extended PAT. Extended PAT uses 65535 ports per service, as opposed to per IP address, by
including the destination address and port in the translation information. Normally, the destination port
and address are not considered when creating PAT translations, so you are limited to 65535 ports per
PAT address. For example, with extended PAT, you can create a translation of [Link]:1027 when going
to [Link]:23 as well as a translation of [Link]:1027 when going to [Link]:80. You cannot
use this option with interface PAT or interface PAT fallback.
Flat Port Range; Include Reserved Ports
To use the 1024 to 65535 port range as a single flat range when allocating TCP/UDP ports. (Pre-6.7)
When choosing the mapped port number for a translation, PAT uses the real source port number if it is
available. However, without this option, if the real port is not available, by default the mapped ports are
chosen from the same range of ports as the real port number: 1 to 511, 512 to 1023, and 1024 to 65535.
To avoid running out of ports at the low ranges, configure this setting. To use the entire range of 1 to
65535, also check the Include Reserved Ports option. For the threat defense devices running version
6.7 or higher, the flat port range is always configured, whether you select the option or not. You can still
select the Include Reserved Ports option for these systems, and that setting is honored.
Block Allocation
To enable port block allocation. For carrier-grade or large-scale PAT, you can allocate a block of ports
for each host, rather than have NAT allocate one port translation at a time. If you allocate a block of
ports, subsequent connections from the host use new randomly selected ports within the block. If necessary,
additional blocks are allocated if the host has active connections for all ports in the original block. Port
blocks are allocated in the 1024-65535 range only. Port block allocation is compatible with round robin,
but you cannot use it with the extended PAT or flat port range options. You also cannot use interface
PAT fallback.
IPv6
Whether to use the IPv6 address of the destination interface for interface PAT.
Net to Net Mapping (Static NAT only.)
For NAT 46, select this option to translate the first IPv4 address to the first IPv6 address, the second to
the second, and so on. Without this option, the IPv4-embedded method is used. For a one-to-one
translation, you must use this option.
Do not proxy ARP on Destination Interface (Static NAT only.)
Disables proxy ARP for incoming packets to the mapped IP addresses. If you use addresses on the same
network as the mapped interface, the system uses proxy ARP to answer any ARP requests for the mapped
addresses, thus intercepting traffic destined for a mapped address. This solution simplifies routing because
the device does not have to be the gateway for any additional networks. You can disable proxy ARP if
desired, in which case you need to be sure to have proper routes on the upstream router. Normally for
identity NAT, proxy ARP is not required, and in some cases can cause connectivity issues.
Perform Route Lookup for Destination Interface (Static Identity NAT only. Routed mode only.)
If you select source and destination interfaces when selecting the same object for original and translated
source address, you can select this option to have the system determine the destination interface based
on the routing table rather than using the destination interface configured in the NAT rule.
Unidirectional (Manual NAT only, static NAT only.)
Select this option to prevent the destination addresses from initiating traffic to the source addresses. The
unidirectional option is mainly useful for testing purposes and might not work with all protocols. For
example, SIP requires protocol inspection to translate SIP headers using NAT, but this will not occur if
you make the translation unidirectional.
• NAT66—Translates IPv6 packets to a different IPv6 address. We recommend using static NAT. Although
you can use dynamic NAT or PAT, IPv6 addresses are in such large supply, you do not have to use
dynamic NAT.
Note NAT64 and NAT 46 are possible on standard routed interfaces only. NAT66 is possible on both routed and
bridge group member interfaces.
You need to define two policies, one for the source IPv6 network, and one for the destination IPv4 network.
Although you can accomplish this with a single manual NAT rule, if the DNS server is on the external network,
you probably need to rewrite the DNS response. Because you cannot enable DNS rewrite on a manual NAT
rule when you specify a destination, creating two auto NAT rules is the better solution.
In this example, you translate the inside IPv6 network to IPv4 using dynamic interface PAT with the IP address
of the outside interface. Outside IPv4 traffic is statically translated to addresses on the [Link]/96 network,
allowing transmission on the inside network.
Procedure
Step 1 Create the network object that defines the inside IPv6 network.
a) Choose Objects > Object Management.
b) Select Network from the table of contents and click Add Network > Add Object.
c) Define the inside IPv6 network.
Name the network object (for example, inside_v6) and enter the network address, [Link]/96.
d) Click Save.
Step 2 Create the manual NAT rule to translate the IPv6 network to IPv4 and back again.
a) Select Devices > NAT and create or edit the threat defense NAT policy.
b) Click Add Rule.
c) Configure the following properties:
• NAT Rule = Manual NAT Rule.
• Type = Dynamic.
f) Click OK.
With this rule, any traffic from the [Link]/96 subnet on the inside interface going to the outside
interface gets a NAT64 PAT translation using the IPv4 address of the outside interface. Conversely, any
IPv4 address on the outside network coming to the inside interface is translated to an address on the
[Link]/96 network using the embedded IPv4 address method.
g) Click Save on the NAT rules page.
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
Following is a typical example where you have an inside IPv6-only network, but there are some IPv4-only
services on the outside Internet that internal users need.
In this example, you translate the inside IPv6 network to IPv4 using dynamic interface PAT with the IP address
of the outside interface. Outside IPv4 traffic is statically translated to addresses on the [Link]/96 network,
allowing transmission on the inside network. You enable DNS rewrite on the NAT46 rule, so that replies from
the external DNS server can be converted from A (IPv4) to AAAA (IPv6) records, and the addresses converted
from IPv4 to IPv6.
Following is a typical sequence for a web request where a client at [Link] on the internal IPv6 network
tries to open [Link].
1. The client’s computer sends a DNS request to the DNS server at [Link]. The NAT rules
make the following translations to the source and destination in the DNS request:
• [Link] to a unique port on [Link] (The NAT64 interface PAT rule.)
• [Link] to [Link] (The NAT46 rule. D1A5:CA81 is the IPv6 equivalent
of [Link].)
2. The DNS server responds with an A record indicating that [Link] is at [Link]. The
NAT46 rule, with DNS rewrite enabled, converts the A record to the IPv6-equivalent AAAA record, and
translates [Link] to [Link]in the AAAA record. In addition, the source and
destination addresses in the DNS response are untranslated:
• [Link] to [Link]
• [Link] to [Link]
3. The IPv6 client now has the IP address of the web server, and makes an HTTP request to [Link]
at [Link]. (D1A5:C8E1 is the IPv6 equivalent of [Link].) The source and
destination of the HTTP request are translated:
• [Link] to a unique port on [Link] (The NAT64 interface PAT rule.)
• [Link] to [Link] (The NAT46 rule.)
Procedure
Step 1 Create the network objects that define the inside IPv6 and outside IPv4 networks.
a) Choose Objects > Object Management.
b) Select Network from the table of contents and click Add Network > Add Object.
c) Define the inside IPv6 network.
Name the network object (for example, inside_v6) and enter the network address, [Link]/96.
d) Click Save.
e) Click Add Network > Add Object and define the outside IPv4 network.
Name the network object (for example, outside_v4_any) and enter the network address [Link]/0.
f) Click Save.
Step 2 Configure the NAT64 dynamic PAT rule for the inside IPv6 network.
Step 3 Configure the static NAT46 rule for the outside IPv4 network.
a) Click Add Rule.
b) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Static.
f) Click OK.
With this rule, any IPv4 address on the outside network coming to the inside interface is translated to an
address on the [Link]/96 network using the embedded IPv4 address method. In addition, DNS responses
are converted from A (IPv4) to AAAA (IPv6) records, and the addresses converted from IPv4 to IPv6.
Procedure
Step 1 Create the network objects that define the inside IPv6 and outside IPv6 NAT networks.
a) Choose Objects > Object Management.
b) Select Network from the table of contents and click Add Network > Add Object.
c) Define the inside IPv6 network.
Name the network object (for example, inside_v6) and enter the network address, [Link]/96.
d) Click Save.
e) Click Add Network > Add Object and define the outside IPv6 NAT network.
Name the network object (for example, outside_nat_v6) and enter the network address
[Link]/96.
f) Click Save.
Step 2 Configure the static NAT rule for the inside IPv6 network.
a) Select Devices > NAT and create or edit the threat defense NAT policy.
b) Click Add Rule.
c) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Static.
f) Click OK.
With this rule, any traffic from the [Link]/96 subnet on the inside interface going to the
outside interface gets a static NAT66 translation to an address on the [Link]/96 network.
When you configure an interface PAT rule for NAT66, all the global addresses that are configured on that
interface are used for PAT mapping. Link-local or site-local addresses for the interface are not used for PAT.
Procedure
Step 1 Create the network object that defines the inside IPv6 network.
a) Choose Objects > Object Management.
b) Select Network from the table of contents and click Add Network > Add Object.
c) Define the inside IPv6 network.
Name the network object (for example, inside_v6) and enter the network address, [Link]/96.
d) Click Save.
Step 2 Configure the dynamic PAT rule for the inside IPv6 network.
a) Select Devices > NAT and create or edit the threat defense NAT policy.
b) Click Add Rule.
c) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Dynamic.
f) On Advanced, select IPv6, which indicates that the IPv6 address of the destination interface should be
used.
g) Click OK.
With this rule, any traffic from the [Link]/96 subnet on the inside interface going to the
outside interface gets a NAT66 PAT translation to one of the IPv6 global addresses configured for the
outside interface.
Monitoring NAT
To monitor and troubleshoot NAT connections, log into the device CLI and use the following commands.
• show nat displays the NAT rules and per-rule hit counts. There are additional keywords to show other
aspects of NAT.
• show xlate displays the actual NAT translations that are currently active.
• clear xlate lets you remove an active NAT translation. You might need to remove active translations if
you alter NAT rules, because existing connections continue to use the old translation slot until the
connection ends. Clearing a translation allows the system to build a new translation for a client on the
client's next connection attempt based on your new rules.
Procedure
Step 1 Create the network objects that define the server’s private and public host addresses.
a) Choose Objects > Object Management.
b) Select Network from the table of contents and click Add Network > Add Object.
c) Define the web server’s private address.
Name the network object (for example, WebServerPrivate) and enter the real host IP address, [Link].
d) Click Save.
e) Click Add Network > Add Object and define the public address.
Name the network object (for example, WebServerPublic) and enter the host address [Link].
f) Click Save.
Step 2 Configure static NAT for the object.
a) Select Devices > NAT and create or edit the threat defense NAT policy.
f) Click Save.
Step 3 Click Save on the NAT rule page.
Dynamic Auto NAT for Inside Hosts and Static NAT for an Outside Web Server
The following example configures dynamic NAT for inside users on a private network when they access the
outside. Also, when inside users connect to an outside web server, that web server address is translated to an
address that appears to be on the inside network.
Figure 402: Dynamic NAT for Inside, Static NAT for Outside Web Server
Procedure
Step 1 Create a network object for the dynamic NAT pool to which you want to translate the inside addresses.
a) Choose Objects > Object Management.
b) Select Network from the table of contents and click Add Network > Add Object.
c) Define the dynamic NAT pool.
Name the network object (for example, myNATpool) and enter the network range
[Link]-[Link].
d) Click Save.
Step 2 Create a network object for the inside network.
a) Click Add Network > Add Object.
b) Name the network object (for example, MyInsNet) and enter the network address [Link]/24.
c) Click Save.
Step 3 Create a network object for the outside web server.
a) Click Add Network > Add Object.
b) Name the network object (for example, MyWebServer) and enter the host address [Link].
c) Click Save.
Step 4 Create a network object for the translated web server address.
a) Click Add Network > Add Object.
b) Name the network object (for example, TransWebServer) and enter the host address [Link].
c) Click Save.
Step 5 Configure dynamic NAT for the inside network using the dynamic NAT pool object.
a) Select Devices > NAT and create or edit the threat defense NAT policy.
b) Click Add Rule.
c) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Dynamic.
f) Click Save.
Step 6 Configure static NAT for the web server.
a) Click Add Rule.
b) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Static.
e) Click Save.
Step 7 Click Save on the NAT rule page.
Inside Load Balancer with Multiple Mapped Addresses (Static Auto NAT,
One-to-Many)
The following example shows an inside load balancer that is translated to multiple IP addresses. When an
outside host accesses one of the mapped IP addresses, it is untranslated to the single load balancer address.
Depending on the URL requested, it redirects traffic to the correct web server.
Figure 403: Static NAT with One-to-Many for an Inside Load Balancer
Procedure
Step 1 Create a network object for the addresses to which you want to map the load balancer.
a) Choose Objects > Object Management.
b) Select Network from the table of contents and click Add Network > Add Object.
c) Define the addresses.
Name the network object (for example, myPublicIPs) and enter the network range
[Link]-[Link].
d) Click Save.
Step 2 Create a network object for the load balancer.
a) Click Add Network > Add Object.
b) Name the network object (for example, myLBHost), enter the host address [Link].
c) Click Save.
Step 3 Configure static NAT for the load balancer.
a) Select Devices > NAT and create or edit the threat defense NAT policy.
b) Click Add Rule.
c) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Static.
f) Click Save.
Step 4 Click Save on the NAT rule page.
you can specify static NAT-with-port-translation rules that use the same mapped IP address, but different
ports.
Figure 404: Static NAT-with-Port-Translation
Procedure
d) Click Save.
Step 2 Create a network object for the HTTP server.
a) Click Add Network > Add Object.
b) Name the network object (for example, HTTPserver), enter the host address [Link].
c) Click Save.
Step 3 Create a network object for the SMTP server.
a) Click Add Network > Add Object.
b) Name the network object (for example, SMTPserver), enter the host address [Link].
c) Click Save.
Step 4 Create a network object for the public IP address used for the three servers.
a) Click Add Network > Add Object.
b) Name the network object (for example, ServerPublicIP) and enter the host address [Link].
c) Click Save.
Step 5 Configure static NAT with port translation for the FTP server, mapping the FTP port to itself.
a) Select Devices > NAT and create or edit the threat defense NAT policy.
b) Click Add Rule.
c) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Static.
f) Click Save.
Step 6 Configure static NAT with port translation for the HTTP server, mapping the HTTP port to itself.
a) Click Add Rule.
b) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Static.
e) Click Save.
Step 7 Configure static NAT with port translation for the SMTP server, mapping the SMTP port to itself.
a) Click Add Rule.
b) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Static.
e) Click Save.
Step 8 Click Save on the NAT rule page.
Procedure
d) Click Save.
Step 2 Create a network object for the DMZ network 1.
a) Click Add Network > Add Object.
b) Name the network object (for example, DMZnetwork1) and enter the network address [Link]/27
(subnet mask of [Link]).
c) Click Save.
Step 3 Create a network object for the PAT address for DMZ network 1.
a) Click Add Network > Add Object.
b) Name the network object (for example, PATaddress1) and enter the host address [Link].
c) Click Save.
Step 4 Create a network object for the DMZ network 2.
a) Click Add Network > Add Object.
b) Name the network object (for example, DMZnetwork2) and enter the network address [Link]/27
(subnet mask of [Link]).
c) Click Save.
Step 5 Create a network object for the PAT address for DMZ network 2.
a) Click Add Network > Add Object.
b) Name the network object (for example, PATaddress2) and enter the host address [Link].
c) Click Save.
Step 6 Configure dynamic manual PAT for DMZ network 1.
a) Select Devices > NAT and create or edit the threat defense NAT policy.
b) Click Add Rule.
c) Configure the following properties:
• NAT Rule = Manual NAT Rule.
• Type = Dynamic.
f) Click Save.
Step 7 Configure dynamic manual PAT for DMZ network 2.
a) Click Add Rule.
b) Configure the following properties:
• NAT Rule = Manual NAT Rule.
• Type = Dynamic.
e) Click Save.
Step 8 Click Save on the NAT rule page.
Procedure
d) Click Save.
Step 2 Create a network object for the Telnet/Web server.
a) Click Add Network > Add Object.
b) Name the network object (for example, TelnetWebServer) and enter the host address [Link].
c) Click Save.
Step 3 Create a network object for the PAT address when using Telnet.
a) Click Add Network > Add Object.
b) Name the network object (for example, PATaddress1) and enter the host address [Link].
c) Click Save.
Step 4 Create a network object for the PAT address when using HTTP.
a) Click Add Network > Add Object.
b) Name the network object (for example, PATaddress2) and enter the host address [Link].
c) Click Save.
Step 5 Configure dynamic manual PAT for Telnet access.
a) Select Devices > NAT and create or edit the threat defense NAT policy.
b) Click Add Rule.
c) Configure the following properties:
• NAT Rule = Manual NAT Rule.
• Type = Dynamic.
f) Click Save.
Step 6 Configure dynamic manual PAT for web access.
e) Click Save.
Procedure
d) Click Save.
e) Click Add Network > Add Object and define the inside San Jose network.
Name the network object (for example, sanjose-network) and enter the network address [Link]/24.
f) Click Save.
Step 2 Configure manual identity NAT for the Boulder network when going over the VPN to San Jose on Firewall1
(Boulder).
a) Select Devices > NAT and create or edit the threat defense NAT policy.
b) Click Add Rule.
c) Configure the following properties:
• NAT Rule = Manual NAT Rule.
• Type = Static.
g) Click Save.
Step 3 Configure manual dynamic interface PAT when going to the Internet for the inside Boulder network on
Firewall1 (Boulder).
a) Click Add Rule.
b) Configure the following properties:
• NAT Rule = Manual NAT Rule.
• Type = Dynamic.
• Insert Rule = any position after the first rule. Because this rule will apply to any destination address,
the rule that uses sanjose-network as the destination must come before this rule, or the sanjose-network
rule will never be matched. The default is to place new manual NAT rules at the end of the "NAT
Rules Before Auto NAT" section.
e) Click Save.
Step 4 If you are also managing Firewall2 (San Jose), you can configure similar rules for that device.
• The manual identity NAT rule would be for sanjose-network when the destination is boulder-network.
Create new interface objects for the Firewall2 inside and outside networks.
• The manual dynamic interface PAT rule would be for sanjose-network when the destination is "any."
Following are the main circumstances when you would need to configure DNS rewrite on a NAT rule.
• The rule is NAT64 or NAT46, and the DNS server is on the outside network. You need DNS rewrite to
convert between DNS A records (for IPv4) and AAAA records (for IPv6).
• The DNS server is on the outside, clients are on the inside, and some of the fully-qualified domain names
that the clients use resolve to other inside hosts.
• The DNS server is on the inside and responds with private IP addresses, clients are on the outside, and
the clients access fully-qualified domain names that point to servers that are hosted on the inside.
Procedure
Step 1 Create the network objects for the FTP server, DNS server, inside network, and PAT pool.
a) Choose Objects > Object Management.
b) Select Network from the table of contents and click Add Network > Add Object.
c) Define the real FTP server address.
Name the network object (for example, ftp_server) and enter the host address, [Link].
d) Click Save.
e) Click Add Network > Add Object and define the FTP server's translated IPv6 address.
Name the network object (for example, ftp_server_v6) and enter the host address, [Link].
f) Click Save.
g) Click Add Network > Add Object and define the DNS server's real address.
Name the network object (for example, dns_server) and enter the host address, [Link].
h) Click Save.
i) Click Add Network > Add Object and define the DNS server's translated IPv6 address.
Name the network object (for example, dns_server_v6) and enter the host address, [Link]
(where D1A5:C90F is the IPv6 equivalent of [Link]).
j) Click Save.
k) Click Add Network > Add Object and define the inside IPv6 network.
Name the network object (for example, inside_v6) and enter the network address, [Link]/96.
l) Click Save.
m) Click Add Network > Add Object and define the IPv4 PAT pool for the inside IPv6 network.
Name the network object (for example, ipv4_pool) and enter the range [Link]-[Link].
n) Click Save.
Step 2 Configure the static NAT rule with DNS modification for the FTP server.
a) Select Devices > NAT and create or edit the threat defense NAT policy.
b) Click Add Rule.
c) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Static.
g) Click OK.
Step 3 Configure the static NAT rule for the DNS server.
a) Click Add Rule.
b) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Static.
e) On Advanced, select Net to Net Mapping, because this is a one-to-one NAT46 translation.
f) Click OK.
Step 4 Configure the dynamic NAT with a PAT pool rule for the inside IPv6 network.
a) Click Add Rule.
b) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Dynamic.
f) Click OK.
Procedure
d) Click Save.
e) Click Add Network > Add Object and define the FTP server's translated address.
Name the network object (for example, ftp_server_outside) and enter the host address, [Link].
f) Click Save.
Step 2 Configure the static NAT rule with DNS modification for the FTP server.
a) Select Devices > NAT and create or edit the threat defense NAT policy.
b) Click Add Rule.
c) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Static.
g) Click OK.
Procedure
d) Click Save.
e) Click Add Network > Add Object and define the FTP server's translated address.
Name the network object (for example, ftp_server_translated) and enter the host address, [Link].
f) Click Save.
Step 2 Configure the static NAT rule with DNS modification for the FTP server.
a) Select Devices > NAT and create or edit the threat defense NAT policy.
b) Click Add Rule.
c) Configure the following properties:
• NAT Rule = Auto NAT Rule.
• Type = Static.
g) Click OK.
Creation of network 7.2.6 Any You can create network groups in addition to network objects when you are
groups while editing editing a NAT rule.
7.4.1
NAT rules.
This feature is not supported in Version 7.3.x or 7.4.0.
Ability to enable, disable, 7.2 Any You can select multiple NAT rules and enable, disable, or delete them all at
or delete more than one the same time. Enable and disable apply to manual NAT rules only, whereas
NAT rule at a time. delete applies to any NAT rule.
Manual NAT support for 7.1 Any You can use an FQDN network object, such as one specifying
fully-qualified domain [Link], as the translated destination address in manual NAT rules.
name (FQDN) objects as The system configures the rule based on the IP address returned from the DNS
the translated destination. server.
Changes to PAT address 6.7 Any The way PAT addresses are distributed to the members of a cluster is changed.
allocation in clustering. Previously, addresses were distributed to the members of the cluster, so your
The PAT pool Flat Port PAT pool would need a minimum of one address per cluster member. Now,
Range option is now the control unit instead divides each PAT pool address into equal-sized port
enabled by default and it blocks and distributes them across cluster members. Each member has port
is not configurable. blocks for the same PAT addresses. Thus, you can reduce the size of the PAT
pool, even to as few as one IP address, depending on the amount of connections
you typically need to PAT. Port blocks are allocated in 512-port blocks from
the 1024-65535 range. You can optionally included the reserved ports, 1-1023,
in this block allocation when you configure PAT pool rules. For example, in
a 4-node cluster, each node gets 32 blocks with which it will be able to handle
16384 connections per PAT pool IP address compared to a single node handling
all 65535 connections per PAT pool IP address.
As part of this change, PAT pools for all systems, whether standalone or
operating in a cluster, now use a flat port range of 1023 - 65535. Previously,
you could optionally use a flat range by including the Flat Port Range option
in a PAT pool rule. The Flat Port Range option is now ignored: the PAT pool
is now always flat. You can optionally select the Include Reserved Ports
option to include the 1 - 1023 port range within the PAT pool.
Note that if you configure port block allocation (the Block Allocation PAT
pool option), your block allocation size is used rather than the default 512-port
block. In addition, you cannot configure extended PAT for a PAT pool for
systems in a cluster.
Ability to search and 6.7 Any You can now search for rules in threat defense NAT policies to help you find
filter the threat defense rules based on IP addresses, ports, object names, and so forth. Search results
NAT rule table. include partial matches. Searching on criteria filters the rule table so only
matching rules are displayed.
We added a search field above the rule table when you edit threat defense NAT
policies.
Carrier grade NAT 6.5 Any For carrier-grade or large-scale PAT, you can allocate a block of ports for each
enhancements. host, rather than have NAT allocate one port translation at a time (see RFC
6888).
New/modified screens: We added the Block Allocation option to the NAT
PAT Pool tab for threat defense NAT rules.
Support for network 6.1.0 Any You can now use network range objects in threat defense NAT rules where
range objects in NAT for appropriate.
threat defense.
Network Address 6.0.1 Any The NAT policy for threat defense was added.
Translation (NAT) for
New/modified screens: Threat Defense was added as a type of NAT policy to
threat defense.
the Devices > NAT page.
About Alarms
You can configure the ISA 3000 to issue alarms for a variety of conditions. If any conditions do not match
the configured settings, the system triggers an alarm, which is reported by way of LEDs, syslog messages,
SNMP traps, and through external devices connected to the alarm output interface. By default, triggered alarms
issue syslog messages only.
You can configure the alarm system to monitor the following:
• Power supply.
• Primary and secondary temperature sensors.
• Alarm input interfaces.
The ISA 3000 has internal sensors plus two alarm input interfaces and one alarm output interface. You can
connect external sensors, such as door sensors, to the alarm inputs. You can connect external alarm devices,
such as buzzers or lights, to the alarm output interface.
The alarm output interface is a relay mechanism. Depending on the alarm conditions, the relay is either
energized or de-energized. When it is energized, any device connected to the interface is activated. A
de-energized relay results in the inactive state of any connected devices. The relay remains in an energized
state as long as alarms are triggered.
For information about connecting external sensors and the alarm relay, see Cisco ISA 3000 Industrial Security
Appliance Hardware Installation Guide.
Alarm activated Minor alarm—solid Relay energized Syslog generated SNMP trap sent
red
Major
alarm—flashing red
Alarm activated Solid red Relay energized Syslog generated SNMP trap sent
Syslog Alarms
By default, the system sends syslog messages when any alarm is triggered. You can disable syslog messaging
if you do not want the messages.
For syslog alarms to work, you must also enable diagnostic logging. Choose Device > Platform Settings,
add or edit a Threat Defense platform settings policy that is assigned to the device, and configure destinations
and settings on the Syslog page. For example, you can configure a syslog server, console logging, or internal
buffer logging.
Without enabling a destination for diagnostic logging, the alarm system has nowhere to send syslog messages.
SNMP Alarms
You can optionally configure the alarms to send SNMP traps to your SNMP server. For SNMP trap alarms
to work, you must also configure SNMP settings.
Choose Device > Platform Settings, add or edit a Threat Defense platform settings policy that is assigned to
the device, and enable SNMP and configure settings on the SNMP page.
Temperature Enabled for the — — Enabled for Enabled for Enabled for
primary primary primary primary
temperature temperature temperature temperature
alarm (default alarm alarm alarm
values of 92°C
and -40°C for the
high and low
thresholds
respectively)
Disabled for the
secondary alarm.
Supported Domains
Any
User Roles
Admin
Procedure
Step 1 Create the FlexConfig object to configure the alarm input contacts.
a) Choose Objects > Object Management.
b) Choose FlexConfig > FlexConfig Object from the table of contents.
c) Click Add FlexConfig Object, configure the following properties, and click Save.
• Name—The object name. For example, Configure_Alarm_Contacts.
• Deployment—Select Everytime. You want this configuration to be sent in every deployment to
ensure it remains configured.
• Type—Keep the default, Append. The commands are sent to the device after the commands for
directly-supported features.
• Object body—In the object body, type the commands needed to configure the alarm contacts. The
following steps explain the commands.
For example, to set the severity of contact 1 to Major, enter the following:
For example, you connect a door sensor to alarm input contact 1, and its normal state has no electrical
current flowing through the alarm contact (it is open). If the door is opened, the contact is closed and
electrical current flows through the alarm contact. You would set the alarm trigger to closed so that the
alarm goes off when the electrical current starts flowing.
For example, to enable all actions for the alarm input contact 1, enter the following:
h) Verify that the object body contains the commands you want.
For example, if your template includes all of the command examples shown in this procedure, the object
body would have the following commands:
i) Click Save.
Step 2 Create the FlexConfig policy and assign it to the devices.
a) Choose Devices > FlexConfig.
b) Either click New Policy, or if an existing FlexConfig policy should be assigned to (or is already assigned
to) the target devices, simply edit that policy.
When creating a new policy, assign the target devices to the policy in the dialog box where you name the
policy.
c) Select the alarm contact FlexConfig object in the User Defined folder in the table of contents and click
> to add it to the policy.
The object should be added to the Selected Appended FlexConfigs list.
d) Click Save.
e) If you have not yet assigned all the targeted devices to the policy, click the Policy Assignments link below
Save and make the assignments now.
f) Click Preview Config, and in the Preview dialog box, select one of the assigned devices.
The system generates a preview of the configuration CLI that will be sent to the device. Verify that the
commands generated from the FlexConfig object look correct. These will be shown at the end of the
preview. Note that you will also see commands generated from other changes you have made to managed
features. For the alarm contact commands, you should see something similar to the following:
Procedure
Step 1 Create the FlexConfig object to configure the power supply alarm.
a) Choose Objects > Object Management.
b) Choose FlexConfig > FlexConfig Object from the table of contents.
c) Click Add FlexConfig Object, configure the following properties, and click Save.
• Name—The object name. For example, Power_Supply_Alarms.
• Deployment—Select Everytime. You want this configuration to be sent in every deployment to
ensure it remains configured.
• Type—Keep the default, Append. The commands are sent to the device after the commands for
directly-supported features.
• Object body—In the object body, type the commands needed to configure the power supply alarms.
The following steps explain the commands.
power-supply dual
e) Configure the actions to take when the power supply alarm is triggered.
alarm facility power-supply rps {relay | syslog | notifies | disable}
You can configure more than one action. For example, you can configure the device to activate the external
alarm, send syslog messages, and also send SNMP traps.
• relay—Energize the alarm output relay, which activates the external alarm that you attached to it,
such as a buzzer or a flashing light. The output LED also goes red.
• syslog—Send a syslog message. This option is enabled by default.
• notifies—Send an SNMP trap.
• disable—Disable the power supply alarm. Any other actions configured for the power supply alarm
are inoperable.
For example, to enable all actions for the power supply alarm, enter the following:
f) Verify that the object body contains the commands you want.
For example, if your template includes all of the command examples shown in this procedure, the object
body would have the following commands:
power-supply dual
alarm facility power-supply rps relay
alarm facility power-supply rps syslog
alarm facility power-supply rps notifies
g) Click Save.
Step 2 Create the FlexConfig policy and assign it to the devices.
a) Choose Devices > FlexConfig.
b) Either click New Policy, or if an existing FlexConfig policy should be assigned to (or is already assigned
to) the target devices, simply edit that policy.
When creating a new policy, assign the target devices to the policy in the dialog box where you name the
policy.
c) Select the power supply alarm FlexConfig object in the User Defined folder in the table of contents and
click > to add it to the policy.
The object should be added to the Selected Appended FlexConfigs list.
d) Click Save.
e) If you have not yet assigned all the targeted devices to the policy, click the Policy Assignments link below
Save and make the assignments now.
f) Click Preview Config, and in the Preview dialog box, select one of the assigned devices.
The system generates a preview of the configuration CLI that will be sent to the device. Verify that the
commands generated from the FlexConfig object look correct. These will be shown at the end of the
preview. Note that you will also see commands generated from other changes you have made to managed
features. For the power supply alarm commands, you should see something similar to the following:
The secondary temperature alarm is disabled by default. You can set the secondary temperature within the
range -35°C to 85°C.
Because the secondary temperature range is more restrictive than the primary range, if you set either the
secondary low or high temperature, that setting disables the corresponding primary setting, even if you
configure non-default values for the primary setting. You cannot enable two separate high and two separate
low temperature alarms.
Thus, in practice, you should configure the primary only, or the secondary only, setting for high and low.
Procedure
For example, to enable all actions for the secondary temperature alarm, enter the following:
f) Verify that the object body contains the commands you want.
For example, if your template includes all of the command examples shown in this procedure, the object
body would have the following commands:
g) Click Save.
Step 2 Create the FlexConfig policy and assign it to the devices.
a) Choose Devices > FlexConfig.
b) Either click New Policy, or if an existing FlexConfig policy should be assigned to (or is already assigned
to) the target devices, simply edit that policy.
When creating a new policy, assign the target devices to the policy in the dialog box where you name the
policy.
c) Select the temperature alarms FlexConfig object in the User Defined folder in the table of contents and
click > to add it to the policy.
The object should be added to the Selected Appended FlexConfigs list.
d) Click Save.
e) If you have not yet assigned all the targeted devices to the policy, click the Policy Assignments link below
Save and make the assignments now.
f) Click Preview Config, and in the Preview dialog box, select one of the assigned devices.
The system generates a preview of the configuration CLI that will be sent to the device. Verify that the
commands generated from the FlexConfig object look correct. These will be shown at the end of the
preview. Note that you will also see commands generated from other changes you have made to managed
features. For the temperature alarms commands, you should see something similar to the following:
Monitoring Alarms
The following topics explain how to monitor and manage alarms.
Temperature Alarms
In these alarms, Celsius is replaced by the temperature detected on the device, in Celsius.
• %FTD-6-806001: Primary alarm CPU temperature is High Celsius
• %FTD-6-806002: Primary alarm for CPU high temperature is cleared
• %FTD-6-806003: Primary alarm CPU temperature is Low Celsius
• %FTD-6-806004: Primary alarm for CPU Low temperature is cleared
• %FTD-6-806005: Secondary alarm CPU temperature is High Celsius
• %FTD-6-806006: Secondary alarm for CPU high temperature is cleared
• %FTD-6-806007: Secondary alarm CPU temperature is Low Celsius
• %FTD-6-806008: Secondary alarm for CPU Low temperature is cleared
Alarms for the Cisco ISA 6.7 Any Configuring alarms for the Cisco ISA 3000 series was validated using
3000 series. FlexConfig. You should be able to configure the alarms in older releases that
support FlexConfig, except for the dual power supply alarms.
Supported platforms: Secure Firewall Threat Defense on the ISA 3000.
Default Route
The simplest option is to configure a default static route to send all traffic to an upstream router, relying on
the router to route the traffic for you. A default route identifies the gateway IP address to which the threat
defense device sends all IP packets for which it does not have a learned or static route. A default static route
is simply a static route with [Link]/0 (IPv4) or ::/0 (IPv6) as the destination IP address.
You should always define a default route.
The threat defense has separate routing tables for data interfaces and for management-only interfaces (including
the special Linux Management interface). You can only add a default route for the data routing table. The
threat defense automatically adds a default route in the management-only routing table that sends traffic to
the Linux Management interface, where a separate route lookup occurs in the Linux routing table. You can
add static routes to the Linux routing table that can be used by Management using the threat defense CLI
configure network static-routes command.
Note The default Linux route is set with the configure network ipv4 or configure network ipv6 command.
Static Routes
You might want to use static routes in the following cases:
• Your networks use an unsupported router discovery protocol.
• Your network is small and you can easily manage static routes.
• You do not want the traffic or CPU overhead associated with routing protocols.
• In some cases, a default route is not enough. The default gateway might not be able to reach the destination
network, so you must also configure more specific static routes. For example, if the default gateway is
outside, then the default route cannot direct traffic to any inside networks that are not directly connected
to the threat defense device.
• You are using a feature that does not support dynamic routing protocols.
• Virtual routers use static routes to create route leaks. Route leaks enable flow of traffic from an interface
of a virtual router to another interface in another virtual router. For more information, see Interconnecting
Virtual Routers, on page 1158.
Route Priorities
• Routes that identify a specific destination take precedence over the default route.
• When multiple routes exist to the same destination (either static or dynamic), then the administrative
distance for the route determines priority. Static routes are set to 1, so they typically are the highest
priority routes.
• When you have multiple static routes to the same destination with the same administrative distance, see
Equal-Cost Multi-Path (ECMP) Routing, on page 1151.
• For traffic emerging from a tunnel with the Tunneled option, this route overrides any other configured
or learned default routes.
For bridge groups in routed mode, you must specify the BVI in a static route; you cannot specify a member
interface. See MAC Address vs. Route Lookups, on page 282 for more information.
You can configure static route tracking for statically defined routes or default routes obtained through DHCP
or PPPoE. You can only enable PPPoE clients on multiple interfaces with route tracking configured.
Supported Domains
Any
User Roles
Admin
Network Admin
Clustering
• In clustering, static route tracking is only supported on the control node.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 (May be required) From the virtual routers drop-down list, select the virtual router for which you are configuring
a static route.
Step 4 Select Static Route.
Step 9 In the Gateway or IPv6 Gateway field, enter or choose the gateway router that is the next hop for this route.
You can provide an IP address or a Networks/Hosts object.
When you are using static-route configuration for virtual routers to leak routes, do not specify the next hop
gateway.
Step 10 In the Metric field, enter the number of hops to the destination network. Valid values range from 1 to 255;
the default value is 1.
The metric is a measurement of the “expense” of a route, based on the number of hops (hop count) to the
network on which a specific host resides. Hop count is the number of networks that a network packet must
traverse, including the destination network, before it reaches its final destination. The metric is used to compare
routes among different routing protocols. The default administrative distance for static routes is 1, giving it
precedence over routes discovered by dynamic routing protocols but not directly connected routes. The default
administrative distance for routes discovered by OSPF is 110. If a static route has the same administrative
distance as a dynamic route, the static route takes precedence. Connected routes always take precedence over
static or dynamically discovered routes.
Step 11 (Optional) For a default route, click the Tunneled checkbox to define a separate default route for VPN traffic.
You can define a separate default route for VPN traffic if you want your VPN traffic to use a different default
route than your non VPN traffic. For example, traffic incoming from VPN connections can be easily directed
towards internal networks, while traffic from internal networks can be directed towards the outside. When
you create a default route with the tunneled option, all traffic from a tunnel terminating on the device that
cannot be routed using learned or static routes, is sent to this route. You can configure only one default tunneled
gateway per device. ECMP for tunneled traffic is not supported.
Step 12 (IPv4 static route only) To monitor route availability, enter or choose the name of an SLA (service level
agreement) Monitor object that defines the monitoring policy, in the Route Tracking field.
See SLA Monitor, on page 1421.
Path Determination
Routing protocols use metrics to evaluate what path will be the best for a packet to travel. A metric is a standard
of measurement, such as path bandwidth, that is used by routing algorithms to determine the optimal path to
a destination. To aid the process of path determination, routing algorithms initialize and maintain routing
tables, which include route information. Route information varies depending on the routing algorithm used.
Routing algorithms fill routing tables with a variety of information. Destination or next hop associations tell
a router that a particular destination can be reached optimally by sending the packet to a particular router
representing the next hop on the way to the final destination. When a router receives an incoming packet, it
checks the destination address and attempts to associate this address with a next hop.
Routing tables also can include other information, such as data about the desirability of a path. Routers compare
metrics to determine optimal routes, and these metrics differ depending on the design of the routing algorithm
used.
Routers communicate with one another and maintain their routing tables through the transmission of a variety
of messages. The routing update message is one such message that generally consists of all or a portion of a
routing table. By analyzing routing updates from all other routers, a router can build a detailed picture of
network topology. A link-state advertisement, another example of a message sent between routers, informs
other routers of the state of the sender links. Link information also can be used to build a complete picture of
network topology to enable routers to determine optimal routes to network destinations.
Dynamic routing algorithms can be supplemented with static routes where appropriate. A router of last resort
(a default route for a router to which all unrouteable packets are sent), for example, can be designated to act
as a repository for all unrouteable packets, ensuring that all messages are at least handled in some way.
OSPF is a routing protocol developed for Internet Protocol (IP) networks by the interior gateway protocol
(IGP) working group of the Internet Engineering Task Force (IETF). OSPF uses a link-state algorithm
to build and calculate the shortest path to all known destinations. Each router in an OSPF area includes
an identical link-state database, which is a list of each of the router usable interfaces and reachable
neighbors.
• Routing Information Protocol (RIP)
RIP is a distance-vector protocol that uses hop count as its metric. RIP is widely used for routing traffic
in the global Internet and is an interior gateway protocol (IGP), which means that it performs routing
within a single autonomous system.
• Border Gateway Protocol (BGP)
BGP is an interautonomous system routing protocol. BGP is used to exchange routing information for
the Internet and is the protocol used between Internet service providers (ISP). Customers connect to ISPs,
and ISPs use BGP to exchange customer and ISP routes. When BGP is used between autonomous systems
(AS), the protocol is referred to as External BGP (EBGP). If a service provider is using BGP to exchange
routes within an AS, then the protocol is referred to as Interior BGP (IBGP).
Routing Table
The threat defense uses separate routing tables for data traffic (through-the-device) and for management traffic
(from-the-device). This section describes how the routing tables work. For information about the management
routing table, see also Routing Table for Management Traffic, on page 1151.
Even though OSPF routes have the better administrative distance, both routes are installed in the routing
table because each of these routes has a different prefix length (subnet mask). They are considered
different destinations and the packet forwarding logic determines which route to use.
• If the threat defense device learns about multiple paths to the same destination from a single routing
protocol, such as RIP, the route with the better metric (as determined by the routing protocol) is entered
into the routing table.
Metrics are values associated with specific routes, ranking them from most preferred to least preferred.
The parameters used to determine the metrics differ for different routing protocols. The path with the
lowest metric is selected as the optimal path and installed in the routing table. If there are multiple paths
to the same destination with equal metrics, load balancing is done on these equal cost paths.
• If the threat defense device learns about a destination from more than one routing protocol, the
administrative distances of the routes are compared, and the routes with lower administrative distance
are entered into the routing table.
Connected interface 0
VPN route 1
Static route 1
External BGP 20
Internal EIGRP 90
OSPF 110
IS-IS 115
RIP 120
Unknown 255
The smaller the administrative distance value, the more preference is given to the protocol. For example, if
the threat defense device receives a route to a certain network from both an OSPF routing process (default
administrative distance - 110) and a RIP routing process (default administrative distance - 120), the threat
defense device chooses the OSPF route because OSPF has a higher preference. In this case, the router adds
the OSPF version of the route to the routing table.
A VPN advertised route (V-Route/RRI)) is equivalent to a static route with the default administrative distance
1. But it has a higher preference as with the network mask [Link].
In this example, if the source of the OSPF-derived route was lost (for example, due to a power shutdown),
the threat defense device would then use the RIP-derived route until the OSPF-derived route reappears.
The administrative distance is a local setting. For example, if you change the administrative distance of routes
obtained through OSPF, that change would only affect the routing table for the threat defense device on which
the command was entered. The administrative distance is not advertised in routing updates.
Administrative distance does not affect the routing process. The routing processes only advertise the routes
that have been discovered by the routing process or redistributed into the routing process. For example, the
RIP routing process advertises RIP routes, even if routes discovered by the OSPF routing process are used in
the routing table.
For example, a packet destined for [Link] arrives on an interface with the following routes in the routing
table:
• [Link]/24 gateway [Link]
• [Link]/19 gateway [Link]
In this case, a packet destined to [Link] is directed toward [Link], because [Link] falls within
the [Link]/24 network. It also falls within the other route in the routing table, but [Link]/24 has
the longest prefix within the routing table (24 bits verses 19 bits). Longer prefixes are always preferred over
shorter ones when forwarding a packet.
Note Existing connections continue to use their established interfaces even if a new similar connection would result
in different behavior due to a change in routes.
After the data node learn the routes from the control node, each node makes forwarding decisions independently.
The OSPF LSA database is not synchronized from the control node to data nodes. If there is a control node
switchover, the neighboring router will detect a restart; the switchover is not transparent. The OSPF process
picks an IP address as its router ID. Although not required, you can assign a static router ID to ensure a
consistent router ID is used across the cluster. See the OSPF Non-Stop Forwarding feature to address the
interruption.
In the above diagram, Router A learns that there are 4 equal-cost paths to Router B, each through a node.
ECMP is used to load balance traffic between the 4 paths. Each node picks a different router ID when talking
to external routers.
You must configure a cluster pool for the router ID so that each node has a separate router ID.
EIGRP does not form neighbor relationships with cluster peers in individual interface mode.
Note If the cluster has multiple adjacencies to the same router for redundancy purposes, asymmetric routing can
lead to unacceptable traffic loss. To avoid asymmetric routing, group all of these node interfaces into the same
traffic zone. See Create an ECMP Zone, on page 1213.
Note The default Linux route is set with the configure network ipv4 or configure
network ipv6 command.
Note For devices that have not yet merged the Management and legacy Diagnostic interfaces, see refer to pre-7.3
versions of this guide.
In this case, traffic is load-balanced on the outside interface between [Link], [Link], and [Link]. Traffic
is distributed among the specified gateways based on an algorithm that hashes the source and destination IP
addresses, incoming interface, protocol, source and destination ports.
Similarly, your dynamic routing protocol can automatically configure equal cost routes. The threat defense
device load-balances traffic across the interfaces with a more robust load balancing mechanism.
When a route is lost, the device seamlessly moves the flow to a different route.
These are some of the differences between route maps and ACLs:
• Route maps are more flexible than ACLs and can verify routes based on criteria which ACLs can not
verify. For example, a route map can verify if the type of route is internal.
• Each ACL ends with an implicit deny statement, by design convention. If the end of a route map is
reached during matching attempts, the result depends on the specific application of the route map. Route
maps that are applied to redistribution behave the same way as ACLs: if the route does not match any
clause in a route map then the route redistribution is denied, as if the route map contained a deny statement
at the end.
For each route that is being redistributed, the router first evaluates the match criteria of a clause in the route
map. If the match criteria succeeds, then the route is redistributed or rejected as dictated by the permit or deny
clause, and some of its attributes might be modified by the values set from the set commands. If the match
criteria fail, then this clause is not applicable to the route, and the software proceeds to evaluate the route
against the next clause in the route map. Scanning of the route map continues until a clause is found that
matches the route or until the end of the route map is reached.
A match or set value in each clause can be missed or repeated several times, if one of these conditions exists:
• If several match entries are present in a clause, all must succeed for a given route in order for that route
to match the clause (in other words, the logical AND algorithm is applied for multiple match commands).
• If a match entry refers to several objects in one entry, either of them should match (the logical OR
algorithm is applied).
• If a match entry is not present, all routes match the clause.
• If a set entry is not present in a route map permit clause, then the route is redistributed without modification
of its current attributes.
Note Do not configure a set entry in a route map deny clause because the deny clause prohibits route
redistribution—there is no information to modify.
A route map clause without a match or set entry does perform an action. An empty permit clause allows a
redistribution of the remaining routes without modification. An empty deny clause does not allow a
redistribution of other routes (this is the default action if a route map is completely scanned, but no explicit
match is found).
Note that there are separate management and data routing tables per virtual router. For example, if you assign
a management-only interface to a virtual router, then the routing table for that interface is separate from the
data interfaces assigned to the virtual router.
A dynamic VTI and its corresponding protected network interface must be part of the same virtual router.
You must map the borrow IP interface and the dynamic VTI to the same virtual router. A tunnel source
interface can be part of multiple virtual routers.
To configure virtual routers using dynamic VTI for a route-based site-to-site VPN, see How to Configure a
Virtual Router with Dynamic VTI, on page 1156.
For more information about a configuration example, see How to Secure Traffic from Networks with Multiple
Virtual Routers over a Site-to-Site VPN with Dynamic VTI, on page 1188
1 Create a route-based site-to-site VPN with Create a Route-based Site-to-Site VPN, on page
a dynamic VTI interface on the hub and 1518
static VTI(s) on the spoke(s).
3 Assign the interfaces to the virtual router. Configure a Virtual Router, on page 1166
4 Configure routing policies for the hub and Configure Endpoints for a Hub and Spoke
spoke. Topology, on page 1521
5 Configure access control policies for the Configure Endpoints for a Hub and Spoke
hub and spoke. Topology, on page 1521
• Traffic separation for customers through dedicated routing tables for each customer or for different
departments.
• Common security policy management for different departments or networks.
• Shared internet access for different departments or network.
ISIS and PBR are supported through Flex Config in management center (see Predefined FlexConfig Objects,
on page 2628). Configure only global virtual router interfaces for these features.
DHCP server auto-configuration uses WINS/DNS server that is learned from an interface. This interface can
only be a global virtual router interface.
You can configure the following features separately for each user-defined virtual router:
• Static routes and their SLA monitors
• OSPFv2
• BGPv4/v6
• Integrated Routing and Bridging (IRB)
• SNMP
Following features are used by the system when querying or communicating with the remote system
(from-the-box traffic). These features use interfaces in the global virtual router only. That means, if you
configure an interface for the feature, it must belong to the global virtual router. As a rule, anytime, if the
system must look up a route to reach an external server for its own management purposes, it does the route
lookup in the global virtual router.
• DNS server when used to resolve fully qualified names used in access control rules, or for resolving
names for the ping command. If you specify any as the interface for a DNS server, the system considers
interfaces in the global virtual router only.
• AAA server or identity realm when used with VPN. You can configure VPN on interfaces in the global
virtual router only. Thus, the external AAA servers that are used for VPN, such as Active Directory,
must be reachable through an interface in the global virtual router.
If you use overlapping address spaces in your virtual routers, you should use security zones to ensure that the
right policies get applied. For example, if you use the [Link]/24 address space in two separate virtual
routers, an access control rule that simply specifies the [Link]/24 network will apply to traffic in both
virtual routers. If that is not the desired outcome, you can limit the application of the rule by also specifying
the source/destination security zones for just one of the virtual routers.
For details on configuring BGP route leaking, see Configure BGP Route Import/Export Settings, on page 1281.
Overlapping IP Addresses
Virtual router creates multiple instances of routing tables that are independent, thereby, the same or overlapping
IP addresses can be used without conflicts. Threat Defense allows the same network to be part of two or more
virtual routers. This involves multiple policies to be applied at the interface or at the virtual router level.
Other than few exceptions, the routing functions and most of the NGFW and IPS capability does not get
impacted by the overlapping IP addresses. The following section describes the features that have limitations
with overlapping IP addresses and the suggestions or recommendations to overcome them.
For the following features, you need to apply rules on specific interfaces to ensure that different policies are
applied on overlapping IP segments:
• Access Policy
• Prefilter Policy
• QoS/Rate Limit
• SSL Policy
Note SNMP is not virtual router-aware. Hence, while configuring SNMP server on the user-defined virtual router,
ensure that the network address is not an Overlapping IP Addresses.
4. Deploy Configuration Changes. On successful deployment, the-SNMP polling and traps are sent to the
Network Management Station through the virtual router interface.
70 cores, then each core would support a maximum of 1.43 virtual routers (rounded). Thus, an instance
assigned 6 cores would support 8.58 virtual routers, which rounds down to 8, and an instance assigned 10
cores would support 14.3 virtual routers (rounding down, 14).
Firepower 1010 5
Firepower 1120 5
Firepower 1140 10
Firepower 1150 10
Firepower 4112 60
Firepower 4115 80
ISA 3000 10
Related Topics
Requirements and Prerequisites for Container Instances, on page 315
Supported Domains
Any
User Roles
Admin
Network Admin
Security Approver
Interface Guidelines
• You can assign an interface to only one virtual router.
• A virtual router can have any number of interfaces that are assigned to it.
• You can assign only routed interfaces with logical names and VTIs to a user-defined virtual router.
• If you want to change a virtual router interface to a non-routed mode, remove the interface from the
virtual router, and then change its mode.
• You can assign an interface to a virtual router, either from a global virtual router or from another
user-defined virtual router.
• The following interfaces cannot be assigned to an user-defined virtual router:
• Members of EtherChannel.
• Members of Redundant interfaces.
• Members of BVI.
• VTI is a route-based VPN. So, when the tunnel is established, the traffic that uses VTI for encryption
must be controlled through routing. Static routing, as well as dynamic routing with BGP, OSPFv2/v3,
or EIGRP is supported.
• You cannot use interfaces that belong to user-defined virtual routers in policy-based site-to-site or remote
access VPNs.
• A dynamic VTI and its corresponding protected network interface must be part of the same virtual router.
• You must map the borrow IP interface and the dynamic VTI to the same virtual router.
• User-defined virtual routers support only BGPv4/v6 and OSPFv2 routing protocols.
• A tunnel source interface can be in a different user-defined virtual router than that associated with the
dynamic VTI.
• If a route using the interface that is being moved or its virtual router is deleted, exist in source or destination
virtual router table, remove the routes before the interface movement or virtual router deletion.
• As separate routing tables are maintained for each virtual router, when an interface is moved from one
virtual router to another virtual router, be it global or user-defined, the system removes the IP address
configured on the interface temporarily. All existing connections on the interface are terminated. Thus,
moving interfaces between virtual routers have drastic effect on the network traffic. Hence take
precautionary measures before you move interfaces.
Clustering Guidelines
• When the control unit link fails due to failure of its interfaces, the unit removes all leaked routes of its
interfaces from the global routing table and propagates the inactive connected and static routes to other
units of the cluster. This results in removal of those leaked routes from the routing table in other units.
These removal takes place prior to another unit becoming a new control unit, which takes approximately
500 ms. When another unit becomes the new control unit, these routes are learned and added back to the
routing tables through BGP convergence. Thus, till the convergence time, approximately one minute,
the leaked routes are not available for the routing events to take place.
• When a control role change occurs in a cluster, the leaked routes learnt through BGP is updated with the
best ECMP path. However, the non-best ECMP path is removed from the cluster routing table only after
the BGP reconvergence timer elapses, that is 210 seconds. Thus, till the BGP reconvergence timer elapse,
the old, non-best ECMP path persist as preferred route for routing events.
Additional Guidelines
• While configuring BGP for virtual routers, you can redistribute the routes belonging to different protocols
within the same virtual routers. For example, OSPF VR2 routes cannot be imported into BGP VR1. You
can only redistribute OSPF VR2 into BGP VR2, and then configure a route leak between BGP VR2 and
BGP VR1.
• You cannot use IPv6 ACL for filtering the routes in the route map. Only prefix list is supported.
• Security Intelligence Policy—The Security Intelligence policy is not virtual-router-aware. If you add an
IP address, URL, or DNS name to the block list, it is blocked for all virtual routers. This limitation is
applicable on the interface having security zones.
• NAT Rules—Do not mix interfaces in NAT rules. In virtual routing, if the specified source and destination
interface objects (interface groups or security zones) have interfaces that belong to different virtual
routers, the NAT rule diverts traffic from one virtual router through another virtual router. The NAT
does the route lookup in the virtual router table for the inbound interface only. If necessary, define static
routes in the source virtual router for the destination interface. If you leave the interface as any, the rule
applies to all interfaces regardless of virtual router membership.
• DHCP Relay—Interconnecting virtual routers for DHCP relay is not supported. For example, if DHCP
relay client is enabled on VR1 interface and DHCP relay server is enabled on VR2 interface, the DHCP
requests will not be forwarded outside of VR2 interface.
• Recreating a deleted virtual router—When you recreate a virtual router that was deleted less than 10
seconds earlier, an error message appears stating that deletion of the virtual router is in progress. If you
want to recreate a deleted virtual router successively, use a different name for the new virtual router.
For devices using virtual routing, the left pane of the Routing page displays the following:
• Manage Virtual Routers—allows you to create and manage virtual routers.
• List of virtual routing protocols—lists routing protocols that you can configure for the virtual routers.
• General Settings—allows you to configure BGP general settings that are applicable for all the virtual
routers. Select the Enable BGP check box in order to define other BGP settings. To configure other
BGP settings for a virtual router, navigate to BGP in the virtual routing protocols .
virtual routers. You cannot edit or remove a global virtual router. You can only View ( ) the details of a
global virtual router.
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 Click Manage Virtual Routers.
What to do next
• Configure a Virtual Router.
Procedure
Step 1 From the Devices > Device Management page, edit the virtual-router supported device. Navigate to Routing.
For information on the modifications to the routing page, see Modifications to the Management Center Web
Interface - Routing Page, on page 1165.
Step 2 From the drop-down list, select the desired virtual router.
Step 3 In the Virtual Router Properties page, you can modify the description.
Step 4 To add interfaces, select the interface under the Available Interfaces box, and then click Add.
Remember the following:
• Only interfaces with a logical name are listed under the Available Interfaces box. You can edit the
interface and provide a logical name in Interfaces. Remember to save the changes for the settings to
take effect.
• Only interfaces of global virtual routers are available for assigning; the Available Interfaces box lists
only interfaces that are not assigned to any other user-defined virtual routers. You can assign physical
interfaces, subinterfaces, redundant interfaces, bridge groups, VTIs, and EtherChannels to a virtual
router, but not their member interfaces. Because the member interfaces cannot be named, they cannot
be used in virtual routing.
You can assign the diagnostic interface to the global virtual router only.
interface to indicate that it is belonging to another virtual router and can be used for a route leak. For the
route leak to be successful, do not specify next hop gateway.
The Static Route table displays the virtual router whose interface is used for a route leak in the Leaked
from Virtual Router column. If it is not a route leak, the column displays N/A.
Irrespective of which virtual router the static route belongs, a Null0 interface is listed along with the
interfaces of the same virtual router to which the static route belongs.
For information on static route settings, see Static and Default Routes, on page 1139.
• Multicast—You can configure multicast routing policies only for a global virtual router. For information
on multicast settings, see Multicast, on page 1291.
What to do next
• Modify a Virtual Router.
• Remove Virtual Routers.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 Click Manage Virtual Routers.
All virtual routers along with the assigned interfaces are displayed in the Virtual Routers page.
Step 4 To modify a virtual router, click Edit ( ) against the desired virtual router.
Note
You cannot modify the general settings of the global virtual router. Hence, edit is not available for the global
router; instead a View ( ) is provided to view the settings.
What to do next
• Remove Virtual Routers.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 Click Manage Virtual Routers.
All virtual routers along with the mapped interfaces are displayed in the Virtual Routers page.
Step 4 To remove a virtual router, click Delete ( ) against the desired virtual router.
Step 5 To remove multiple routers, holding the CTRL key, click the virtual routers that you want to delete. Right-click,
and then click Delete.
Step 6 To save the changes, click Save.
In the Tunnel Status widget, hover over a topology, click View and click Packet Tracer to view
and troubleshoot the threat defense VPN tunnels.
Procedure
Step 1 Configure the inside interface (Gi0/1) of the device to be assigned to Sales virtual router:
a) Choose Devices > Device Management > Interfaces.
b) Edit the Gi0/1 interface:
• Name—For this example, VR-Sales.
c) Click Ok.
d) Click Save.
Step 2 Configure the inside interface (Gi0/2) of the device to be assigned to Warehouse virtual router:
a) Choose Devices > Device Management > Interfaces.
b) Edit the Gi0/2 interface:
• Name—For this example, VR-Warehouse.
• Select the Enabled checkbox.
• In IPV4, for IP Type, choose Use Static IP.
• IP Address—Leave it blank. The system does not allow you to configure interfaces with same IP
address ([Link]/24), as you are yet to create user-defined virtual routers.
c) Click Ok.
d) Click Save.
Step 3 Create Sales and Warehouse virtual routers and assign their interfaces:
a) Choose Devices > Device Management, and edit the threat defense device.
b) Choose Routing > Manage Virtual Routers.
c) Click Add Virtual Router and create Sales.
d) Click Add Virtual Router and create Warehouse.
e) Select Sales from virtual router drop-down, in Virtual Router Properties, add VR-Sales as Selected
Interface and save.
f) Select Warehouse from virtual router drop-down, in Virtual Router Properties, add VR-Warehouse as
Selected Interface and save.
Step 4 Revisit the VR-Warehouse interface configuration:
a) Choose Devices > Device Management > Interfaces.
b) Click Edit against VR-Warehouse interface. Specify the IP Address as [Link]/24. The system now
allows you to configure with same IP address of VR-Sales, because the interfaces are seperately assigned
to two different virtual routers.
c) Click Ok.
d) Click Save.
Step 5 Create network objects for the warehouse server—[Link]/24, and for the warehouse gateway— [Link]/30:
a) Choose Object > Object Management.
b) Choose Add Network > Add Object:
• Name—For this example, Warehouse-Server.
• Network—Click Network and enter [Link]/24.
c) Click Save.
d) Choose Add Network > Add Object:
e) Click Save.
Step 6 Define the route leak in Sales that points to the VR-Warehouse interface:
a) Choose Devices > Device Management, and edit the threat defense device.
b) Choose Routing.
c) Choose Sales virtual router from the drop-down, and then click Static Route.
d) Click Add Route. In Add Static Route Configuration, specify the following:
• Interface—Select VR-Warehouse.
• Network—Select the Warehouse-Server object.
• Gateway—Leave it blank. When leaking a route into another virtual router, do not select the gateway.
e) Click Ok.
f) Click Save.
Step 7 In the Warehouse virtual router, define the route that points to the Warehouse Router 2 gateway:
a) Choose Warehouse virtual router from the drop-down, and then click Static Route.
b) Click Add Route. In Add Static Route Configuration, specify the following:
• Interface—Select VR-Warehouse.
• Network—Select the Warehouse-Server object.
• Gateway—Select the Warehouse-Gateway object.
c) Click Ok.
d) Click Save.
Step 8 Configure access control rule that allows access to the warehouse server. For creating the access control rule,
you need to create security zones. Use Object > Object Management > Interface. Choose Add > Security
Zone and create security zones for VR-Sales and VR-Warehouse; for Warehouse-Server network object,
create a Warehouse-Server interface group (Choose Add > Interface Group).
Step 9 Choose Policies > Access Control and configure an access control rule to allow traffic from the source
interfaces in the Sales virtual router to the destination interfaces in the Warehouse virtual router for the
destination Warehouse-Server network object.
For example, if the interfaces in Sales are in the Sales-Zone security zone, and those in Warehouse are in the
Warehouse-Zone security zone, the access control rule would look similar to the following:
Note Even if you have some interfaces within virtual routers that does not use overlapping address spaces, define
the NAT rule with the source interface to make troubleshooting easier, and to ensure a cleaner separation
between traffic from the virtual routers that is Internet-bound.
Procedure
c) Click Ok.
d) Click Save.
Step 2 Configure the inside interface of the device for VR2:
a) Choose Devices > Device Management > Interfaces.
b) Edit the interfaces that you want to assign to VR2:
• Name—For this example, vr2-inside.
• Select the Enabled checkbox.
• In IPV4, for IP Type, choose Use Static IP.
• IP Address—Leave it blank. The system does not allow you to configure interfaces with same IP
address, as you are yet to create user-defined virtual routers.
c) Click Ok.
d) Click Save.
Step 3 Configure VR1 and the static default route leak to the outside interface:
a) Choose Devices > Device Management, and edit the threat defense device.
b) Choose Routing > Manage Virtual Routers. Click Add Virtual Router and create VR1.
c) For VR1, in Virtual Router Properties, assign vr1-inside and save.
d) Click Static Route.
e) Click Add Route. In Add Static Route Configuration, specify the following:
• Interface—Select the outside interface of the global router.
• Network—Select the any-ipv4 object. This network is the default route for any traffic that cannot
be routed within VR1.
• Gateway—Leave it blank. When leaking a route into another virtual router, do not provide a Gateway.
f) Click Ok.
g) Click Save.
Step 4 Configure VR2 and the static default route leak to the outside interface:
a) Choose Devices > Device Management, and edit the threat defense device.
b) Choose Routing > Manage Virtual Routers. Click Add Virtual Router and create VR2.
c) For VR2, in Virtual Router Properties, assign vr2-inside and save.
d) Click Static Route.
e) Click Add Route. In Add Static Route Configuration, specify the following:
• Interface—Select the outside interface of the global router.
• Network—Select the any-ipv4 object. This network is the default route for any traffic that cannot
be routed within VR2.
• Gateway—Leave it blank. When leaking a route into another virtual router, do not select the Gateway.
f) Click Ok.
g) Click Save.
Step 5 Configure IPv4 static default route, namely [Link] on the outside interface of the global router:
a) Choose Devices > Device Management, and edit the threat defense device.
b) Choose Routing and edit global router properties.
c) Click Static Route.
d) Click Add Route. In Add Static Route Configuration, specify the following:
• Interface—Select the outside interface of the global router.
• Network—Select the any-ipv4 object. This will be the default route for any IPv4 traffic.
• Gateway—If already created, select the host name from the drop-down. If the object is not yet
created, click Add and define the host object for the IP address of the gateway at the other end of
the network link on the outside interface, in this example, [Link]. After you create the object,
select it in the Gateway field.
e) Click Ok.
f) Click Save.
Step 6 Revisit the vr2-inside interface configuration:
a) Choose Devices > Device Management > Interfaces.
b) Click Edit against vr2-inside interface. Specify the IP Address as [Link]/24. The system now allows
you to configure with same IP address of vr1-inside, because the interfaces are separately assigned to two
different virtual routers.
c) Click Ok.
d) Click Save.
Step 7 Create the NAT rule to PAT inside to outside traffic of VR1 to [Link].
a) Choose Devices > NAT.
b) Click New Policy.
c) Enter InsideOutsideNATRule as the NAT policy name, and select the threat defense device. Click Save.
d) In InsideOutsideNATRule page, click Add Rule and define the following:
• NAT Rule—Select Manual NAT Rule.
• Type—Select Dynamic.
• Insert—Above, if any dynamic NAT rule exists.
• Click Enabled.
• In Interface Objects, select vr1-interface object and click Add to Source (If the object is not
available, create one in Object > Object Management > Interface), and select outside as Add to
Destination.
• In Translation, for Original Source, select any-ipv4. For Translated Source, click Add and define
host object VR1-PAT-Pool with [Link]. Select VR1-PAT-Pool as shown in the figure below:
e) Click Ok.
f) Click Save.
Step 8 Add NAT rule to PAT inside to outside traffic of VR2 to [Link].
a) Choose Devices > NAT.
b) Edit InsideOutsideNATRule to define the VR2 NAT rule:
• NAT Rule—Select Manual NAT Rule.
• Type—Select Dynamic.
• Insert—Above, if any dynamic NAT rule exists.
• Click Enabled.
• In Interface Objects, select vr2-interface object and click Add to Source (If the object is not
available, create one in Object > Object Management > Interface), and select outside as Add to
Destination.
• In Translation, for Original Source, select any-ipv4. For Translated Source, click Add and define
host object VR2-PAT-Pool with [Link]. Select VR2-PAT-Pool as shown in the figure below:
c) Click Ok.
d) Click Save.
Step 9 To configure the access control policy that allows traffic from the vr1-inside and vr2-inside interfaces to the
outside interface, you need to create security zones. Use Object > Object Management > Interface. Choose
Add > Security Zone and create security zones for vr1-inside, vr2-inside, and outside interfaces.
Step 10 Choose Policies > Access Control and configure an access control rule to allow traffic from vr1-inside-zone
and vr2- inside-zone to outside-zone.
Assuming that you create zones named after the interfaces, a basic rule that allows all traffic to flow to the
Internet will look like the following. You can apply other parameters to this access control policy:
Procedure
Step 1 Configure route leak from Global virtual router to the user-defined VR1:
a) Choose Devices > Device Management, and edit the threat defense device.
b) Click Routing. By default, the Global routing properties page appears.
c) Click Static Route.
d) Click Add Route. In Add Static Route Configuration, specify the following:
• Interface—Select the VR1 inside interface.
• Network—Select the VR1 virtual router network object. You can create one using the Add Object
option.
• Gateway—Leave it blank. When leaking a route into another virtual router, does not select the
gateway.
The route leak allows Secure Client assigned IP addresses in the VPN pool to access the [Link]/24
network in the VR1 virtual router.
e) Click Ok.
Step 2 Configure the route leak from VR1 to the Global virtual router:
a) Choose Devices > Device Management, and edit the threat defense device.
b) Click Routing and from the drop-down, select VR1.
c) Click Static Route.
d) Click Add Route. In Add Static Route Configuration, specify the following:
• Interface—Select the outside interface of the global router.
• Network—Select the global virtual router network object.
• Gateway—Leave it blank. When leaking a route into another virtual router, does not select the
gateway.
The configured static route allows endpoints on the [Link]/24 network (VR1) to initiate connections
to Secure Client assigned IP addresses in the VPN pool.
e) Click Ok.
What to do next
If RA VPN address pool and the IP addresses in the user-defined virtual router overlap, you must also use
static NAT rules on the IP addresses to enable proper routing. Alternatively, you can change your RA VPN
address pool so that there is no overlap.
Let us consider a scenario, where, a site-to-site VPN is configured between a branch office network to a
company headquaters network; the threat defense in the branch office having virtual routers. In this case, the
site-to-site VPN is defined on the outside interface of the branch office at [Link]. This VPN includes the
inside network [Link]/24 without extra configuration, because the inside interface is also part of the
global virtual router. But, to provide site-to-site VPN services to the [Link]/24 network, which is part
of the VR1 virtual router, you must leak the route by configuring the static routes on global and VR1, and
add the VR1 network to the site-to-site VPN configuration.
Procedure
Step 1 Configure route leak from the Global virtual router to the user-defined VR1:
a) Choose Devices > Device Management, and edit the threat defense device.
b) Click Routing. By default, the Global routing properties page appears.
c) Click Static Route.
d) Click Add Route. In Add Static Route Configuration, specify the following:
• Interface—Select the VR1 inside interface.
• Network—Select the VR1 virtual router network object. You can create one using the Add Object
option.
• Gateway—Leave it blank. When leaking a route into another virtual router, do not select the gateway.
The route leak allows endpoints protected by the external (remote) end of the site-to-site VPN to access
the [Link]/24 network in the VR1 virtual router.
e) Click Ok.
Step 2 Configure the route leak from VR1 to the Global virtual router:
a) Choose Devices > Device Management, and edit the threat defense device.
b) Click Routing and from the drop-down, select VR1.
c) Click Static Route.
d) Click Add Route. In Add Static Route Configuration, specify the following:
• Interface—Select the outside interface of the global router.
• Network—Select the global virtual router network object.
• Gateway—Leave it blank. When leaking a route into another virtual router, do not select the gateway.
This static route allows endpoints on the [Link]/24 network (VR1) to initiate connections that will
traverse the site-to-site VPN tunnel. For this example, the remote endpoint that is protecting the
[Link]/24 network.
e) Click Ok.
Step 3 Add the [Link]/24 network to the site-to-site VPN connection profile:
a) Choose Devices > VPN > Site To Site, and edit the VPN Topology.
b) In Endpoints, edit Node A endpoint.
c) In Edit Endpoint, in the Protected Networks field, click Add New Network Object.
d) Add the VR1 network object with [Link] network:
How to Secure Traffic from Networks with Multiple Virtual Routers over a
Site-to-Site VPN with Dynamic VTI
ISPs have different segmented networks for different customers. You can create virtual routers, associate
dynamic VTIs with these virtual routers, and extend the capabilities of dynamic VTIs in your network. You
can associate dynamic VTIs either with global or user-defined virtual routers. A single threat defense device
can act as a dynamic VTI hub with a global or one or more user-defined virtual routers. Each user-defined
virtual router can be one customer network.
Let us consider an example where route-based site-to-site VPNs are configured between two company
headquarter networks and their two branch office networks. The ISP's threat defense, a dynamic VTI hub,
manages the two company headquarter networks with two user-defined virtual routers: VRF green and VRF
red. The dynamic VTI hub establishes a site-to-site VPN between:
• Customer 1 (VRF green) and Branch 1 (SVTI spoke 1)
• Customer 2 (VRF red) and Branch 2 (SVT2 spoke 2)
Figure 411: Site-to-Site VPNs with Multiple Virtual Routers and Dynamic VTI
This example illustrates how to configure networks with multiple virtual routers over a site-to-site VPN with
dynamic VTI.
Procedure
h) Repeat steps 3a - g to configure the second route-based site-to-site VPN topology between hub (DVTI2)
and SVTI spoke 2.
Step 4 Configure the two virtual routers.
a) Choose Devices > Device Management and edit the threat defense device.
b) Click Routing.
c) Click Manage Virtual Routers.
d) Click Add Virtual Router.
Specify the name as VRF green and provide a description for the virtual router.
e) Repeat steps 4a - d to configure VRF red.
Step 5 Assign all the interfaces to the virtual routers.
a) From the drop-down list, select the virtual router.
b) In the Virtual Router Properties page, select the interfaces listed under the Available Interfaces box.
Assign the dynamic VTI interface along with the other interfaces.
c) Click Add.
Step 6 Repeat steps 5a - c for VRF red.
Step 7 Configure the routing policy for the virtual router.
a) From the drop-down list, select the virtual router.
b) Click Static Route or one of the dynamic routing protocols.
c) Configure the routing parameters.
d) Click Save.
What to do next
Select the hub and spoke devices and click Deploy. After the deployment, you can monitor the VPN tunnels
in the Site-to site monitoring dashboard (Overview > Site to Site VPN).
You can also use the commands listed in Monitoring Virtual Routers, on page 1169 to view and troubleshoot
the virtual router.
How to Route Traffic between Two Overlapping Network Host in Virtual Routing
You can configure hosts on the virtual routers that have same network address. If the hosts want to communicate,
you can configure twice NAT. This example provides the procedure to configure the NAT rules to manage
the overlapping network host.
In the following example, two hosts Host A and Host B belong to different virtual routers: VRG (interface
vrg-inside), VRB (interface vrb-inside) respectively with the same subnet [Link]/24. For both the hosts to
communicate, create a NAT policy where, VRG-Host interface object would use a mapped NAT address -
[Link], and VRB-Host interface object would use a mapped NAT address - [Link]. Thus, Host A uses
[Link] to communicate to Host B; Host B uses [Link] to reach Host A.
Procedure
Step 1 Create the NAT rule to handle traffic from Host A to Host B. Choose Devices > NAT.
Step 2 Click New Policy.
Step 3 Enter a NAT policy name, and select the threat defense device. Click Save.
Step 4 In the NAT page, click Add Rule and define the following:
• NAT Rule—Select Manual NAT Rule.
• Type—Select Static.
• Insert—Select Above, if any NAT rule exists.
• Click Enabled.
• In Interface Objects, select VRG-Inf object and click Add to Source (If the object isn’t available, create
one in Object > Object Management > Interface), and select VRB-Inf object and click Add to
Destination.
• In Translation, select the following:
• Original Source, select vrg-inside.
• Original Destination, click Add and define object VRB-Mapped-Host with [Link]. Select
VRB-Mapped-Host.
• Translated Source, click Add and define object, VRG-Mapped-Host with [Link]. Select
VRG-Mapped-Host.
• Translated Destination, select vrb-inside as shown in the following figure:
When you run the show nat detail command on the threat defense device, you will see an output similar to
this:
firepower(config-service-object-group)# show nat detail
Manual NAT Policies (Section 1)
1 (2001) to (3001) source static vrg-inside VRG-MAPPED-HOST destination static VRB-MAPPED-HOST
vrb-inside
translate_hits = 0, untranslate_hits = 0
Source - Origin: [Link]/24, Translated: [Link]/24
Destination - Origin: [Link]/24, Translated: [Link]/24
Procedure
Step 1 Choose Devices > Device Management. Edit the required device.
Step 2 In Interfaces, choose Add Interfaces > Bridge Group Interface.
a) Enter the following details for BVI-G:
• Name—For this example, BVI-G.
• Bridge Group ID—For this example, 1.
• Available Interface—Select the interfaces.
• In IPV4, for IP Type, choose Use Static IP.
• IP Address—Enter [Link]/24.
b) Click Ok.
c) Click Save.
a) Enter the following details for BVI-B:
• Name—For this example, BVI-B.
• Bridge Group ID—For this example, 2.
• Available Interface—Select the sub interfaces.
• In IPV4, for IP Type, choose Use Static IP.
• IP Address—Leave this field empty as the system does not allow two interfaces to have overlapping
IP address. You can revisit the Bridge Group and provide the same IP address after aligning it under
a virtual router.
b) Click Ok.
c) Click Save.
Step 3 Create virtual router, say VRG, and select BVI-G as its network:
a) Choose Devices > Device Management.
b) Edit the device, and choose Routing > Manage Virtual Routers.
c) Click Add Virtual Router. Enter a name for the virtual router and click Ok.
d) In Virtual Routing Properties, select BVI-G and click Add.
e) Click Save.
Step 4 Create virtual router, say VRB, and select BVI-B as its network:
a) Choose Devices > Device Management.
b) Edit the device, and choose Routing > Manage Virtual Routers.
c) Click Add Virtual Router. Enter a name for the virtual router and click Ok.
d) In Virtual Routing Properties, select BVI-B and click Add.
e) Click Save.
Step 5 Revisit the BVI-B configuration:
a) Choose Devices > Device Management > Interfaces.
b) Click Edit against BVI-B interface. Specify the IP Address as [Link]/24. The system now allows you
to configure with same IP address of BVI-G, because the interfaces are seperately assigned to two different
virtual routers.
c) Click Ok.
d) Click Save.
If you want to enable inter-BVI communication, use an external router as default gateway. In overlapping
BVI scenarios, as in this example, use twice NAT external router as gateway to establish inter-BVI traffic.
When configuring NAT for the members of a bridge group, you specify the member interface. You cannot
configure NAT for the bridge group interface (BVI) itself. When doing NAT between bridge group member
interfaces, you must specify the real and mapped addresses. You cannot specify “any” as the interface.
Procedure
c) Click Ok.
d) Click Save.
Step 2 Configure the inside interface of the device for VRB:
a) Choose Devices > Device Management > Interfaces.
b) Edit the interfaces that you want to assign to VRB:
• Name—For this example, VRB-inside.
c) Click Ok.
d) Click Save.
Step 3 Configure VRG and the static default route leak to the inside interface of the Global router for the VRG users
to access the common server [Link]:
a) Choose Devices > Device Management, and edit the threat defense device.
b) Choose Routing > Manage Virtual Routers. Click Add Virtual Router and create VRG.
c) For VRG, in Virtual Router Properties, assign VRG-inside and save.
f) Click Ok.
g) Click Save.
Step 4 Configure VRB and the static default route leak to the inside interface of the Global router for the VRB users
to access the shared server 172.16.10.x:
a) Choose Devices > Device Management, and edit the threat defense device.
b) Choose Routing > Manage Virtual Routers. Click Add Virtual Router and create VRB.
c) For VRB, in Virtual Router Properties, assign VRB-inside and save.
f) Click Ok.
g) Click Save.
Step 5 Revisit the VRB-inside interface configuration:
a) Choose Devices > Device Management > Interfaces.
b) Click Edit against VRB-inside interface. Specify the IP Address as [Link]/24. The system now
allows you to configure with the same IP address as that of VRG-inside, because the interfaces are
seperately assigned to two different virtual routers.
c) Click Ok.
d) Click Save.
Step 6 Add NAT rules for the source objects VRG and VRB. Click Devices > NAT.
Step 7 Click New Policy.
Step 8 Enter a NAT policy name, and select the threat defense device. Click Save.
Step 9 In the NAT page, click Add Rule and define the following source NAT for VRG:
• NAT Rule—Select Manual NAT Rule.
• Type—Select Static.
• Insert—Select Above, if any NAT rule exists.
• Click Enabled.
• In Interface Objects, select VRG-Inside object and click Add to Source (If the object is not available,
create one in Object > Object Management > Interface), and select Global-Inside object and click
Add to Destination.
• In Translation, select the following:
• Original Source, select VRG-Users.
• Translated Source, click Add and define object, VRG-NAT with [Link]. Select VRG-NAT as
shown in the following figure:
Step 13 Add the two unique AD servers in management center one for each VRG and VRB users—choose System >
Integration > Realms.
Step 14 Click New Realm and complete the fields. For detailed information on the fields, see Realm Fields, on page
2386.
Step 15 For controlling the access from VRG and VRB users, define 2 Active Directories, see Realm Directory and
Synchronize fields, on page 2390see Create an LDAP Realm or an Active Directory Realm and Realm Directory,
on page 2376
Step 16 Add ISE in management center—choose System > Integration > Identity Sources.
Step 17 Click Identity Services Engine and complete the fields. For detailed information on the fields, see How to
Configure ISE/ISE-PIC for User Control Using a Realm, on page 2455.
Step 18 Create Identity policy, rules, and then define access control policy for controlling access of overlapping users
from VRG and VRB.
Assume that you want the routes of warehouse (VR-W) to be leaked with sales (VR-S) and Global, and the
outside interface routes of VR-S to VR-W. Similarly, you want the outside interface routes of the Global
router to be leaked to sales (VR-S). This example demonstrates the BGP configuration procedure to achieve
interconnecting the routers:
Figure 412: Interconnect Virtual Routers using BGP Settings
Procedure
Step 1 Configure VR-W to export its routes tagging them with a route target to VR-S:
a) Choose Devices > Device Management, edit device, and then click the Routing tab.
b) From the virtual router drop-down, select VR-W.
Note
If you want to conditionalize routes to be leaked from VR-W, you can specify the match criteria in the route
map object, and choose it in the User Virtual Router Export Route Map. Similarly, if you want to
conditionalize the routes to be imported to VR-S from the BGP table, you can use the User Virtual Router
Import Route Map. This procedure is explained in Step 3.
Step 2 Configure VR-W to export its routes to the Global virtual router:
a) You need to create a route map that would allow the VR-W routes to be exported to the Global routing
table. Choose Objects > Object Management > Route Map.
b) Click Add Route Map, give a name, say Export-to-Global, and then click Add.
c) Specify a Sequence Number, say 1, and then choose Allow from the Redistribution drop-down list:
d) Click Save.
In this example, all the VR-W routes are leaked to the Global routing table. Hence, no match criteria is
configured for the route map.
e) Navigate to the Routing tab of the device, and select VR-W. Click BGP > IPv4 > Route Import/Export.
f) From the Global Virtual Router Export Route Map drop-down list, choose Export-to-Global:
h) Specify a Sequence Number, say 1, and then choose Allow from the Redistribution drop-down list.
i) Enter the IP Address (first two octets) of the VR-S Outside1 interface.
j) Click Save.
k) Create a route map with the match clause with the prefix list. Click Route Map. Click Add Route Map,
give a name, say Import-from-VRS, and then click Add.
l) Specify a Sequence Number, say 1, and then choose Allow from the Redistribution drop-down list.
m) In the Match Clause tab, click IPv4. Under Address tab, click Prefix List.
n) Under Available IPv4 Prefix List, select VRS-Outside1-Only, and then click Add.
o) Click Save.
p) Navigate to the Routing tab of the device, and select VR-W. Click BGP > IPv4 > Route Import/Export.
q) From the Global Virtual Router Import Route Map drop-down list, choose Import-from-VRS:
Step 4 Configure VR-S to import the Outside routes of Global virtual router:
Note
To leak routes to or from a Global virtual router, you must configure the source or destination user defined
virtual router respectively. Thus, in this example, VR-S is the destination router that imports the routes from
Outside interface of the Global virtual router.
a) Choose Objects > Object Management > Prefix List > IPv4 Prefix List.
b) Click Add IPv4 Prefix List, give a name, say Global-Outside-Only, and then click Add.
c) Specify a Sequence Number, say 1, and then choose Allow from the Redistribution drop-down list.
d) Enter the IP Address (first two octets) of the Global Outside interface:
e) Click Save.
f) Click Route Map. Click Add Route Map, give a name, say Import-from-Global, and then click Add.
g) Specify a Sequence Number, say 1, and then choose Allow from the Redistribution drop-down list.
h) In the Match Clause tab, click IPv4. Under Address tab, click Prefix List.
i) Under Available IPv4 Prefix List, select Global-Outside-Only, and then click Add:
j) Click Save.
k) Navigate to the Routing tab of the device, and select VR-S. Click BGP > IPv4 > Route Import/Export.
l) From the Global Virtual Router Import Route Map drop-down list, choose Import-from-Global:
AAA for user-defined 7.6 7.6 A device's authentication, authorization, and accounting (AAA) is now
VRF interfaces. supported on user-defined Virtual Routing and Forwarding (VRF) interfaces.
The default is to use the management interface.
In device platform settings, you can now associate a security zone or interface
group having the VRF interface, with a configured external authentication
server.
New/modified screens: Devices > Platform Settings > External
Authentication
Virtual routing with 7.4 7.4 You can now configure a virtual router with a dynamic VTI for a route-based
dynamic VTI. site-to-site VPN.
New/modified screens: Devices > Device Management > Edit Device >
Routing > Virtual Router Properties > Dynamic VTI interfaces under
Available Interfaces
Platform restrictions: Supported only on native mode standalone or high
availability devices. Not supported for container instances or clustered devices.
Virtual router support for 7.0 7.0 You can configure up to 10 virtual routers on the ISA 3000.
the ISA 3000.
SNMP support on 7.0 7.0 You can now configure SNMP on user-defined virtual routers.
user-defined virtual
routers
Bulk removal of virtual 6.7 6.6 You can remove multiple virtual routers from threat defense at a time.
routers.
New/modified screens: Devices > Device Management > Routing > Manage
Virtual Routers
Virtual routers and 6.6 6.6 You can now create multiple virtual routers to maintain separate routing tables
VRF-Lite for threat for groups of interfaces. Because each virtual router has its own routing table,
defense. you can provide clean separation in the traffic flowing through the device.
Virtual routers implement the “light” version of Virtual Routing and
Forwarding, or VRF-Lite, which does not support Multiprotocol Extensions
for BGP (MBGP). The maximum number of virtual routers you can create
ranges from five to 100, and depends on the device model..
New/modified screens: Devices > Device Management > edit device > Routing
tab
New/modified CLI commands: .
• show vrf
• Added the [vrf name | all] keyword set to these CLI commands,
and changed the output to indicate virtual router information where
applicable: clear ospf, clear route, ping, show asp table routing, show
bgp, show ipv6 route, show ospf, show route, show snort counters
Platform restrictions: Not supported on the Firepower 1010 and ISA 3000.
About ECMP
The threat defense device supports Equal-Cost Multi-Path (ECMP) routing. You can configure traffic zones
per virtual router to contain a group of interfaces. You can have up to 8 equal cost static or dynamic routes
across up to 8 interfaces within each zone. For example, you can configure multiple default routes across three
interfaces in the zone:
Interface Guidelines
dVTI and Loopback interfaces are not supported.
Additional Guidelines
• A device can have a maximum of 256 ECMP zones.
• You can associate only 8 interfaces per ECMP zone.
• An interface can be a member of only one ECMP zone.
• You cannot remove an interface that is associated with an equal cost static route from the ECMP zone.
• You cannot delete an ECMP zone if its interface has equal cost static routes associated with it.
• Only routed interfaces can be associated with an ECMP zone.
• The following interfaces cannot be associated with an ECMP zone:
• BVI interface.
• Member interfaces in an EtherChannel.
• Failover or state link interface.
• Management-only or management-access interfaces.
• Cluster control link interface.
• VNIs.
• VLAN interfaces.
• Interfaces in a remote access VPN configuration with SSL enabled.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 From the virtual router drop-down, select the virtual router in which you want to create the ECMP zone.
You can create ECMP zones in global virtual router and user-defined virtual routers. For information on
creating virtual routers, see Create a Virtual Router, on page 1166.
Step 7 To associate interfaces, select the interface under the Available Interfaces box, and then click Add.
Remember the following:
• Only interfaces belonging to the virtual router are available for assigning.
• Only interfaces with a logical name are listed under the Available Interfaces box. You can edit the
interface and provide a logical name in Interfaces. Remember to save the changes for the settings to
take effect.
You can associate the ECMP zone interfaces with equal cost static route by defining them with same destination
and metric value, but with different gateway.
What to do next
• Configure an Equal Cost Static Route, on page 1214
• Modify an ECMP Zone, on page 1215
• Remove an ECMP Zone, on page 1215
You can assign interfaces of a virtual router, both global and user-defined, to an ECMP zone for the device.
Procedure
Step 1 From the Devices > Device Management page, edit the threat defense device. Click the Routing tab.
Step 2 From the drop-down list, select the virtual router whose interfaces are associated with an ECMP zone.
Step 3 To configure the equal cost static route for the interfaces, click Static Route.
Step 4 Either click Add Route to add a new route, or click Edit ( ) for an existing route.
Step 5 From the Interface drop-down, select the interface belonging to the virtual router and an ECMP zone.
Step 6 Select the destination network from the Available Networks box and click Add.
Step 7 Enter a gateway for the network.
Step 8 Enter a metric value. It can be a number that ranges between 1 and 254.
Step 9 To save the settings, click Save.
Step 10 To configure equal cost static routing, repeat the steps to configure the static route for another interface in the
same ECMP zone with the same destination network and metric value. Remember to provide a different
gateway.
What to do next
• Modify an ECMP Zone, on page 1215
• Remove an ECMP Zone, on page 1215
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 Click ECMP.
ECMP zones with its associated interfaces are displayed in the ECMP page.
Step 4 To modify an ECMP, click Edit ( ) against the desired ECMP. In the Edit ECMP box, you can do the
following:
• ECMP Name—Ensure that the changed name is unique for the device.
• Interfaces—You can add or remove interfaces. You cannot include an interface that is already associated
with another ECMP. In addition, you cannot remove the interface that is associated with an equal cost
static route.
What to do next
• Configure an Equal Cost Static Route, on page 1214
• Remove an ECMP Zone, on page 1215
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 Click ECMP.
ECMP zones with its associated interfaces are displayed in the ECMP page.
Step 4 To remove an ECMP zone, click Delete ( ) against the ECMP zone.
You cannot delete the ECMP zone if any of its interfaces are associated with an equal cost static route.
Procedure
Step 1 Create a Virtual Router—R4 with Inside1, Outside1, and Outside2 interfaces:
Figure 414: Configuring R4 Virtual Router
b) Click Add.
c) Enter the ECMP name and from the Available Interfaces list, choose Outside1 and Outside2:
Figure 415: Creating ECMP Zone
e) Configure the static route for Outside2, repeating from Step 3b to Step 3d.
Ensure to specify same metric, but different gateways for the static routes:
Figure 417: Configured Static Routes of ECMP Zone Interfaces
The network packets to reach its destination, R3, follows R4>R1>R3 or R4>R2>R3, based on the ECMP
algorithm. If R1>R3 route is lost, the traffic flows through R2 without any packet drops. Similarly, the response
from R3 can be received by Outside2 though the packet was sent from Outside1. In addition, when the network
traffic is heavy, R4 distributes them between the two routes and thus balances the load.
ECMP support as 7.1 Any Secure Firewall Threat Defense was supporting ECMP routing through
Routing Policy FlexConfig policies. From this release, you can group interfaces in to traffic
zones and configure ECMP routing in Secure Firewall Management Center.
New/modified screens: Devices > Device Management > Routing > ECMP
Note For optimal routing, do not configure BFD when BGP graceful restart for NSF
is configured on the device.
For BFD support on IS-IS, using FlexConfig CLI configure BFD on IS-IS interfaces (Physical Interfaces,
Sub-Interfaces, Port-Channels only):
For IPv6
###Flex-config Appended CLI###
router isis
net 11.1111.0000.0000.0001.00
exit
interface GigabitEthernet x/x
ipv6 router isis
isis ipv6 bfd
exit
For IPv4
###Flex-config Appended CLI###
router isis
net 11.1111.0000.0000.0001.00
exit
interface GigabitEthernet x/x
isis
isis bfd
exit
Single-hop Guidelines
• Echo mode is disabled by default. You can enable echo mode on single-hop only.
• Echo mode is not supported for IPv6.
• Use only a single-hop template to configure a single-hop policy.
• Authentication of the single-hop template is optional.
• You cannot configure multiple BFDs on the same interface.
Multi-hop Guidelines
• Do not configure the source IP address also as the destination IP address.
• Source and destination address should have same IP type—IPV4 or IPV6.
Upgrade Guidelines
When you upgrade to version 7.3 and when the previous version has any FlexConfig BFD policies, the
management center displays a warning message during deployment. However, it does not stop the deployment
process. After post-upgrade deployment, to manage the BFD policies from the UI ( Device (Edit) > Routing >
BFD), you must configure BFD policies in the Device (Edit) > Routing > BFD page and remove the
configuration from the FlexConfig policy for the device.
Configure BFD
This section describes how to enable and configure the BFD routing policy on your system.
Procedure
Procedure
Step 1 From the Devices > Device Management page, edit the virtual-router supported device. Navigate to Routing.
Step 2 From the drop-down list, select the desired virtual router, and then click BFD.
Step 3 To configure a BFD on the interface, click the Single-Hop tab or Multi-Hop tab.
Note
For a single-hop policy, the BFD template is configured on an interface; for a multi-hop policy, the BFD
template is configured on a source and destination address pair.
Step 4 Click Add. To modify the configured BFD policy, click Edit ( ).
Note
When you edit the interface mapping with BFD template to replace it with a new BFD template, the management
center uses a no command to remove the template mapping from interface and applies the new template to
the interface which causes a BFD flap which may also lead to an OSPFv2, OSPFv3, or BGP flap. However,
if the BFD intervals are higher, the BFD flap might not occur. Alternatively, to avoid the flapping, you can
delete the existing BFD template mapping; deploy the interface, and then add the new BFD template to the
interface and deploy the configuration.
Procedure
If you have not created a single-hop template, use Add ( ) and BFD Template.
Procedure
Step 1 In the Add BFD Multi-Hop dialog box, configure the following:
a) Click the BFD source address type—IPv4 or IPv6 radio button.
b) In the Source Address drop-down list, network objects are listed. Select the source address that you want
to configure for the BFD policy. You cannot choose any-ipv4 or any-ipv6.
If you have not created the required network object, use Add ( ) and create a host/network object.
Note
The created network object's IP type should match with the selected source IP type.
c) In the Destination Address drop-down list, network objects are listed. Select the destination address that
you want to configure for the BFD. You cannot choose any-ipv4 or any-ipv6.
If you have not created the required network object, use Add ( ) and create a host/network object.
Note
The created network object's IP type should match with the selected source IP type.
Attention
Do not select the network object that has the same IP address as that of the source address.
d) In the Template Name drop-down list, multi-hop templates are listed. Select the template that you want
to apply on the BFD policy.
If you have not created a multi-hop template, use Add ( ) and BFD Template.
The multi-hop map (table view) is displayed on the Multi-Hop tab page.
BFD support for IS-IS 7.4 7.4 You can configure BFD on IS-IS interfaces using FlexConfig CLI.
BFD support for OSPF 7.4 7.4 You can enable BFD on OSPFv2 and OSPFv3 interfaces.
New/modified screens:
• Configuration > Device Setup > Routing > OSPFv2
• Configuration > Device Setup > Routing > OSPFv3
BFD configuration 7.4 7.4 In the previous releases, BFD was configurable on threat defense only through
FlexConfig. FlexConfig no longer supports BFD configuration. You can now
configure BFD policies for threat defense in the management center UI. In
threat defense, BFD is supported only on the BGP protocol.
New/modified screens: Devices > Device Management > Routing > BFD.
OSPF
This chapter describes how to configure the threat defense to route data, perform authentication, and redistribute
routing information using the Open Shortest Path First (OSPF) routing protocol.
About OSPF
OSPF is an interior gateway routing protocol that uses link states rather than distance vectors for path selection.
OSPF propagates link-state advertisements rather than routing table updates. Because only LSAs are exchanged
instead of the entire routing tables, OSPF networks converge more quickly than RIP networks.
OSPF uses a link-state algorithm to build and calculate the shortest path to all known destinations. Each router
in an OSPF area contains an identical link-state database, which is a list of each of the router usable interfaces
and reachable neighbors.
The advantages of OSPF over RIP include the following:
• OSPF link-state database updates are sent less frequently than RIP updates, and the link-state database
is updated instantly, rather than gradually, as stale information is timed out.
• Routing decisions are based on cost, which is an indication of the overhead required to send packets
across a certain interface. The threat defense device calculates the cost of an interface based on link
bandwidth rather than the number of hops to the destination. The cost can be configured to specify
preferred paths.
The disadvantage of shortest path first algorithms is that they require a lot of CPU cycles and memory.
The threat defense device can run two processes of OSPF protocol simultaneously on different sets of interfaces.
You might want to run two processes if you have interfaces that use the same IP addresses (NAT allows these
interfaces to coexist, but OSPF does not allow overlapping addresses). Or you might want to run one process
on the inside and another on the outside, and redistribute a subset of routes between the two processes.
Similarly, you might need to segregate private addresses from public addresses.
You can redistribute routes into an OSPF routing process from another OSPF routing process, a RIP routing
process, or from static and connected routes configured on OSPF-enabled interfaces.
The threat defense device supports the following OSPF features:
• Intra-area, inter-area, and external (Type I and Type II) routes.
• Virtual links.
• LSA flooding.
• Authentication to OSPF packets (both password and MD5 authentication).
• Configuring the threat defense device as a designated router or a designated backup router. The threat
defense device also can be set up as an ABR.
• Stub areas and not-so-stubby areas.
• Area boundary router Type 3 LSA filtering.
OSPF supports MD5 and clear text neighbor authentication. Authentication should be used with all routing
protocols when possible because route redistribution between OSPF and other protocols (such as RIP) can
potentially be used by attackers to subvert routing information.
If NAT is used, if OSPF is operating on public and private areas, and if address filtering is required, then you
need to run two OSPF processes—one process for the public areas and one for the private areas.
A router that has interfaces in multiple areas is called an Area Border Router (ABR). A router that acts as a
gateway to redistribute traffic between routers using OSPF and routers using other routing protocols is called
an Autonomous System Boundary Router (ASBR).
An ABR uses LSAs to send information about available routes to other OSPF routers. Using ABR Type 3
LSA filtering, you can have separate private and public areas with the ASA acting as an ABR. Type 3 LSAs
(inter-area routes) can be filtered from one area to other, which allows you to use NAT and OSPF together
without advertising private networks.
Note Only Type 3 LSAs can be filtered. If you configure the threat defense device as an ASBR in a private network,
it will send Type 5 LSAs describing private networks, which will get flooded to the entire AS, including
public areas.
If NAT is employed but OSPF is only running in public areas, then routes to public networks can be redistributed
inside the private network, either as default or Type 5 AS external LSAs. However, you need to configure
static routes for the private networks protected by the threat defense device. Also, you should not mix public
and private networks on the same threat defense device interface.
You can have two OSPF routing processes, one RIP routing process, and one EIGRP routing process running
on the threat defense device at the same time.
Supported Domains
Any
User Roles
Admin
Network Admin
IPv6 Guidelines
• OSPFv2 does not support IPv6.
• OSPFv3 supports IPv6.
• OSPFv3 uses IPv6 for authentication.
• The threat defense device installs OSPFv3 routes into the IPv6 RIB, provided it is the best route.
Clustering Guidelines
• OSPFv3 encryption is not supported. An error message appears if you try to configure OSPFv3 encryption
in a clustering environment.
• In Spanned interface mode, dynamic routing is not supported on management-only interfaces.
• In Individual interface mode, make sure that you establish the control and data units as either OSPFv2
or OSPFv3 neighbors.
• In Individual interface mode, OSPFv2 adjacencies can only be established between two contexts on a
shared interface on the control unit. Configuring static neighbors is supported only on point-to point-links;
therefore, only one neighbor statement is allowed on an interface.
• When a control role change occurs in the cluster, the following behavior occurs:
• In spanned interface mode, the router process is active only on the control unit and is in a suspended
state on the data units. Each cluster unit has the same router ID because the configuration has been
synchronized from the control unit. As a result, a neighboring router does not notice any change in
the router ID of the cluster during a role change.
• In individual interface mode, the router process is active on all the individual cluster units. Each
cluster unit chooses its own distinct router ID from the configured cluster pool. A control role change
in the cluster does not change the routing topology in any way.
Make sure that non-stop forwarding (NSF) is disabled on the appliance to ensure that the neighbor relationship
remains stable:
• Navigate to the Non Stop Forwarding page in management center(Devices > Device Management
(select the desired device) > Routing > OSPF > Advanced > Non Stop Forwarding ).
Ensure the Non Stop Forwarding Capability boxes are not checked.
Note The Firepower 4100/9300 models may have high latency when using MPLS because they lack load balancing
across multiple receiving queues.
Additional Guidelines
• OSPFv2 and OSPFv3 support multiple instances on an interface.
• OSPFv3 supports encryption through ESP headers in a non-clustered environment.
• OSPFv3 supports Non-Payload Encryption.
• OSPFv2 supports Cisco NSF Graceful Restart and IETF NSF Graceful Restart mechanisms as defined
in RFCs 4811, 4812 & 3623 respectively.
• OSPFv3 supports Graceful Restart mechanism as defined in RFC 5187.
• There is a limit to the number of intra area (type 1) routes that can be distributed. For these routes, a
single type-1 LSA contains all prefixes. Because the system has a limit of 35 KB for packet size, 3000
routes result in a packet that exceeds the limit. Consider 2900 type 1 routes to be the maximum number
supported.
• For a device using virtual routing, you can configure OSPFv2 and OSPFv3 for a global virtual router.
However, you can configure only OSPFv2 for a user-defined virtual router.
• To avoid adjacency flaps due to route updates being dropped if the route update is larger than the minimum
MTU on the link, ensure that you configure the same MTU on the interfaces on both sides of the link.
• OSPFv3 drops the LS update if the packet size exceeds 8190. As a result, the neighbourship is terminated.
Hence, configure the switch with the “ospfv3 mtu-ignore” command to avoid neighbourship termination.
Configure OSPFv2
This section describes the tasks involved in configuring an OSPFv2 routing process. For a device using virtual
routing, you can configure OSPFv2 for global as well as for user-defined virtual routers.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 (For a virtual-router-aware device) From the virtual routers drop-down list, choose the virtual router for which
you are configuring OSPF.
Step 4 Click OSPF.
Step 5 Check the check box of Process 1. You can enable up to two OSPF process instances for each context/virtual
router. You must choose an OSPF process to be able to configure the Area parameters.
If the device is using virtual routing, the ID fields display the unique process IDs generated for the chosen
virtual router.
Step 6 Choose the OSPF Role from the drop-down list, and enter a description for it in the next field. The options
are Internal, ABR, ASBR, and ABR & ASBR. See About OSPF, on page 1227 for a description of the OSPF
roles.
Step 7 Select Area > Add.
You can click Edit ( ), or use the right-click menu to cut, copy, past, insert, and delete areas.
Step 8 Configure the following area options for each OSPF process:
• OSPF Process—Choose the process ID. For a device using virtual routing, the drop-down lists the unique
process IDs generated for the selected virtual router.
• Metric Value—The metric used for generating the default route. The default value is 10. Valid metric
values range from 0 through 16777214.
• Metric Type—The metric type is the external link type that is associated with the default route that is
advertised into the OSPF routing domain. The available options are 1 for a Type 1 external route or 2
for a Type 2 external route.
• Available Network—Choose one of the available networks and click Add, or click Add ( ) to add a
new network object. See Network, on page 1381 for the procedure for adding networks.
• Authentication—Choose the OSPF authentication:
• None—(Default) Disables OSPF area authentication.
• Password—Provides a clear text password for area authentication, which is not recommended
where security is a concern.
• MD5—Allows MD5 authentication.
• Default Cost—The default cost for the OSPF area, which is used to determine the shortest paths to the
destination. Valid values range from 0 through 65535. The default value is 1.
• Click Add ( ) to add a new network object. See Network, on page 1381 for the procedure for adding
networks.
• Peer Router—Choose the IP address of the peer router. To add a new peer router, click Add ( ). See
Network, on page 1381 for the procedure for adding networks.
• Hello Interval—The time in seconds between the hello packets sent on an interface. The hello interval
is an unsigned integer that is to be advertised in the hello packets. The value must be the same for all
routers and access servers on a specific network. Valid values range from 1 through 65535. The default
is 10.
The smaller the hello interval, the faster topological changes are detected, but the more traffic is sent on
the interface.
• Transmit Delay—The estimated time in seconds that is required to send an LSA packet on the interface.
The integer value must be greater than zero. Valid values range from 1 through 8192. The default is 1.
LSAs in the update packet have their own ages incremented by this amount before transmission. If the
delay is not added before transmission over a link, the time in which the LSA propagates over the link
is not considered. The value assigned should take into account the transmission and propagation delays
for the interface. This setting has more significance on very low-speed links.
• Retransmit Interval—The time in seconds between LSA retransmissions for adjacencies that belong
to the interface. The retransmit interval is the expected round-trip delay between any two routers on the
attached network. The value must be greater than the expected round-trip delay, and can range from 1
through 65535. The default is 5.
When a router sends an LSA to its neighbor, it keeps the LSA until it receives the acknowledgment
message. If the router receives no acknowledgment, it resends the LSA. Be conservative when setting
this value, or needless retransmission can result. The value should be larger for serial lines and virtual
links.
• Dead Interval—The time in seconds that hello packets are not seen before a neighbor indicates that the
router is down. The dead interval is an unsigned integer. The default is four times the hello interval, or
40 seconds. The value must be the same for all routers and access servers that are attached to a common
network. Valid values range from 1 through 65535.
• Authentication—Choose the OSPF virtual link authentication from the following:
• None—(Default) Disables virtual link area authentication.
• Area Authentication—Enables area authentication using MD5. Click Add, and enter the key ID,
key, confirm the key, and then click OK.
• Password—Provides a clear text password for virtual link authentication, which is not recommended
where security is a concern.
• MD5—Allows MD5 authentication. Click Add, and enter the key ID, key, confirm the key, and
then click OK.
Note
Ensure to enter only numbers as the MD5 key ID.
• Key Chain—Allows key chain authentication. Click Add, and create the key chain, and then click
Save. For detailed procedure, see Creating Key Chain Objects, on page 1379. Use the same
authentication type (MD5 or Key Chain) and key ID for the peers to establish a successful adjacency.
What to do next
Continue with Configure OSPF Redistribution.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 (For a virtual-router-aware device) From the virtual routers drop-down list, choose the virtual router for which
you are configuring OSPF.
Step 4 Click OSPF.
Step 5 From OSPF Role drop-down, choose role .
Step 6 Click Redistribution > Add.
You can click Edit ( ), or use the right-click menu to cut, copy, past, insert, and delete areas.
Step 7 Configure the following redistribution options for each OSPF process:
• OSPF Process—Choose the process ID. For a device using virtual routing, this drop-down list displays
the unique process IDs generated for the selected virtual router.
• Route Type—Choose one of the following types:
• Static—Redistributes static routes to the OSPF routing process.
• Connected—Redistributes connected routes (routes established automatically by virtue of having
the IP address enabled on the interface) to the OSPF routing process. Connected routes are
redistributed as external to the device. You can select whether to use subnets under the Optional
list.
• OSPF—Redistributes routes from another OSPF routing process, for example, internal, external 1
and 2, NSSA external 1 and 2, or whether to use subnets. You can select these options under the
Optional list.
• BGP—Redistribute routes from the BGP routing process. Add the AS number and whether to use
subnets.
• RIP—Redistributes routes from the RIP routing process. You can select whether to use subnets
under the Optional list.
Note
As a user-defined virtual router does not support RIP, you cannot redistribute routes from RIP.
• EIGRP—Redistribute routes from the EIGRP routing process. Add the AS number and whether
to use subnets.
• Metric Value—Metric value for the routes being distributed. The default value is 10. Valid values range
from 0 to 16777214.
When redistributing from one OSPF process to another OSPF process on the same device, the metric
will be carried through from one process to the other if no metric value is specified. When redistributing
other processes to an OSPF process, the default metric is 20 when no metric value is specified.
• Metric Type—The metric type is the external link type that is associated with the default route that is
advertised into the OSPF routing domain. The available options are 1 for a Type 1 external route or 2
for a Type 2 external route.
• Tag Value—Tag specifies the 32-bit decimal value attached to each external route that is not used by
OSPF itself, but which may be used to communicate information between ASBRs. If none is specified,
then the remote autonomous system number is used for routes from BGP and EGP. For other protocols,
zero is used. Valid values are from 0 to 4294967295.
• RouteMap—Checks for filtering the importing of routes from the source routing protocol to the current
routing protocol. If this parameter is not specified, all routes are redistributed. If this parameter is specified,
but no route map tags are listed, no routes are imported. Or you can add a new route map by clicking
Add ( ). See Route Map to add a new route map.
What to do next
Continue with Configure OSPF Inter-Area Filtering, on page 1237.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 (For a virtual-router-aware device) From the virtual routers drop-down list, choose the virtual router for which
you are configuring OSPF.
Step 4 Click OSPF.
Step 5 Select InterArea > Add.
You can click Edit ( ), or use the right-click menu to cut, copy, past, insert, and delete inter-areas.
Step 6 Configure the following inter-area filtering options for each OSPF process:
• OSPF Process—For a device using virtual routing, the drop-down lists the unique process IDs generated
for the selected virtual router.
• Area ID—The area for which routes are to be summarized.
• PrefixList—The name of the prefix. To add a new prefix list object, see Step 5.
• Traffic Direction—Inbound or outbound. Choose Inbound to filter LSAs coming into an OSPF area,
or Outbound to filter LSAs coming out of an OSPF area. If you are editing an existing filter entry, you
cannot modify this setting.
Step 7 Click Add ( ), and enter a name for the new prefix list, and whether to allow overrides.
You must configure a prefix list before you can configure a prefix rule.
Step 8 Click Add to configure prefix rules, and configure the following parameters:
• Action—Select Block or Allow for the redistribution access.
• Sequence No—The routing sequence number. By default, sequence numbers are automatically generated
in increments of 5, beginning with 5.
• IP Address—Specify the prefix number in the format of IP address/mask length.
• Min Prefix Length—(Optional) The minimum prefix length.
• Max Prefix Length—(Optional) The maximum prefix length.
What to do next
Continue with Configure OSPF Filter Rules, on page 1238.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 (For a virtual-router-aware device) From the virtual routers drop-down list, choose the virtual router for which
you are configuring OSPF.
Step 4 Click OSPF.
Step 5 Select Filter Rule > Add.
You can click Edit ( ), or use the right-click menu to cut, copy, past, insert, and delete filter rules.
Step 6 Configure the following filter rule options for each OSPF process:
• OSPF Process— For a device using virtual routing, the drop-down lists the unique process IDs generated
for the selected virtual router.
• Access List—The access list for this OSPF process. To add a new standard access list object, click Add
( ) and see Configure Standard ACL Objects, on page 1353.
• Traffic Direction—Choose In or Out for the traffic direction being filtered. Choose In to filter LSAs
coming into an OSPF area, or Out to filter LSAs coming out of an OSPF area. If you are editing an
existing filter entry, you cannot modify this setting.
• Interface—The interface for this filter rule.
What to do next
Continue with Configure OSPF Summary Addresses, on page 1239.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 (For a virtual-router-aware device) From the virtual routers drop-down list, choose the virtual router for which
you are configuring OSPF.
Step 6 Configure the following summary address options for each OSPF process:
• OSPF Process— For a device using virtual routing, the drop-down lists the unique process IDs generated
for the selected virtual router.
• Available Network—The IP address of the summary address. Select one from the Available networks
list and click Add, or to add a new network, click Add ( ). See Network, on page 1381 for the procedure
for adding networks.
• Tag—A 32-bit decimal value that is attached to each external route. This value is not used by OSPF
itself, but may be used to communicate information between ASBRs.
• Advertise—Advertises the summary route. Uncheck this check box to suppress routes that fall under
the summary address. By default, this check box is checked.
What to do next
Continue with Configure OSPF Interfaces and Neighbors, on page 1240.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 (For a virtual-router-aware device) From the virtual routers drop-down list, choose the virtual router for which
you are configuring OSPF.
Step 4 Click OSPF.
Step 5 Select Interface > Add.
You can click Edit ( ), or use the right-click menu to cut, copy, past, insert, and delete areas.
Step 6 Configure the following Interface options for each OSPF process:
• Interface—The interface you are configuring.
Note
If the device is using virtual routing, this drop-down list displays only those interfaces that belong to the
router.
• Default Cost—The cost of sending a packet through the interface. The default value is 10.
• Priority—The designated router for a network. Valid values range from 0 to 255. The default value is
1. Entering 0 for this setting makes the router ineligible to become the designated router or backup
designated router.
When two routers connect to a network, both attempt to become the designated router. The device with
the higher router priority becomes the designated router. If there is a tie, the router with the higher router
ID becomes the designated router. This setting does not apply to interfaces that are configured as
point-to-point interfaces.
• MTU Ignore—OSPF checks whether neighbors are using the same MTU on a common interface. This
check is performed when neighbors exchange DBD packets. If the receiving MTU in the DBD packet
is higher than the IP MTU configured on the incoming interface, OSPF adjacency is not established.
• Database Filter—Use this setting to filter the outgoing LSA interface during synchronization and
flooding. By default, OSPF floods new LSAs over all interfaces in the same area, except the interface
on which the LSA arrives. In a fully meshed topology, this flooding can waste bandwidth and lead to
excessive link and CPU usage. Checking this check box prevents OSPF flooding of the LSA on the
selected interface.
• Hello Interval—Specifies the interval, in seconds, between hello packets sent on an interface. Valid
values range 1–8192 seconds. The default value is 10 seconds.
The smaller the hello interval, the faster topological changes are detected, but more traffic is sent on the
interface. This value must be the same for all routers and access servers on a specific interface.
• Transmit Delay—Estimated time in seconds to send an LSA packet on the interface. Valid values range
1–65535 seconds. The default is 1 second.
LSAs in the update packet have their ages increased by the amount specified by this field before
transmission. If the delay is not added before transmission over a link, the time in which the LSA
propagates over the link is not considered. The value assigned should take into account the transmission
and propagation delays for the interface. This setting has more significance on very low-speed links.
• Retransmit Interval—Time in seconds between LSA retransmissions for adjacencies that belong to the
interface. The time must be greater than the expected round-trip delay between any two routers on the
attached network. Valid values range from 1 to 65535 seconds. The default is 5 seconds.
When a router sends an LSA to its neighbor, it keeps the LSA until it receives the acknowledgment
message. If the router receives no acknowledgment, it resends the LSA. Be conservative when setting
this value, or needless retransmission can result. The value should be larger for serial lines and virtual
links.
• Dead Interval—Time period in seconds for which hello packets must not be seen before neighbors
indicate that the router is down. The value must be the same for all nodes on the network and can range
1–65535.
• Hello Multiplier—Specifies the number of Hello packets to be sent per second. Valid values are 3–20.
• Neighbor—Choose one of the neighbors in the drop-down list, or click Add ( ) to add a new neighbor;
enter the name, description, network, whether to allow overrides, and then click Save.
• Interface—Choose the interface associated with the neighbor.
This capability is useful when there is a scheduled hitless software upgrade. You can configure graceful
restart on OSPFv2 by using either using NSF Cisco (RFC 4811 and RFC 4812) or NSF IETF (RFC
3623).
Configuring the NSF graceful-restart feature involves two steps; configuring capabilities and configuring
a device as NSF-capable or NSF-aware. A NSF-capable device can indicate its own restart activities to
neighbors and a NSF-aware device can help a restarting neighbor.
A device can be configured as NSF-capable or NSF-aware, depending on some conditions:
• A device can be configured as NSF-aware irrespective of the mode in which it is.
• A device has to be in either Failover or Spanned Etherchannel (L2) cluster mode to be configured
as NSF-capable.
• For a device to be either NSF-aware or NSF-capable, it should be configured with the capability of
handling opaque Link State Advertisements (LSAs)/ Link Local Signaling (LLS) block as required.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 (For a virtual-router-aware device) From the virtual routers drop-down list, choose the virtual router for which
you are configuring OSPF.
Step 4 Click OSPF > Advanced.
Step 5 Select General, and configure the following:
• Router ID—Choose Automatic or IP Address (appears for non-cluster and a cluster in spanned
etherchannel mode) or Cluster Pool (appears for a cluster in individual interface mode) for the router ID.
If you choose IP address, enter the IP address in the adjacent field. If you choose Cluster Pool, choose
the IPv4 cluster pool value in the adjacent drop-down field. For information on creating the cluster pool
address, see Address Pools, on page 1354.
• Ignore LSA MOSPF—Suppresses syslog messages when the route receives unsupported LSA Type 6
multicast OSPF (MOSPF) packets.
• RFC 1583 Compatible—Configures RFC 1583 compatibility as the method used to calculate summary
route costs. Routing loops can occur with RFC 1583 compatibility enabled. Disable it to prevent routing
loops. All OSPF routers in an OSPF routing domain should have RFC compatibility set identically.
• Adjacency Changes—Defines the adjacency changes that cause syslog messages to be sent.
By default, a syslog message is generated when an OSPF neighbor goes up or down. You can configure
the router to send a syslog message when an OSPF neighbor goes down and also a syslog for each state.
• Log Adjacency Changes—Causes the threat defense device to send a syslog message whenever
an OSPF neighbor goes up or down. This setting is checked by default.
• Log Adjacency Change Details—Causes the threat defense device to send a syslog message
whenever any state change occurs, not just when a neighbor goes up or down. This setting is
unchecked by default.
• Administrative Route Distance—Allows you to modify the settings that were used to configure
administrative route distances for inter-area, intra-area, and external IPv6 routes. The administrative
route distance is an integer from 1 to 254. The default is 110.
• LSA Group Pacing—Specifies the interval in seconds at which LSAs are collected into a group and
refreshed, check summed, or aged. Valid values range from 10 to 1800. The default value is 240.
• Enable Default Information Originate—Check the Enable check box to generate a default external
route into an OSPF routing domain and configure the following options:
• Always advertise the default route—Ensures that the default route is always advertised.
• Metric Value—Metric used for generating the default route. Valid metric values range from 0 to
16777214. The default value is 10.
• Metric Type—The external link type that is associated with the default route that is advertised into
the OSPFv3 routing domain. Valid values are 1 (Type 1 external route) and 2 (Type 2 external
route). The default is Type 2 external route.
• RouteMap—Choose the routing process that generates the default route if the route map is satisfied
or click Add ( ) to add a new one. See Route Map to add a new route map.
a) Check the Enable Cisco Non Stop Forwarding Capability check box.
b) (Optional) Check the Cancel NSF restart when non-NSF-aware neighboring networking devices are
detected check box if required.
c) (Optional) Make sure the Enable Cisco Non Stop Forwarding Helper mode check box is unchecked to
disable the helper mode on an NSF-aware device.
Step 8 Configure IETF NSF Graceful Restart for OSPFv2, for an NSF-capable or NSF-aware device:
a) Check the Enable IETF Non Stop Forwarding Capability check box.
b) In the Length of graceful restart interval (seconds) field, enter the restart interval in seconds. The default
value is 120 seconds. For a restart interval below 30 seconds, graceful restart will be terminated.
c) (Optional) Make sure the Enable IETF nonstop forwarding (NSF) for helper mode check box is
unchecked to disable the IETF NSF helper mode on an NSF-aware device.
d) Enable Strict Link State advertisement checking—When enabled, it indicates that the helper router
will terminate the process of restarting the router if it detects that there is a change to a LSA that would
be flooded to the restarting router, or if there is a changed LSA on the retransmission list of the restarting
router when the graceful restart process is initiated.
e) Enable IETF Non Stop Forwarding—Enables non stop forwarding, which allows for the forwarding
of data packets to continue along known routes while the routing protocol information is being restored
following a switchover. OSPF uses extensions to the OSPF protocol to recover its state from neighboring
OSPF devices. For the recovery to work, the neighbors must support the NSF protocol extensions and be
willing to act as "helpers" to the device that is restarting. The neighbors must also continue forwarding
data traffic to the device that is restarting while protocol state recovery takes place.
Configure OSPFv3
This section describes the tasks involved in configuring an OSPFv3 routing process. For a device using virtual
routing, you can configure OSPFv3 only for its global virtual router and not for its user-defined virtual router.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Select Routing > OSPFv3.
Step 3 By default Enable Process 1 is selected. You can enable up to two OSPF process instances.
Step 4 Chose the OSPFv3 role from the drop-down list, and enter a description for it. The options are Internal, ABR,
ASBR, and ABR and ASBR. See About OSPF, on page 1227 for descriptions of the OSPFv3 roles.
Step 5 Select Area > Add.
You can click Edit ( ), or use the right-click menu to cut, copy, past, insert, and delete areas.
Step 6 Select General, and configure the following options for each OSPF process:
• Area ID—The area for which routes are to be summarized.
• Cost—The metric or cost for the summary route, which is used during OSPF SPF calculations to determine
the shortest paths to the destination. Valid values range from 0 to 16777215.
• Type—Specifies Normal, NSSA, or Stub. If you select Normal, there are no other parameters to configure.
If you select Stub, you can choose to send summary LSAs in the area. If you select NSSA, you can
configure the next three options:
• Allow Sending summary LSA into this area—Allows the sending of summary LSAs into the
area.
• Imports routes to normal and NSSA area—Allows redistribution to import routes to normal and
not to stubby areas.
• Defaults information originate—Generates a default external route into an OSPFv3 routing domain.
• Metric—Metric used for generating the default route. The default value is 10. Valid metric values range
from 0 to 16777214.
• Metric Type—The metric type is the external link type that is associated with the default route that is
advertised into the OSPFv3 routing domain. The available options are 1 for a Type 1 external route or
2 for a Type 2 external route.
Step 9 Configure the following route summary options for each OSPF process:
• IPv6 Prefix/Length—The IPv6 prefix. To add a new network object, click Add ( ). See Network, on
page 1381 for the procedure for adding networks.
• Cost—The metric or cost for the summary route, which is used during OSPF SPF calculations to determine
the shortest paths to the destination. Valid values range from 0 to 16777215.
• Advertise—Advertises the summary route. Uncheck this check box to suppress routes that fall under
the summary address. By default, this check box is checked.
attached network. The value must be greater than the expected round-trip delay, and can range from 1
to 65535. The default is 5.
When a router sends an LSA to its neighbor, it keeps the LSA until it receives the acknowledgment
message. If the router receives no acknowledgment, it resends the LSA. Be conservative when setting
this value, or needless retransmission can result. The value should be larger for serial lines and virtual
links.
• Transmit Delay—The estimated time in seconds that is required to send an LSA packet on the interface.
The integer value must be greater than zero. Valid values range from 1 to 8192. The default is 1.
LSAs in the update packet have their own ages incremented by this amount before transmission. If the
delay is not added before transmission over a link, the time in which the LSA propagates over the link
is not considered. The value assigned should take into account the transmission and propagation delays
for the interface. This setting has more significance on very low-speed links.
What to do next
Continue with Configure OSPFv3 Redistribution.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Select Routing > OSPF.
Step 3 Select Redistribution, and click Add.
You can click Edit ( ), or use the right-click menu to cut, copy, past, insert, and delete areas.
Step 4 Configure the following redistribution options for each OSPF process:
• Source Protocol—The source protocol from which routes are being redistributed. The supported protocols
are connected, OSPF, Static, EIGRP, and BGP. If you choose OSPF, you must enter the Process ID in
the Process ID field. If you choose BGP, you must add the AS number in the AS Number field.
• Metric —Metric value for the routes being distributed. The default value is 10. Valid values range from
0 to 16777214.
When redistributing from one OSPF process to another OSPF process on the same device, the metric
will be carried through from one process to the other if no metric value is specified. When redistributing
other processes to an OSPF process, the default metric is 20 when no metric value is specified.
• Metric Type—The metric type is the external link type that is associated with the default route that is
advertised into the OSPF routing domain. The available options are 1 for a Type 1 external route or 2
for a Type 2 external route.
• Tag —Tag specifies the 32-bit decimal value attached to each external route that is not used by OSPF
itself, but which may be used to communicate information between ASBRs. If none is specified, then
the remote autonomous system number is used for routes from BGP and EGP. For other protocols, zero
is used. Valid values are from 0 to 4294967295.
• Route Map—Checks for filtering the importing of routes from the source routing protocol to the current
routing protocol. If this parameter is not specified, all routes are redistributed. If this parameter is specified,
but no route map tags are listed, no routes are imported. Or you can add a new route map by clicking
Add ( ). See Route Map, on page 1405 for the procedure to add a new route map.
• Process ID—The OSPF process ID, either 1 or 2.
Note
The Process ID is enabled the OSPFv3 process is redistributing a route learned by another OSPFv3
process.
What to do next
Continue with Configure OSPFv3 Summary Prefixes, on page 1248.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Select Routing > OSPFv3.
Step 3 Select Summary Prefix > Add.
You can click Edit ( ), or use the right-click menu to cut, copy, past, insert, and delete summary prefixes.
Step 4 Configure the following summary prefix options for each OSPF process:
• IPv6 Prefix/Length—The IPv6 prefix and prefix length label. Select one from the list or click Add ( )
to add a new network object. See Network, on page 1381 for the procedure for adding networks.
• Advertise— Advertises routes that match the specified prefix and mask pair. Uncheck this check box
to suppress routes that match the specified prefix and mask pair.
• (Optional) Tag—A value that you can use as a match value for controlling redistribution through route
maps.
What to do next
Continue with Configure OSPFv3 Interfaces, Authentication, and Neighbors, on page 1249.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Select Routing > OSPFv3.
Step 3 Select Interface > Add.
You can click Edit to edit, or use the right-click menu to cut, copy, past, insert, and delete areas.
Step 4 Configure the following interface options for each OSPFv3 process:
• Interface—The interface you are configuring.
• Enable OSPFv3—Enables OSPFv3.
• OSPF Process—Choose 1 or 2.
• Area—The area ID for this process.
• Instance —Specifies the area instance ID to be assigned to the interface. An interface can have only one
OSPFv3 area. You can use the same area on multiple interfaces, and each interface can use a different
area instance ID.
Step 5 Select Properties, and configuring the following options for each OSPFv3 process:
• Filter Outgoing Link Status Advertisements—Filters outgoing LSAs to an OSPFv3 interface. All
outgoing LSAs are flooded to the interface by default.
• Disable MTU mismatch detection—Disables the OSPF MTU mismatch detection when DBD packets
are received. OSPF MTU mismatch detection is enabled by default.
• Flood Reduction—Changes normal LSAs into Do Not Age LSAs, so that they don't get flooded every
3600 seconds across areas.
OSPF LSAs are refreshed every 3600 seconds. In large OSPF networks, this can lead to large amounts
of unnecessary LSA flooding from area to area.
• Point-to-Point Network—Lets you transmit OSPF routes over VPN tunnels. When an interface is
configured as point-to-point, non-broadcast, the following restrictions apply:
• You can define only one neighbor for the interface.
• You need to manually configure the neighbor.
• You need to define a static route pointing to the crypto endpoint.
• If OSPF over a tunnel is running on the interface, regular OSPF with an upstream router cannot be
run on the same interface.
• You should bind the crypto map to the interface before specifying the OSPF neighbor to ensure that
the OSPF updates are passed through the VPN tunnel. If you bind the crypto map to the interface
after specifying the OSPF neighbor, use the clear local-host all command to clear OSPF connections
so that the OSPF adjacencies can be established over the VPN tunnel.
• Broadcast— Specifies that the interface is a broadcast interface. By default, this check box is checked
for Ethernet interfaces. Uncheck this check box to designate the interface as a point-to-point, nonbroadcast
interface. Specifying an interface as point-to-point, nonbroadcast lets you transmit OSPF routes over
VPN tunnels.
• Cost—Specifies the cost of sending a packet on the interface. Valid values for this setting range from 0
to 255. The default value is 1. Entering 0 for this setting makes the router ineligible to become the
designated router or backup designated router. This setting does not apply to interfaces that are configured
as point-to-point, nonbroadcast interfaces.
When two routers connect to a network, both attempt to become the designated router. The device with
the higher router priority becomes the designated router. If there is a tie, the router with the higher router
ID becomes the designated router.
• Priority—Determines the designated router for a network. Valid values range from 0 to 255.
• Dead Interval—Time period in seconds for which hello packets must not be seen before neighbors
indicate that the router is down. The value must be the same for all nodes on the network and can range
from 1 to 65535.
• Hello Interval— Time period in seconds between OSPF packets that the router will send before adjacency
is established with a neighbor. Once the routing device detects an active neighbor, the hello packet interval
changes from the time specified in the poll interval to the time specified in the hello interval. Valid values
range from 1 to 65535 seconds.
• Retransmit Interval—Time in seconds between LSA retransmissions for adjacencies that belong to the
interface. The time must be greater than the expected round-trip delay between any two routers on the
attached network. Valid values range from 1 to 65535 seconds. The default is 5 seconds.
• Transmit Delay—Estimated time in seconds to send a link-state update packet on the interface. Valid
values range from 1 to 65535 seconds. The default is 1 second.
• Enable BFD—Allows you to enable BFD on this interface.
Configuring the NSF graceful-restart feature involves two steps; configuring capabilities and configuring
a device as NSF-capable or NSF-aware. A NSF-capable device can indicate its own restart activities to
neighbors and a NSF-aware device can help a restarting neighbor.
A device can be configured as NSF-capable or NSF-aware, depending on some conditions:
• A device can be configured as NSF-aware irrespective of the mode in which it is.
• A device has to be in either Failover or Spanned Etherchannel (L2) cluster mode to be configured
as NSF-capable.
• For a device to be either NSF-aware or NSF-capable, it should be configured with the capability of
handling opaque Link State Advertisements (LSAs)/ Link Local Signaling (LLS) block as required.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > OSPFv3 > Advanced.
Step 3 For Router ID, choose Automatic or IP Address(appears for non-cluster and a cluster in spanned etherchannel
mode) or Cluster Pool (appears for a cluster in individual interface mode). If you choose IP Address, enter
the IPv6 address in the IP Address field. If you choose Cluster Pool, choose the IPv6 cluster pool value from
the Cluster Pool down-down field. For information on creating the cluster pool address, see Address Pools,
on page 1354.
Step 4 Check the Ignore LSA MOSPF check box if you want to suppress syslog messages when the route receives
unsupported LSA Type 6 multicast OSPF (MOSPF) packets.
Step 5 Select General, and configure the following:
• Adjacency Changes—Defines the adjacency changes that cause syslog messages to be sent.
By default, a syslog message is generated when an OSPF neighbor goes up or down. You can configure
the router to send a syslog message when an OSPF neighbor goes down and also a syslog for each state.
• Adjacency Changes—Causes the threat defense device to send a syslog message whenever an
OSPF neighbor goes up or down. This setting is checked by default.
• Include Details—Causes the threat defense device to send a syslog message whenever any state
change occurs, not just when a neighbor goes up or down. This setting is unchecked by default.
• Administrative Route Distances—Allows you to modify the settings that were used to configure
administrative route distances for inter-area, intra-area, and external IPv6 routes. The administrative
route distance is an integer from 1 to 254. The default is 110.
• Default Information Originate—Check the Enable check box to generate a default external route into
an OSPFv3 routing domain and configure the following options:
• Always Advertise—Will always advertise the default route whether or not one exists.
• Metric—Metric used for generating the default route. Valid metric values range from 0 to 16777214.
The default value is 10.
• Metric Type—The external link type that is associated with the default route that is advertised into
the OSPFv3 routing domain. Valid values are 1 (Type 1 external route) and 2 (Type 2 external
route). The default is Type 2 external route.
• Route Map—Choose the routing process that generates the default route if the route map is satisfied
or click Add ( ) to add a new one. See Route Map, on page 1405 to add a new route map.
For LSA throttling, if the minimum or maximum time is less than the first occurrence value, then OSPFv3
automatically corrects to the first occurrence value. Similarly, if the maximum delay specified is less
than the minimum delay, then OSPFv3 automatically corrects to the minimum delay value.
• SPF Throttle—Specifies the delay in milliseconds to receive a change to the SPF calculation. The default
value is 5000 milliseconds. The minimum specifies the delay in milliseconds between the first and second
SPF calculations. The default value is 10000 milliseconds. The maximum specifies the maximum wait
time in milliseconds for SPF calculations. The default value is 10000 milliseconds.
Note
For SPF throttling, if the minimum or maximum time is less than the first occurrence value, then OSPFv3
automatically corrects to the first occurrence value. Similarly, if the maximum delay specified is less
than the minimum delay, then OSPFv3 automatically corrects to the minimum delay value.
Step 13 Check the Enable graceful-restart (Use when Spanned Cluster or Failover Configured) and enter the
graceful-restart interval in seconds. The range is 1-1800. The default value is 120 seconds. For a restart interval
below 30 seconds, graceful restart will be terminated.
Step 14 Click OK to save the graceful restart configuration.
Step 15 Click Save on the Routing page to save your changes.
Minimum Minimum
Management Threat
Feature Center Defense Details
BFD Support for OSPF 7.4 7.4 You can enable BFD on OSPFv2 and OSPFv3 interfaces.
v2 and v3
New/modified screens:
• Configuration > Device Setup > Routing > OSPFv2
• Configuration > Device Setup > Routing > OSPFv3
received from a neighbor includes a hold time. Hold time is the time within which threat defense can expect
to receive a hello packet from that neighbor. If the device does not receive a hello packet from that neighbor
within the hold time advertised by that neighbor, the device considers that neighbor to be unavailable.
EIGRP uses neighbor discovery/recovery, Reliable Transport Protocol (RTP), and Diffusing Update Algorithm
(DUAL) for route computations. DUAL saves all routes to a destination in the topology table, and not just
the least-cost route. The least-cost route is inserted into the routing table. The other routes remain in the
topology table. If the main route fails, another route is chosen from the feasible successors. A successor is a
neighboring router that is used for packet forwarding that has a least-cost path to a destination. A feasibility
calculation ensures that the path is not part of a routing loop.
If a feasible successor is not found in the topology table, a route recomputation takes place. During route
recomputation, DUAL queries the EIGRP neighbors for a route. The query is propagated to successive
neighbors. If a feasible successor is not found, an unreachable message is returned.
During route recomputation, DUAL marks the route as active. By default, threat defense waits for three
minutes to receive a response from its neighbors. If the device does not receive a response from a neighbor,
the route is marked as stuck-in-active. All routes in the topology table that point to the unresponsive neighbor
as a feasibility successor are removed.
Supported Domains
Any
User Roles
Admin
Network Admin
Device Guidelines
• Only one EIGRP process is allowed per device.
• EIGRP can be configured through management center UI on threat defense 6.6 and higher versions.
Interface Guidelines
• Only routed interfaces with logical names and with an IP address can be associated with an EIGRP
routing process.
• Only interfaces belonging to the global virtual router can be part of EIGRP. EIGRP can learn, filter, and
redistribute routes across routing protocols in global virtual router.
• Supports physical, EtherChannel, redundant, subinterfaces only. However, the members of EtherChannel
interfaces are not supported.
• BVI and VNI cannot be part of EIGRP.
• A passive interface cannot be configured as a neighbor interface.
Redistribution Guidelines
• BGP, OSPF, and RIP in the global virtual router can redistribute to EIGRP.
• EIGRP can redistribute to BGP, OSPF, RIP, Static, and Connected in the global virtual router.
• When EIGRP is configured on a device that is a part of OSPF network or vice versa, ensure that
OSPF-router is configured to tag the route (EIGRP does not support route tag).
When redistributing EIGRP into OSPF and OSPF into EIGRP, a routing loop occurs when there is an
outage on one of the links, interfaces, or even when the route originator is down. To prevent the
redistribution of routes from one domain back into the same domain, a router can tag a route that belongs
to a domain while it is redistributing, and those routes can be filtered on the remote router based on the
same tag. Because the routes will not be installed into the routing table, they will not be redistributed
back into the same domain.
Upgrade Guidelines
When you upgrade to version 7.2 and later when the previous version has any FlexConfig EIGRP policies,
the management center displays a warning message during deployment. However, it does not stop the
deployment process. However, after deployment, to manage the EIGRP policies from the UI ( Device (Edit) >
Routing > EIGRP), you must redo the configuration in the Device (Edit) > Routing > EIGRP page and
remove the configuration from FlexConfig. To automate creation of the policies in the UI, management center
provides an option to migrate the policies from FlexConfig to the UI. For more details, see Migrating FlexConfig
Policies, on page 2658.
Configure EIGRP
You can enable and configure EIGRP on the firewall device in the Routing tab.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click the Routing tab.
Step 3 Under Global, click EIGRP.
Step 4 Check the Enable EIGRP check box to enable the EIGRP routing process.
Step 5 In the AS Number field, enter the autonomous system (AS) number for the EIGRP process. The AS number
includes multiple autonomous numbers. The AS number can be from 1 to 65535 and is a uniquely assigned
value that identifies each network on the Internet.
Step 6 To configure other EIGRP properties, see the following topics:
a. Configure EIGRP Settings, on page 1258.
b. Configure EIGRP Neighbors Settings, on page 1259.
c. Configure EIGRP Filter Rules Settings, on page 1259.
d. Configure EIGRP Redistribution Settings, on page 1260.
e. Configure EIGRP Summary Address Settings, on page 1261.
f. Configure EIGRP Interfaces Settings, on page 1261.
g. Configure EIGRP Advanced Settings, on page 1262.
Procedure
Step 3 In the Available Networks/Hosts box, click the networks or hosts that should participate in the EIGRP routing
process, and then click Add. To add a new network object, click Add ( ). See Network, on page 1381 for the
procedure for adding networks.
Step 4 To configure passive interfaces, check the Passive Interface check box. In EIGRP, a passive interface does
not send or receive routing updates.
a) To specify selective interfaces as passive, click the Selected Interface radio button. In the Available
Interfaces box, select the interfaces, and click Add.
b) To specify all interfaces as passive, click the All Interfaces radio button.
Step 5 Click Ok and Save the settings.
Procedure
Procedure
Step 4 To select the interface to which the filtering rule applies, click the Interface radio button, and from the
drop-down, select the interface.
Step 5 To select the protocol to which the filtering rule applies, click the Protocol radio button and from the drop-down,
select the protocol—BGP, RIP, Static, Connected, or OSPF. For BGP and OSPF protocols, you can specify
the relevant Process ID.
Step 6 From the Access List drop-down, choose the access list. The list defines the networks that are to be received
and that are to be suppressed in routing updates. To add a new standard access list object, click Add ( ) and
see Configure Standard ACL Objects, on page 1353 for the detailed procedure.
Step 7 Click Ok and Save the settings.
Procedure
Note
These options are not available when redistributing static, connected, RIP, or BGP routes.
Step 5 From the Route Map drop-down, choose the route map object to apply to the redistribution entry. To create
a new route map object, click Add ( ). See Route Map for the procedure to add a new route map.
Step 6 Click Ok and Save the settings.
Procedure
Procedure
• Key ID—The ID of the key that is used to authenticate EIGRP updates. Enter a numerical key identifier.
Valid values range from 0 to 255.
• Key—An alphanumeric character string of up to 17 characters. For an encrypted authentication type,
this field should have a minimum of 17 characters.
• Confirm Key—Re-enter the key.
Procedure
Step 2 Under Default Route Information, you can specify the sending and receiving of default route information
in EIGRP updates.
• (Appears for non-cluster and cluster in spanned etherchannel mode)Router ID (IP Address)—Enter the
ID used to identify the originating router for external routes. If an external route is received with the
local router ID, the route is discarded. To prevent this issue, specify a global address for the router ID.
An unique value should be configured for each EIGRP router.
• (Appears only for a cluster in individual interface mode)IPv4 Address Pool—Select the relevant cluster
pool value (IPv4 address pool object). To create the address pool, see Address Pools, on page 1354.
• Accept Default Route Info—Check the check box to configure EIGRP to accept exterior default routing
information.
• Access List—From the Access List drop-down, specify a standard access list that defines the
networks that are allowed and the networks that are not when receiving default route information.
To add a new standard access list object, click Add ( ) and see Configure Standard ACL Objects,
on page 1353 for the detailed procedure.
• Send Default Route Info—Check the check box to configure EIGRP to advertise exterior default routing
information.
• Access List—From the Access List drop-down, specify a standard access list that defines the
networks that are allowed and the networks that are not when sending default route information.
To add a new standard access list object, click Add ( ) and see Configure Standard ACL Objects,
on page 1353 for the detailed procedure.
Step 5 Under Stub, to enable the device as an EIGRP stub routing process, click one or more of the following EIGRP
stub routing processes check boxes:
• Receive only—Configures the EIGRP stub routing process to receive route information from the neighbor
routers but not send route information to the neighbors. If this option is selected, you cannot select any
of the other stub routing options.
Step 6 Under Default Metrics, define the default metrics for routes redistributed to the EIGRP routing process:
• Bandwidth—the minimum bandwidth of the route in kilobits per second. Valid values range from 1 to
4294967295.
• Delay Time—the route delay in tens of microseconds. Valid values range from 0 to 4294967295.
• Reliability—the likelihood of successful packet transmission expressed as a number 0 through 255. The
value 255 indicates 100 percent reliability; 0 means no reliability.
• Loading—the effective bandwidth of the route. Valid values range from 1 to 255; 255 indicates 100
percent loading.
• MTU—the smallest allowed value for the maximum transmission unit of the path. Valid values range
from 1 to 65535.
EIGRP configuration 7.2 Any In the previous releases, EIGRP was configurable on threat defense only through
FlexConfig. FlexConfig no longer supports EIGRP configuration. You can
now configure EIGRP settings for threat defense in the management center UI.
New/modified screens: Devices > Device Management > Routing > EIGRP.
About BGP
BGP is an inter and intra autonomous system routing protocol. An autonomous system is a network or group
of networks under a common administration and with common routing policies. BGP is used to exchange
routing information for the Internet and is the protocol used between Internet service providers (ISP).
Note AS loop detection is done by scanning the full AS path (as specified in the AS_PATH attribute), and checking
that the AS number of the local system does not appear in the AS path. By default, EBGP advertises the
learned routes to the same peer to prevent additional CPU cycles on the device in performing loop checks and
to avoid delays in the existing outgoing update tasks.
Routes learned via BGP have properties that are used to determine the best route to a destination, when multiple
paths exist to a particular destination. These properties are referred to as BGP attributes and are used in the
route selection process:
• Weight—This is a Cisco-defined attribute that is local to a router. The weight attribute is not advertised
to neighboring routers. If the router learns about more than one route to the same destination, the route
with the highest weight is preferred.
• Local preference—The local preference attribute is used to select an exit point from the local AS. Unlike
the weight attribute, the local preference attribute is propagated throughout the local AS. If there are
multiple exit points from the AS, the exit point with the highest local preference attribute is used as an
exit point for a specific route.
• Multi-exit discriminator—The multi-exit discriminator (MED) or metric attribute is used as a suggestion
to an external AS regarding the preferred route into the AS that is advertising the metric. It is referred
to as a suggestion because the external AS that is receiving the MEDs may also be using other BGP
attributes for route selection. The route with the lower MED metric is preferred.
• Origin—The origin attribute indicates how BGP learned about a particular route. The origin attribute
can have one of three possible values and is used in route selection.
• IGP—The route is interior to the originating AS. This value is set when the network router
configuration command is used to inject the route into BGP.
• EGP—The route is learned via the Exterior Border Gateway Protocol (EBGP).
• Incomplete—The origin of the route is unknown or learned in some other way. An origin of
incomplete occurs when a route is redistributed into BGP.
• AS_path—When a route advertisement passes through an autonomous system, the AS number is added
to an ordered list of AS numbers that the route advertisement has traversed. Only the route with the
shortest AS_path list is installed in the IP routing table.
• Next hop—The EBGP next-hop attribute is the IP address that is used to reach the advertising router.
For EBGP peers, the next-hop address is the IP address of the connection between the peers. For IBGP,
the EBGP next-hop address is carried into the local AS. However, when the next hop is in the same
subnet as the peering address of the eBGP peer, the next hop is not modified. This behavior is referred
to as the third party next hop.
Use the next-hop-self command when redistributing VPN-advertised routes to iBGP peers to ensure
that the routes are redistributed with the correct next hop IP.
• Community—The community attribute provides a way of grouping destinations, called communities, to
which routing decisions (such as acceptance, preference, and redistribution) can be applied. Route maps
are used to set the community attribute. The predefined community attributes are as follows:
• no-export—Do not advertise this route to EBGP peers.
• no-advertise—Do not advertise this route to any peer.
• internet—Advertise this route to the Internet community; all routers in the network belong to it.
BGP Multipath
BGP Multipath allows installation into the IP routing table of multiple equal-cost BGP paths to the same
destination prefix. Traffic to the destination prefix is then shared across all installed paths.
These paths are installed in the table together with the best path for load-sharing. BGP Multipath does not
affect best-path selection. For example, a router still designates one of the paths as the best path, according
to the algorithm, and advertises this best path to its BGP peers.
In order to be candidates for multipath, paths to the same destination need to have these characteristics equal
to the best-path characteristics:
• Weight
• Local preference
• AS-PATH length
• Origin code
• Multi Exit Discriminator (MED)
• One of these:
These are the additional requirements for internal BGP (iBGP) multipath candidates:
• The path should be learned from an internal neighbor (iBGP).
• The IGP metric to the BGP next hop should be equal to the best-path IGP metric, unless the router is
configured for unequal-cost iBGP multipath.
BGP inserts up to n most recently received paths from multipath candidates into the IP routing table, where
n is the number of routes to install to the routing table, as specified when you configure BGP Multipath. The
default value, when multipath is disabled, is 1.
For unequal-cost load balancing, you can also use BGP Link Bandwidth.
Note The equivalent next-hop-self is performed on the best path that is selected among eBGP multipaths before it
is forwarded to internal peers.
Supported Domains
Any
User Roles
Admin
Network Admin
IPv6 Guidelines
Supports IPv6.
Additional Guidelines
• For BGP, the next hop IP address for the routes is the network IP address and not [Link].
• The system does not add route entry for the IP address received over PPPoE in the CP route table. BGP
always looks into CP route table for initiating the TCP session, hence BGP does not form TCP session.
Thus, BGP over PPPoE is not supported.
• BGP is not supported on management-only or BVI interfaces.
• To avoid adjacency flaps due to route updates being dropped if the route update is larger than the minimum
MTU on the link, ensure that you configure the same MTU on the interfaces on both sides of the link.
• BGP with PATH MTU (PMTU) can cause adjacency flaps if MTU discovery fails, especially with ECMP
routing. Hence, be cautious while using BGP, PMTU, and ECMP as packet drops can occur if MTU
discovery fails due to any reason.
• The BGP table of the member unit is not synchronized with the control unit table. Only its routing table
is synchronized with the control unit routing table.
• When you configure a route-based site-to-site VPN using static or dynamic VTI interfaces, ensure that
the value of the TTL hop is more than one if you use BGP as the routing protocol.
Configure BGP
To configure BGP, see the following topics:
Procedure
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Select Routing.
Step 3 (For a virtual-router-aware device) Under General Settings, click BGP.
Step 4 Check the Enable BGP check box to enable the BGP routing process.
Step 5 In the AS Number field, enter the autonomous system (AS) number for the BGP process. The AS number
internally includes multiple autonomous numbers. The AS number can be from 1 to 4294967295 or from 1.0
to 65535.65535. The AS number is a uniquely assigned value, that identifies each network on the Internet.
Step 6 In the Router ID drop-down list, choose Automatic or Manual (appears for non-cluster and a cluster in spanned
etherchannel mode) or Cluster Pool (appears for a cluster in individual interface mode). If you choose
Automatic, the highest-level IP address on the threat defense device is used as the router ID. If you choose
Manual, enter the IP address in the IP Address field. If you choose Cluster Pool, enter the cluster pool value
in the Cluster Pool field. For information on creating the cluster pool address, see Address Pools, on page
1354.
Step 7 To use a fixed router ID, choose Manual and enter an IPv4 address in the IP Address field. The default value
is Automatic. For a virtual router-aware device, you can override the router ID settings in the Virtual Routers >
BGP page.
Step 8 (Optional) Edit the various BGP settings, starting with General. The defaults for these settings are appropriate
in most cases, but you can adjust them to fit the needs of your network. Click Edit ( ) to edit the settings in
the group:
a) Enter a Scanning Interval for BGP routers for next-hop validation. Valid values are from 5 to 60 seconds.
The default value is 60.
b) Enter the Number of AS numbers in AS_PATH attribute. An AS _PATH attribute is a sequence of
intermediate AS numbers between source and destination routers that form a directed route for packets
to travel. Valid values are between 1 and 254. The default value is None.
c) Check the Log Neighbor Changes check box to enable logging of BGP neighbor changes (up or down)
and resets. This helps in troubleshooting network connectivity problems and measuring network stability.
This is enabled by default.
d) Check the Use TCP Path MTU Discovery check box to use the Path MTU determining technique to
determine the maximum transmission unit (MTU) size on the network path between two IP hosts. This
avoids IP fragmentation. This is enabled by default.
e) Check the Reset session upon Failover check box to reset the external BGP session immediately upon
link failure. This is enabled by default.
f) Check the Enforce that the first AS is peer’s AS for EBGP routes check box to discard incoming
updates received from external BGP peers that do not list their AS number as the first segment in the
AS_PATH attribute. This prevents a mis-configured or unauthorized peer from misdirecting traffic by
advertising a route as if it was sourced from another autonomous system. This is enabled by default.
g) Check the Use dot notation for AS number check box to split the full binary 4-byte AS number into
two words of 16 bits each, separated by a dot. AS numbers from 0-65553 are represented as decimal
numbers and AS numbers larger than 65535 are represented using the dot notation. This is disabled by
default.
h) Click OK.
Step 9 (Optional) Edit the Best Path Selection section:
a) Enter a value for Default Local Preference between 0 and 4294967295. The default value is 100. Higher
values indicate higher preference. This preference is sent to all routers and access servers in the local
autonomous system.
b) Check the Allow comparing MED from different neighbors check box to allow the comparison of
Multi Exit Discriminator (MED) for paths from neighbors in different autonomous systems. This is
disabled by default.
c) Check the Compare Router ID for identical EBGP paths check box to compare similar paths received
from external BGP peers during the best path selection process and switch the best path to the route with
the lowest router ID. This is disabled by default.
d) Check the Pick the best MED path among paths advertised from the neighboring AS check box to
enable MED comparison among paths learned from confederation peers. The comparison between MEDs
is made only if no external autonomous systems are there in the path. This is disabled by default.
e) Check the Treat missing MED as the least preferred one check box to consider the missing MED
attribute as having a value of infinity, making the path the least desirable; therefore, a path with a missing
MED is least preferred. This is disabled by default.
f) Click OK.
Step 10 (Optional) Edit the Neighbor Timers section:
a) Enter the time interval for which the BGP neighbor remains active after not sending a keepalive message
in the Keep alive interval field. At the end of this keepalive interval, the BGP peer is declared dead, if
no messages are sent. The default value is 60 seconds.
b) Enter the time interval for which the BGP neighbor remains active while a BGP connection is being
initiated and configured in the Hold time field. The default value is 180 seconds. Specify a value from 0
to 65535.
c) (Optional) Enter the minimum time interval for which the BGP neighbor remains active while a BGP
connection is being initiated and configured in the Min Hold time field. Specify a value from 3 to 65535.
Note
A hold time of less than 20 seconds increases the possibility of peer flapping.
d) Click OK.
Step 11 In the Next Hop section, optionally select the Enable address tracking check box to enable BGP next hop
address tracking and enter the Delay Interval between checks on updated next-hop routes installed in the
routing table. Click OK.
Note
The Next Hop section is applicable only to IPv4 settings.
a) Check the Enable Graceful Restart checkbox to enable threat defense peers to avoid a routing flap
following a switchover.
b) Specify the time duration that threat defense peers will wait to delete stale routes before a BGP open
message is received in the Restart Time field. The default value is 120 seconds. Valid values are between
1 and 3600 seconds.
c) Enter the time duration that the threat defense will wait before deleting stale routes after an end of record
(EOR) message is received from the restarting threat defense in the Stalepath Time field. The default
value is 360 seconds. Valid values are between 1 and 3600 seconds.
d) Click OK.
Step 13 Click Save.
Step 14 To view the BGP basic settings, from the virtual routers drop-down, select the desired router, and then click
BGP.
This page displays the basic settings that are configured in the Settings page. You can edit the router ID
settings on this page.
Step 15 To edit the router ID settings, modify the IP address in the IP Address fields. The modified value overrides
the router ID settings that were configured in the BGP page under General Settings.
Procedure
b) In the Administrative Route Distances section, update the following as required, and click OK:
• External — Enter the administrative distance for external BGP routes. Routes are external when
learned from an external autonomous system. The range of values for this argument are from 1 to
255. The default value is 20.
• Internal — Enter administrative distance for internal BGP routes. Routes are internal when learned
from peer in the local autonomous system. The range of values for this argument are from 1 to 255.
The default value is 200.
• Local — Enter administrative distance for local BGP routes. Local routes are those networks listed
with a network router show command, often as back doors, for the router or for the networks that is
being redistributed from another process. The range of values for this argument are from 1 to 255.
The default value is 200.
c) In the Routes and Synchronization section, update the following as required, and click OK:
• (Optional) Generate default routes — Check the check box of this option to configure
default-information originate.
• (Optional) Summarize subnet routes into network-level routes — Check the check box of this to
configure automatic summarization of subnet routes into network-level routes. This check box is
applicable only to IPv4 settings.
• (Optional) Advertise inactive routes — Check the check box of this to advertise routes that are not
installed in the routing information base (RIB).
• (Optional) Synchronize between BGP and IGP system — Check the check box of this to enable
synchronization between BGP and your Interior Gateway Protocol (IGP) system. Usually, a BGP
speaker does not advertise a route to an external neighbor unless that route is local or exists in the
IGP. This feature allows routers and access servers within an autonomous system to have the route
before BGP makes it available to other autonomous systems.
• (Optional) Redistribute IBGP into IGP — Check the check box of this to configure iBGP
redistribution into an interior gateway protocol (IGP), such as OSPF.
d) In the Forward Packets over Multiple Paths section, update the following as required and click OK:
• (Optional) Number of Paths — Enter the maximum number of Border Gateway Protocol routes
that can be installed in a routing table. The range of values are from 1 to 8. The default value is 1.
• (Optional) IBGP Number of Paths — Enter the maximum number of parallel internal Border
Gateway Protocol (iBGP) routes that can be installed in a routing table. The range of values are from
1 to 8. The default value is 1.
Procedure
Step 8 Enter the autonomous system to which the BGP neighbor belongs, in the Remote AS field.
Step 9 Check the Enabled address check box to enable communication with this BGP neighbor. Further neighbor
settings will be configured only if the Enabled address check box is selected.
Step 10 (Use this option only when the routing does not result in a loop.) Check the AS Override check box to enable
overriding of the AS number of the originating router with the AS number of the sending BGP router.
Note
Loop prevention in BGP is achieved by verifying the AS number in the AS Path. BGP rejects route updates
when the AS Path attribute contain its own AS number. However, in circumstances where the same ASN is
used by discontiguous network segments, to establish end-to-end reacheability, you can opt to override the
AS number with that of the sending BGP router.
Step 11 (Optional) Check the Shutdown administratively check box to disable a neighbor or peer group.
Step 12 (Optional) Check the Configure graceful restart (failover / spanned mode) check box to enable configuration
of the BGP graceful restart capability for this neighbor. After selecting this option, you must check the Enable
graceful restart check box to specify whether graceful restart should be enabled or disabled for this neighbor.
Note
• The graceful restart is enabled only when the device is in HA mode or when L2 cluster (all nodes from
the same network) is configured.
• The graceful restart option for BGPv6 is enabled only on threat defense Version 7.3+.
• If you configure graceful restart only at General Settings and not at BGP IPv6, the global General Settings
configuration persist.
• If you configure graceful restart at General Settings and also at BGP IPv6, the global General Settings
configuration is overridden by the BGP IPv6 configuration settings.
Step 13 (Optional) To enable configuration of the BFD support for BGP, from the BFD Fallover drop-down list,
choose the BFD type—single-hop, multi-hop, or auto-detect-hop. This selection registers the BGP neighbor
to receive forwarding path detection failure messages from BFD. Choose None if you do not want to have
BFD support.
Step 14 (Optional) Enter a Description for the BGP neighbor.
Step 15 (Optional) From the Update Sourcedrop-down list, choose an interface to source the BGP packets.
You can choose a loopback address as this interface to overcome path failures. You can also choose any
physical, port-channel, or a sub-interface.
Step 16 (Optional) In Filtering Routes, use access lists, route maps, prefix lists and AS path filters as required, to
distribute BGP Neighbor information. Update the following sections:
a) Choose or select the appropriate incoming or outgoing Access List to distribute BGP neighbor information.
Note
b) Choose or select the appropriate incoming or outgoing Route Maps to apply a route map to incoming or
outgoing routes.
c) Choose or select the appropriate incoming or outgoing Prefix List to distribute BGP neighbor information.
d) Choose or select the appropriate incoming or outgoing AS path filter to distribute BGP neighbor
information.
e) Check the check box of Limit the number of prefixes allowed from the neighbor to control the number
of prefixes that can be received from a neighbor.
• Enter the maximum number of prefixes allowed from a specific neighbor in the Maximum Prefixes
field.
• Enter the percentage (of maximum) at which the router starts to generate a warning message in the
Threshold Level field. Valid values are integers between 1 and 100. The default value is 75.
f) Check the Control prefixes received from the peer check box to specify additional controls for the
prefixes received from a peer. Do one of the following
• Check the Terminate peering when prefix limit is exceeded check box to stop the BGP neighbor
when the prefix limit is reached. Specify the interval after which the BGP neighbor will restart in
the Restart interval field.
• Check the Give only warning message when prefix limit is exceeded check box to generate a log
message when the maximum prefix limit is exceeded. Here, the BGP neighbor will not be terminated.
g) Click OK.
Step 17 (Optional) In Routes, specify miscellaneous Neighbor route parameter. Proceed to update the following:
a) Enter the minimum interval (in seconds) between the sending of BGP routing updates in the Advertisement
Interval field. Valid values are between 1 and 600.
b) Check the Remove private AS numbers from outbound routing updates check box to exclude the
private AS numbers from being advertised on outbound routes.
c) Check the Generate default routes check box to allow the local router to send the default route [Link]
to a neighbor to use as a default route. Enter or Select the route map that allows the route [Link] to be
injected conditionally in the Route map field.
d) To add conditionally advertised routes, click Add Row +. In the Add Advertised Route dialog box, do
the following:
1. Add or choose a route map in the Advertise Map field, that will be advertised if the conditions of
the exist map or the non-exist map are met.
2. Click Exist Map and choose a route map from the Route Map Object Selector. This route map is
compared with the routes in the BGP table, to determine whether the advertise map route is advertised.
3. Click Non-Exist Map and choose a route map from the Route Map Object Selector. This route map
is compared with the routes in the BGP table, to determine whether the advertise map route is
advertised.
4. Click OK.
Step 18 In Timers, check the Set timers for the BGP peer check box to set the keepalive frequency, hold time and
minimum hold time
• Keep alive interval—Enter the frequency (in seconds) with which threat defense sends keepalive
messages to the neighbor. Valid values are between 0 and 65535. The default value is 60 seconds.
• Hold time—Enter the interval (in seconds) after not receiving a keepalive message that threat defense
declares a peer dead. Valid values are between 0 and 65535. The default value is 180 seconds.
• Min hold time—(Optional) Enter the minimum interval (in seconds) after not receiving a keepalive
message that threat defense declares a peer dead. Valid values are between 3 and 65535. The default
value is 3 seconds.
Note
A hold time of less than 20 seconds increases the possibility of peer flapping.
b) (Optional) Select the Send Community attribute to this neighbor check box to specify that communities
attributes should be sent to the BGP neighbor
c) (Optional) Select the Use FTD as next hop for this neighbor check box to configure the router as the
next-hop for a BGP speaking neighbor or peer group.
d) Select the Disable Connection Verification check box to disable the connection verification process for
eBGP peering sessions that are reachable by a single hop but are configured on a loopback interface or
otherwise configured with a non-directly connected IP address. When deselected (default), a BGP routing
process will verify the connection of single-hop eBGP peering session (TTL=254) to determine if the
eBGP peer is directly connected to the same network segment by default. If the peer is not directly
connected to same network segment, connection verification will prevent the peering session from being
established.
e) Select Allow connections with neighbor that is not directly connected to accept and attempt BGP
connections to external peers residing on networks that are not directly connected. (Optional) Enter the
time-to-live in the TTL hopsfield. Valid values are between 1 and 255. Alternately, select Limited
number of TTL hops to neighbor, to secure a BGP peering session. Enter the maximum number of hops
that separate eBGP peers in the TTL hops field. Valid values are between 1 and 254.
f) (Optional) Select the Use TCP MTU path discovery check box to enable a TCP transport session for a
BGP session.
g) Choose the TCP connection mode from the TCP Transport Mode drop-down list. Options are Default,
Active, or Passive.
h) (Optional) Enter a Weight for the BGP neighbor connection.
i) Select the BGP Version that threat defense will accept from the drop-down list. The version can be set
to 4-Only to force the software to use only Version 4 with the specified neighbor. The default is to use
Version 4 and dynamically negotiate down to Version 2 if requested.
a) (Optional) Check the Customize the AS number for routes received from the neighbor check box to
customize the AS_PATH attribute for routes received from an eBGP neighbor.
b) Enter the local autonomous system number in the Local AS number field. Valid values are any valid
autonomous system number from 1 to 4294967295 or 1.0 to 65535.65535.
c) (Optional) Check the Do not prepend local AS number to routes received from neighbor check box
to prevent the local AS number from being prepended to any routes received from eBGP peer.
d) (Optional) Check the Replace real AS number with local AS number in routes received from neighbor
check box to replace the real autonomous system number with the local autonomous system number in
the eBGP updates. The autonomous system number from the local BGP routing process is not prepended.
e) (Optional) Check the Accept either real AS number or local AS number in routesreceived from
neighbor check box to configure the eBGP neighbor to establish a peering session using the real
autonomous system number (from the local BGP routing process) or by using the local autonomous system
number.
Step 21 Click OK.
Step 22 Click Save.
Procedure
d) Suppress Map — (Optional) Enter or select the route map used to select the routes to be suppressed.
e) Generate AS set path Information — (Optional) Check the check box to enable generation of autonomous
system set path information.
f) Filter all routes from updates — (Optional) Check the check box to filter all more-specific routes from
updates.
g) Click OK.
What to do next
• For BGPv4 settings, proceed to Configure BGPv4 Filtering Settings, on page 1278.
• For BGPv6 settings, proceed to Configure BGP Network Settings, on page 1279.
Procedure
Step 5 Click ( )Add and update the Add Filter dialog box:
a) Access List— Choose an access control list that defines which networks are to be received and which are
to be suppressed in routing updates.
b) Direction— (Optional) Choose a direction that specifies if the filter should be applied to inbound updates
or outbound updates.
c) Protocol— (Optional) Choose the routing process for which you want to filter: None, BGP, Connected,
OSPF, RIP, or Static.
d) Process ID— (Optional) Enter the process ID for the OSPF routing protocol.
e) Click OK.
Step 6 Click Save.
Procedure
To add a new network object, see Creating Network Objects, on page 1383.
b) (Optional) Route Map— Enter or choose a route map that should be examined to filter the networks to
be advertised. If not specified, all networks are redistributed. To add a new route map object, see Route
Map, on page 1405.
c) Click OK.
Step 6 Click Save.
Procedure
b) Process ID— Enter the identifier for the selected source protocol. Applies to the OSPF protocol. For
devices using virtual routing, this drop-down lists the process ID assigned for the virtual router for which
you are configuring the BGP settings.
c) Metric— (Optional) Enter a metric for the redistributed route.
d) Route Map— Enter or select a route map that should be examined to filter the networks to be redistributed.
If not specified, all networks are redistributed. To create a new route map object, click Add ( ). See
Route Map for the procedure to add a new route map.
e) Match— The conditions used for redistributing routes from one routing protocol to another. The routes
must match the selected condition to be redistributed. You can choose one or more of the following match
conditions. These options are enabled only when OSPF is chosen as the Source Protocol.
• Internal
• External 1
• External 2
• NSSA External 1
• NSSA External 2
f) Click OK.
Procedure
• To import routes from the global virtual router to a user-defined virtual router, specify the IPv4/IPv6
route map in Global Virtual Router Import Route Map to import to the user-defined virtual router.
• To export routes from a user-defined virtual router to the global virtual router, in addition to exporting
the route targets, you can also specify the Global Virtual Router Export Route Map to export from the
user-defined virtual router.
The BGP inter-virtual-router route leaking supports both ipv4 and ipv6 prefixes.
Procedure
Step 6 In the Route Targets Export field, enter the route target extended community to tag the source virtual router's
routes with the route target value. On deployment, the routes of the source virtual router are tagged with this
value.
Note
• The route target must be in ASN:nn format.
• You can enter multiple route targets as comma separated values.
• This value can range from 0:1 to 65534:65535.
Step 7 Route maps help you to narrow down the routes to be shared instead of leaking the entire routing table. Route
map filtering is applied on the list of routes that are obtained with the specified route target values:
a) (Optional) Under User Virtual Router, choose the route map from the Import Route Map drop-down
list to filter the routes at the destination virtual router.
Note
The user virtual router import route map is effective only when the route targets import is configured.
b) (Optional) Under User Virtual Router, choose the route map from the Export Route Map drop-down
list to filter the routes at the source virtual router before the routes are exported to other virtual routers.
Note
You can use the match and set clauses in the route map with the route target extended community lists
for filtering based on other criteria or tagging the routes with the route target community values. For more
information, see Route Map, on page 1405.
Step 8 To share the routes between a user-defined virtual router and global virtual router, specify the route map under
the Global Virtual Router:
a) To leak the global virtual router routes to the user-defined virtual router, select the route map from the
Import Route Map drop-down list. The IPv4 or IPv6 route map is imported to the user-defined virtual
router.
b) To leak the user-defined virtual router routes to the global virtual router, select the route map from the
Export Route Map drop-down list. The IPv4 or IPv6 route map is exported to the global virtual router.
Note
You must specify the route targets for export apart from specifying the route map.
Note
You can use the match clause of the route map object to filter the routes for leaking. For more information,
see Route Map, on page 1405.
Step 9 Follow the procedure ( Step 3 to Step 8) to configure relevant BGP route import and export settings for other
virtual routers as well.
Step 10 Click Save and Deploy.
When the packets flow into the ingress virtual router, BGP imports the routes from the destination virtual
routers that have the matching route target value and if a route map is also configured, the routes are further
filtered and used to identify the best path routes for routing the packets.
BGP AS Override 7.7 7.7 You can enable the receiving BGP router to override the AS number of the
originating router (that is the same as the receiving router) with the AS number
of the sending BGP router if the same AS number is being used by discontiguous
network segments.
New/modified screens: Routing > BGP > IPv4 or IPv6 > Add/Edit Neighbor.
Graceful restart support 7.4 Any You can configure graceful restart on BGPv6 for Secure Firewall Threat
on BGPv6 Defense version 7.3 and later.
New/modified screens: Routing > BGP > IPv6 > Add/Edit Neighbor .
Loopback interface 7.4 Any You can use a loopback interface for BGP.
support for BGP
New/modified screens: Routing > BGP > IPv4 or IPv6 > Add/Edit Neighbor
.
BGP configuration to 7.1 Any You can configure BGP settings to dynamically leak routes among user-defined
interconnect virtual virtual routers, and between global virtual router and user-defined virtual
routers routers. The import and export routes feature was introduced to exchange routes
among the virtual routers by tagging them with route targets and optionally,
filtering the matched routes with route maps. This BGP feature is accessible
only when you select a user-defined virtual router.
New/modified screens: For a selected user-defined virtual router, Devices >
Device Management > Routing > BGPv4/v6 > Route Import/Export tab.
BGPv6 support for 7.1 Any Secure Firewall Threat Defense now supports configuring BGPv6 on
user-defined virtual user-defined virtual routers.
routers
New/modified screens: For a selected user-defined virtual router, Devices >
Device Management > Routing > BGPv6 page.
About RIP
The Routing Information Protocol, or RIP, as it is more commonly called, is one of the most enduring of all
routing protocols. RIP has four basic components: routing update process, RIP routing metrics, routing stability,
and routing timers. Devices that support RIP send routing-update messages at regular intervals and when the
network topology changes. These RIP packets include information about the networks that the devices can
reach, as well as the number of routers or gateways that a packet must travel through to reach the destination
address. RIP generates more traffic than OSPF, but is easier to configure.
RIP is a distance-vector routing protocol that uses hop count as the metric for path selection. When RIP is
enabled on an interface, the interface exchanges RIP broadcasts with neighboring devices to dynamically
learn about and advertise routes.
The Secure Firewall Threat Defense device supports both RIP Version 1 and RIP Version 2. RIP Version 1
does not send the subnet mask with the routing update. RIP Version 2 sends the subnet mask with the routing
update and supports variable-length subnet masks. Additionally, RIP Version 2 supports neighbor authentication
when routing updates are exchanged. This authentication ensures that the Secure Firewall Threat Defense
device receives reliable routing information from a trusted source.
RIP has advantages over static routes because the initial configuration is simple, and you do not need to update
the configuration when the topology changes. The disadvantage to RIP is that there is more network and
processing overhead than in static routing.
routers maintain only the best route (the route with the lowest metric value) to a destination. After updating
its routing table, the router immediately begins transmitting routing updates to inform other network routers
of the change. These updates are sent independently of the regularly scheduled updates that RIP routers send.
RIP Timers
RIP uses numerous timers to regulate its performance. Following are the timer stages for RIP:
• Update—The routing-update timer is the interval between periodic routing updates. This is how often
the device sends routing updates. Generally, it is set to 30 seconds, with a small random amount of time
added whenever the timer is reset. This is done to help prevent congestion, which could result from all
routers simultaneously attempting to update their neighbors.
• Invalid—Each routing table entry has a route-timeout timer associated with it. This is the number of
seconds since the device received the last valid update. When the route-timeout timer expires, the route
is marked invalid but is retained in the table until the route-flush timer expires. Once this timer expires,
the route goes into holddown. The default is 180 seconds (3 minutes).
• Holddown—The holddown period is the number of seconds the system waits before accepting any new
updates for the route that is in holddown (that is, routes that have been marked invalid). The default is
180 seconds (3 minutes).
• Flush—The route-flush timer is the number of seconds since the system received the last valid update
until the route is discarded and removed from the routing table. The default is 240 seconds (4 minutes).
As an example, when the interface on an adjacent router goes down, the system no longer receives routing
updates from the adjacent router. At this time, the Invalid and Flush timers start increasing. In the first 180
seconds, nothing will happen. After 180 seconds, the invalid timer expires, making the route invalid, and the
Holddown timer starts and holds the route for another 60 seconds. If there is still no update regarding the
interface status on the adjacent router (that is, it is still down), then the route enters into the Flush state where
in total the system has waited for 240 seconds from the last update (180 seconds for the Invalid timer and 60
seconds for Holddown timer), and the system flushes the route. Even if the adjacent routers interface comes
up immediately, the system does not accept a routing update until the Holddown timer completes the remaining
120 seconds.
Supported Domains
Any
User Roles
Admin
Network Admin
Additional Guidelines
The following information applies to RIP Version 2 only:
• If using neighbor authentication, the authentication key and key ID must be the same on all neighbor
devices that provide RIP Version 2 updates to the interface.
• With RIP Version 2, the Secure Firewall Threat Defense device transmits and receives default route
updates using the multicast address [Link]. In passive mode, it receives route updates at that address.
• When RIP Version 2 is configured on an interface, the multicast address [Link] is registered on that
interface. When a RIP Version 2 configuration is removed from an interface, that multicast address is
unregistered.
Limitations
• The Secure Firewall Threat Defense device cannot pass RIP updates between interfaces.
• RIP Version 1 does not support variable-length subnet masks.
• RIP has a maximum hop count of 15. A route with a hop count greater than 15 is considered unreachable.
• RIP convergence is relatively slow compared to other routing protocols.
• You can only enable a single RIP process on the Secure Firewall Threat Defense device.
Configure RIP
RIP is a distance-vector routing protocol that uses hop count as the metric for path selection.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Select Routing.
Step 3 Select RIP from the table of contents.
Step 4 Check the Enable RIP check box to configure the RIP settings.
Step 5 Choose the RIP versions for sending and receiving RIP updates from the RIP Version drop-down list.
Step 6 (Optional) Check the Generate Default Route check box to generate a default route for distribution, based
on the route map that you specify.
a) Specify a route map name to use for generating default routes, in the Route Map field.
The default route [Link]/0 is generated for distribution over a certain interface , when the route map,
specified in the Route Map field, is present.
Step 7 When Send and Receive Version 2 is the chosen RIP Version, the Enable Auto Summary option is available.
When the Enable Auto Summary check box is checked, automatic route summarization is enabled. Disable
automatic summarization if you must perform routing between disconnected subnets. When automatic
summarization is disabled, subnets are advertised.
Note
RIP Version 1 always uses automatic summarization—you cannot disable it.
Step 8 Click Networks. Define one or more networks for RIP routing. Enter IP address(es), or enter or select the
desired Network/Hosts objects. There is no limit to the number of networks you can add to the security
appliance configuration. Any interface that belongs to a network defined by this command, will participate
in the RIP routing process. The RIP routing updates will be sent and received only through interfaces on the
specified networks. Also, if the network of an interface is not specified, the interface will not be advertised
in any RIP updates.
Note
RIP only supports IPv4 objects.
Step 9 (Optional) Click Passive Interface. Use this option to specify passive interfaces on the appliance, and by
extension the active interfaces. The device listens for RIP routing broadcasts on passive interfaces, using that
information to populate its routing tables, but does not broadcast routing updates on passive interfaces.
Interfaces that are not designated as passive, receive and send updates.
Step 10 Click Redistribution to manage redistribution routes. These are the routes that are being redistributed from
other routing processes into the RIP routing process.
a) Click Add to specify redistribution routes.
b) Choose the routing protocol to redistribute into the RIP routing process, in the Protocol drop-down list.
Note
For the OSPF protocol, specify a process ID. Similarly, specify an AS path for BGP. When you choose
the Connected option in the Protocol drop-down list, you can redistribute, directly connected networks
into the RIP routing process.
c) (Optional) If you are redistributing OSPF routes into the RIP routing process, you can select specific types
of OSPF routes to redistribute in the Match drop-down list . Ctrl-click to select multiple types:
• Internal – Routes internal to the autonomous system (AS) are redistributed.
• External 1 – Type 1 routes external to the AS are redistributed.
• External 2 – Type 2 routes external to the AS are redistributed.
• NSSA External 1 – Type 1 routes external to a not-so-stubby area (NSSA) are redistributed.
• NSSA External 2 – Type 2 routes external to an NSSA are redistributed
Note
The default is match Internal, External 1, and External 2
d) Select the RIP metric type to apply to the redistributed routes in the Metric drop-down list. The two
choices are:
• Transparent – Use the current route metric
• Specified Value – Assign a specific metric value. Enter a specific value from 0-16, in the Metric
Value field.
• None – No metric is specified. Do not use any metric value, to apply to redistributed routes.
Note
None option is applicable only for Static and Connected protocols.
e) (Optional) Enter the name of a route map that must be satisfied, in the Route Map field before the route
can be redistributed into the RIP routing process. Routes are redistributed only if IP address matches an
allow statement in the route map address list. To create a new route map object, click Add ( ). See Route
Map for the procedure to add a new route map.
f) Click OK.
Step 11 (Optional) Click Filtering to manage filters for the RIP policy. In this section, filters are used to prevent
routing updates through an interface, control the advertising of routes in routing updates, control the processing
of routing updates and filtering sources of routing updates.
a) Click Add to add RIP filters.
b) Select the type of traffic to be filtered - Inbound or Outbound in the Traffic Direction field.
Note
If traffic direction is inbound, you can only define an Interface filter.
c) Specify whether the filter is based on an Interface or a Route, by selecting appropriate in the Filter On
field. If you click Interface, enter or choose the name of the interface on which routing updates are to be
filtered. If you click Route, choose the route type:
• Static – Only static routes are filtered.
• Connected – Only connected routes are filtered.
• OSPF – Only OSPFv2 routes discovered by the specified OSPF process are filtered. Enter the Process
ID of the OSPF process to be filtered.
• BGP – Only BGPv4 routes discovered by the specified BGP process are filtered. Enter the AS path
of the BGP process to be filtered.
d) In the Access List field, enter or choose the name of one or more access control lists (ACLs) that define
the networks to be allowed or removed from RIP route advertisements. To add a new standard access list
object, click Add ( ) and see Configure Standard ACL Objects, on page 1353.
e) Click OK.
Step 12 (Optional) Click Broadcast to add or edit interface configurations. Using Broadcast, you can override the
global RIP versions to send or receive per interface. You can also define the authentication parameters per
interface if you want to implement authentication to ensure valid RIP updates.
a) Click Add to add interface configurations.
b) Enter or choose an interface defined on this appliance in the Interface field.
c) In the Send option, select the appropriate boxes to specify sending updates using the RIP Version 1,
Version 2, or both. These options let you override, for the specified interface, the global Send versions
specified .
d) In the Receive option, select the appropriate boxes to specify accepting updates using the RIP Version
1, Version 2, or both. These options let you override, for the specified interface, the global Receive
versions specified .
e) Select the Authentication used on this interface for RIP broadcasts.
• None – No authentication
• MD5 – Employ MD5
• Clear Text – Employ clear-text authentication
If you choose MD5 or Clear Text, you must also provide the following authentication parameters.
• Key ID – The ID of the authentication key. Valid values are from 0 to 255.
• Key – The key used by the chosen authentication method. Can contain up to 16 characters
• Confirm – Enter the authentication key again, to confirm
f) Click OK.
Note The UDP and non-UDP transports are both supported for multicast routing. However, the non-UDP transport
has no FastPath optimization.
IGMP Protocol
IP hosts use the Internet Group Management Protocol (IGMP) to report their group memberships to
directly-connected multicast routers. IGMP is used to dynamically register individual hosts in a multicast
group on a particular LAN. Hosts identify group memberships by sending IGMP messages to their local
multicast router. Under IGMP, routers listen to IGMP messages and periodically send out queries to discover
which groups are active or inactive on a particular subnet.
IGMP uses group addresses (Class D IP address) as group identifiers. Host group address can be in the range
of [Link] to [Link]. The address [Link] is never assigned to any group. The address [Link]
is assigned to all systems on a subnet. The address [Link] is assigned to all routers on a subnet.
Note When you enable multicast routing on the threat defense device, IGMP Version 2 is automatically enabled
on all interfaces.
Note If the threat defense device is the PIM RP, use the untranslated outside address of the threat defense device
as the RP address.
Note The threat defense device does not act as a C-RP, even though the C-RP is a
mandatory requirement for BSR traffic. Only routers can act as a C-RP. So, for
BSR testing functionality, you must add routers to the topology.
• BSR Election Mechanism — Each C-BSR originates Bootstrap messages (BSMs) that contain a BSR
Priority field. Routers within the domain flood the BSMs throughout the domain. A C-BSR that hears
about a higher-priority C-BSR than itself suppresses its sending of further BSMs for some period of time.
The single remaining C-BSR becomes the elected BSR, and its BSMs inform all the other routers in the
domain that it is the elected BSR.
Multicast Addresses
Multicast addresses specify an arbitrary group of IP hosts that have joined the group and want to receive traffic
sent to this group.
Clustering
Multicast routing supports clustering. In Spanned EtherChannel clustering, the control unit sends all multicast
routing packets and data packets until fast-path forwarding is established. After fast-path forwarding is
established, data units may forward multicast data packets. All data flows are full flows. Stub forwarding
flows are also supported. Because only one unit receives multicast packets in Spanned EtherChannel clustering,
redirection to the control unit is common.
Supported Domains
Any
User Roles
Admin
Network Admin
IPv6
Does not support IPv6.
Multicast Group
The range of addresses between [Link] and [Link] is reserved for the use of routing protocols and
other topology discovery or maintenance protocols, such as gateway discovery and group membership reporting.
Hence, Internet multicast routing from address range 224.0.0/24 is not supported; IGMP group is not created
when enabling multicast routing for the reserved addresses.
Clustering
In clustering, for IGMP and PIM, this feature is only supported on the primary unit.
Additional Guidelines
• You must configure an access control or prefilter rule on the inbound security zone to allow traffic to
the multicast host, such as [Link]. However, you cannot specify a destination security zone for the
rule, or it cannot be applied to multicast connections during initial connection validation.
• You cannot disable an interface with PIM configured on it. If you have configured PIM on the interface
(see Configure PIM Protocol, on page 1301), disabling the multicast routing and PIM does not remove the
PIM configuration. You must remove (delete) the PIM configuration to disable the interface.
• PIM/IGMP Multicast routing is not supported on interfaces in a traffic zone.
• Do not configure threat defense to simultaneously be a Rendezvous Point (RP) and a First Hop Router.
• HSRP standby IP address does not participate in PIM neighborship. Thus, if the RP router IP is routed
through a HSRP standby IP address, the multicast routing does not work in Threat Defense. Hence for
the multicast traffic to pass through successfully, ensure that the route for the RP address is not the HSRP
standby IP address, instead, configure the route address to an interface IP address.
• For a device using virtual routing, you can configure multicast only for its global virtual router and not
for its user-defined virtual router.
Procedure
Note Only the UDP transport layer is supported for multicast routing.
The following list shows the maximum number of entries for specific multicast tables. Once these limits are
reached, any new entries are discarded.
• MFIB—30,000
• IGMP Groups—30,000
• PIM Routes—72,000
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > Multicast Routing > IGMP.
Step 3 Check the Enable Multicast Routing check box.
Checking this check box enables IP multicast routing on the device. Unchecking this check box disables IP
multicast routing. By default, multicast is disabled. Enabling multicast routing enables multicast on all
interfaces.
You can disable multicast on a per-interface basis. This is useful if you know that there are no multicast hosts
on a specific interface and you want to prevent the threat defense device from sending host query messages
on that interface.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
• Forward Interface—From the drop-down list, choose the specific interface from which you want to
forward IGMP messages.
This configures the Secure Firewall Threat Defense device to act as an IGMP proxy agent and forward
IGMP messages from hosts connected on one interface to an upstream multicast router on another
interface.
• Version—Choose IGMP Version 1 or 2.
By default, the threat defense device runs IGMP Version 2, which enables several additional features.
Note
All multicast routers on a subnet must support the same version of IGMP. The threat defense device does
not automatically detect Version 1 routers and switch to Version 1. However, you can have a mix of
IGMP Version 1 and 2 hosts on the subnet; the threat defense device running IGMP Version 2 works
correctly when IGMP Version 1 hosts are present.
• Query Interval—The interval in seconds at which the designated router sends IGMP host-query messages.
The range is 1 to 3600. The default is 125.
Note
If the threat defense device does not hear a query message on an interface for the specified timeout value,
then the device becomes the designated router and starts sending the query messages.
• Response Time—The interval in seconds before the threat defense device deletes the group. The range
is 1 to 25. The default is 10.
If the threat defense device does not receive a response to a host query within this amount of time, it
deletes the group.
• Group Limit—The maximum number of hosts that can join on an interface. The range is 1 to 500. The
default is 500.
You can limit the number of IGMP states resulting from IGMP membership reports on a per-interface
basis. Membership reports exceeding the configured limits are not entered in the IGMP cache, and traffic
for the excess membership reports is not forwarded
• Query Timeout—The period of time in seconds before which the threat defense device takes over as
the requester for the interface after the previous requester has stopped. The range is 60 to 300. The default
is 255.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > Multicast Routing > Access Group.
Step 3 On Access Group, click Add or Edit.
Use the Add IGMP Access Group parameters dialog box to add new IGMP access groups to the Access
Group table. Use the Edit IGMP Access Group parameters dialog box to change existing parameters.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > Multicast Routing > IGMP.
Note See Configure IGMP Static Groups, on page 1299 if you want to forward multicast packets for a specific group
to an interface without the threat defense device accepting those packets as part of the group.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > Multicast Routing > IGMP.
Step 3 On Join Group, click Add or Edit.
Use the Add IGMP Join Group parameters dialog box to configure the threat defense device to be a member
of a multicast group. Use the Edit IGMP Join Group parameters dialog box to change existing parameters.
Note
The IGMP Join Group enables PIM to send Join requests towards the sources or towards the Rendezvous
Point (RP), provided, the firewall with this command is the PIM Designated Router (DR) on that interface
where the command is applied.
• From the Interface drop-down list, choose the interface you want to be a member of a multicast group.
If you are editing an existing entry, you cannot change the value.
• From the Join Group drop-down list, choose the multicast group to which you want to assign the interface,
or click Plus to create a new multicast group. See Creating Network Objects for the procedure.
Note PIM is not supported with PAT. The PIM protocol does not use ports, and PAT only works with protocols
that use ports.
Procedure
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > Multicast Routing > PIM.
Step 3 On Protocol, click Add or Edit.
Use the Add PIM parameters dialog box to add new PIM parameters to the interface. Use the Edit PIM
parameters dialog box to change existing parameters.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > Multicast Routing > PIM.
Step 3 On Neighbor Filter, click Add or Edit.
Use the Add PIM Neighbor Filter dialog box to add new PIM neighbor filters to the interface. Use the Edit
PIM Neighbor Filter dialog box to change existing parameters.
• From the Interface drop-down list, choose the interface to which you want to add a PIM neighbor filter.
• Standard Access List— From the Standard Access List drop-down list, choose a standard ACL or
click Add ( ) to create a new standard ACL. See Configure Standard ACL Objects, on page 1353 for the
procedure.
Note
Choosing Allow on the Add Standard Access List Entry dialog box lets the multicast group
advertisements pass through the interface. Choosing Block prevents the specified multicast group
advertisements from passing through the interface. When a multicast boundary is configured on an
interface, all multicast traffic is prevented from passing through the interface unless permitted with a
neighbor filter entry.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Multicast Routing > PIM.
Step 3 On Bidirectional Neighbor Filter, click Add or Edit.
Use the Add PIM Bidirectional Neighbor Filter dialog box to create ACL entries for the PIM bidirectional
neighbor filter ACL. Use the Edit PIM Bidirectional Neighbor Filter dialog box to change existing
parameters.
• Standard Access List— From the Standard Access List drop-down list, select a standard ACL or click
Add ( ) to create a new standard ACL. See Configure Standard ACL Objects, on page 1353 for the
procedure.
Note
Choosing Allow on the Add Standard Access List Entry dialog box lets the specified devices participate
in the DR election process. Choosing Block prevents the specified devices from participating in the DR
election process.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > Multicast Routing > PIM.
Step 3 On Rendezvous Points, click Add or Edit.
Use the Add Rendezvous Point dialog box to create a new entry to the Rendezvous Point table. Use the Edit
Rendezvous Point dialog box to change existing parameters.
ACL or click Add ( ) to create a new standard ACL. See Configure Standard ACL Objects, on page
1353 for the procedure.
Note This behavior is known as Shortest Path Switchover (SPT). We recommend that you always use the Shared
Tree option.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > Multicast Routing > PIM.
Step 3 On Route Tree, select the path for the route tree:
• Click Shortest Path to use the shortest-path tree for all multicast groups.
• Click Shared Tree to use the shared tree for all multicast groups.
• Click Shared tree for below mentioned group to designate the groups specified in the Multicast Groups
table, and then from the Standard Access List drop-down list, select a standard ACL or click Add ( )
to create a new standard ACL. See Configure Standard ACL Objects, on page 1353 for the procedure.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > Multicast Routing > PIM.
Step 3 On Request Filter, define the multicast sources that are allowed to register with the threat defense device
when it acts as an RP:
• From the Filter PIM register messages using: drop-down list select None, Access List, or Route Map.
• If you choose Access List from the drop-down list, select an extended ACL or click Add ( ) to create
a new extended ACL. See Configure Extended ACL Objects, on page 1349 for the procedure.
Note
In the Add Extended Access List Entry dialog box, select Allow from the drop-down list o create a
rule that allows the specified source of the specified multicast traffic to register with the threat defense
device, or select Block to create a rule that prevents the specified source of the specified multicast traffic
from registering with the device.
• If you choose Route Map, select a route map from the Route Map drop-down list, or click Add ( )
to create a new route map. See Creating Network Objects for the procedure.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > Multicast Routing > PIM.
Step 3 On Bootstrap Router, check the Configure this FTD as a Candidate Bootstrap Router (C-BSR) check
box to perform the C-BSR setup.
a) From the Interface drop-down list, select the interface on the threat defense device from which the BSR
address is derived to make it a candidate.
This interface must be enabled with PIM.
b) In the Hash mask length field, enter the length of a mask (32 bits maximum) that is to be ANDed with
the group address before the hash function is called. All groups with the same seed hash (correspond) to
the same RP. For example, if this value is 24, only the first 24 bits of the group addresses matter. This
fact allows you to get one RP for multiple groups. The range is 0 to 32.
c) In the Priority field, enter the priority of the candidate BSR. The BSR with the larger priority is preferred.
If the priority values are the same, the router with the larger IP address is the BSR. The range is 0 to 255.
The default value is 0.
Step 4 (Optional) Click Add ( ) to select an interface on which no PIM BSR messages will be sent or received in
the Configure this FTD as a Border Bootstrap Router (BSR) section.
• From the Interface drop-down list, select the interface on which no PIM BSR messages will be sent or
received.
RP or BSR advertisements are filtered effectively isolating two domains of RP information exchange.
• Check the Enable Border BSR check box to enable BSR.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > Multicast Routing > Multicast Routes > Add or Edit.
Use the Add Multicast Route Configuration dialog box to add a new multicast route to the threat defense
device. Use the Edit Multicast Route Configuration dialog box to change an existing multicast route.
Step 3 From the Source Network drop-down box, choose an existing network or click Add ( ) to add a new one.
See Creating Network Objects for the procedure.
Step 4 To configure an interface to forward the route, click Interface and configure the following options:
• From the Source Interface drop-down list, choose the incoming interface for the multicast route.
• From the Output Interface/Dense drop-down list, choose the destination interface that the route is
forwarded through.
• In the Distance field, enter the distance of the multicast route. The range is 0 to 255.
Step 5 To configure an RPF address to forward the route, click Address and configure the following options:
• In the RPF Address field, enter the IP address for the multicast route.
• In the Distance field, enter the distance of the multicast route The range is 0 to 255.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Choose Routing > Multicast Routing > Multicast Boundary Filter, and then click Add or Edit.
Use the Add Multicast Boundary Filter dialog box to add new multicast boundary filters to the device. Use
the Edit Multicast Boundary Filter dialog box to change existing parameters.
You can configure a multicast boundary for administratively scoped multicast addresses. A multicast boundary
restricts multicast data packet flows and enables reuse of the same multicast group address in different
administrative domains. When a multicast boundary is defined on an interface, only the multicast traffic
permitted by the filter ACL passes through the interface.
Step 3 From the Interface drop-down list, choose the interface for which you are configuring the multicast boundary
filter ACL.
Step 4 From the Standard Access List drop-down list, choose the standard ACL you want to use, or click Add ( )
to create a new standard ACL. See Configure Standard ACL Objects, on page 1353 for the procedure.
Step 5 Check the Remove any Auto-RP group range announcement from the Auto-RP packets that are denied
by the boundary check box to filter Auto-RP messages from sources denied by the boundary ACL. If this
check box is not checked, all Auto-RP messages are passed.
the higher-bandwidth link gets most, if not all, of the traffic sent across it based on the metric savings obtained
by the bandwidth, delay, or both (using EIGRP or OSPF) characteristics of the link. With PBR, you can route
higher priority traffic over the high-bandwidth/low-delay link, while sending all other traffic over the
low-bandwidth/high-delay link.
Following are a few scenarios where you can use Policy Based Routing:
Direct Internet Access
In this topology, application traffic from the branch office can be routed directly to the internet instead of
through the VPN tunnel connecting to the headquarters. The branch threat defense is configured with an
internet exit point and the PBR policy is applied on the ingress interface (Inside 1) to identify the traffic based
on the applications, user identity (username and group membership), and Security Group Tag (security group
association) defined in the ACL. Correspondingly, the traffic is forwarded through the egress interfaces directly
to the internet or to the IPsec VPN tunnel.
Load Sharing
In addition to the dynamic load-sharing capabilities offered by ECMP load balancing, network administrators
can now implement policies to distribute traffic among multiple paths based on the traffic characteristics.
As an example, in the topology depicted in the Equal-Access Source Sensitive Routing scenario, an
administrator can configure policy based routing to route the traffic from HR network through ISP1 and traffic
from Eng network through ISP2 and thus share the load.
Device Guidelines
• PBR through management center's Policy Based Routing page is supported only from Version 7.1+ on
both the management center and the device.
• When you upgrade management center or threat defense to version 7.1 and higher, the PBR configuration
in the device is removed. You must configure PBR again using the Policy Based Routing page. If the
managed device is lower than version 7.1, you must configure PBR again using FlexConfig with deploy
option set to "every time."
• Configuring application, user identity, and Security Group Tag (SGT) based PBR policy on cluster
devices is not supported.
Interface Guidelines
• Only routed interfaces and non management-only interfaces belonging to the Global virtual router can
be configured as ingress or egress interface.
• PBR is not supported on user-defined virtual routers.
• Only interfaces that have a logical name can be defined in the policy.
• Static VTIs can be configured only as egress interfaces.
• Before proceeding with configuration, ensure that the ingress and egress traffic of each session flows
through the same ISP-facing interface to avoid unexpected behavior caused by asymmetric routing,
specifically when NAT and VPN are in use.
IPv6 Support
PBR supports IPv6.
For more information on configuring DNS servers, see DNS, on page 939.
will not be triggered if the incoming packet belongs to an existing connection, or if NAT is applied and NAT
chooses the egress interface.
Note An embryonic connection is where the necessary handshake between source and destination has not been
made.
When a new internal interface is added and a new VPN policy is created using a unique address pool, PBR
is applied to the outside interface matching the source of the new client pool. Thus, PBR sends traffic from
the client to the next hop on the new interface. However, PBR is not involved in the return traffic from a host
that has not yet established a connection with the new internal interface routes to the client. Thus, the return
traffic from the host to the VPN client, specifically, the VPN client response is dropped as there is no valid
route. You must configure a weighted static route with a higher metric on the internal interface.
Additional Guidelines
• All existing configuration restrictions and limitations of route map will be carried forward.
• While defining the ACL for the policy match criteria, you can select multiple applications from a list of
predefined applications to form an Access Control Entry (ACE). In threat defense, the predefined
applications are stored as Network Service objects and the group of applications as Network Service
Groups (NSG). You can create a maximum of 1024 such NSGs. The application or network service
group is detected through first-packet classification. Currently, you cannot add to or modify the predefined
applications list.
• Unicast Reverse Path Forwarding (uRPF) validates the source IP address of packets received on an
interface against the routing table and not against the PBR route map. When uRPF is enabled, packets
received on an interface through PBR are dropped as they are without the specific route entry. Hence,
when using PBR, ensure to disable uRPF.
Path Monitoring
PBR uses either static cost or path monitoring (dynamic metrics) to route its traffic.
Path monitoring, when configured on interfaces, derive metrics such as round trip time (RTT), jitter, mean
opinion score (MOS), and packet loss per interface. These metrics are used to determine the best path for
routing PBR traffic.
Note You can configure both ICMP and HTTP on the same interface. If the destination in the policy matches to
any of the domain IP, the corresponding metrics are used. If the destination does not match to any of the
configured domains, the metrics from the ICMP are used by PBR to select the outgoing interface.
Note You cannot configure or modify the interval for any of these timers.
performance metrics (RTT, jitter, packet-lost, and MOS) of the egress interfaces. PBR uses the metrics to
determine the best path (egress interface) for forwarding the traffic. Path monitoring periodically notifies PBR
about the monitored interface whose metric got changed. PBR retrieves the latest metric values for the monitored
interfaces from the path monitoring database and updates the data path.
Path monitoring functions only with dynamic metrics, and only if the RTT, jitter, packet-lost, or MOS variables
are set on the interfaces. Path monitoring does not function with static metrics—interface cost (cost set in
interface).
You must enable path monitoring for the interface and configure the monitoring type. The PBR policy page
allows you to specify the desired metric for path determination. See Configure Policy-Based Routing Policy,
on page 1317.
PBR and HTTP-based Path Monitoring
From management center version 7.4, PBR can be configured to use HTTP-based path monitoring to collect
the performance metrics of the application domains and not just one destination IP address. Path monitoring
does not commence monitoring immediately after HTTP-based application monitoring is configured. It starts
monitoring only when a DNS entry is snooped for a domain. With the information on the resolved IP for the
domain, it sends and receives the HTTP request and response respectively. When DNS resolves multiple IP
addresses for a single domain, the first resolved IP address will be used for probing and monitoring the
application. It continues to monitor till the IP address changes or the HTTP-based path monitoring is disabled.
Based on the HTTP request and response durations, path monitoring computes the performance metrics for
the application. The collected metrics are forwarded to PBR periodically, for making the routing and forwarding
decision for the traffic arising from the configured ingress interface. If traffic arrives before the path monitoring
could send its metrics to PBR, the traffic flow follows path chosen by the routing table. For the subsequent
traffic flows that arrive after path monitoring metrics are available, PBR applies its routing decision based on
the metrics and forwards the traffic.
Note Based on the Network Service Groups in the match ACL of the policy, you can apply PBR for multiple
domains having multiple IP addresses.
In HTTP-based path monitoring of applications, the management center associates the applications/NSGs to
the egress interface only when the PBR configuration meets the following criteria:
• The match ACL contains the monitored applications.
• The PBR policy is configured with any one of the following interface ordering values (metric type):
• Minimal Jitter
• Maximum Mean Opinion Score
• Minimal Round-Trip Time
• Minimal Packet Loss
metrics on the specified interfaces. On the Interfaces page, you can configure interfaces with settings for path
monitoring to send the ICMP probes or HTTP pings for metrics collection.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click Edit ( ) for the interface you want to edit.
Step 3 Click the Path Monitoring tab.
Step 4 To configure ICMP based monitoring of the interface, click the Enable IP based Monitoring check box.
Step 5 From the Monitoring Type drop-down list, select the relevant option:
• Auto—Sends ICMP probes to the IPv4 default gateway of the interface. If the IPv4 gateway does not
exist, path monitoring sends the probes to the IPv6 default gateway of the interface.
• Peer IPv4—Sends ICMP probes to the specified peer IPv4 address (next-hop IP) for monitoring. If you
select this option, enter the IPv4 address in the Peer IP To Monitor field.
• Peer IPv6—Sends ICMP probes to the specified peer IPv6 address (next-hop IP) for monitoring. If you
select this option, enter the IPv6 address in the Peer IP To Monitor field.
• Auto IPv4—Sends ICMP probes to the default IPv4 gateway of the interface.
• Auto IPv6—Send ICMP probes to the default IPv6 gateway of the interface.
Note
• The Auto options are not available for VTI interfaces. You must specify the peer address.
• Only one next-hop is monitored to a destination. That is, you cannot specify more than one peer address
to monitor for an interface.
Step 6 By default, the Enable HTTP based Application Monitoring check box is selected. All applications selected
for path monitoring in the match ACL of the PBR policy are listed, provided this interface is configured as
the egress interface in the policy. To disable the HTTP-based monitoring of the interface, clear the check box.
Step 7 Click Ok, and to save the settings, click Save.
Procedure
Step 1 Choose Devices > Device Management, and edit the threat defense device.
Step 2 Click Routing.
Step 3 Click Policy Based Routing.
The Policy Based Routing page displays the configured policy. The grid displays the list of ingress interfaces
and a combination of the policy-based route access list, and egress interfaces.
Step 6 To specify the match criteria and the forward action in the policy, click Add.
Step 7 In the Add Forwarding Actions dialog box, do the following:
a) From the Match ACL drop-down, choose the extended access control list object. You can predefine the
ACL object (see Configure Extended ACL Objects, on page 1349) or click the Add ( ) icon to create the
object. In the New Extended Access List Object box, enter a name, click Add to open the Add Extended
Access List Entry dialog box, where you can define the network, port, user identity, SGT, or application
match criteria for the PBR policy.
Note
You can either have destination address or application/user identity/SGT defined in an ACE.
To selectively apply PBR on the incoming interface, you can define Block criteria in the ACE. When the
traffic matches the block rule of the ACE, the traffic is forwarded to the egress interface based on the
routing table.
c) If you have selected Egress Interfaces, from the Interface Ordering drop-down, choose the relevant
option:
• By Interface Priority—The traffic is forwarded based on the priority of the interfaces. Traffic is
routed to the interface with the least priority value first. When the interface is not available, the traffic
is then forwarded to the interface with the next lowest priority value. For example, let us assume that
Gig0/1, Gig0/2, and Gig0/3 are configured with priority values 0,1, and 2 respectively. The traffic
is forwarded to Gig0/1. If Gig0/1 becomes unavailable, the traffic is then forwarded to Gig0/2.
Note
To configure the priority for the interfaces, click Configure Interface Priority on the Policy Based
Routing page. In the dialog box, provide the priority number against the interfaces, and then click
Save. You can also configure the priority for an interface in the Configure Routed Mode Interfaces.
When the priority value is the same for all the interfaces, the traffic is balanced among the interfaces.
• By Order—The traffic is forwarded based on the sequence of the interfaces specified here. For
example, let us assume that Gig0/1, Gig0/2, and Gig0/3 are selected in the following order, Gig0/2,
Gig0/3, Gig0/1. The traffic is forwarded to Gig0/2 first, then to Gig0/3, irrespective of their priority
values.
• By Minimal Jitter—The traffic is forwarded to the interface that has the lowest jitter value. You
need to enable Path Monitoring on the interfaces for PBR to obtain the jitter values.
• By Maximum Mean Opinion Score—The traffic is forwarded to the interface that has the maximum
mean opinion score (MOS). You need to enable Path Monitoring on the interfaces for PBR to obtain
the MOS values.
• By Minimal Round Trip Time—The traffic is forwarded to the interface that has the minimal round
trip time (RTT). You need to enable Path Monitoring on the interfaces for PBR to obtain the RTT
values.
• By Minimal Packet Loss—The traffic is forwarded to the interface that has the minimal packet loss.
You need to enable Path Monitoring on the interfaces for PBR to obtain the packet loss values.
d) In the Available Interfaces box, all the interfaces with their priority values are listed. From the list of
interfaces, click the Add ( ) button to add to the selected egress interfaces. Proceed to Step 7.k, on page
1320
Note
The route to the selected interface must be present in the routing table.
e) If you have selected IP Address, enter the IP addresses separated by commas in the IPv4 Addresses or
IPv6 Addresses fields. The traffic is forwarded as per the sequence of the specified IP addresses.
Note
When multiple next-hop IP addresses are provided, the traffic is forwarded as per the sequence of the
specified IP addresses until a valid routable next-hop IP address is found. The configured next-hops should
be directly connected.
f) From the Don't Fragment drop-down list, select Yes, No, or None. If the DF (Don't Fragment) flag is
set to Yes, the intermediate routers never perform fragmentation of a packet.
g) To specify the current interface as the default for forwarding, check the Default Interface check box.
h) The IPv4 Settings and IPv6 Settings tab enables you to specify the recursive and default settings:
Note
For a route-map, you can only specify either IPv4 or IPv6 next-hop settings.
• Recursive—The route map configuration is applied only when the specified next-hop address and
the default next-hop address are found on a directly connected subnet. However, you could use the
recursive option, where the next-hop address need not be directly connected. Here, a recursive lookup
is performed on the next-hop address, and matching traffic is forwarded to the next-hop used by that
route entry according to the current routing path of the router.
• Default—If the normal route lookup fails to match traffic, the traffic is forwarded to this specified
next-hop IP address.
i) Check the Peer Address check box to use the next-hop address as the peer address.
Note
You cannot configure a route map with both default next-hop address and peer address.
j) For IPv4 settings, you can check whether the next IPv4 hops of a route map are available under Verify
Availability—click the Add ( ) button and add the next-hop IP address entries:
• IP Address—Enter the next hop IP address.
• Sequence—Entries are assessed in order using the sequence number. Ensure that no duplicate
sequence numbers are entered. The valid range is 1 to 65535.
• Track—Enter a valid ID. The valid range is 1 to 255.
k) Click Save.
Step 8 To save the policy, click Save and Deploy.
The threat defense uses ACLs to match traffic and perform routing actions on the traffic. Typically, you
configure a route map that specifies an ACL against which traffic is matched, and then you specify one or
more actions for that traffic. With the use of path monitoring, PBR can now select the best egress interface
for routing the traffic. Finally, you associate the route map with an interface on which you want to apply PBR
on all incoming traffic.
Procedure
that address day-to-day operations through the corporate network results in huge network expansion and
maintenance costs. This example illustrates the PBR configuration procedure for direct internet access.
The following figure depicts the topology of a corporate network. The branch network is connected to the
corporate network through a route-based VPN. Traditionally, the corporate threat defense is configured to
handle both the internal and external traffic of the branch office. With the PBR policy, the branch threat
defense is configured with a policy that routes specific traffic to the WAN network instead of the virtual
tunnels. The rest of the traffic flows through the route-based VPN, as usual.
This example also illustrates the configuring of the WAN and the VTI interfaces with ECMP zones to achieve
load balancing.
Figure 418: Configuring Policy Based Routing on Branch Threat Defense in Management Center
Procedure
Step 1 Configure policy based routing for the branch threat defense, select the ingress interfaces:
a) Choose Devices > Device Management, and edit the threat defense device.
b) Choose Routing > Policy Based Routing, and on the Policy Based Routing page, click Add.
c) In the Add Policy Based Route dialog box, select the interfaces (say, Inside 1, and Inside 2) from the
Ingress Interface drop-down list.
Step 2 Specify the match criteria:
a) Click Add.
b) To define the match criteria, click the Add ( ) button.
c) In New Extended Access List Object, enter the name for the ACL (say, DIA-FTD-Branch), and click
Add.
d) In the Add Extended Access List Entry dialog box, choose the required web-based applications from
the Application tab:
Figure 419: Applications Tab
On the threat defense, the application group in an ACL is configured as a network service group and each
of the applications as a network service object.
Figure 420: Extended ACL
e) Click Save.
c) Click Save.
Step 4 Interface priority configuration:
You can set the priority value for the interfaces either in the Edit Physical Interface page, or in the Policy
Based Routing page (Configure Interface Priority). In this example, the Edit Physical Interface method is
described.
a) Choose Devices > Device Management, and edit the branch threat defense.
b) Set the priority for the interfaces. Click Edit against the interface and enter the priority value:
Step 6 Configure static routes for the zone interfaces for load balancing:
a) In the Routing page, click Static Route.
b) Click Add and specify the static routes for WAN1, WAN2, VTI01, and VTI02. Ensure that you specify the
same metric value for the interfaces belonging to the same ECMP zones (Step 5):
Note
Ensure that the zone interfaces have the same destination address and metric, but different gateway
addresses.
Step 7 Configure trusted DNS on the WAN objects of the branch threat defense to ensure secured flow of traffic to
the internet:
a) Choose Devices > Platform Settings, and create a DNS policy on the branch threat defense.
b) To specify the trusted DNS, Edit the policy and click DNS.
c) To specify the DNS servers for the DNS resolution to be used by WAN objects, in the DNS Settings tab,
provide the DNS server group details and select WAN from the interface objects.
d) Use the Trusted DNS Servers tab to provide specific DNS servers that you trust for the DNS resolution.
Step 8 Save and Deploy.
Any YouTube related access requests from the branch inside network INSIDE1 or INSIDE2 are routed to
WAN1 or WAN2 as they would match the DIA-FTD-Branch ACL. Any other request, say [Link], are
routed through VTI01 or VTI02 as configured in the Site to Site VPN Settings.
With the ECMP configured, the network traffic is seamlessly balanced.
2. You have configured ingress and egress interfaces with logical names. In this example, the ingress interface
is named Inside1, and egress interfaces are named ISP01, ISP02, and ISP03.
Procedure
e) Click Save.
f) Select PBR-WebEx from the Match ACL drop-down list.
Step 4 Specify the egress interfaces:
a) From the Send To drop-down list, choose Egress Interfaces.
b) From the Interface Ordering drop-down list, choose By Minimal Jitter.
c) Under Available Interfaces, click the Right Arrow ( )button against the respective interface names to
add ISP01, ISP02, and ISP03.
d) Click Save.
Step 5 Repeat Step 2 and Step 3 to create PBRs for the same interface (Inside1) to route Office365 and network-based
access control traffic:
a) Create a match criteria object, example PBR-Office365, and select the Office365 application from the
Application tab.
b) From the Interface Ordering drop-down list, choose By Minimal Round Trip Time.
c) Specify the egress interfaces ISP01, ISP02, and ISP03, and click Save.
d) Now, create a match criteria object, example PBR-networks, and specify the source and destination
interface in the Network tab.
e) From the Interface Ordering drop-down list, choose By Minimal Packet Loss.
f) Specify the egress interfaces ISP01, ISP02, and ISP03, and click Save.
Step 6 Save and Deploy.
Step 7 To view path monitoring metrics, choose Devices > Device Management, and from More ( ) click Health
Monitor. To view the metric details for the interfaces of the device, you must add the path metrics dashboard.
For details, see Add Path Monitoring Dashboard , on page 1320.
The WebEx, Office365, and networks-based ACL traffic are forwarded through the best route derived from
the metrics value collected on ISP01, ISP02, and ISP03.
Identity and SGT based 7.4.0 7.4.0 You can now classify the network traffic based on users and user groups, and
PBR Policy SGTs in PBR policies. You can select the identity and SGT objects while
defining the extended ACLs for the PBR policies.
New/modified screens: New tabs added in the extended access list object for
configuring the policy based routing policy: Objects > Object Management >
Access Control Lists > Add Extended page, Users and Security Group Tag.
HTTP based Path 7.4.0 7.2.0 PBR can now use the performance metrics (RTT, jitter, packet-lost, and MOS)
Monitoring collected by path monitoring through HTTP client on the application domain
rather than the metrics on a specific destination IP. HTTP-based application
monitoring option is enabled by default for the interface. You can configure a
PBR policy with match ACL having the monitored applications and desired
metric type for path determination.
New/modified screens: New option in Interfaces page for enabling path
monitoring: Devices > Device Management > Edit Interfaces > Path
Monitoring > Enable HTTP based Application Monitoring check box.
Dual WAN/ISP Threat 7.3.0 7.3.0 On a dual WAN-enabled threat defense, a single data interface was configured
Defense Management to communicate with the management center. Now, support to configure a
Support secondary data interface is provided so that the communication channel is
sustained when the primary data interface fails. The management center
autoconfigures PBR to route the SF-Tunnel traffic from the tapnlp (internal)
interface to one of the available data interfaces based on the priority and SLA
metric.
Next-hop settings for 7.3.0 7.1.0 You can configure the next-hops for the PBR route-map while enabling packet
PBR route map forwarding actions.
New/modified screens: New fields in Add/Edit Forwarding Actions page for
configuring egress interfaces: Device Management > Routing > Policy Based
Routing > Add Forwarding Actions page.
PBR and Path 7.2.0 7.2.0 PBR uses path monitoring to collect the performance metrics (RTT, jitter,
Monitoring packet-lost, and MOS) of the egress interfaces. You must enable path monitoring
for the interface and configure the monitoring type. You can configure a PBR
policy with the desired metric for path determination.
New/modified screens: New tab in Interfaces page for enabling path monitoring:
Devices > Device Management > Edit Interfaces > Path Monitoring tab.
Configure policy based 7.1.0 7.1.0 Upgrade impact. Redo FlexConfigs after upgrade.
routing from the FMC
You can now configure policy based routing (PBR) from the FMC web
web interface.
interface. This allows you to classify network traffic based on applications and
to implement direct internet access (DIA) to send traffic to the internet from a
branch deployment. You can define a PBR policy and configure it on ingress
interfaces, specifying match criteria and egress interfaces. Network traffic that
matches the access control policy is forwarded through the egress interface
based on priority or the order as configured in the policy.
This feature requires Version 7.1+ on both the FMC and the device. When you
upgrade the FMC to Version 7.1+, existing policy based routing FlexConfigs
are removed. After you upgrade your devices to Version 7.1+, redo your policy
based routing configurations in the FMC web interface. For devices that you
do not upgrade to Version 7.1+, redo the FlexConfigs and configure them to
deploy "every time."
New/modified screens: Devices > Device Management > Routing > Policy
Based Routing
Introduction to Objects
For increased flexibility and web interface ease-of-use, the system uses named objects, which are reusable
configurations that associate a name with a value. When you want to use that value, use the named object
instead. The system supports object use in various places in the web interface, including many policies and
rules, event searches, reports, dashboards, and so on. The system provides many predefined objects that
represent frequently used configurations.
Use the object manager to create and manage objects. Many configurations that use objects also allow you to
create objects on the fly, as needed. You can also use the object manager to:
• View the policies, settings, and other objects where a network, port, VLAN, or URL object is used; see
Viewing Objects and Their Usage, on page 1338.
• Group objects to reference multiple objects with a single configuration; see Object Groups, on page 1339.
• Override object values for selected devices; see Object Overrides, on page 1341.
After you edit an object used in an active policy, you must redeploy the changed configuration for your changes
to take effect. You cannot delete an object that is in use by an active policy.
Note An object is configured on a managed device if, and only if, the object is used in a policy that is assigned to
that device. If you remove an object from all policies assigned to a given device, the object is also removed
from the device configuration on the next deployment, and subsequent changes to the object are not reflected
in the device configuration.
Object Types
The following table lists the objects you can create in the system, and indicates whether each object type can
be grouped or configured to allow overrides.
Interface: no no
• Security Zone
• Interface Group
Tunnel Zone no no
Application Filter no no
Geolocation no no
Time Range no no
Variable Set no no
Sinkhole no no
File List no no
SLA Monitor no no
AS Path no yes
objects created in the current domain, which you can edit. It also displays objects created in ancestor domains,
which you cannot edit, with the exception of security zones and interface groups.
Note Because security zones and interface groups are tied to device interfaces, which you configure at the leaf
level, administrators in descendant domains can view and edit and groups created in ancestor domains.
Subdomain users can add and delete interfaces from ancestor zones and groups, but cannot delete or rename
the zones/groups.
Object names must be unique within the domain hierarchy. The system may identify a conflict with the name
of an object you cannot view in your current domain.
For objects that support grouping, you can group objects in the current domain with objects inherited from
ancestor domains.
Object overrides allow you to define device-specific or domain-specific values for certain types of object,
including network, port, VLAN tag, and URL. In a multidomain deployment, you can define a default value
for an object in an ancestor domain, but allow administrators in descendant domains to add override values
for that object.
Importing Objects
Objects can be imported from a comma-separated values file. Up to 1000 objects can be imported in one
attempt. The contents of the comma-separated values file should follow a specific format. The format is
different for each object type. Only a few types of objects can be imported. See the following table to know
the supported object types and the corresponding rules.
Procedure
Step 3 Choose Import Object from the Add [Object Type] drop-down list.
Note
If you have selected Individual Objects in the previous step, click Import.
Editing Objects
Procedure
Step 8 If you are editing a variable set, and that set is in use by an access control policy, click Yes to confirm that
you want to save your changes.
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Procedure
The Object Usage window displays a list of all the policies, objects, and other settings where the object is in
use. Click any of the listed items to know more about the object usage. For policies and some other settings
where the object is used, you can click the corresponding links to visit the respective UI pages.
Procedure
Step 3 Check the Show Unused Object check box to view the objects and the object groups that are unused anywhere
in the system.
Note
• In case an object is a part of an unused object group, the object is considered as used. However, the
unused object group is displayed when the Show Unused Object check box is checked.
• The Show Unused Object check box is available only for network, port, URL and VLAN tag object
types.
Object Groups
Grouping objects allows you to reference multiple objects with a single configuration. The system allows you
to use objects and object groups interchangeably in the web interface. For example, anywhere you would use
a port object, you can also use a port object group.
You can group network, port, VLAN tag, URL, and PKI objects. Network object groups can be nested, that
is, you can add a network object group to another network object group up to 10 levels.
Objects and object groups of the same type cannot have the same name.
When you edit an object group used in a policy (for example, a network object group used in an access control
policy), you must re-deploy the changed configuration for your changes to take effect.
Deleting a group does not delete the objects in the group, just their association with each other. Additionally,
you cannot delete a group that is in use in an active policy. For example, you cannot delete a VLAN tag group
that you are using in a VLAN condition in a saved access control policy.
Procedure
• Use the filter field Search ( ) to search for existing objects to include, which updates as you type to
display matching items. Click Reload ( ) above the search field or click Clear ( ) in the search field
to clear the search string.
• Click Add ( ) to create objects on the fly if no existing objects meet your needs.
Step 7 Optionally for Network, Port, URL, and VLAN Tag groups:
• Enter a Description.
• Check the Allow Overrides check box to allow overrides for this object group; see Allowing Object
Overrides, on page 1342.
What to do next
• If an active policy references your object group, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Object Overrides
An object override allows you to define an alternate value for an object, which the system uses for the devices
you specify.
You can create an object whose definition works for most devices, and then use overrides to specify
modifications to the object for the few devices that need different definitions. You can also create an object
that needs to be overridden for all devices, but its use allows you to create a single policy for all devices.
Object overrides allow you to create a smaller set of shared policies for use across devices without giving up
the ability to alter policies when needed for individual devices.
For example, you might want to deny ICMP traffic to the different departments in your company, each of
which is connected to a different network. You can do this by defining an access control policy with a rule
that includes a network object called Departmental Network. By allowing overrides for this object, you can
then create overrides on each relevant device that specifies the actual network where that device is connected.
You can target an object override to a specific domain. In this case, the system uses the object override value
for all devices in the targeted domain unless you override it at the device level.
From the object manager, you can choose an object that can be overridden and define a list of device-level or
domain-level overrides for that object.
You can use object overrides with the following object types only:
• Network
• Port
• VLAN tag
• URL
• SLA Monitor
• Prefix List
• Route Map
• Access List
• AS Path
• Community List
• Policy List
• Cert Enrollment (PKI)
• Key Chain
If you can override an object, the Override column appears for the object type in the object manager. Possible
values for this column include:
• Green checkmark — indicates that you can create overrides for the object and no overrides have been
added yet
• Red X — indicates that you cannot create overrides for the object
• Number — represents a count of the overrides that have been added to that object (for example, "2"
indicates two overrides have been added)
Procedure
Procedure
Step 1 In the object editor, check the Allow Overrides check box.
Step 2 Click Save.
What to do next
Add object override values; see Adding Object Overrides, on page 1342.
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
AAA Server
Add reusable AAA server objects.
Procedure
Step 1 Select Objects > Object Management > AAA Server > RADIUS Server Group.
All currently configured RADIUS Server Group objects will be listed. Use the filter to narrow down the list.
Step 2 Choose and edit a listed RADIUS Server Group object, or add a new one.
See RADIUS Server Options, on page 1346 and RADIUS Server Group Options, on page 1344 to configure this
object.
Navigation Path
Objects > Object Management > AAA Server > RADIUS Server Group. Choose and edit a configured
RADIUS Server Group object or add a new one.
Fields
• Name and Description—Enter a name and optionally, a description to identify this RADIUS Server
Group object.
• Group Accounting Mode—The method for sending accounting messages to the RADIUS servers in
the group. Choose Single, accounting messages are sent to a single server in the group, this is the default.
Or, Multiple, accounting messages are sent to all servers in the group simultaneously.
• Retry Interval—The interval between attempts to contact the RADIUS servers. Values range from 1 to
10 seconds.
• Realms(Optional)—Specify or select the Active Directory (AD) realm this RADIUS server group is
associated with. This realm is then selected in identity policies to access the associated RADIUS server
group when determining the VPN authentication identity source for a traffic flow. This realm effectively
provides a bridge from the identity policy to this Radius server group. If no realm is associated with this
RADIUS server group, the RADIUS server group cannot be reached to determine the VPN authentication
identity source for a traffic flow in an identity policy.
Note This field is mandatory if you use remote access VPN with User Identity and
RADIUS as the identity source.
• Enable authorize only—If this RADIUS server group is not being used for authentication, but is being
used for authorization or accounting, check this field to enable authorize-only mode for the RADIUS
server group.
Authorize only mode eliminates the need of including the RADIUS server password in the Access-Request.
Thus, the password, configured for the individual RADIUS servers, is ignored.
• Enable interim account update and Interval—Enables the generation of RADIUS
interim-accounting-update messages in order to inform the RADIUS server of newly assigned IP addresses.
Set the length, in hours, of the interval between periodic accounting updates in the Interval field. The
valid range is 1 to 120 and the default value is 24.
• Enable Dynamic Authorization and Port— Enables the RADIUS dynamic authorization or change of
authorization (CoA) services for this RADIUS server group. Specify the listening port for RADIUS CoA
requests in the Port field. The valid range is 1024 to 65535 and the default value is 1700. Once defined,
the corresponding RADIUS server group will be registered for CoA notification and it listens to the port
for the CoA policy updates from the Cisco Identity Services Engine (ISE).
• Merge Downloadable ACL with Cisco AV Pair ACL—Enables merging a downloadable access control
list (dACL) with a Cisco attribute-value (AV) pair ACL.
A downloadable ACL defines and updates access control lists in CiscoISE and allows ACL download
to all the applicable controllers. For more information about using dACLs in Cisco ISE, see the chapter
on Segmentation, section on authorization policies, in the Cisco ISE Administrator Guide.
A Cisco AV pair ACL can be utilized to define specific authentication, authorization, and accounting
elements for each individual session. For more information about using dACLs in Cisco ISE, see the
chapter on Segmentation, section on authorization profile settings, in the Cisco ISE Administrator Guide.
If you select Merge Downloadable ACL with Cisco AV Pair ACL, you can choose the following
options:
• After Cisco AV Pair ACL means the downloadable ACL entries should be placed after the Cisco
AV pair entries.
• Before Cisco AV Pair ACL means the downloadable ACL entries should be placed before the
Cisco AV pair entries.
Related Topics
Add a RADIUS Server Group, on page 1344
Navigation Path
Objects > Object Management > AAA Server > RADIUS Server Group. Choose and edit a listed RADIUS
Server Group object or add a new one. Then, in the RADIUS Server Group dialog, choose and edit a listed
RADIUS Server or add a new one.
Fields
• IP Address/Hostname—The network object that identifies the hostname or IP address of the RADIUS
server to which authentication requests will be sent. You may only select one, to add additional servers,
add additional RADIUS Server to the RADIUS Server Group list.
Note The device now supports IPv6 IP addresses for RADIUS authentication.
• Authentication Port—The port on which RADIUS authentication and authorization are performed. The
default is 1812.
• Key and Confirm Key— The shared secret that is used to encrypt data between the managed device
(client) and the RADIUS server.
The key is a case-sensitive, alphanumeric string of up to 127 characters. Special characters are permitted.
The key you define in this field must match the key on the RADIUS server. Enter the key again in the
Confirm field.
• Accounting Port—The port on which RADIUS accounting is performed. The default is 1813.
• Timeout— Session timeout for authentication.
Note The timeout value must be 60 seconds or more for RADIUS two factor
authentication. The default timeout value is 10 seconds.
• Connect Using —Establishes connectivity from the device to a RADIUS server using a route lookup or
using a specific interface.
• Click the Routing radio button to use the routing table.
• Click the Specific Interface radio button and choose a security zone/interface group or the
Management interface (the default) from the drop-down list. If you want to use Management, you
must choose it specifically; it is not available when using a route lookup. You cannot specify any
other management-only interface as the RADIUS source. You can also choose a loopback interface
group.
• Redirect ACL—Select the redirect ACL from the list or add a new one.
Note This is the name of the ACL defined in the device to decide the traffic to be
redirected. The Redirect ACL name here must be the same as the redirect-acl
name in ISE server. When you configure the ACL object, ensure that you select
Block action for ISE and DNS servers, and Allow action for the rest of the servers.
Related Topics
Add a RADIUS Server Group, on page 1344
RADIUS Server Group Options, on page 1344
For more information, see Configuring a SAML Single Sign-On Authentication, on page 1645.
Procedure
Step 1 Choose Object > Object Management > AAA Server > Single Sign-on Server.
Step 2 Click Add Single Sign-on Server and provide the following details:
• Allow Overrides—Select this check box to allow overrides for this single sign-on server object.
Related Topics
Configure AAA Settings for Remote Access VPN, on page 1575
Access List
An access list object, also known as an access control list (ACL), selects the traffic to which a service will
apply. You use these objects when configuring particular features, such as route maps, for threat defense
devices. Traffic identified as allowed by the ACL is provided the service, whereas “blocked” traffic is excluded
from the service. Excluding traffic from a service does not necessarily mean that it is dropped altogether.
You can configure the following types of ACL:
• Extended—Identifies traffic based on source and destination address and ports. Supports IPv4 and IPv6
addresses, which you can mix in a given rule.
• Standard—Identifies traffic based on destination address only. Supports IPv4 only.
An ACL is composed of one or more access control entry (ACE), or rule. The order of ACEs is important.
When the ACL is evaluated to determine if a packet matches an “allowed” ACE, the packet is tested against
each ACE in the order in which the entries are listed. After a match is found, no more ACEs are checked. For
example, if you want to “allow” [Link], but “block” the rest of [Link]/24, the allow entry must
come before the block entry. In general, place more specific rules at the top of an ACL.
Packets that do not match an “allow” entry are considered to be blocked.
The following topics explain how to configure ACL objects.
Procedure
Step 1 Select Objects > Object Management and choose Access List > Extended from the table of contents.
Step 2 Do one of the following:
• Click Add Extended Access List to create a new object.
Step 3 In the New Extended Access List Object dialog box, enter a name for the object (no spaces allowed), and
configure the access control entries:
a) Do one of the following:
b) Select the Action, whether to Allow (match) or Block (not match) the traffic criteria.
Note
The Logging, Log Level, and Log Interval options are used for access rules only (ACLs attached to
interfaces or applied globally). Because ACL objects are not used for access rules, leave these values at
their defaults.
c) Configure the source and destination addresses on the Network tab using any of the following techniques:
• Select the desired network objects or groups from the Available list and click Add to Source or Add
to Destination. You can create new objects by clicking the + button above the list. You can mix
IPv4 and IPv6 addresses.
• Type an address in the edit box below the source or destination list and click Add. You can specify
a single host address (such as [Link] or [Link]), or a subnet (in
[Link]/24 or [Link] [Link] format, or for IPv6, [Link]/60).
d) Click the Port tab and configure the service using any of the following techniques.
• Select the desired port objects from the Available list and click Add to Source or Add to Destination.
You can create new objects by clicking the + button above the list. The object can specify TCP/UDP
ports, ICMP/ICMPv6 message types, or other protocols (including “any”). However, the source port,
which you typically would leave empty, accepts TCP/UDP only. You cannot select port groups.
For TCP/UDP, note that you must use the same protocol in both the source and destination fields, if
you specify both. For example, you cannot specify a UDP source port and a TCP destination port.
• Type or select a port or protocol in the edit box below the source or destination list and click Add.
Note
To get an entry that applies to all IP traffic, select a destination port object that specifies “all” protocols.
e) Click the Application tab and choose the applications that are to be grouped for the direct internet access
policy.
Important
• You cannot configure applications for cluster devices. Hence, this tab is not applicable for cluster
devices.
• Use extended ACL with applications only in policy-based routing. Do not use it in other policies as
its behavior is unknown and not supported. Ensure migration of the realm/ISE configuration for
policy-based routing that uses User Identity and SGT in extended ACL.
Note
• The Available Applications list displays a fixed set of pre-defined applications. This list is a subset
of the applications that are available on the Access Control policy as only they can be detected by
their first packet (FQDN end-points resolved to IP addresses and port). The application definitions
are updated through the VDB updates and are pushed to threat defense during subsequent deployments.
• User-defined custom applications or group of applications are not supported.
f) Click the Users tab and choose the users, user groups, or both that are to be classified for the Policy Based
Routing (PBR).
Important
Use extended ACL with users, user groups, or both only for Policy Based Routing. Do not use it in other
policies as its behavior is unknown and not supported.
Note
• The Available Realms list displays the configured active directory/LDAP realms. For information
on creation of realm and managing them, see Create an LDAP Realm or an Active Directory Realm
and Realm Directory, on page 2376 and Manage a Realm, on page 2405 respectively.
Note
Local realms and Azure AD realms are not supported.
• The Available Users list displays the downloaded users and user groups of the selected AD/LDAP
realms. To download the users, user groups, or both, navigate to Integrations > Other Integrations >
Realms, and then click Download against the relevant active directory/LDAP realms.
Note
Threat defense can support a maximum of 512 user groups and 64000 user-IP mappings.
• The user to IP mapping and user group membership information are updated and pushed to the threat
defense from the management center during the user login or logouts, and changes in the group
memberships.
g) Click the Security Group Tag tab and choose the source SGT tags to be classified for the direct internet
access policy.
Important
Use extended ACL with SGTs only for Policy Based Routing. Do not use it in other policies as its behavior
is unknown and not supported.
Note
• The Available Security Group Tags list displays the configured security group tags. You can choose
to use the ISE SGTs or create custom SGTs.
• To use ISE SGTs, ensure that ISE is integrated with management center with Session Directory
Topic and SXP Topic subscribed. For more information on ISE integration, see Ways to Configure
the Cisco Identity Services Engine (Cisco ISE) Identity Source, on page 2461.
Note
The supported ISE versions are 3.2, 3,1, 3.0, and 2.7 patch 2+.
• For information on creating custom SGTs, see Creating Security Group Tag Objects, on page 1372.
Note
• Do not configure destination networks and applications in the extended ACL object.
• The selected applications (Nertwork Service objects) in each of the access control entries, form a
Network Service Group (NSG) and this group is deployed on the threat defense. The NSG is used
in direct internet access to classify traffic based on the match with the selected application group.
Step 4 If you want to allow overrides for this object, check the Allow Overrides check box; see Allowing Object
Overrides, on page 1342.
Step 5 Click Save.
Procedure
3. Click Add.
After you create a service access rule, a sequence number is assigned to the rule. This number determines
the execution order of the rule. You cannot reorder these rules.
Step 5 From the Default Action drop-down list, choose Allow All Countries or Deny All Countries.
Step 6 (Optional) Check the Allow Overrides check box and click + to configure overrides for the service access
object for devices.
Note
When you define an override for a device or a domain, whenever the system configures this object on the
device or domain, it uses the override value instead of the value defined in the original object.
Step 7 (Optional) In the Add Service Access Override dialog box, configure the following parameters:
a) From the Target Devices and Domains drop-down list, choose the required devices or domains for the
override.
b) Verify if you require the existing rules. Otherwise, delete them.
c) Click Add Rule to create service access rules for this object override.
1. Choose an action as Allow or Deny from the drop-down list.
2. From Available Countries, select countries, continents, or user-defined geolocation objects and move
them to the Selected Geolocation list.
3. Click Add.
d) From the Default Action drop-down list, choose Allow All Countries or Deny All Countries.
e) Click Add.
Step 8 Click Save.
What to do next
Configure the Service Access object in the remote access VPN policy. For more information, see Configure
Access Interfaces for Remote Access VPN, on page 1591.
Procedure
Step 1 Select Objects > Object Management and choose Access List > Standard from the table of contents.
Step 2 Do one of the following:
• Click Add Standard Access List to create a new object.
Step 3 In the New Standard Access List Object dialog box, enter a name for the object (no spaces allowed), and
configure the access control entries:
a) Do one of the following:
• Click Add to create a new entry.
Step 4 If you want to allow overrides for this object, check the Allow Overrides check box; see Allowing Object
Overrides, on page 1342.
Step 5 Click Save.
Address Pools
You can configure IP address pools for both IPv4 and IPv6 that can be used for clustering or for VPN remote
access profiles. For clustering in Individual interface mode, you can also configure MAC address pools.
Procedure
Application Filters
System-provided application filters help you perform application control by organizing applications according
to basic characteristics: type, risk, business relevance, category, and tags. In the object manager, you can
create and manage reuseable user-defined application filters based on combinations of the system-provided
filters, or on custom combinations of applications. For detailed information, see Application Rule Conditions,
on page 929.
AS Path
An AS Path is a mandatory attribute to set up BGP. It is a sequence of AS numbers through which a network
can be accessed. An AS-PATH is a sequence of intermediate AS numbers between source and destination
routers that form a directed route for packets to travel. Neighboring autonomous systems (ASes ) use BGP to
exchange and update messages about how to reach different AS prefixes. After each router makes a new local
decision on the best route to a destination, it will send that route, or path information, along with the
accompanying distance metrics and path attributes, to each of its peers. As this information travels through
the network, each router along the path prepends its unique AS number to a list of ASes in the BGP message.
This list is the route's AS-PATH. An AS-PATH along with an AS prefix, provides a specific handle for a
one-way transit route through the network. Use the Configure AS Path page to create, copy and edit autonomous
system (AS) path policy objects. You can create AS path objects to use when you are configuring route maps,
policy maps, or BGP Neighbor Filtering. An AS path filter allows you to filter the routing update message
by using regular expressions.
You can use this object with threat defense devices.
Procedure
Step 1 Select Objects > Object Management and choose AS Path from the table of contents.
Step 2 Click Add AS Path.
Step 3 Enter a name for the AS Path object in the Name field. Valid values are between 1 and 500.
Step 4 Click Add on the New AS Path Object window.
a) Select the Allow or Block options from the Action drop-down list to indicate redistribution access.
b) Specify the regular expression that defines the AS path filter in the Regular Expression field.
c) Click Add.
Step 5 If you want to allow overrides for this object, check the Allow Overrides check box; see Allowing Object
Overrides, on page 1342.
Step 6 Click Save.
BFD Template
The BFD template specifies a set of BFD interval values. BFD interval values as configured in the BFD
template are not specific to a single interface. You can also configure authentication for single-hop and
multi-hop sessions. Echo mode is disabled by default. You can enable Echo mode on single-hop only.
Procedure
If the Echo function is not negotiated, BFD control packets are sent at a high rate to meet the detection time.
If the Echo function is negotiated, BFD control packets are sent at a slower, negotiated rate and self-directed
echo packets are sent at a high rate. We recommend that you use Echo mode, if possible.
Note Although you can use cipher suites in the web interface in the same places as cipher suite lists, you cannot
add, modify, or delete cipher suites.
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Community List
A Community is an optional transitive BGP attribute. A community is a group of destinations that share some
common attribute. It is used for route tagging. The BGP community attribute is a numerical value that can be
assigned to a specific prefix and advertised to other neighbors. Communities can be used to mark a set of
prefixes that share a common attribute. Upstream providers can use these markers to apply a common routing
policy such as filtering or assigning a specific local preference or modifying other attributes. Use the Configure
Community Lists page to create, copy and edit community list policy objects. You can create community list
objects to use when you are configuring route maps or policy maps. You can use community lists to create
groups of communities to use in a match clause of a route map. The community list is an ordered list of
matching statements. Destinations are matched against the rules until a match is found.
You can use this object with threat defense devices.
Procedure
Step 1 Select Objects > Object Management and choose Community List from the table of contents.
Step 2 Click Add Community List.
Step 3 In the Name field, specify a name for the community list object.
Step 4 Click Add on the New Community List Object window.
Step 5 Select the Standard radio button to indicate the community rule type.
Standard community lists are used to specify well-known communities and community numbers.
Note
You cannot have entries using Standard and entries using Expanded community rule types in the same
Community List object.
a) Select the Allow or Block options from the Action drop-down list to indicate redistribution access.
b) In the Communities field, specify a community number. Valid values can be from 1 to 4294967295 or
from 0:1 to 65534:65535.
c) Select the appropriate Route Type.
• Internet — Select to specify the Internet well-known community. Routes with this community are
advertised to all peers (internal and external).
• No Advertise — Select to specify the no-advertise well-known community. Routes with this
community are not advertised to any peer (internal or external).
• No Export — Select to specify the no-export well-known community. Routes with this community
are advertised to only peers in the same autonomous system or to only other sub-autonomous systems
within a confederation. These routes are not advertised to external peers.
Step 6 Select the Expanded radio button to indicate the community rule type.
Expanded community lists are used to filter communities using a regular expression. Regular expressions are
used to specify patterns to match COMMUNITIES attributes.
a) Select the Allow or Block options from the Action drop-down list to indicate redistribution access.
b) Specify the regular expression in the Expressions field.
Step 7 Click Add.
Step 8 If you want to allow overrides for this object, check the Allow Overrides check box; see Allowing Object
Overrides, on page 1342.
Step 9 Click Save.
Extended Community
An extended community is a larger group of destinations that share some common attribute. The BGP extended
community list has attributes that can be used to mark a set of prefixes that share a common attribute. These
markers are used in the match clause of a route map to filter the routes for implementing route leaks among
virtual routers. You can also define policy list objects with the extended community list for filtering. The
extended community list is an ordered list of matching statements. Routes are matched against the rules until
a match is found with the specified route target (standard) or regular expression (expanded). Use the Extended
Community page to create and edit extended community list policy objects.
Note The extended community lists are applicable only for configuring import or export of routes.
Procedure
Step 1 Select Objects > Object Management and choose Community List > Extended Community from the table
of contents.
Step 2 Click Add Extended Community List.
Step 3 In the Name field, specify a name for the extended community list object. The length of the name cannot
exceed 80 characters.
Step 4 Select the extended community rule type:
• Click the Standard radio button to specify one or more route targets.
• Click the Expanded radio button to specify regular expressions.
Note
You cannot have entries using Standard and Expanded extended community rule type in the same Extended
Community List object.
Step 7 If you have selected Expanded as the extended community rule type, specify the following:
a) In the Sequence No field, enter the order in which you want the rule to be executed.
The sequence number must be unique in the list.
b) From the Action drop-down list, if you want to permit routes that have matching regular expression that
is specified here, select Allow; if you want to deny routes that have matching regular expression that is
specified here, select Block.
c) Specify the regular expression in the Expressions field.
• You can add a single route target or a set of route targets separated by a space in a single entry. For
example, ^((16) | (18)):(.)$.
Step 8 If you want to allow overrides for this object, check the Allow Overrides check box; see Allowing Object
Overrides, on page 1342.
Step 9 Click Save.
The extended community list can be referenced in the match clause of the Route Map object or Policy List
object:
• In the Route Map object, the name of the extended community list is displayed in the Add Route Map
Entry > Match Clause > BGP > Community List > Add Extended Community List dialog. For more
details on configuring BGP settings in a route map, see Route Map, on page 1405.
• In the Policy List object, the name of the extended community list is displayed in the Add Policy List >
Community Rule > Add Extended Community List dialog. For more details on configuring BGP
settings in a policy list, see Policy List, on page 1401.
Distinguished Name
Each distinguished name object represents the distinguished name for a public key certificate’s subject or
issuer. You can use distinguished name objects and groups in TLS/SSL rules to control encrypted traffic based
on whether the client and server negotiated the TLS/SSL session using a server certificate with the distinguished
name as subject or issuer.
(A distinguished name group is a named collection of existing distinguished name objects.)
The distinguished name can consist of country code, common name, organization, and organizational unit,
but typically consists of a common name only. For example, the common name in the certificate for
[Link] is [Link]. (However, it's not always this simple; Distinguished Name (DN) Rule
Conditions, on page 2273 shows how to find common names.) The certificate can contain multiple Subject
Alternative Names (SANs) you can use as DNs in a rule condition. For detailed information about SANs, see
RFC 5280, section [Link].
The format of a distinguished name object that references a common name is CN=name. If you add a DN rule
condition without CN=, the system prepends CN= before saving the object.
As discussed further in Distinguished Name (DN) Rule Conditions, on page 2273, the system uses Server Name
Indication (SNI) to match the DN in the TLS/SSL rule whenever possible.
You can also add a distinguished name with one of each of the attributes listed in the following table, separated
by commas.
Wildcard examples
You can define one or more asterisks (*) as wildcards in an attribute. In a common name attribute, you can
define one or more asterisks per domain name label. wildcards match only in that label, but you can define
multiple labels with wildcards. See the following table for examples.
Note The DN object CN=[Link] would not match a CN like CN=[Link], which is why we
recommend wildcards in these cases.
For more information and examples, see Distinguished Name (DN) Rule Conditions, on page 2273.
Related Topics
Distinguished Name (DN) Rule Conditions, on page 2273
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Procedure
Step 6 The default Timeout and Retries values are pre-populated. Change these values if necessary.
• Retries—The number of times, from 0 to 10, to retry the list of DNS servers when the system does not
receive a response. The default is 2.
• Timeout—The number of seconds, from 1 to 30, to wait before trying the next DNS server. The default
is 2 seconds. Each time the system retries the list of servers, this timeout doubles.
Step 7 Enter the DNS Servers that will be a part of this group, either in IPv4 or IPv6 format as comma separated
entries.
A maximum of 6 DNS servers can belong to one group.
What to do next
The DNS servers configured in the DNS server group should be assigned to interface objects in the DNS
platform settings. For more information, see DNS, on page 939.
External Attributes
Dynamic Objects
A dynamic object is an object that specifies one or many IP addresses retrieved either using REST API calls
or using the Cisco Secure Dynamic Attributes Connector, which is capable of updating IP addresses from
cloud sources. These dynamic objects can be used in access control rules without the need to deploy dynamic
changes to the objects.
Note Unlike most other objects, dynamic objects do not have to be deployed to managed devices to take effect.
Just add dynamic objects to the Dyamic Attributes tab of the rule and then deploy the rule; the object values
are automatically updated on the managed device as soon as possible after being pushed by the Cisco Secure
Dynamic Attributes Connector.
For more information about API-created dynamic objects, see About API-Created Dynamic Objects, on
page 1370.
• If you clicked the FMC with Integrated CSDAC method, Start takes you to Objects > Object
Management > External Attributes > Dynamic Object where you can enable and configure the
Cisco Secure Dynamic Attributes Connector.
For more information, see Enable the Cisco Secure Dynamic Attributes Connector, on page 1785.
• If you clicked the FMC with CSDAC embedded in Security Cloud Control method, Start starts
Cisco Security Cloud Control.
For more information, see the guide titled Managing Firewall Threat Defense with Cloud-delivered
Firewall Management Center in Firewall in Security Cloud Control .
• If you clicked the FMC with On-Prem CSDAC method, Start enables you to download the Cisco
Secure Dynamic Attributes Connector if you have not done so already.
For more information, see the Cisco Secure Dynamic Attributes Connector Configuration Guide.
Create Dynamic Objects with the Embedded Cisco Secure Dynamic Attributes Connector
The following page is displayed if you indicated you're configuring the Cisco Secure Dynamic Attributes
Connector provided with this Secure Firewall Management Center. This Secure Firewall Management Center
already has the Cisco Secure Dynamic Attributes Connector integrated with it (Integration > Dynamic
Attributes Connector).
4. View your dynamic objects at Objects > Object Management > External Attributes > Dynamic
Object.
5. Use dynamic objects in access control rules (Policies > Access Control heading > Access Control, then
click the Dynamic Attributes tab).
The preceding diagram has details about configuring Cisco Security Cloud Control that are not discussed in
this guide. For more detailed information, see Secure Device Connector (SDC) or SecureX and Security Cloud
Control.
To use this type of deployment:
1. Configure connectors, which retrieve IP addresses from cloud services.
For more information, see Create a Connector, on page 1794.
2. Configure dynamic attributes filters, which determine what IP addresses to send to the management center.
For more information, see Create Dynamic Attributes Filters, on page 1819.
3. Configure adapters, which send IP addresses to a Secure Firewall Management Center or Cloud-delivered
Firewall Management Center.
For more information, see the section on creating adapters in the Managing Firewall Threat Defense with
Cloud-Delivered Firewall Management Center in Cisco Security Cloud Control.
4. Log in to the Secure Firewall Management Center you defined as an adapter.
If the Secure Firewall Management Center is managed by Cisco Security Cloud Control, click and choose
Cloud-Delivered FMC.
5. View your dynamic objects at Objects > Object Management > External Attributes > Dynamic
Object.
6. Use dynamic objects in access control rules (Policies > Access Control heading > Access Control, then
click the Dynamic Attributes tab).
Create Dynamic Objects with the On-Premises Cisco Secure Dynamic Attributes Connector
The following page is displayed if you indicated you're configuring the on-premises Cisco Secure Dynamic
Attributes Connector to send dynamic objects to a Secure Firewall Management Center or Cloud-delivered
Firewall Management Center.
For more information, see the Cisco Secure Dynamic Attributes Connector Configuration Guide.
This page displays information about each dynamic object and enables you to view or download IP addresses
associated with that object. For more information, see Dynamic Object Mappings, on page 1370.
IP addresses are added dynamically with time so you should consider doing this on a regular basis, especially
if your access control rules are not behaving as expected.
Related topics
• About API-Created Dynamic Objects, on page 1370
• About the Cisco Secure Dynamic Attributes Connector, on page 1781
• Dynamic objects created using the dynamic attributes connector are pushed to the management center
as soon as they're created and are updated at a regular interval.
• API-created dynamic objects:
• Are IP addresses, with or without or classless inter-domain routing (CIDR), that can be used in
access control rules much like a network object.
• Do not support fully-qualified domain names or address ranges.
• Must be updated using an API.
Related Topics
Add or Edit an API-Created Dynamic Object, on page 1371
Note This procedure is not necessary if you use the Cisco Secure Dynamic Attributes Connector because it
automatically creates dynamic objects for you.
Procedure
What to do next
If necessary, update the dynamic object using the API. Deployment is not required.
Related Topics
Autotransition from Custom SGTs to ISE SGTs
Custom SGT Conditions
ISE SGT vs Custom SGT Rule Conditions
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
File List
If you use malware defense, and the AMP cloud incorrectly identifies a file’s disposition, you can add the file
to a file list to better detect the file in the future. These files are specified using SHA-256 hash values. Each
file list can contain up to 10000 unique SHA-256 values.
There are two predefined categories of file lists:
Clean List
If you add a file to this list, the system treats it as if the AMP cloud assigned a clean disposition.
Custom Detection List
If you add a file to this list, the system treats it as if the AMP cloud assigned a malware disposition.
Because you manually specify the blocking behavior for the files included in these lists, the system does not
query the AMP cloud for these files’ dispositions. You must configure a rule in the file policy with either a
Malware Cloud Lookup or Block Malware action and a matching file type to calculate a file’s SHA value.
Caution Do not include malware on the clean list. The clean list overrides both the AMP cloud and the custom detection
list.
Procedure
Step 4 Choose Enter SHA Value from the Add by drop-down list.
Step 5 Enter a description of the source file in the Description field.
Step 6 Enter or paste the file’s entire value in the SHA-256 field. The system does not support matching partial
values.
Step 7 Click Add.
Step 8 Click Save.
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Note After configuration changes are deployed, the system no longer queries the AMP cloud for files on the list.
Procedure
If View ( ) appears instead, the object belongs to an ancestor domain, or you do not have permission to
modify the object.
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Note After you deploy configuration changes, the system no longer queries the AMP cloud for files on the list.
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Note After you deploy the policies, the system no longer queries the AMP cloud for files on the list.
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Note After configuration changes are deployed, the system no longer queries the AMP cloud for files on the list.
Procedure
Step 4 Next to the source file you want to download, click View ( ).
Step 5 Click Download SHA List and follow the prompts to save the source file.
Step 6 Click Close.
FlexConfig
Use FlexConfig policy objects in FlexConfig policies to provide customized configuration of features on
threat defense devices that you cannot otherwise configure using Secure Firewall Management Center. For
more information on FlexConfig policies, see FlexConfig Policy Overview, on page 2617.
You can configure the following types of objects for FlexConfig.
Text Objects
Text objects define free-form text strings that you use as variables in a FlexConfig object. These objects
can have single values or be a list of multiple values.
There are several predefined text objects that are used in the predefined FlexConfig objects. If you use
the associated FlexConfig object, you simply need to edit the contents of the text object to customize
how the FlexConfig object configures a given device. When editing a predefined object, it is in general
a better option to create device overrides for each device you are configuring, rather than directly change
the default values of these objects. This helps avoid unintended consequences if another user wants to
use the same FlexConfig object for a different set of devices.
For information on configuring text objects, see Configure FlexConfig Text Objects, on page 2644.
FlexConfig Objects
FlexConfig Objects include device configuration commands, variables, and scripting language instructions.
During configuration deployment, these instructions are processed to create a sequence of configuration
commands with customized parameters to configure specific features on the target devices.
These instructions are either configured before (prepended) the system configures features defined in
regular management center policies and settings, or after (appended). Any FlexConfig that depends on
Secure Firewall Management Center-configured objects (for example, a network object) must be appended
to the configuration deployment, or the needed objects would not be configured before the FlexConfig
needed to refer to the objects.
For more information on configuring FlexConfig objects, see Configure FlexConfig Objects, on page
2640.
Geolocation
Each geolocation object you configure represents one or more countries or continents that the system has
identified as the source or destination of traffic on your monitored network. You can use geolocation objects
in various places in the system’s web interface, including access control policies, SSL policies, remote access
VPN, and event searches. For example, you could write an access control rule that blocks traffic to or from
certain countries.
To ensure that you are using up-to-date information to filter your network traffic, Cisco strongly recommends
that you regularly update your Geolocation Database (GeoDB).
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Interface
Each interface can be assigned to a security zone and/or interface group. You then apply your security policy
based on zones or groups. For example, you can assign the "inside" interface to the "inside" zone; and the
"outside" interface to the "outside" zone. You can configure your access control policy to enable traffic to go
from inside to outside, but not from outside to inside, for example. Some policies only support security zones,
while other policies support zones and groups.
For more information about interface objects, see Security Zones and Interface Groups, on page 765.
To add interface objects, see Create Security Zone and Interface Group Objects, on page 767.
Key Chain
To enhance data security and protection of devices, rotating keys for authenticating IGP peers that have a
duration of 180 days or less is introduced. The rotating keys prevent any malicious user from guessing the
keys used for routing protocol authentication and thereby protecting the network from advertising incorrect
routes and redirecting traffic. Changing the keys frequently reduces the risk of them eventually being guessed.
When configuring authentication for routing protocols that provide key chains, configure the keys in a key
chain to have overlapping lifetimes. This helps to prevent loss of key-secured communication due to absence
of an active key. The rotating keys are applicable only for OSPFv2 protocol. If the key lifetime expires and
no active keys are found, OSPF uses the last valid key to maintain the adjacency with peers.
Lifetime of a Key
To maintain stable communications, each device stores key chain authentication keys and uses more than one
key for a feature at the same time. Based on the send and accept lifetimes of a key, key chain management
provides a secured mechanism to handle key rollover. The device uses the lifetimes of keys to determine
which keys in a key chain are active.
Each key in a key chain has two lifetimes:
• Accept lifetime—The time interval within which the device accepts the key during key exchange with
another device.
• Send lifetime—The time interval within which the device sends the key during key exchange with another
device.
During a key send lifetime, the device sends routing update packets with the key. The device does not accept
communication from other devices when the key sent is not within the accept lifetime of the key on the device.
If lifetimes are not configured then it is equivalent to configuring MD5 authentication key without timelines.
Key Selection
• When key chain has more than one valid key, OSPF selects the key that has the maximum life time.
• Key having an infinite lifetime is preferred.
• If keys have the same lifetime, then key with the higher key ID is preferred.
Procedure
Step 7 The Algorithm field and the Crypto Encryption Type field displays the supported algorithm and the
encryption type, namely MD5 and Plain Text respectively.
Step 8 Enter the password in the Crypto Key String field, and re-enter the password in the Confirm Crypto Key
String field.
• The password can be of a maximum length of 80 characters.
• The passwords cannot be a single digit nor those starting with a digit followed by a white space. For
example, "0 pass" or "1" are invalid.
Step 9 To set the time interval for a device to accept/send the key during key exchange with another device, provide
the lifetime values in the Accept Lifetime and Send Lifetime fields:
Note
The Date Time values default to UTC timezones.
The end time can be the duration, the absolute time when the accept/send lifetime ends, or never expires. The
default end time is DateTime.
Following are the validation rules for the start and end values:
• Start lifetime cannot be null when the end lifetime is specified.
• The start lifetime for accept or send lifetime must be earlier than the respective end lifetime.
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Network
A network object represents one or more IP addresses. You can use network objects and groups in various
places, including access control policies, network variables, identity rules, network discovery rules, event
searches, reports, identity policies, and so on.
When you configure an option that requires a network object, the list is automatically filtered to show only
those objects that are valid for the option. For example, some options require host objects, while other options
require subnets.
A network object can be one of the following types:
Host
A single IP address.
IPv4 example:
[Link]
IPv6 example:
[Link] or [Link]
Range
A range of IP addresses.
IPv4 example:
[Link]-[Link]
IPv6 example:
[Link]-[Link]
Network
An address block, also known as a subnet.
IPv4 example:
[Link]/27
IPv6 example:
[Link]/60
FQDN
A single fully-qualified domain name (FQDN). You can limit FQDN resolution to IPv4 address only,
IPv6 address only, or both IPv4 and IPv6 addresses. FQDNs must begin and end with a digit or letter.
Only letters, digits, and hyphens are allowed as internal characters in an FQDN.
For example:
[Link]
Note You can use FQDN objects in access control rules and prefilter rules, or manual NAT rules, only. The
rules match the IP address obtained for the FQDN through a DNS lookup. To use an FQDN network
object, ensure you have configured the DNS server settings in DNS Server Group, on page 1364 and the
DNS platform settings in DNS, on page 939.
You cannot use FDQN network objects in identity rules.
Group
A group of network objects or other network object groups. You can create nested groups by adding one
network object group to another network object group. You can nest up to 10 levels of groups.
Note You can add up to 100 network literals in a network object. Additionally, each nested network object
group can contain a maximum of 100 network literals.
[Link]/8 No Network
[Link]/[Link] No Network
Note Network wildcard object and object group, which contains network wildcard objects, are allowed only while
configuring the following policies:
• Prefilter policy
• Access control policy
• NAT policy
Procedure
Step 8 (FQDN objects only) Select the DNS resolution from the Lookup drop-down menu to determine whether
you want the IPv4, IPv6, or both IPv4 and IPv6 addresses associated with the FQDN.
Step 9 Manage overrides for the object:
• If you want to allow overrides for this object, check the Allow Overrides check box; see Allowing Object
Overrides, on page 1342.
• If you want to add override values to this object, expand the Override section and click Add; see Adding
Object Overrides, on page 1342.
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
PKI
PKI Objects for SSL Application
PKI objects represent the public key certificates and paired private keys required to support your deployment.
Internal and trusted CA objects consist of certificate authority (CA) certificates; internal CA objects also
contain the private key paired with the certificate. Internal and external certificate objects consist of server
certificates; internal certificate objects also contain the private key paired with the certificate.
If you use trusted certificate authority objects and internal certificate objects to configure a connection to
ISE/ISE-PIC, you can use ISE/ISE-PIC as an identity source.
If you use internal certificate objects to configure captive portal, the system can authenticate the identity of
your captive portal device when connecting to users' web browsers.
If you use trusted certificate authority objects to configure realms, you can configure secure connections to
LDAP or AD servers.
If you use PKI objects in SSL rules, you can match traffic encrypted with:
• the certificate in an external certificate object
• a certificate either signed by the CA in a trusted CA object, or within the CA’s chain of trust
You can manually input certificate and key information, upload a file containing that information, or in some
cases, generate a new CA certificate and private key.
When you view a list of PKI objects in the object manager, the system displays the certificate’s Subject
distinguished name as the object value. Hover your pointer over the value to view the full certificate Subject
distinguished name. To view other certificate details, edit the PKI object.
Note The management center and managed devices encrypt all private keys stored in internal CA objects and internal
certificate objects with a randomly generated key before saving them. If you upload private keys that are
password protected, the appliance decrypts the key using the user-supplied password, then reencrypts it with
the randomly generated key before saving it.
The certificate enrollment object may also includes certificate revocation information. For more information
on PKI, digital certificates, and certificate enrollment see PKI Infrastructure and Digital Certificates , on page
1485.
Note If you reference an internal CA object in a Decrypt - Resign SSL rule and the rule matches an encrypted
session, the user’s browser may warn that the certificate is not trusted while negotiating the SSL handshake.
To avoid this, add the internal CA object certificate to either the client or domain list of trusted root certificates.
After you create an internal CA object containing a signed certificate, you can download the CA certificate
and private key. The system encrypts downloaded certificates and private keys with a user-provided password.
Whether system-generated or user-created, you can modify the internal CA object name, but cannot modify
other object properties.
You cannot delete an internal CA object that is in use. Additionally, after you edit an internal CA object used
in an SSL policy, the associated access control policy goes out-of-date. You must re-deploy the access control
policy for your changes to take effect.
If the private key file is password-protected, you can supply the decryption password. If the certificate and
key are encoded in the PEM format, you can also copy and paste the information.
You can upload only files that contain proper certificate or key information, and that are paired with each
other. The system validates the pair before saving the object.
Note If you configure a rule with the Decrypt - Resign action, the rule matches traffic based on the referenced
internal CA certificate’s encryption algorithm type, in addition to any configured rule conditions. You must
upload an elliptic curve-based CA certificate to decrypt outgoing traffic encrypted with an elliptic curve-based
algorithm, for example.
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Procedure
You can only reference an internal CA object in an SSL rule if it contains a signed certificate.
Procedure
What to do next
• You must upload a signed certificate issued by a CA as described in Uploading a Signed Certificate
Issued in Response to a CSR, on page 1387
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
The system encrypts the private key stored in an internal CA object with a randomly generated key before
saving it to disk. If you download a certificate and private key from an internal CA object, the system first
decrypts the information before creating a file containing the certificate and private key information. You
must then provide a password the system uses to encrypt the downloaded file.
Caution Private keys downloaded as part of a system backup are decrypted, then stored in the unencrypted backup
file.
Procedure
After you create the trusted CA object, you can modify the name and add certificate revocation lists (CRL),
but cannot modify other object properties. There is no limit on the number of CRLs you can add to an object.
If you want to modify a CRL you have uploaded to an object, you must delete the object and recreate it.
Note Adding a CRL to an object has no effect when the object is used in your ISE/ISE-PIC integration configuration.
You cannot delete a trusted CA object that is in use. Additionally, after you edit a trusted CA object that is in
use, the associated access control policy goes out-of-date. You must re-deploy the access control policy for
your changes to take effect.
Trusted CA Object
You can configure an external CA object by uploading an X.509 v3 CA certificate. You can upload a file
encoded in one of the following supported formats:
• Distinguished Encoding Rules (DER)
• Privacy-enhanced Electronic Mail (PEM)
If the file is password-protected, you must supply the decryption password. If the certificate is encoded in the
PEM format, you can also copy and paste the information.
You can upload a CA certificate only if the file contains proper certificate information; the system validates
the certificate before saving the object.
Procedure
Step 6 If the file is password-protected, check the Encrypted, and the password is: check box, and enter the
password.
Step 7 Click Save.
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
After you add the CRL, you can view the list of revoked certificates. If you want to modify a CRL you have
uploaded to an object, you must delete the object and recreate it.
You can upload only files that contain a proper CRL. There is no limit to the number of CRLs you can add
to a trusted CA object. However, you must save the object each time you upload a CRL, before adding another
CRL.
Note Adding a CRL to an object has no effect when the object is used in your ISE/ISE-PIC integration configuration.
Note Adding a CRL to an object has no effect when the object is used in your ISE/ISE-PIC integration configuration.
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
You can upload only files that contains proper server certificate information; the system validates the file
before saving the object. If the certificate is encoded in the PEM format, you can also copy and paste the
information.
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
You can configure an internal certificate object by uploading an X.509 v3 RSA-based or elliptic curve-based
server certificate and paired private key. You can upload a file in one of the following supported formats:
• Distinguished Encoding Rules (DER)
• Privacy-enhanced Electronic Mail (PEM)
If the file is password-protected, you must supply the decryption password. If the certificate and key are
encoded in the PEM format, you can also copy and paste the information.
You can upload only files that contain proper certificate or key information, and that are paired with each
other. The system validates the pair before saving the object.
After you create the internal certificate object, you can modify the name, but cannot modify other object
properties.
You cannot delete an internal certificate object that is in use. Additionally, after you edit an internal certificate
object that is in use, the associated access control policy goes out-of-date. You must re-deploy the access
control policy for your changes to take effect.
Procedure
• The Override column indicates whether the object allows overrides (a green check mark) or not (a red
X). If a number is displayed, it is the number of overrides in place.
Use the Override option to customize the object settings for each device that is part of the VPN
configuration. Overriding makes each device's trustpoint details unique. Typically the Common Name
or Subject is overridden for each device in the VPN configuration.
See Object Overrides, on page 1341 for details and procedures on overriding objects of any type.
• Edit a previously created certificate enrollment object by clicking on the edit icon (a pencil). Editing
can only be done if the enrollment object is not associated with any managed devices. Refer to the adding
instructions for editing a certificate enrollment object. Failed enrollment objects can be edited.
• Delete a previously created certificate enrollment object by clicking on the delete icon (a trash can). You
cannot delete a certificate enrollment object if it is associated with any managed device.
Press ( )Add Cert Enrollment to open the Add Cert Enrollment dialog and configure a Certificate
Enrollment Object, see Adding Certificate Enrollment Objects, on page 1394. Then install the certificate on
each managed, headend device.
Related Topics
Installing a Certificate Using Self-Signed Enrollment , on page 1469
Installing a Certificate using EST Enrollment, on page 1470
Installing a Certificate Using SCEP Enrollment, on page 1471
Installing a Certificate Using Manual Enrollment, on page 1471
Installing a Certificate Using a PKCS12 File, on page 1472
Procedure
Step 2 Enter the Name, and optionally, a Description of this enrollment object.
When enrollment is complete, this name is the name of the trustpoint on the managed devices with which it
is associated.
Step 3 Open the CA Information tab and choose the Enrollment Type.
• Self-Signed Certificate—The managed device, acting as a CA, generates its own self-signed root
certificate. No other information is needed in this pane.
Note
When enrolling a self-signed certificate you must specify the Common Name (CN) in the certificate
parameters.
• EST—Enrollment over Secure Transport protocol. Specify the EST information. See Certificate Enrollment
Object EST Options, on page 1396.
• SCEP—(Default) Simple Certificate Enrollment Protocol. Specify the SCEP information. See Certificate
Enrollment Object SCEP Options, on page 1397.
• Manual
• CA Only—Check this check box to create only the CA certificate from the selected CA. An identity
certificate will not be created for this certificate.
If you do not select this check box, a CA certificate is not mandatory. You can generate the CSR
without having a CA certificate and obtain the identity certificate.
• CA Certificate—Paste the CA certificate in the PEM format in the box. You can also obtain a CA
certificate by copying it from another device.
You can leave this box empty if you choose to generate a CSR without the CA certificate.
• PKCS12 File—Import a PKCS12 file on a threat defense managed device that supports VPN connectivity.
A PKCS#12, or PFX, file holds a server certificate, intermediate certificates, and a private key in one
encrypted file. Enter the Passphrase value for decryption.
• Skip Check for CA flag in basic constraints of the CA Certificate—Check this check box if you want
to skip checking the basic constraints extension and the CA flag in a trustpoint certificate.
• Validation Usage—Choose from the options to validate the certificate during a VPN connection:
• IPsec Client—Validate an IPsec client certificate for a site-to-site VPN connection.
• SSL Client—Validate an SSL client certificate during a remote access VPN connection attempt.
• SSL Server—Select to validate an SSL server certificate, like as a Cisco Umbrella server certificate.
Step 4 (Optional) Open the Certificate Parameters tab and specify the certificate contents. See Certificate Enrollment
Object Certificate Parameters, on page 1398.
This information is placed in the certificate and is readable by any party who receives the certificate from the
router.
Step 5 (Optional) Open the Key tab and specify the Key information. See Certificate Enrollment Object Key Options,
on page 1399.
Step 6 (Optional) Click the Revocation tab, and specify the revocation options: See Certificate Enrollment Object
Revocation Options, on page 1400.
Step 7 Allow Overrides of this object if desired.
Whenever you modify the PKCS12 certificate enrollment object to permit overrides, you must update the
Passphrase for the certificate on the device where it is overridden.
See Object Overrides, on page 1341 for a full description of object overrides.
What to do next
Associate and install the enrollment object on a device to create a trustpoint on that device.
Related Topics
Installing a Certificate Using Self-Signed Enrollment , on page 1469
Installing a Certificate using EST Enrollment, on page 1470
Installing a Certificate Using SCEP Enrollment, on page 1471
Installing a Certificate Using Manual Enrollment, on page 1471
Installing a Certificate Using a PKCS12 File, on page 1472
Procedure
Objects > Object Management, then from the navigation pane choose PKI > Cert Enrollment. Click ( )
Add Cert Enrollment to open the Add Cert Enrollment dialog, and select the CA Information tab.
Fields
Enrollment Type—set to EST.
Enrollment URL—The URL of the CA server to which devices should attempt to enroll.
Use an HTTPS URL in the form of [Link] where CA_name is the host DNS name or IP
address of the CA server. The port number is mandatory.
Username—The username to access the CA server.
Password / Confirm Password—The password to access the CA server.
Fingerprint—When retrieving the CA certificate using EST, you may enter the fingerprint for the CA server.
Using the fingerprint to verify the authenticity of the CA server’s certificate helps prevent an unauthorized
party from substituting a fake certificate in place of the real one. Enter the Fingerprint for the CA server in
hexadecimal format. If the value you enter does not match the fingerprint on the certificate, the certificate is
rejected. Obtain the CA’s fingerprint by contacting the server directly.
Source Interface—The interface that interacts with the CA server. By default, the diagnostic interface is
displayed. To configure a data interface as the source interface, choose the respective security zone or interface
group object.
Ignore EST Server Certificate Validations—The EST server certificate validation is done by default. Check
the check box if you want to ignore threat defense validating EST server certificate.
Objects > Object Management, then from the navigation pane choose PKI > Cert Enrollment. Click ( )
Add Cert Enrollment to open the Add Cert Enrollment dialog, and select the CA Information tab.
Fields
Enrollment Type—set to SCEP.
Enrollment URL—The URL of the CA server to which devices should attempt to enroll.
Use an HTTP URL in the form of [Link] where CA_name is the host DNS name or
IP address of the CA server. The port number is mandatory.
Note If the SCEP Server is referred with hostname/FQDN, configure DNS Server using FlexConfig object.
If the CA cgi-bin script location at the CA is not the default (/cgi-bin/[Link]), you must also include
the nonstandard script location in the URL, in the form of [Link] where
script_location is the full path to the CA scripts.
Challenge Password / Confirm Password—The password used by the CA server to validate the identity of
the device. You can obtain the password by contacting the CA server directly or by entering the following
address in a web browser: [Link] The password is
good for 60 minutes from the time you obtain it from the CA server. Therefore, it is important that you deploy
the password as soon as possible after you create it.
Retry Period—The interval between certificate request attempts, in minutes. Value can be 1 to 60 minutes.
The default is 1 minute.
Retry Count—The number of retries that should be made if no certificate is issued upon the first request.
Value can be 1 to 100. The default is 10.
CA Certificate Source—Specify how the CA certificate will be obtained.
• Retrieve Using SCEP (Default, and only supported option)—Retrieve the certificate from the CA server
using the Simple Certificate Enrollment Process (SCEP). Using SCEP requires a connection between
your device and the CA server. Ensure there is a route from your device to the CA server before beginning
the enrollment process.
Fingerprint—When retrieving the CA certificate using SCEP, you may enter the fingerprint for the CA
server. Using the fingerprint to verify the authenticity of the CA server’s certificate helps prevent an
unauthorized party from substituting a fake certificate in place of the real one. Enter the Fingerprint for the
CA server in hexadecimal format. If the value you enter does not match the fingerprint on the certificate, the
certificate is rejected. Obtain the CA’s fingerprint by contacting the server directly, or by entering the following
address in a web browser: [Link]
Objects > Object Management, then from the navigation pane choose PKI > Cert Enrollment. Press ( )
Add Cert Enrollment to open the Add Cert Enrollment dialog, and select the Certificate Parameters tab.
Fields
Enter all information using the standard LDAP X.500 format.
• Include FQDN—Whether to include the device’s fully qualified domain name (FQDN) in the certificate
request. Choices are:
• Use Device Hostname as FQDN
• Don't use FQDN in certificate
• Custom FQDN—Select this and then specify it in the Custom FQDN field that displays.
• Include Device's IP Address—The interface whose IP address is included in the certificate request.
• Common Name (CN)—The X.500 common name to include in the certificate.
Note When enrolling a self-signed certificate you must specify the Common Name
(CN) in the certificate parameters.
• Organization Unit (OU)—The name of the organization unit (for example, a department name) to
include in the certificate.
• Organization (O)—The organization or company name to include in the certificate.
• Locality (L)—The locality to include in the certificate.
• State (ST)—The state or province to include in the certificate.
• County Code (C)—The country to include in the certificate. These codes conform to ISO 3166 country
abbreviations, for example "US" for the United States of America.
• Email (E)—The email address to include in the certificate.
• Include Device's Serial Number—Whether to include the serial number of the device in the certificate.
The CA uses the serial number to either authenticate certificates or to later associate a certificate with a
particular device. If you are in doubt, include the serial number, as it is useful for debugging purposes.
Objects > Object Management, then from the navigation pane choose PKI > Cert Enrollment. Press ( )
Add Cert Enrollment to open the Add Cert Enrollment dialog, and select the Key tab.
Fields
• Key Type—RSA, ECDSA, EdDSA.
Note • For EST enrollment type, do not select EdDSA key as it is not supported.
• EdDSA is supported only in Site-to-Site VPN topologies.
• EdDSA is not supported as an identity certificate for the Remote Access
VPN.
• Key Name—If the key pair you want to associate with the certificate already exists, this field specifies
the name of that key pair. If the key pair does not exist, this field specifies the name to assign to the key
pair that will be generated during enrollment. If you do not specify a name, the fully qualified domain
name (FQDN) key pair is used instead.
• Key Size—If the key pair does not exist, defines the desired key size (modulus), in bits. The recommended
size is 2048 bits. The larger the modulus size, the more secure the key. However, keys with larger modulus
sizes take longer to generate (a minute or more when larger than 512 bits) and longer to process when
exchanged.
Important • On management center and threat defense Versions 7.0 and higher, you
cannot enroll certificates with RSA key sizes smaller than 2048 bits and
keys using SHA-1 with the RSA Encryption algorithm. However, you can
use PKI Enrollment of Certificates with Weak-Crypto to allow certificates
that use SHA-1 with RSA Encryption algorithm and smaller key size.
• You cannot generate RSA keys with sizes smaller than 2048 bits for threat
defense 7.0, even when you enable the weak-crypto option.
• Advanced Settings—Select Ignore IPsec Key Usage if you do not want to validate values in the key
usage and extended key usage extensions of IPsec remote client certificates. You can suppress key usage
checking on IPsec client certificates. By default this option is not enabled.
Note For site-to-site VPN connection, if you use a Windows Certificate Authority
(CA), the default Application Policies extension is IP security IKE intermediate.
If you are using this default setting, you must select the Ignore IPsec Key Usage
option for the object you select. Otherwise, the endpoints cannot complete the
site-to-site VPN connection.
Note Threat Defense 7.0 or higher does not support generating RSA keys with sizes smaller than 2048 bits even
when you permit weak-crypto.
To enable weak-crypto on the device, navigate to the Devices > Certificates page. Click the Enable
Weak-Crypto( ) button provided against the threat defense device. When the weak-crypto option is enabled,
the button changes to . By default, the weak-crypto option is disabled.
Note When a certificate enrollment fails due to weak cipher usage, the management center displays a warning
message prompting you to enable the weak-crypto option. Similarly, when you turn on the enable weak-crypto
button, the management center displays a warning message before enabling weak-crypto configuration on the
device.
Objects > Object Management, then from the navigation pane choose PKI > Cert Enrollment. Press ( )
Add Cert Enrollment to open the Add Cert Enrollment dialog, and select the Revocation tab.
Fields
• Enable Certificate Revocation Lists—Check to enable CRL checking.
• Use CRL distribution point from the certificate—Check to obtain the revocation lists distribution
URL from the certificate.
• Use static URL configured—Check this to add a static, pre-defined distribution URL for revocation
lists. Then add the URLs.
CRL Server URLs—The URL of the LDAP server from which the CRL can be downloaded.
URLs must start with [Link] Include a port number in the URL. Enclose IPv6 addresses in
square brackets, for example: [Link]
Policy List
Use the Configure Policy List page to create, copy, and edit policy list policy objects. You can create policy
list objects to use when you are configuring route maps. When a policy list is referenced within a route map,
all of the match statements within the policy list are evaluated and processed. Two or more policy lists can
be configured with a route map. A policy list can also coexist with any other preexisting match and set
statements that are configured within the same route map but outside of the policy list. When multiple policy
lists perform matching within a route map entry, all policy lists match on the incoming attribute only.
You can use this object with threat defense devices.
Procedure
Step 1 Select Objects > Object Management and choose Policy List from the table of contents.
Step 2 Click Add Policy List.
Step 3 Enter a name for the policy list object in the Name field. Object names are not case-sensitive.
Step 4 Select whether to allow or block access for matching conditions from the Action drop-down list.
Step 5 Click the Interface tab to distribute routes that have their next hop out of one of the interfaces specified.
In the Zones/Interfaces list, add the zones that contain the interfaces through which the device communicates
with the management station. For interfaces not in a zone, you can type the interface name into the field below
the Selected Zone/Interface list and click Add. The host will be configured on a device only if the device
includes the selected interfaces or zones.
Step 6 Click the Address tab to redistribute any routes that have a destination address that is permitted by a standard
access list or prefix list.
Choose whether to use an Access List or Prefix List for matching and then enter or select the Standard Access
List Objects or Prefix list objects you want to use for matching.
Step 7 Click the Next Hop tab to redistribute any routes that have a next hop router address passed by one of the
access lists or prefix lists specified.
Choose whether to use an Access List or Prefix List for matching and then enter or select the Standard Access
List Objects or Prefix list objects you want to use for matching.
Step 8 Click the Route Source tab to redistribute routes that have been advertised by routers and access servers at
the address specified by the access lists or prefix list.
Choose whether to use an Access List or Prefix List for matching and then enter or select the Standard Access
List Objects or Prefix list objects you want to use for matching.
Step 9 Click the AS Path tab to match a BGP autonomous system path. If you specify more than one AS path, then
the route can match either AS path.
Step 10 Click the Community Rule tab to enable matching of the BGP community or extended community with the
specified community list objects or the extended community list objects respectively. If you specify more
than one rule, the routes are verified against the rules until a matching permit or deny is met.
a) To specify a community list to the rule, click Edit ( ) given in the Selected Community List field. The
community lists appear under Available Community List. Select the required list, click Add, and then
click Ok.
To enable matching the BGP community exactly with the specified community, check the Match the
specified community exactly check box.
b) To add the extended community list, click Edit ( ) given in the Selected Extended Community List
field. The extended community lists appear under the Available Extended Community List. Select the
required list, click Add, and then click Ok.
Note
The extended community lists are applicable only for configuring import or export of routes.
Step 11 Click the Metric & tag tab to match the metric and security group tag of a route.
a) Enter the metric values to use for matching in the Metric field. You can enter multiple values separated
by commas. This setting allows you to match any routes that have a specified metric. The metric values
can range from 0 to 4294967295.
b) Enter the tag values to use for matching in the Tag field. You can enter multiple values separated by
commas. This setting allows you to match any routes that have a specified security group tag. The tag
values can range from 0 to 4294967295.
Step 12 If you want to allow overrides for this object, check the Allow Overrides check box; see Allowing Object
Overrides, on page 1342.
Step 13 Click Save.
Port
Port objects represent different protocols in slightly different ways:
TCP and UDP
A port object represents the transport layer protocol, with the protocol number in parentheses, plus an
optional associated port or port range. For example: TCP(6)/22.
ICMP and ICMPv6 (IPv6-ICMP)
A port object represents the Internet layer protocol plus an optional type and code. For example:
ICMP(1):3:3.
You can restrict an ICMP or IPV6-ICMP port object by type and, if applicable, code. For more information
on ICMP types and codes, see:
• [Link]
• [Link]
Other
A port object can represent other protocols that do not use ports.
The system provides default port objects for well-known ports. You cannot modify or delete these default
objects. You can create custom port objects in addition to the default objects.
You can use port objects and groups in various places in the system’s web interface, including access control
policies, identity rules, network discovery rules, port variables, and event searches. For example, if your
organization uses a custom client that uses a specific range of ports and causes the system to generate excessive
and misleading events, you can configure your network discovery policy to exclude monitoring those ports.
When using port objects, observe the following guidelines:
• You cannot add any protocol other than TCP or UDP for source port conditions in access control rules.
Also, you cannot mix transport protocols when setting both source and destination port conditions in a
rule.
• If you add an unsupported protocol to a port object group used in a source port condition, the rule where
it is used does not take affect on the managed device when the configuration is deployed.
• If you create a port object containing both TCP and UDP ports, then add it as a source port condition in
a rule, you cannot add a destination port, and vice versa.
Procedure
• If you want to add override values to this object, expand the Override section and click Add; see Adding
Object Overrides, on page 1342.
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Prefix List
You can create prefix list objects for IPv4 and IPv6 to use when you are configuring route maps, policy maps,
OSPF Filtering, or BGP Neighbor Filtering.
Procedure
Step 1 Select Objects > Object Management and choose Prefix Lists > IPv6 Prefix List from the table of contents.
Step 2 Click Add Prefix List.
Step 3 Enter a name for the prefix list object in the Name field on the New Prefix List Object window.
Step 4 Click Add on the New Prefix List Object window.
Step 5 Select the appropriate action, Allow or Block from the Action drop-down list, to indicate the redistribution
access.
Step 6 Enter a unique number that indicates the position a new prefix list entry will have in the list of prefix list
entries already configured for this object, in the Sequence No. field. If left blank, the sequence number will
default to five more than the largest sequence number currently in use.
Step 7 Specify the IPv6 address in the IP address/mask length format in the IP address field. The mask length must
be a valid value between 1-128.
Step 8 Enter the minimum prefix length in the Minimum Prefix Length field. The value must be greater than the
mask length and less than or equal to the Maximum Prefix Length, if specified.
Step 9 Enter the maximum prefix length in the Maximum Prefix Length field. The value must be greater than or
equal to the Minimum Prefix Length, if present, or greater than the mask length if the Minimum Prefix Length
is not specified.
Procedure
Step 1 Select Objects > Object Management and choose Prefix Lists > IPv4 Prefix List from the table of contents.
Step 2 Click Add Prefix List.
Step 3 Enter a name for the prefix list object in the Name field on the New Prefix List Object window.
Step 4 Click Add.
Step 5 Select the appropriate action, Allow or Block from the Action drop-down list, to indicate the redistribution
access.
Step 6 Enter a unique number that indicates the position a new prefix list entry will have in the list of prefix list
entries already configured for this object, in the Sequence No. field. If left blank, the sequence number will
default to five more than the largest sequence number currently in use.
Step 7 Specify the IPv4 address in the IP address/mask length format in the IP address field. The mask length must
be a valid value between 1- 32.
Step 8 Enter the minimum prefix length in the Minimum Prefix Length field. The value must be greater than the
mask length and less than or equal to the Maximum Prefix Length, if specified.
Step 9 Enter the maximum prefix length in the Maximum Prefix Length field. The value must be greater than or
equal to the Minimum Prefix Length, if present, or greater than the mask length if the Minimum Prefix Length
is not specified.
Step 10 Click Add.
Step 11 If you want to allow overrides for this object, check the Allow Overrides check box; see Allowing Object
Overrides, on page 1342.
Step 12 Click Save.
Route Map
Route maps are used when redistributing routes into any routing process. They are also used when generating
a default route into routing process. A route map defines which of the routes from the specified routing protocol
are allowed to be redistributed into the target routing process. Configure a route map, to create a new route
map entry for a Route Map object or to edit an existing one.
Note The extended community lists are applicable only for configuring import or export
of routes.
Procedure
Step 1 Select Objects > Object Management and choose Route Map from the table of contents.
Step 2 Click Add Route Map.
Step 3 Click Add on the New Route Map Object window.
Step 4 In the Sequence No. field, enter a number, from 0 through 65535, that indicates the position a new route map
entry has in the list of route maps entries already configured for this route map object.
Note
We recommend that you number clauses in intervals of at least 10 to reserve numbering space in case you
want to insert clauses in the future.
Step 5 Select the appropriate action, Allow or Block, from the Redistribution drop-down list, to indicate the
redistribution access.
Step 6 Click the Match Clauses tab to match (routes/traffic) based on the following criteria, which you select in the
table of contents:
• Security Zones —Match traffic based on the (ingress/egress) interfaces. You can select zones and add
them, or type in interface names and add them.
• IPv4 — Match IPv4 (routes/traffic) based on the following criteria; select the tab to define the criteria.
a. Click the Address tab to match routes based on the route address. For IPv4 addresses, choose whether
to use an Access list or Prefix list for matching from the drop-down list and then enter or select the
ACL objects or Prefix list objects you want to use for matching.
b. Click the Next Hop tab to match routes based on the next hop address of a route. For IPv4 addresses,
choose whether to use an access list or Prefix list for matching from the drop-down list and then
enter or select the ACL objects or Prefix list objects you want to use for matching.
c. Click the Route Source tab to match routes based on the advertising source address of the route. For
IPv4 addresses, choose whether to use an access list or Prefix list for matching from the drop-down
list and then enter or select the ACL objects or Prefix list objects you want to use for matching.
• IPv6 —Match IPv6 (routes/traffic) based on the route address, next-hop address or advertising source
address of route.
• BGP —Match BGP (routes/traffic) based on the following criteria; select the tab to define the criteria.
a. Click the AS Path tab to enable matching the BGP autonomous system path access list with the
specified path access list. If you specify more than one path access list, then the route can match
either path access list.
b. Click the Community List tab to enable matching of the BGP community or extended community
with the specified community list objects or the extended community list objects respectively.
• To specify a community list to the rule, click Edit ( ) given in the Selected Community List
field. The community lists appears under Available Community List. Select the required list,
click Add, and then click Ok. For information on how to create community list objects, see
Community List, on page 1358
• To add the extended community list, click Edit ( ) given in the Selected Extended Community
List field. The extended community lists appears under the Available Extended Community
List. Select the required list, click Add, and then click Ok. For information on how to create
extended community list objects, see Extended Community, on page 1359.
To enable matching the BGP community exactly with the specified community list objects, check
the Match the specified community exactly check box. This option is not applicable for the extended
community list.
Note
If you specify more than one rule, the routes are verified against the rules until a matching permit or
deny condition is met. Any route that does not match at least one Match community will not be
advertised for outbound route maps.
c. Click the Policy List tab to configure a route map to evaluate and process a BGP policy. When
multiple policy lists perform matching within a route map entry, all policy lists match on the incoming
attribute only.
Step 7 Click the Set Clauses tab to set routes/traffic based on the following criteria, which you select in the table of
contents:
• Metric Values—Set either Bandwidth, all of the values or none of the values.
a. Enter a metric value or bandwidth in Kbits per second in the Bandwidth field. Valid values are an
integer value in the range from 0 to 4294967295.
b. Select to specify the type of metric for the destination routing protocol, from the Metric Type
drop-down list. Valid values are : internal, type-1, or type-2.
• BGP Clauses —Set BGP routes based on the following criteria; select the tab to define the criteria.
a. Click the AS Path tab to modify an autonomous system path for BGP routes.
1. Enter an AS path number in the Prepend AS Path field to prepend an arbitrary autonomous
system path string to BGP routes. Usually the local AS number is prepended multiple times,
increasing the autonomous system path length. If you specify more than one AS path number
then the route can prepend either AS number.
2. Enter an AS path number in the Prepend Last AS to AS Path field to prepend the AS path with
the last AS number. Enter a value for the AS number from 1 to 10.
3. Check the Convert route tag into AS path check box to convert the tag of a route into an
autonomous system path.
Under Specific Extended Community, in the Route Target field, enter the route target number in
ASN:nn format:
• You can enter values that ranges from 1:1 to 65534:65535.
You can add a single route target or a set of route targets separated by commas in a single entry.
For example, 1:2,1:4,1:6.
• You can have a maximum of 8 route targets in an entry.
• You cannot have redundant route target entries across route maps.
2. Enter a preference value for the autonomous system path in the Set Local Preference field. Enter
a value between 0 and 4294967295.
3. Enter a BGP weight for the routing table in the Set Weight field. Enter a value between 0 and
65535.
4. Select to specify the BGP origin code. Valid values are Local IGP Local IGP and Incomplete.
5. In the IPv4 Settings section, specify a next hop IPv4 address of the next hop to which packets
are output. It need not be an adjacent router. If you specify more than one IPv4 address then the
packets can output at either IP address.
Select to specify an IPv4 prefix list in the Prefix List drop-down list.
6. In the IPv6 Settings section, specify a next hop IPv6 address of the next hop to which packets
are output. It need not be an adjacent router. If you specify more than one IPv6 address, then the
packets can output at any of the IP addresses.
Select to specify an IPv6 prefix in the Prefix List drop-down list.
Security Intelligence
Security Intelligence functionality requires the IPS license (for threat defense devices) or the Protection license
(all other device types).
Security Intelligence lists and feeds are collections of IP addresses, domain names, and URLs that you can
use to quickly filter traffic that matches an entry on a list or feed.
• A list is a static collection that you manage manually.
• A feed is a dynamic collection that updates on an interval over HTTP or HTTPS.
System-Provided Feeds
Cisco provides the following feeds as Security Intelligence objects:
• Security Intelligence feeds updated regularly with the latest threat intelligence from Talos:
• Cisco-DNS-and-URL-Intelligence-Feed (under DNS Lists and Feeds)
You cannot delete the system-provided feeds, but you can change the frequency of (or disable) their
updates.
• Cisco-TID-Feed (under Network Lists and Feeds)
This feed is not used in the Security Intelligence tab of the access control policy.
Instead, you must enable and configure Secure Firewall threat intelligence director to use this feed, which
is a collection of TID observables data.
Use this object to set how frequently this data is published to TID elements.
For more information, see Secure Firewall Threat Intelligence Director, on page 2665.
Predefined Lists: Global Block Lists and Global Do Not Block Lists
The system ships with predefined global Block lists and Do Not Block lists for domains (DNS), IP addresses
(Networks), and URLs.
These lists are empty until you populate them. To build these lists, see Global and Domain Security Intelligence
Lists, on page 1411.
By default, access control and DNS policies use these lists as part of Security Intelligence.
Custom Feeds
You can use third-party feeds, or use a custom internal feed to easily maintain an enterprise-wide Block list
in a large deployment with multiple Secure Firewall Management Center appliances.
See Custom Security Intelligence Feeds, on page 1417.
Custom Lists
Custom lists can augment and fine-tune feeds and the Global lists.
See Custom Security Intelligence Lists, on page 1418.
Custom Block and Do Not Block Upload new and replacement lists No
lists using the object manager.
Note These options apply to Security Intelligence only. Security Intelligence cannot block traffic that has already
been fastpathed. Similarly, adding an item to a Security Intelligence Do Not Block list does not automatically
trust or fastpath matching traffic. For more information, see About Security Intelligence, on page 1863.
Domain Lists
In addition to being able to access (but not edit) the Global lists, each subdomain has its own named lists, the
contents of which apply only to that subdomain. For example, a subdomain named Company A owns:
• Domain Block list - Company A and Domain Do Not Block list - Company A
• Domain Block list for DNS - Company A, Domain Do Not Block list for DNS - Company A
• Domain Block list for URL - Company A, Domain Do Not Block list for URL - Company A
Any administrator at or above the current domain can populate these lists. You can use the context menu to
add an item to the Block or Do Not Block list in the current and all descendant domains. However, only an
administrator in the associated domain can remove an item from a Domain list.
For example, a Global administrator could choose to add the same IP address to the Block list in the Global
domain and Company A’s domain, but not add it to the Block list in Company B’s domain. This action would
add the same IP address to:
• Global Block list (where it can be removed only by Global administrators)
• Domain Block list - Company A (where it can be removed only by Company A administrators)
Note Descendant Domain lists do not appear in the object manager because they are symbolic aggregations, not
hand-populated lists. They appear where you can use them: in access control and DNS policies.
If appropriate, verify that these lists are used in the policies in which you expect them to be used.
Procedure
Step 1 Navigate to an event that includes an IP address, domain, or URL that you want to always block using Security
Intelligence, or exempt from Security Intelligence blocking.
Step 2 Right-click the IP address, domain, or URL and choose the appropriate option:
Domain of a URL in the URL field Add Domain to Global Block List for URL
Add Domain to Global Do-Not-Block List for URL
Domain in the DNS Query field Add Domain to Global Block List for DNS
Add Domain to Global Do-Not-Block List for DNS
What to do next
You do NOT need to redeploy for these changes to take effect.
If you want to delete an item from a list, see Delete Entries from Global Security Intelligence Lists, on page
1413.
Note To add entries to these lists, see Add Entries to Global Security Intelligence Lists, on page 1412.
Procedure
Step 4 Click the pencil beside the Global Block or Global Do-Not-Block list.
Step 5 Click the trash button beside the entry to delete.
Procedure
Tip The number of entries you can include is limited by the maximum size of the file. For example, a URL list
with no comments and an average URL length of 100 characters (including Punycode or percent Unicode
representations and newlines) can contain more than 5.24 million entries.
In a DNS list entry, you can specify an asterisk (*) wildcard character for a domain label. All labels match
the wildcard. For example, an entry of [Link].* matches both [Link] and [Link].
If you add comment lines within the source file, they must start with the pound (#) character. If you upload
a source file with comments, the system removes your comments during upload. Source files you download
contain all your entries without your comments.
Feed Requirements
When you configure a feed, you specify its location using a URL; the URL cannot be Punycode-encoded.
For feed update intervals of 30 minutes or less, you must specify an MD5 URL. This prevents frequent
downloads of unchanged feeds. If your feed server does not provide an MD5 URL, you must use a download
interval of at least 30 minutes.
If you use an MD5 checksum, the checksum must be stored in a simple text file with only the checksum.
Comments are not supported.
Example: When the following URL feed —[Link], [Link].*, org, edu,
[Link].* is added to the global Block List, the following contents are blocked:[Link]
[Link] [Link] [Link] [Link] and [Link]
You can also include an entire URL path, such as
[Link]
Note You can create a custom URL, Network, and DNS feeds, wherein, you can add
the username and password inside the URL itself, for example:
[Link]
However, if your password contain special characters such as a colon (:) or an at
sign (@), the transmission would fail. Ensure that your password does not have
any special characters. Alternatively, you could use an encoded password in the
URL.
Invalid examples:
• example*.com
• [Link]/*
• IP addresses (IPv4)
For IPv6 addresses, or to use ranges or CIDR notation, use the Security Intelligence Network object.
You can include one or more wildcards representing an octet, for example 10.10.10.* or 10.10.*.*.
Note You cannot add address blocks to Block or Do Not Block lists using a /0 netmask in a Security Intelligence
feed. If you want to monitor or block all traffic targeted by a policy, use an access control rule with the Monitor
or Block rule action, respectively, and a default value of any for the Source Networks and Destination
Networks.
You also can configure the system to use an MD5 checksum to determine whether to download an updated
feed. If the checksum has not changed since the last time the system downloaded the feed, the system does
not need to re-download it. You may want to use MD5 checksums for internal feeds, especially if they are
large.
Note The system does not perform peer SSL certificate verification when downloading custom feeds, nor does the
system support the use of certificate bundles or self-signed certificates to verify the remote peer.
If you want strict control over when the system updates a feed from the Internet, you can disable automatic
updates for that feed. However, automatic updates ensure the most up-to-date, relevant data.
Manually updating Security Intelligence feeds updates all feeds, including the Intelligence Feeds.
See complete requirements at Custom Lists and Feeds: Requirements, on page 1415.
Procedure
This is used to determine whether the feed contents have changed since the last update, so the system does
not download unchanged feeds.
MD5 URL is required for update intervals shorter than 30 minutes.
If your feed server does not provide an MD5 URL, you must choose an interval of at least 30 minutes.
Procedure
After the Secure Firewall Management Center downloads and verifies the feed updates, it communicates any
changes to its managed devices. Your deployment begins filtering traffic using the updated feeds.
Note You cannot add address blocks to a Block or Do Not Block list using a /0 netmask in a Security Intelligence
list. If you want to monitor or block all traffic targeted by a policy, use an access control rule with the Monitor
or Block rule action, respectively, and a default value of any for the Source Networks and Destination
Networks.
• Unicode in domain names must be encoded in Punycode format, and are case insensitive.
• Characters in domain names are case-insensitive.
• Unicode in URLs should be encoded in percent-encoding format.
• Characters in URL subdirectories are case-sensitive.
• List entries that start with the pound sign (#) are treated as comments.
• See additional formatting requirements at Custom Lists and Feeds: Requirements, on page 1415.
Uploading New Security Intelligence Lists to the Secure Firewall Management Center
To modify a Security Intelligence list, you must make your changes to the source file and upload a new copy.
You cannot modify the file’s contents using the web interface. If you do not have access to the source file,
download a copy from the system.
Procedure
What to do next
You do not need to redeploy these changes to take effect. If you want to delete an entry from the list, see
Delete Entries from Global Security Intelligence Lists, on page 1413.
Procedure
Step 4 If you need a copy of the list to edit, click Download, then follow your browser’s prompts to save the list as
a text file.
Step 5 Make changes to the list as necessary.
Step 6 On the Security Intelligence pop-up window, click Browse to browse to the modified list, then click Upload.
Step 7 Click Save.
What to do next
You do not need to redeploy these changes to take effect. If you want to delete an entry from the list, see
Delete Entries from Global Security Intelligence Lists, on page 1413.
Sinkhole
A sinkhole object represents either a DNS server that gives non-routable addresses for all domain names
within the sinkhole, or an IP address that does not resolve to a server. You can reference the sinkhole object
within a DNS policy rule to redirect matching traffic to the sinkhole. You must assign the object both an IPv4
address and an IPv6 address.
Procedure
• If you want to redirect traffic to a non-resolving IP address, choose Block and Log Connections to
Sinkhole.
Step 7 If you want to assign an Indication of Compromise (IoC) type to your sinkhole, choose one from the Type
drop-down.
Step 8 Click Save.
SLA Monitor
Each Internet Protocol Service Level Agreement (SLA) monitor defines a connectivity policy to a monitored
address and tracks the availability of a route to the address. The route is periodically checked for availability
by sending ICMP echo requests and waiting for the response. If the requests time out, the route is removed
from the routing table and replaced with a backup route. SLA monitoring jobs start immediately after
deployment and continue to run unless you remove the SLA monitor from the device configuration (that is,
they do not age out). The Internet Protocol Service Level Agreement (SLA) Monitor Object is used in the
Route Tracking field of an IPv4 Static Route Policy. IPv6 routes do not have the option to use SLA monitor
via route tracking.
You can use these objects with threat defense devices.
Procedure
Step 1 Select Objects > Object Management and choose SLA Monitor from the table of contents.
Step 2 Click Add SLA Monitor.
Step 3 Enter a name for the object in the Name field.
Step 4 (Optional) Enter a description for the object in the Description field.
Step 5 Enter the frequency of ICMP echo request transmissions, in seconds, in the Frequency field. Valid values
range from 1 to 604800 seconds (7 days). The default is 60 seconds.
Note
The frequency cannot be less than the timeout value; you must convert frequency to milliseconds to compare
the values.
Step 6 Enter the ID number of the SLA operation in the SLA Monitor ID field. Values range from 1 to 2147483647.
You can create a maximum of 2000 SLA operations on a device. Each ID number must be unique to the policy
and the device configuration.
Step 7 Enter the amount of time that must pass after an ICMP echo request before a rising threshold is declared, in
milliseconds, in the Threshold field. Valid values range from 0 to 2147483647 milliseconds. The default is
5000 milliseconds. The threshold value is used only to indicate events that exceed the defined value. You can
use these events to evaluate the proper timeout value. It is not a direct indicator of the reachability of the
monitored address.
Note
The threshold value should not exceed the timeout value.
Step 8 Enter the amount of time that the SLA operation waits for a response to the ICMP echo requests, in milliseconds,
in the Timeout field. Values range from 0 to 604800000 milliseconds (7 days). The default is 5000 milliseconds.
If a response is not received from the monitored address within the amount of time defined in this field, the
static route is removed from the routing table and replaced by the backup route.
Note
The timeout value cannot exceed the frequency value (adjust the frequency value to milliseconds to compare
the numbers).
Step 9 Enter the size of the ICMP request packet payload, in bytes, in the Data Size field. Values range from 0 to
16384 bytes. The default is 28 bytes, which creates a total ICMP packet of 64 bytes. Do not set this value
higher than the maximum allowed by the protocol or the Path Maximum Transmission Unit (PMTU). For
purposes of reachability, you might need to increase the default data size to detect PMTU changes between
the source and the target. A low PMTU can affect session performance and, if detected, might indicate that
the secondary path should be used.
Step 10 Enter a value for type of service (ToS) defined in the IP header of the ICMP request packet in the ToS field.
Values range from 0 to 255. The default is 0. This field contains information such as delay, precedence,
reliability, and so on. It can be used by other devices on the network for policy routing and features such as
committed access rate.
Step 11 Enter the number of packets that are sent in the Number of Packets field. Values range from 1 to 100. The
default is 1 packet.
Note
Increase the default number of packets if you are concerned that packet loss might falsely cause the Secure
Firewall Threat Defense device to believe that the monitored address cannot be reached.
Step 12 Enter the IP address that is being monitored for availability by the SLA operation, in the Monitored Address
field.
Step 13 The Available Zones list displays both zones and interface groups. In the Zones/Interfaces list, add the zones
or interface groups that contain the interfaces through which the device communicates with the management
station. To specify a single interface, you need to create a zone or the interface groups for the interface; see
Create Security Zone and Interface Group Objects, on page 767. The host will be configured on a device only
if the device includes the selected interfaces or zones.
Step 14 Click Save.
Time Range
Use time range objects to define time periods that you will use to determine when rules apply.
Note Time-based ACLs is supported in Snort 3 also from management center 7.0 onwards.
Note The timezone represents the device's local time and is used ONLY for applying the time ranges in rules in
the policies that support the time ranges. The timezone does not change the configured time of the device. To
verify the configuration, in the threat defense CLI, use the show time-range timezone and show time
commands (see the Cisco Secure Firewall Threat Defense Command Reference guide). In addition, the
timezone of a chassis overrides the management center timezone.
Procedure
What to do next
Configure time ranges in any of the following:
In a VPN group policy object, specify the time range object using the Access Hours field. For details, see
Configure Group Policy Objects, on page 1445 and Group Policy Advanced Options, on page 1451.
Time Zone
To specify a local time zone for a managed device, create a time zone object and specify it in the device
platform settings policy assigned to the device.
This device local time is used ONLY for applying time ranges in rules in policies that support time ranges,
such as access control, prefilter, and VPN Group policies. If you do not assign a time zone to a device, UTC
is used by default when applying time ranges in these policies. No other functionality in the system uses the
time zone specified in a time zone object.
Time zone objects are supported only for threat defense devices.
Note Time-based ACLs is supported in Snort 3 also from management center 7.0 onwards.
Tunnel Zone
A tunnel zone represents certain types of plaintext, passthrough tunnels that you explicitly tag for special
analysis. A tunnel zone is not an interface object, even though you can use it as an interface constraint in some
configurations.
For detailed information, see Tunnel Zones and Prefiltering, on page 1906.
URL
Important For best practices for using this and similar options in Security Intelligence configurations and for URL rules
in access control and QoS policies, see Manual URL Filtering Options, on page 1850.
A URL object defines a single URL or IP address, whereas a URL group object can define more than one
URL or address. You can use URL objects and groups in various places in the system’s web interface, including
access control policies and event searches.
When creating URL objects, keep the following points in mind:
• If you do not include a path (that is, there are no / characters in the URL), the match is based on the
server’s hostname only. If you include one or more / character, the entire URL string is used for a substring
match. Then, a URL is considered a match if any of the following are true:
• The string is at the beginning of the URL.
• The string follows a dot.
• The string contains a dot in the beginning.
• The string follows the :// characters.
Note We recommend that you do not use manual URL filtering to block or allow
individual web pages or parts of sites (that is, URL strings with / characters), as
servers can be reorganized and pages moved to new paths.
• The system disregards the encryption protocol (HTTP vs HTTPS). In other words, if you block a website,
both HTTP and HTTPS traffic to that website is blocked, unless you use an application condition to
target a specific protocol. When creating a URL object, you do not need to specify the protocol when
creating an object. For example, use [Link] rather than [Link]
• If you plan to use a URL object to match HTTPS traffic in an access control rule, create the object using
the subject common name in the public key certificate used to encrypt the traffic. Also, the system
disregards subdomains within the subject common name, so do not include subdomain information. For
example, use [Link] rather than [Link].
However, please understand that the subject common name in the certificate might be completely unrelated
to a web site’s domain name. For example, the subject common name in the certificate for [Link]
is *.[Link] (this of course might change at any time). You will get more consistent results if you
use the SSL Decryption policy to decrypt HTTPS traffic so that URL filtering rules work on decrypted
traffic.
Note URL objects will not match HTTPS traffic if the browser resumes a TLS session
because the certificate information is no longer available. Thus, even if you
carefully configure the URL object, you might get inconsistent results for HTTPS
connections.
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Variable Set
Variables represent values commonly used in intrusion rules to identify source and destination IP addresses
and ports. You can also use variables in intrusion policies to represent IP addresses in rule suppressions,
adaptive profile updates, and dynamic rule states.
Tip Preprocessor rules can trigger events regardless of the hosts defined by network variables used in intrusion
rules.
You use variable sets to manage, customize, and group your variables. You can use the default variable set
provided by the system or create your own custom sets. Within any set you can modify predefined default
variables and add and modify user-defined variables.
Most of the shared object rules and standard text rules that the system provides use predefined default variables
to define networks and port numbers. For example, the majority of the rules use the variable $HOME_NET to
specify the protected network and the variable $EXTERNAL_NET to specify the unprotected (or outside) network.
In addition, specialized rules often use other predefined variables. For example, rules that detect exploits
against web servers use the $HTTP_SERVERS and $HTTP_PORTS variables.
Rules are more effective when variables more accurately reflect your network environment. At a minimum,
you should modify default variables in the default set. By ensuring that a variable such as $HOME_NET correctly
defines your network and $HTTP_SERVERS includes all web servers on your network, processing is optimized
and all relevant systems are monitored for suspicious activity.
To use your variables, you link variable sets to intrusion policies associated with access control rules or with
the default action of an access control policy. By default, the default variable set is linked to all intrusion
policies used by access control policies.
Adding a variable to any set adds it to all sets; that is, each variable set is a collection of all variables currently
configured on your system. Within any variable set, you can add user-defined variables and customize the
value of any variable.
Initially, the system provides a single, default variable set comprised of predefined default values. Each
variable in the default set is initially set to its default value, which for a predefined variable is the value set
by the Talos Intelligence Group and provided in rule updates.
Although you can leave predefined default variables configured to their default values, Cisco recommends
that you modify a subset of predefined variables.
You could work with variables only in the default set, but in many cases you can benefit most by adding one
or more custom sets, configuring different variable values in different sets, and perhaps even adding new
variables.
When using multiple sets, it is important to remember that the current value of any variable in the default set
determines the default value of the variable in all other sets.
When you select Variable Sets on the Object Manager page, the object manager lists the default variable set
and any custom sets you created.
On a freshly installed system, the default variable set is comprised only of the default variables predefined
by Cisco.
Each variable set includes the default variables provided by the system and all custom variables you have
added from any variable set. Note that you can edit the default set, but you cannot rename or delete the default
set.
Caution Importing an access control or an intrusion policy overwrites existing default variables in the default variable
set with the imported default variables. If your existing default variable set contains a custom variable not
present in the imported default variable set, the unique variable is preserved.
Related Topics
Managing Variables, on page 1438
Managing Variable Sets, on page 1437
Variables
Variables belong to one of the following categories:
Default Variables
Variables provided by the system. You cannot rename or delete a default variable, and you cannot change
its default value. However, you can create a customized version of a default variable.
Customized Variables
Variables you create. These variables can include:
• customized default variables
When you edit the value for a default variable, the system moves the variable from the Default
Variables area to the Customized Variables area. Because variable values in the default set determine
the default values of variables in custom sets, customizing a default variable in the default set
modifies the default value of the variable in all other sets.
• user-defined variables
You can add and delete your own variables, customize their values within different variable sets,
and reset customized variables to their default values. When you reset a user-defined variable, it
remains in the Customized Variables area.
User-defined variables can be one of the following types:
• network variables specify the IP addresses of hosts in your network traffic.
• port variables specify TCP or UDP ports in network traffic, including the value any for either
type.
For example, if you create custom standard text rules, you might also want to add your own user-defined
variables to more accurately reflect your traffic or as shortcuts to simplify the rule creation process.
Alternatively, if you create a rule that you want to inspect traffic in the “demilitarized zone” (or DMZ)
only, you can create a variable named $DMZ whose value lists the server IP addresses that are exposed.
You can then use the $DMZ variable in any rule written for this zone.
Advanced Variables
Variables provided by the system under specific conditions. These variables have a very limited
deployment.
Caution Importing an access control or an intrusion policy overwrites existing default variables in the default variable
set with the imported default variables. If your existing default variable set contains a custom variable not
present in the imported default variable set, the unique variable is preserved.
The following table describes the variables provided by the system and indicates which variables you typically
would modify. For assistance determining how to tailor variables to your network, contact Professional
Services or Support.
Defines known AOL Instant Messenger (AIM) servers, and is used in Not required.
$AIM_SERVERS
chat-based rules and rules that look for AIM exploits.
Defines Domain Name Service (DNS) servers. If you create a rule that Not required in current rule set.
$DNS_SERVERS
affects DNS servers specifically, you can use the $DNS_SERVERS variable
as a destination or source IP address.
Defines the network that the system views as the unprotected network, Yes, you should adequately define
$EXTERNAL_NET
and is used in many rules to define the external network. $HOME_NET and then exclude
$HOME_NET as the value for
$EXTERNAL_NET.
Defines non-encrypted ports used in intrusion rules that detect files in Not required.
$FILE_DATA_PORTS
a network stream.
Defines the ports of FTP servers on your network, and is used for FTP Yes, if your FTP servers use ports
$FTP_PORTS
server exploit rules. other than the default ports (you can
view the default ports in the web
interface).
Defines the data channel ports where the packet decoder extracts the Not required.
$GTP_PORTS
payload inside a GTP (General Packet Radio Service [GPRS] Tunneling
Protocol) PDU.
Defines the network that the associated intrusion policy monitors, and Yes, to include the IP addresses for
$HOME_NET
is used in many rules to define the internal network. your internal network.
Defines the ports of web servers on your network, and is used for web Yes, if your web servers use ports
$HTTP_PORTS
server exploit rules. other than the default ports (you can
view the default ports in the web
interface).
Defines the web servers on your network. Used in web server exploit Yes, if you run HTTP servers.
$HTTP_SERVERS
rules.
Defines Oracle database server ports on your network, and is used in Yes, if you run Oracle servers.
$ORACLE_PORTS
rules that scan for attacks on Oracle databases.
Defines the ports you want the system to scan for shell code exploits, Not required.
$SHELLCODE_PORTS
and is used in rules that detect exploits that use shell code.
Defines the ports of SIP servers on your network, and is used for SIP Not required.
$SIP_PORTS
exploit rules.
Defines SIP servers on your network, and is used in rules that address Yes, if you run SIP servers, you
$SIP_SERVERS
SIP-targeted exploits. should adequately define
$HOME_NET and then include
$HOME_NET as the value for
$SIP_SERVERS.
Defines SMTP servers on your network, and is used in rules that address Yes, if you run SMTP servers.
$SMTP_SERVERS
exploits that target mail servers.
Defines SNMP servers on your network, and is used in rules that scan Yes, if you run SNMP servers.
$SNMP_SERVERS
for attacks on SNMP servers.
Identifies a legacy advanced variable that appears only when it existed No, you can only view or delete this
$SNORT_BPF
on your system in a software release before Version 5.3.0 that you variable. You cannot edit it or
subsequently upgraded to Version 5.3.0 or greater. recover it after deleting it.
Defines database servers on your network, and is used in rules that Yes, if you run SQL servers.
$SQL_SERVERS
address database-targeted exploits.
Defines the ports of SSH servers on your network, and is used for SSH Yes, if your SSH servers use ports
$SSH_PORTS
server exploit rules. other than the default port (you can
view the default ports in the web
interface).
Defines SSH servers on your network, and is used in rules that address Yes, if you run SSH servers, you
$SSH_SERVERS
SSH-targeted exploits. should adequately define
$HOME_NET and then include
$HOME_NET as the value for
$SSH_SERVERS.
Defines known Telnet servers on your network, and is used in rules that Yes, if you run Telnet servers.
$TELNET_SERVERS
address Telnet server-targeted exploits.
Provides a general tool that allows you to configure one or more features No, only as instructed in a feature
$USER_CONF
not otherwise available via the web interface. description or with the guidance of
Support.
Conflicting or duplicate $USER_CONF configurations will halt the system.
Network Variables
Network variables represent IP addresses you can use in intrusion rules that you enable in an intrusion policy
and in intrusion policy rule suppressions, dynamic rule states, and adaptive profile updates. Network variables
differ from network objects and network object groups in that network variables are specific to intrusion
policies and intrusion rules, whereas you can use network objects and groups to represent IP addresses in
various places in the system’s web interface, including access control policies, network variables, intrusion
rules, network discovery rules, event searches, reports, and so on.
You can use network variables in the following configurations to specify the IP addresses of hosts on your
network:
• intrusion rules—Intrusion rule Source IPs and Destination IPs header fields allow you to restrict packet
inspection to the packets originating from or destined to specific IP addresses.
• suppressions—The Network field in source or destination intrusion rule suppressions allows you to
suppress intrusion event notifications when a specific IP address or range of IP addresses triggers an
intrusion rule or preprocessor.
• dynamic rule states—The Network field in source or destination dynamic rule states allows you to detect
when too many matches for an intrusion rule or preprocessor rule occur in a given time period.
• adaptive profile updates—When you enable adaptive profile updates, the adaptive profiles Networks
field identifies hosts where you want to improve reassembly of packet fragments and TCP streams in
passive deployments.
When you use variables in the fields identified in this section, the variable set you link to an intrusion policy
determines the variable values in the network traffic handled by an access control policy that uses the intrusion
policy.
You can add any combination of the following network configurations to a variable:
• any combination of network variables, network objects, and network object groups that you select from
the list of available networks
• individual network objects that you add from the New Variable or Edit Variable page, and can then add
to your variable and to other existing and future variables
• literal, single IP addresses or address blocks
You can list multiple literal IP addresses and address blocks by adding each individually. You can list
IPv4 and IPv6 addresses and address blocks alone or in any combination. When specifying IPv6 addresses,
you can use any addressing convention defined in RFC 4291.
The default value for included networks in any variable you add is the word any, which indicates any IPv4
or IPv6 address. The default value for excluded networks is none, which indicates no network. You can also
specify the address :: in a literal value to indicate any IPv6 address in the list of included networks, or no
IPv6 addresses in the list of exclusions.
Adding networks to the excluded list negates the specified addresses and address blocks. That is, you can
match any IP address with the exception of the excluded IP address or address blocks.
For example, excluding the literal address [Link] specifies any IP address other than [Link], and
excluding [Link] specifies any IP address other than [Link].
You can exclude any combination of networks using literal or available networks. For example, excluding
the literal values [Link] and [Link] includes any IP address other than [Link] or [Link].
That is, the system interprets this as “not [Link] and not [Link],” which matches any IP address
other than those listed between brackets.
Note the following points when adding or editing network variables:
• You cannot logically exclude the value any which, if excluded, would indicate no address. For example,
you cannot add a variable with the value any to the list of excluded networks.
• Network variables identify traffic for the specified intrusion rule and intrusion policy features. Note that
preprocessor rules can trigger events regardless of the hosts defined by network variables used in intrusion
rules.
• Excluded values must resolve to a subset of included values. For example, you cannot include the address
block [Link]/24 and exclude [Link]/24.
Port Variables
Port variables represent TCP and UDP ports you can use in the Source Port and Destination Port header
fields in intrusion rules that you enable in an intrusion policy. Port variables differ from port objects and port
object groups in that port variables are specific to intrusion rules. You can create port objects for protocols
other than TCP and UDP, and you can use port objects in various places in the system’s web interface, including
port variables, access control policies, network discovery rules, and event searches.
You can use port variables in the intrusion rule Source Port and Destination Port header fields to restrict
packet inspection to packets originating from or destined to specific TCP or UDP ports.
When you use variables in these fields, the variable set you link to the intrusion policy associated with an
access control rule or policy determines the values for these variables in the network traffic where you deploy
the access control policy.
You can add any combination of the following port configurations to a variable:
• any combination of port variables and port objects that you select from the list of available ports
Note that the list of available ports does not display port object groups, and you cannot add these to
variables.
• individual port objects that you add from the New Variable or Edit Variable page, and can then add to
your variable and to other existing and future variables
Only TCP and UDP ports, including the value any for either type, are valid variable values. If you use
the new or edit variables page to add a valid port object that is not a valid variable value, the object is
added to the system but is not displayed in the list of available objects. When you use the object manager
to edit a port object that is used in a variable, you can only change its value to a valid variable value.
• single, literal port values and port ranges
You must separate port ranges with a dash (-). Port ranges indicated with a colon (:) are supported for
backward compatibility, but you cannot use a colon in port variables that you create.
You can list multiple literal port values and ranges by adding each individually in any combination.
Tip To create a variable with the value any, name and save the variable without adding
a specific value.
• You cannot logically exclude the value any which, if excluded, would indicate no ports. For example,
you cannot save a variable set when you add a variable with the value any to the list of excluded ports.
• Adding ports to the excluded list negates the specified ports and port ranges. That is, you can match any
port with the exception of the excluded ports or port ranges.
• Excluded values must resolve to a subset of included values. For example, you cannot include the port
range 10-50 and exclude port 60.
Advanced Variables
Advanced variables allow you to configure features that you cannot otherwise configure via the web interface.
The system currently provides only one advanced variable, the USER_CONF variable.
USER_CONF
USER_CONF provides a general tool that allows you to configure one or more features not otherwise available
via the web interface.
Caution Do not use the advanced variable USER_CONF to configure an intrusion policy feature unless you are
instructed to do so in the feature description or by Support. Conflicting or duplicate configurations will halt
the system.
When editing USER_CONF, you can type up to 4096 total characters on a single line; the line wraps
automatically. You can include any number of valid instructions or lines until you reach the 8192 maximum
character length for a variable or a physical limit such as disk space. Use the backslash (\) line continuation
character after any complete argument in a command directive.
Resetting USER_CONF empties it.
Variable Reset
You can reset a variable to its default value on the variable set new or edit variables page. The following table
summarizes the basic principles of resetting variables.
Resetting a variable in a custom set simply resets it to the current value for that variable in the default set.
Conversely, resetting or modifying the value of a variable in the default set always updates the default value
of that variable in all custom sets. When the reset icon is grayed out, indicating that you cannot reset the
variable, this means that the variable has no customized value in that set. Unless you have customized the
value for a variable in a custom set, a change to the variable in the default set updates the value used in any
intrusion policy where you have linked the variable set.
Note It is good practice when you modify a variable in the default set to assess how the change affects any intrusion
policy that uses the variable in a linked custom set, especially when you have not customized the variable
value in the custom set.
You can hover your pointer over the Reset icon in a variable set to see the reset value. When the customized
value and the reset value are the same, this indicates one of the following:
• you are in the custom or default set where you added the variable with the value any
• you are in the custom set where you added the variable with an explicit value and elected to use the
configured value as the default value
You can customize the value of Var1 in any set. In Custom Set 2 where Var1 has not been customized, its
value is [Link]/24. In Custom Set 1 the customized value [Link]/24 of Var1 overrides the default
value. Resetting a user-defined variable in the default set resets its default value to any in all sets.
It is important to note in this example that, if you do not update Var1 in Custom Set 2, further customizing or
resetting Var1 in the default set consequently updates the current, default value of Var1 in Custom Set 2,
thereby affecting any intrusion policy linked to the variable set.
Although not shown in the example, note that interactions between sets are the same for user-defined variables
and default variables except that resetting a default variable in the default set resets it to the value configured
by Cisco in the current rule update.
Note that, except for the origin of Var1 from Custom Set 1, this example is identical to the example above
where you added Var1 to the default set. Adding the customized value [Link]/24 for Var1 to Custom
Set 1 copies the value to the default set as a customized value with a default value of any. Thereafter, Var1
values and interactions are the same as if you had added Var1 to the default set. As with the previous example,
keep in mind that further customizing or resetting Var1 in the default set consequently updates the current,
default value of Var1 in Custom Set 2, thereby affecting any intrusion policy linked to the variable set.
In the next example, you add Var1 with the value [Link]/24 to Custom Set 1 as in the previous example,
but you elect not to use the configured value of Var1 as the default value in other sets.
This approach adds Var1 to all sets with a default value of any. After adding Var1, you can customize its
value in any set. An advantage of this approach is that, by not initially customizing Var1 in the default set,
you decrease your risk of customizing the value in the default set and thus inadvertently changing the current
value in a set such as Custom Set 2 where you have not customized Var1.
Nesting Variables
You can nest variables so long as the nesting is not circular. Nested, negated variables are not supported.
Procedure
• Edit — If you want to edit a variable set, click Edit ( ) next to the variable set you want to modify; see
Editing Objects, on page 1337.
• Filter — If you want to filter variable sets by name, begin entering a name; as you type, the page refreshes
to display matching names. If you want to clear name filtering, click Clear ( ) in the filter field.
• Manage Variables — To manage the variables included in variable sets, see Managing Variables, on
page 1438.
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Managing Variables
You must have the IPS license (for threat defense devices) or the Protection license (all other device types).
Procedure
• Edit — Click Edit ( ) next to the variable you want to edit; see Editing Variables, on page 1440.
• Reset — If you want to reset a modified variable to its default value, click Reset next to a modified
variable. If reset is dimmed, one of the following is true:
• The current value is already the default value.
• The configuration belongs to an ancestor domain.
Tip
Hover your pointer over an active reset to display the default value.
Step 5 Click Save to save the variable set. If the variable set is in use by an access control policy, click Yes to confirm
that you want to save your changes.
Because the current value in the default set determines the default value in all other sets, modifying or resetting
a variable in the default set changes the current value in other sets where you have not customized the default
value.
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Adding Variables
You must have the IPS license (for threat defense devices) or the Protection license (all other device types).
Procedure
• Enter a single literal value, then click Add. For network variables, you can enter a single IP address or
address block. For port variables you can add a single port or port range, separating the upper and lower
values with a hyphen (-). Repeat this step as needed to enter multiple literal values.
• If you want to remove an item from the included or excluded lists, click Delete ( ) next to the item.
Note
The list of items to include or exclude can be comprised of any combination of literal strings and existing
variables, objects, and network object groups in the case of network variables.
Step 5 Click Save to save the variable. If you are adding a new variable from a custom set, you have the following
options:
• Click Yes to add the variable using the configured value as the customized value in the default set and,
consequently, the default value in other custom sets.
• Click No to add the variable as the default value of any in the default set and, consequently, in other
custom sets.
Step 6 Click Save to save the variable set. Your changes are saved, and any access control policy the variable set is
linked to displays an out-of-date status.
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
Editing Variables
You must have the IPS license (for threat defense devices) or the Protection license (all other device types).
You can edit both custom and default variables.
You cannot change the Name or Type values in an existing variable.
Procedure
Step 1 In the variable set editor, click Edit ( ) next to the variable you want to modify.
If View ( ) appears instead, the object belongs to an ancestor domain, or you do not have permission to
modify the object.
• Enter a single literal value, then click Add. For network variables, you can enter a single IP address or
address block. For port variables you can add a single port or port range, separating the upper and lower
values with a hyphen (-). Repeat this step as needed to enter multiple literal values.
• If you want to remove an item from the included or excluded lists, click Delete ( ) next to the item.
Note
The list of items to include or exclude can be comprised of any combination of literal strings and existing
variables, objects, and network object groups in the case of network variables.
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
VLAN Tag
Each VLAN tag object you configure represents a VLAN tag or range of tags.
You can group VLAN tag objects. Groups represent multiple objects; using a range of VLAN tags in a single
object is not considered a group in this sense.
You can use VLAN tag objects and groups in various places in the system’s web interface, including rules
and event searches. For example, you could write an access control rule that applies only to a specific VLAN.
Procedure
What to do next
• If an active policy references your object, deploy configuration changes; see Deploy Configuration
Changes, on page 251.
VPN
You can use the following VPN objects on threat defense devices. To use these objects, you must have Admin
privileges, and your Smart License account must satisfy export controls. You can configure these objects in
leaf domains only.
Navigation
Objects > Object Management > VPN > Certificate Map
Fields
• Name—Identify this object so it can be referred to from other configurations, such as Remote Access
VPN.
• Mapping Criteria—Specify the contents of the certificate to evaluate. If the certificate satisfies these
rules, the user will be mapped to the connection profile containing this object.
• Field—Select the field for the matching rule according to the Subject or the Issuer of the client
certificate.
If the Field is set to Alternative Subject or Extended Key Usage the Component will be frozen as
Whole Field
• Component—Select the component of the client certificate to use for the matching rule.
Note SER (Serial Number) component - Ensure you specify the serial number for
the Subject field. The certificate map only matches with a serial number attribute
in the subject name.
• Value—The value of the matching rule. The value entered is associated with the selected component
and operator.
Related Topics
Configure Certificate Maps, on page 1596
Client custom attributes objects using the management center, add the objects to a group policy and associate
the group policy with a remote access VPN to enable the features for the VPN clients.
Threat Defense supports the following features using the custom attribute objects:
• Per App VPN—The Per App VPN feature helps identify an app and tunnel only applications allowed
by the threat defense administrator over the VPN.
• Allow or defer upgrade— Deferred Upgrade allows the Secure Client user to delay download of the
Secure Client upgrade. When a client update is available, you can configure the attributes for Secure
Client to open a dialog asking the user if they would like to update, or to defer the upgrade.
• Dynamic Split Tunneling— With dynamic split tunneling, you can provision policies that either include
or exclude IP addresses or networks from the VPN tunnel. Dynamic split tunneling is configured by
creating a custom attribute and adding it to a group policy.
For step-by-step instructions to configure Secure Client custom attributes, see Add Secure Client Custom
Attributes Objects, on page 1443 and
For details about the specific custom attributes to configure for a feature, see the Cisco Secure Client (including
AnyConnect) Administrator Guide for the Secure Client release you are using.
Related Topics
Group Policy Secure Client Options, on page 1448
Procedure
Step 1 Choose Objects > Object Management > VPN > Custom Attribute.
Step 2 Click Secure Client Custom Attribute.
• Dynamic Split Tunneling—Select this option to include or exclude IP addresses or networks from the
VPN tunnel.
• Include domains—Specify domain names that will be included in the remote access VPN tunnel.
• Exclude domains—Specify domain names that will be excluded from the remote access VPN
tunnel.
Step 5 Select the Allow Overrides check box to allow object overrides.
Step 6 Click Save.
The custom attributes object is added to the list.
What to do next
Associate the custom attributes with a group policy. See Add Custom Attributes to a Group Policy, on page
1444 .
Procedure
Step 1 Select Objects > Object Management > VPN > Group Policy.
Step 2 Add a new group policy or edit an existing group policy.
Step 3 Click Secure Client > Custom Attributes.
Step 7 Click Add to save the attributes to the group policy and then click Save to save the changes to the group
policy.
Related Topics
Group Policy Secure Client Options, on page 1448
Note There is no group policy attribute inheritance on the threat defense. A group policy object is used, in its
entirety, for a user. The group policy object identified by the AAA server upon login is used, or, if that is not
specified, the default group policy configured for the VPN connection is used. The provided default group
policy can be set to your default values, but will only be used if it is assigned to a connection profile and no
other group policy has been identified for the user.
To use group objects, you must have one of these Secure Client licenses associated with your Smart License
account with Export-Controlled Features enabled:
• Secure Client VPN Only
• Secure Client Advantage
• Secure Client Premier
Related Topics
Configure Group Policy Objects, on page 1445
Procedure
Step 1 Choose Objects > Object Management > VPN > Group Policy.
Previously configured policies are listed including the system default. Depending on your level of access, you
may edit, view, or delete a group policy.
Step 4 Specify the General parameters for this Group Policy as described in Group Policy General Options, on page
1446.
Step 5 Specify the Secure Client parameters for this Group Policy as described in Group Policy Secure Client
Options, on page 1448.
Step 6 Specify the Advanced parameters for this Group Policy as described in Group Policy Advanced Options, on
page 1451.
Step 7 Click Save.
The new Group Policy is added to the list.
What to do next
Add the group policy object to a remote access VPN connection profile.
Navigation Path
Objects > Object Management > VPN > Group Policy, Click Add Group Policy or choose a current policy
to edit., then select the General tab.
IP Address Pools
Specifies the IPv4 address assignment that is applied based on address pools that are specific to user-groups
in Remote Access VPN. For Remote Access VPN, you can assign IP address from specific address pools for
identified user groups using RADIUS/ISE for authorization. You can seamlessly perform policy enforcement
for user or user groups in systems which are not identity-aware, by configuring particular Group Policy as
RADIUS Authorization attribute (GroupPolicy/Class), for a particular user group. For example, you have to
select a specific address pool for contractors and policy enforcement using those addresses to allow restricted
access to internal network.
The order of preference that threat defense device assigns the IPv4 Address Pools to the clients:
1. RADIUS attribute for IPv4Address Pool
Banner Fields
Specifies the banner text to present to users at login. The length can be up to 491 characters. There is no default
value. The IPsec VPN client supports full HTML for the banner, however, the Secure Client supports only
partial HTML. To ensure that the banner displays properly to remote users, use the /n tag for IPsec clients,
and the <BR> tag for SSL clients.
DNS/WINS Fields
Domain Naming System (DNS) and Windows Internet Naming System (WINS) servers. Used for Secure
Client name resolution.
• Primary DNS Server and Secondary DNS Server—Choose or create a Network Object which defines
the IPv4 or IPv6 addresses of the DNS servers you want this group to use.
• Primary WINS Server and Secondary WINS Server—Choose or create a Network Object containing
the IP addresses of the WINS servers you want this group to use.
• DHCP Network Scope—Choose or create a Network Object containing a routable IPv4 address on the
same subnet as the desired pool, but not within the pool. The DHCP server determines which subnet this
IP address belongs to and assigns an IP address from that pool. If not set properly, deployment of the
VPN policy fails.
If you configure DHCP servers for the address pool in the connection profile, the DHCP scope identifies
the subnets to use for the pool for this group. The DHCP server must also have addresses in the same
subnet identified by the scope. The scope allows you to select a subset of the address pools defined in
the DHCP server to use for this specific group.
If you do not define a network scope, the DHCP server assigns IP addresses in the order of the address
pools configured. It goes through the pools until it identifies an unassigned address.
We recommend using the IP address of an interface whenever possible for routing purposes. For example,
if the pool is [Link]-[Link], and the interface address is [Link]/24, use [Link] as
the DHCP scope. Do not use the network number. You can use DHCP for IPv4 addressing only. If the
address you choose is not an interface address, you might need to create a static route for the scope
address.
LINK-SELECTION (RFC 3527) and SUBNET-SELECTION (RFC 3011) are currently not supported.
• Default Domain—Name of the default domain. Specify a top-level domain, for example, [Link].
Related Topics
Configure Group Policy Objects, on page 1445
Navigation
Objects > Object Management > VPN > Group Policy. Click Add Group Policy or choose a current policy
to edit. Then select the Secure Client tab.
Profile Fields
Profile—Choose or create a file object containing the Secure Client Profile. See File Objects, on page 1458 for
object creation details.
The Secure Client Profile is a group of configuration parameters stored in an XML file. The Secure Client
software uses it to configure the connection entries that appear in the client's user interface. These parameters
(XML tags) also configure settings to enable more Secure Client features.
Use the GUI-based Secure Client Profile Editor, an independent configuration tool, to create the Secure Client
Profile. See the Secure Client Profile Editor chapter in the appropriate release of the Cisco Secure Client
(including AnyConnect) Administrator Guide for details.
Click Add and select the following for each client module:
• Client Module—Select the Secure Client module from the list.
• Profile to download—Choose or create a file object containing the Secure Client Profile. See File
Objects, on page 1458 for object creation details.
• Enable module download—Select to enable endpoints to download the client module along with the
profile. If not selected, the endpoints can download only the client profile.
Use the GUI-based Secure Client Profile Editor, an independent configuration tool to create a client profile
for each module. Download the Secure Client Profile Editor from Cisco Software Download Center. See the
Secure Client Profile Editor chapter in the appropriate release of the Cisco Secure Client (including
AnyConnect) for details.
• SSL rekey—Enables the client to rekey the connection, renegotiating the crypto keys and initialization
vectors, increasing the security of the connection. This is disabled by default. When enabled, the
renegotiation can be done at a specified interval and rekey the existing tunnel or create a new tunnel by
setting the following fields:
• Method—Available when SSL rekey is enabled. Create a New Tunnel (default), or renegotiate,
the Existing Tunnel's specifications.
• Interval—Available when SSL rekey is enabled. Set to a default of 4 minutes with a range of
4-10080 minutes (1 week).
• Client Firewall Rules—Use the Client Firewall Rules to configure firewall settings for the VPN client's
platform. Rules are based on criteria such as source address, destination address, and protocol. Extended
Access Control List building block objects are used to define the traffic filter criteria. Choose or create
an Extended ACL for this group policy. Define a Private Network Rule to control data flowing to the
private network, a Public Network Rule to control data flowing "in the clear", outside of the established
VPN tunnel, or both.
Note Ensure that the ACL contains only TCP/UDP/ICMP/IP ports and source network
as any, any-ipv4 or any-ipv6.
Only VPN clients running Microsoft Windows can use these firewall settings.
Note Click Add (+) to create a new custom attribute object for the selected Secure Client attribute. You can also
create a custom attribute object at Objects > Object Management > VPN > Custom Attribute. See Add
Secure Client Custom Attributes Objects, on page 1443.
3. Click Add to save the attributes to the group policy and then click Save to save the changes to the group
policy.
Related Topics
Configure Group Policy Objects, on page 1445
Navigation Path
Objects > Object Management > VPN > Group Policy, Click Add Group Policy or choose a current policy
to edit., then select the Advanced tab.
Related Topics
Configure Group Policy Objects, on page 1445
• When you create an IKEv2 IPsec Proposal object, you can select all of the encryption and Hash Algorithms
allowed in a VPN. During IKEv2 negotiations, the peers select the most appropriate options that each
support.
The Encapsulating Security Protocol (ESP) is used for both IKEv1 and IKEv2 IPsec Proposals. It provides
authentication, encryption, and antireplay services. ESP is IP protocol type 50.
Procedure
Step 1 Choose Objects > Object Management and then VPN > IPsec IKev1 Proposal from the table of contents.
Previously configured Proposals are listed including system defined defaults. Depending on your level of
access, you may Edit ( ), View ( ), or Delete ( ) a Proposal.
Step 5 Choose the ESP Encryption method. The Encapsulating Security Protocol (ESP) encryption algorithm for
this Proposal.
For IKEv1, select one of the options. When deciding which encryption and Hash Algorithms to use for the
IPsec proposal, your choice is limited to algorithms supported by the devices in the VPN. For a full explanation
of the options, see Deciding Which Encryption Algorithm to Use, on page 1482.
Procedure
Step 1 Choose Objects > Object Management and then VPN > IKEv2 IPsec Proposal from the table of contents.
Previously configured Proposals are listed including system defined defaults. Depending on your level of
access, you may Edit ( ), View ( ), or Delete ( ) a Proposal.
Step 5 Choose the ESP Hash method, the hash or integrity algorithm to use in the Proposal for authentication.
Note
Threat Defense does not support IPSec tunnels with NULL encryption. Make sure that you do not choose
NULL encryption for IPSec IKEv2 proposal.
For IKEv2, select all the options you want to support for ESP Hash. For a full explanation of the options,
see Deciding Which Hash Algorithms to Use, on page 1483.
Step 6 Choose the ESP Encryption method. The Encapsulating Security Protocol (ESP) encryption algorithm for
this Proposal.
For IKEv2, click Select to open a dialog box where you can select all of the options you want to support.
When deciding which encryption and Hash Algorithms to use for the IPsec proposal, your choice is limited
to algorithms supported by the devices in the VPN. For a full explanation of the options, see Deciding Which
Encryption Algorithm to Use, on page 1482.
Procedure
Step 1 Choose Objects > Object Management and then VPN > IKEv1 Policy from the table of contents.
Previously configured policies are listed including system defined defaults. Depending on your level of access,
you may Edit ( ), View ( ), or Delete ( ) a proposal.
Step 2 (Optional) Choose Add IKEv1 Policy to create a new policy object.
Step 3 Enter a Name for this policy. A maximum of 128 characters is allowed.
Step 4 (Optional) Enter a Description for this proposal. A maximum of 1,024 characters is allowed.
Step 5 Enter the Priority value of the IKE policy.
The priority value determines the order of the IKE policy compared by the two negotiating peers when
attempting to find a common security association (SA). If the remote IPsec peer does not support the parameters
selected in your first priority policy, it tries to use the parameters defined in the next lowest priority. Valid
values range from 1 to 65,535. The lower the number, the higher the priority. If you leave this field blank,
Management Center assigns the lowest unassigned value starting with 1, then 5, then continuing in increments
of 5.
Step 7 Choose the Hash Algorithm that creates a Message Digest, which is used to ensure message integrity.
When deciding which encryption and Hash Algorithms to use for the IKEv1 proposal, your choice is limited
to algorithms supported by the managed devices. For an extranet device in the VPN topology, you must choose
the algorithm that matches both peers. For a full explanation of the options, see Deciding Which Hash
Algorithms to Use, on page 1483.
Step 9 Set the Lifetime of the security association (SA), in seconds. You can specify a value from 120 to 2,147,483,647
seconds. The default is 86400.
When the lifetime is exceeded, the SA expires and must be renegotiated between the two peers. Generally,
the shorter the lifetime (up to a point), the more secure your IKE negotiations. However, with longer lifetimes,
future IPsec security associations can be set up more quickly than with shorter lifetimes.
Step 10 Set the Authentication Method to use between the two peers.
• Preshared Key—Preshared keys allow for a secret key to be shared between two peers and to be used
by IKE during the authentication phase. If one of the participating peers is not configured with the same
preshared key, the IKE SA cannot be established.
• Certificate—When you use Certificates as the authentication method for VPN connections, peers obtain
digital certificates from a CA server in your PKI infrastructure, and trade them to authenticate each other.
Note
In a VPN topology that supports IKEv1, the Authentication Method specified in the chosen IKEv1 Policy
object becomes the default in the IKEv1 Authentication Type setting. These values must match, otherwise,
your configuration will error.
Procedure
Step 1 Choose Objects > Object Management and then VPN > IKEv2 Policy from the table of contents.
Previously configured policies are listed including system defined defaults. Depending on your level of access,
you may Edit ( ), View ( ), or Delete ( ) a policy.
Step 6 Set the Lifetime of the security association (SA), in seconds. You can specify a value from 120 to 2,147,483,647
seconds. The default is 86400.
When the lifetime is exceeded, the SA expires and must be renegotiated between the two peers. Generally,
the shorter the lifetime (up to a point), the more secure your IKE negotiations. However, with longer lifetimes,
future IPsec security associations can be set up more quickly than with shorter lifetimes.
Step 7 Choose the Integrity Algorithms portion of the Hash Algorithm used in the IKE policy. The Hash Algorithm
creates a Message Digest, which is used to ensure message integrity.
When deciding which encryption and Hash Algorithms to use for the IKEv2 proposal, your choice is limited
to algorithms supported by the managed devices. For an extranet device in the VPN topology, you must choose
the algorithm that matches both peers. Select all the algorithms that you want to allow in the [Link] a full
explanation of the options, see Deciding Which Hash Algorithms to Use, on page 1483.
Step 8 Choose the Encryption Algorithm used to establish the Phase 1 SA for protecting Phase 2 negotiations.
When deciding which encryption and Hash Algorithms to use for the IKEv2 proposal, your choice is limited
to algorithms supported by the managed devices. For an extranet device in the VPN topology, you must choose
the algorithm that matches both peers. Select all the algorithms that you want to allow in the VPN. For a full
explanation of the options, see Deciding Which Encryption Algorithm to Use, on page 1482.
For more information about configuring these Secure Client customizations, see Customize Cisco Secure
Client, on page 1607.
File Objects
Use the Add and Edit File Object dialog boxes to create, and edit file objects. File objects represent files used
in configurations, typically for remote access VPN policies. They can contain Secure Client Profile and Secure
Client Image files.
Profiles are also created for each AnyConnect module and Secure Client Management VPN using independent
profile editors and deployed to administrator-defined end user requirements and authentication policies on
endpoints as part of Secure Client, and they make the preconfigured network profiles available to end users.
When you create a file object, the management center makes a copy of the file in its repository. These files
are backed up whenever you create a backup of the database, and they are restored if you restore the database.
When copying a file to the management center platform to be used in a file object, do not copy the file directly
to the file repository.
When you deploy configurations that specify a file object, the associated file is downloaded to the device in
the appropriate directory.
You can click one of the following options against each file:
• Download —Click to download the Secure Client file.
• Edit —Modify the file object details.
• Delete —Delete the Secure Client file object. When you delete a file object, the associated file is not
deleted from the file repository, only the object is deleted.
Navigation Path
Objects > Object Management > VPN > Secure Client File.
Fields
• Name—Enter the name of the file to identify the file object; you can add up to 128 characters.
• File Name—Click Browse to select the file. The file name and full path of the file are added when you
select the file.
• File Type—Choose the file type corresponding to the file you have selected. The following file types
are available:
• Secure Client Image—Select this type when you add the Secure Client image you have downloaded
from the Cisco Software Download Center.
You can associate any new or additional Secure Client images to the remote access VPN policy.
You can also unassociate the unsupported or end of life client packages that are no longer required.
• Secure Client VPN Profile—Choose this type for the Secure Client VPN profile file.
The profile file is created using the GUI-based Secure Client Profile Editor, an independent
configuration tool. See the Secure Client Profile Editor chapter in the appropriate release of the
Cisco Secure Client (including AnyConnect) User Guide for details.
• Secure Client Management VPN Profile—Select this type when you add a profile file for the
Secure Client management VPN tunnel.
Download the Secure Client VPN Management Tunnel Standalone Profile Editor from Cisco
Software Download Center if you have not done already and create a profile with required settings
for the Secure Client management VPN tunnel.
• AMP Enabler Service Profile—The profile is used for the Secure Client AMP Enabler. The AMP
Enabler along with this profile is pushed to the endpoints from threat defense when a remote access
VPN user connects to the VPN.
• Feedback Profile—You can add a Customer Experience Feedback profile and select this type to
receive information about the features and modules customers have enabled and use.
• ISE Posture Profile—Choose this option if you are adding a profile file for the Secure Client ISE
Posture module.
• NAM Service Profile—Configure and add the NAM profile file using the Network Access Manager
profile editor.
• Network Visibility Service Profile—Profile file for Secure Client Network Visibility module. You
can create the profile using the NVM profile editor.
• Umbrella Roaming Security Profile—You must select this file type if you are deploying the
Umbrella Roaming Security module using the .json file created using the profile editor.
• Web Security Service Profile—Select this file type when you add a prole file for the Web security
module.
• Secure Firewall Posture Package—Select this file type when you add a Secure Firewall Posture
Package file. This file is used while configuring a Dynamic Access Policy (DAP) to collect
information about the operating system, anti-virus, anti-spyware, and firewall software installed on
the endpoints.
• Secure Client External Browser Package—This file type is for selecting an external browser
package file for SAML single sing-on web authentication.
You can add an the package file when a new version of the external package file is available.
For more information, see Configure AAA Settings for Remote Access VPN, on page 1575.
Related Topics
Cisco Secure Client Image, on page 1593
Group Policy Secure Client Options, on page 1448
Merged ACL and AV 7.4.1 Any New/modified screens: Objects > > Object Management > RADIUS Server
ACL Group > Add RADIUS Server Group > Merge Downloadable ACL with
Cisco AV Pair ACL
New CLI commands:
• sh run aaa-server aaa-server ISE-Server protocol radius merge-dacl
after-avpair
• sh run aaa-server aaa-server ISE-Server protocol radius merge-dacl
before-avpair
Secure Client Any 7.4 You can now customize Secure Client and deploy these customizations to the
Customization VPN headend. The threat defense distributes these customizations to the
endpoint when an end user connects from the Secure Client.
IPv6 support for CRL Any 7.4 You can now configure IPv6 OCSP and CRL URLs.
and OCSP urls
Loopback and Any 7.4 You can now create interface group objects that include only management-only
Management type interfaces or only loopback interfaces. You can then use these groups for
interface group objects management features such as DNS servers, HTTP access, or SSH. Loopback
groups are supported for any feature that supports loopback intefaces. Note
that DNS does not support management interfaces.
New/Modified screens: Objects > Object Management > Interface > Add >
Interface Group
Loopback interface Any 7.4 You can use a loopback interface group for configuring a RADIUS server.
support for AAA
New/Modified screens: Objects > Object Management > AAA Server >
RADIUS Server Group
Clone network and port Any 7.4 You can now clone network and port objects. In the object manager (Objects >
objects Object Management), click the new Clone icon next to a port or network
object. You can then change the new object's properties and save it using a
new name.
DHCP IPv6 Pool Any 7.3 The threat defense now supports a light DHCPv6 stateless server when using
the DHCPv6 Prefix Delegation client. The threat defense provides other
information such as the domain name to SLAAC clients when they send
Information Request (IR) packets to the threat defense. The threat defense only
accepts IR packets and does not assign addresses to the clients.
New/Modified screens:
• Devices > Device Management > Interfaces > Add/Edit Interfaces >
IPv6 > DHCP
• Objects > Object Management > DHCP IPv6 Pool
BFD Template Any 7.3 In the previous releases, BFD was configurable on threat defense only through
FlexConfig. FlexConfig no longer supports BFD configuration. You can now
configure BFD policies for threat defense in the management center UI. Hence,
the BFD Template object was introduced.
New/modified screens:
• Devices > Device Management > Routing > BFD.
• Objects > Object Management > BFD Template
New Applications tab for Any 7.1 A new tab for selecting the applications for configuring direct internet access
policy based routing policy (policy based routing) was introduced in the extended access list object.
New/Modified Screens: New option to select applications when configuring
Objects > Object Management >Access List> Extended page.
Supported platforms: Secure Firewall Management Center
New Extended Any 7.1 Extended community list object was introduced to be used in policy list and
Community List object route map objects. The extended community list object is applicable only for
and importing or exporting routes in BGP route leaking support for virtual routers.
New/Modified Screens: New object for configuring policy list and route maps
Objects > Object Management > Community List > Extended Community
page.
Supported platforms: Secure Firewall Management Center
Enhancements to Policy Any 7.1 Options to select the newly introduced Extended Community List objects in
List object and Route policy list and route maps.
Map object
New/Modified Screens: New options for configuring policy list and route maps
Objects > Object Management > Policy List > Community Rule tab, and
Objects > Object Management > Route Map > BGP > Community List
tab.
Supported platforms: Secure Firewall Management Center
Time-based ACL support Any 7.0 Time-based rules in access control and prefilter policies are supported in Snort
for Snort 3 3 as well.
Supported platforms: threat defense
EST for certificate Any 7.0 Support for Enrollment over Secure Transport for certificate enrollment was
enrollment provided.
New/Modified Screens: New enrollment options when configuring Objects >
PKI > Cert Enrollment > CA Information tab.
Supported platforms: Secure Firewall Management Center
Support for EdDSA Any 7.0 A new certificate key type- EdDSA was added with key size 256.
certificate type
New/Modified Screens: New certificate key options when configuring Objects
> PKI > Cert Enrollment > Key tab.
Supported platforms: Secure Firewall Management Center
Restrictions on ciphers Any 7.0 Certificates having SHA-1 with RSA Encryption signature algorithm, and RSA
and key sizes key sizes smaller than 2048 bits are not supported. To override these restrictions
on existing certificates, you can enable the weak-crypto option on threat defense.
However, you cannot generate RSA keys with sizes smaller than 2048 bits.
New/Modified Screens: New toggle button when configuring Devices >
Certificates.
Supported platforms: Secure Firewall Management Center
Security Intelligence feed Any 6.7 New update frequency options (5 and 15 minutes) for custom Security
options Intelligence feeds.
Update frequencies of less than 30 minutes require an MD5 URL, to prevent
unnecessary downloads if the feed has not changed.
New/Modified Screens: New frequency choices when configuring Security
Intelligence > Network Lists and Feeds.
Supported platforms: Secure Firewall Management Center
Bulk upload of objects Any 6.7 Objects can be imported from a comma-separated-values file. Up to 1000
using a objects can be imported in one attempt.
comma-separated-values
New/Modified Screens: The following object types have a new Import Object
(csv) file
option in the Add [Object Type] drop-down list.
• Distinguished Name > Individual Objects
• Network Object
• Port
• URL
• VLAN Tag
See the policies in which Any 6.6 See the policies in which interface objects are used.
interface objects are used
New/Modified Screens: The Interface object page in Objects > Object
Management has a new Find Usage ( ) button.
Supported platforms: Secure Firewall Management Center
Time zone objects Any 6.6 You can assign time zones to threat defense devices, for use when applying
introduced time-based policies.
New/Modified Screens: New Time Zone Object in Objects > Object
Management.
Supported platforms: Secure Firewall Management Center
Time-based objects can Any 6.6 Use time range objects in conjunction with new time zone objects for applying
now be used in access time-based rules in access control and prefilter policies.
control and prefilter
You can specify an absolute or recurring time or time range for a rule to be
policies
applied. The rule is applied based on the time zone of the device that processes
the traffic.
View Object Details from Any 6.6 Feature introduced: Option to view details for an object or object group when
prefilter rule page viewing prefilter rules.
New options: Right-clicking a value in any of the following columns in the
prefilter rule list offers options to view object details: Source Networks,
Destination Networks, Source Port, Destination Port, and VLAN Tag.
Supported platforms: Secure Firewall Management Center
User Roles
Admin
Network Admin
• threat defense devices support certificate enrollment using Microsoft Certificate Authority(CA) Service,
and CA Services provided on Cisco Adaptive Security Appliances(ASA) and Cisco IOS Router.
• threat defense devices cannot be configured as a certificate authority (CA).
Procedure
• Click Enable weak-crypto on the right to enable weak cipher usage in certificates. When you click the
toggle button, you get a warning to confirm before enabling weak ciphers. Click Yes to enable weak
ciphers.
Note
When a certificate enrollment fails due to weak cipher usage, you get a prompt to enable the weak cipher.
You can choose to enable weak cipher when you need to use weak encryption.
Step 2 Choose (+) Add to associate and install an enrollment object on a device.
When a certificate enrollment object is associated with and then installed on a device, the process of certificate
enrollment starts immediately. The process is automatic for self-signed and SCEP enrollment types, meaning
it does not require any additional administrator action. Manual certificate enrollment requires extra administrator
action.
Note
The certificate enrollment on a device does not block the user interface and the enrollment process gets
executed in the background, enabling the user to perform certificate enrollment on other devices in parallel.
The progress of these parallel operations can be monitored on the same user interface. The respective icons
display the certificate enrollment status.
Related Topics
Installing a Certificate Using Self-Signed Enrollment , on page 1469
Installing a Certificate Using SCEP Enrollment, on page 1471
Installing a Certificate Using Manual Enrollment, on page 1471
Installing a Certificate Using a PKCS12 File, on page 1472
Note In an IPv6-only deployment, the automatic update of CA certificates may fail, because, some of the Cisco
servers do not support IPv6. In such cases, force update the CA certificates using the configure cert-update
run-now force command.
Procedure
Step 1 Log into the FMC CLI using SSH, or, if virtual, open the VM console.
Step 2 You can verify whether the CA certificates in the local system are the latest or not:
configure cert-update test
This command compares the CA bundle on the local system with the latest CA bundle (from the Cisco server).
If the CA bundle is up to date, no connection check is executed and the test result is displayed as the one
below:
Example:
If the CA bundle is out of date, the connection check is executed on the downloaded CA bundle and the test
result is displayed.
Example:
When the connection check fails:
Example:
When the connection check succeeds, or the CA bundle is already up to date:
When you execute this command, the CA certificates (from the Cisco server) are verified for SSL connectivity.
If the SSL connectivity check fails for even one of the Cisco servers, the process is terminated.
Example:
To proceed with the update despite connection failures, use the force keyword.
Example:
Certs failed some connection checks, but replace has been forced.
Step 4 If you do not want the CA bundles to be automatically updated, disable the configuration:
configure cert-update auto-update disable
Example:
When you enable the automatic update on the CA certificates, the update process is executed daily at a
system-defined time.
Step 6 (Optional) View the status of automatic update of CA certificates:
show cert-update
Example:
Step 1 On the Devices > Certificates screen, choose Add to open the Add New Certificate dialog.
Step 2 Choose a device from the Device drop-down list.
Step 3 Associate a certificate enrollment object with this device in one of the following ways:
• Choose a Certificate Enrollment Object of the type Self-Signed from the drop-down list.
• Click (+), to add a new Certificate Enrollment Object, see Adding Certificate Enrollment Objects, on
page 1394.
Step 4 Press Add to start the Self Signed, automatic, enrollment process.
For self signed enrollment type trustpoints, the CA Certificate status will always be displayed, since the
managed device is acting as its own CA and does not need a CA certificate to generate its own Identity
Certificate.
The Identity Certificate will go from InProgress to Available as the device creates its own self signed identity
certificate.
Step 5 Click the magnifying glass to view the self-signed Identity Certificate created for this device.
What to do next
When enrollment is complete, a trustpoint exists on the device with the same name as the certificate enrollment
object. Use this trustpoint in the configuration of your Site to Site and Remote Access VPN Authentication
Method
Note Using EST enrollment establishes a direct connection between the managed device and the CA server. So be
sure your device is connected to the CA server before beginning the enrollment process.
Note EST's ability to auto-enroll a device when its certificate expires is not supported.
Procedure
Step 1 On the Devices > Certificates screen, click Add to open the Add New Certificate dialog.
Step 2 Choose a device from the Device drop-down list.
Step 3 Associate a certificate enrollment object with this device in one of the following ways:
• Choose the EST certificate enrollment object from the Cert Enrollment drop-down list.
• Click (+), to add a new Certificate Enrollment Object, see Adding Certificate Enrollment Objects, on
page 1394.
Step 5 Click the magnifying glass to view the Identity Certificate created and installed on this device.
Note Using SCEP enrollment establishes a direct connection between the managed device and the CA server. So
be sure your device is connected to the CA server before beginning the enrollment process.
Procedure
Step 1 On the Devices > Certificates screen, choose Add to open the Add New Certificate dialog.
Step 2 Choose a device from the Device drop-down list.
Step 3 Associate a certificate enrollment object with this device in one of the following ways:
• Choose a Certificate Enrollment Object of the type SCEP from the drop-down list.
• Click (+), to add a new Certificate Enrollment Object, see Adding Certificate Enrollment Objects, on
page 1394.
Step 5 Click the magnifying glass to view the Identity Certificate created and installed on this device.
What to do next
When enrollment is complete, a trustpoint exists on the device with the same name as the certificate enrollment
object. Use this trustpoint in the configuration of your Site to Site and Remote Access VPN Authentication
Method
Step 1 On the Devices > Certificates screen, choose Add to open the Add New Certificate dialog.
Step 2 Choose a device from the Device drop-down list.
Step 3 Associate a certificate enrollment object with this device in one of the following ways:
• Choose a Certificate Enrollment Object of the type Manual from the drop-down list.
• Click (+), to add a new Certificate Enrollment Object, see Adding Certificate Enrollment Objects, on
page 1394.
Step 7 Click the magnifying glass to view the Identity Certificate for this device.
What to do next
When enrollment is complete, a trustpoint exists on the device with the same name as the certificate enrollment
object. Use this trustpoint in the configuration of your Site to Site and Remote Access VPN Authentication
Method
Step 1 Go to Devices > Certificates screen, choose Add to open the Add New Certificate dialog.
Step 2 Choose a pre-configured managed device from the Device drop down list.
Step 3 Associate a certificate enrollment object with this device in one of the following ways:
• Choose a Certificate Enrollment Object of the PKCS type from the drop-down list.
• Click (+), to add a new Certificate Enrollment Object, see Adding Certificate Enrollment Objects, on
page 1394.
Note
When you upload the PKCS12 file for the first time, the file is stored in management center as part of the
CertEnrollment object. For any failed enrollments due to a wrong passphrase or failed deployment, retry
enrolling the PKCS12 certificate without uploading the file again. Also, whenever you modify the certificate
enrollment object to permit overrides, you must update the Passphrase for the certificate for a sucessful
enrollment. A PKCS12 file size should not be larger than 24K.
Step 5 Once Available, click the magnifying glass to view the Identity Certificate for this device.
What to do next
The certificate (trustpoint) on the managed device is named the same as the PKCS#12 file. Use this certificate
in your VPN authentication configuration.
• On the management center, you might receive the following health alert related to the threat defense
device:
Code - F0853; Description - default Keyring's certificate is invalid, reason: expired
Solution: In such cases, use the following command to regenerate the default certificate in CLISH CLI:
> system support regenerate-security-keyring default
• A red cross appears in the CA certificate status with the following error:
Fail to configure CA certificate
Solution: See Troubleshoot Certificate Error "Identity certificate import required" on FMC.
Support for OCSP and 7.4 Any You can now add IPv6 OCSP and CRL URLs for certificate authentication
CRL IPv6 URL (revocation checking). The IPv6 addresses must be enclosed in square brackets.
Enhancements to Manual 6.7 Any You can now create only a CA certificate without an identity certificate. You
Enrollment can also generate a CSR without a CA certificate and obtain an identity
certificate from the CA.
PKCS CA Chain 6.7 Any You can view and manage the chain of certifying authorities (CAs) issuing
your certificates. You can also export a copy of the certificates.
VPN Types
The management center supports the following types of VPN connections:
• Remote Access VPNs on threat defense devices.
Remote access VPNs are secure, encrypted connections, or tunnels, between remote users and your
company’s private network. The connection consists of a VPN endpoint device, which is a workstation
or mobile device with VPN client capabilities, and a VPN headend device, or secure gateway, at the edge
of the corporate private network.
Secure Firewall Threat Defense devices can be configured to support Remote Access VPNs over SSL
or IPsec IKEv2 by the management center. Functioning as secure gateways in this capacity, they
authenticate remote users, authorize access, and encrypt data to provide secure connections to your
network. No other types of appliances, managed by the management center, support Remote Access
VPN connections.
Secure Firewall Threat Defense secure gateways support the Secure Client full tunnel client. This client
is required to provide secure SSL IPsec IKEv2 connections for remote users. This client gives remote
users the benefits of a client without the need for network administrators to install and configure clients
on remote computers since it can be deployed to the client platform upon connectivity. It is the only
client supported on endpoint devices.
• Site-to-site VPNs on threat defense devices.
A site-to-site VPN connects networks in different geographic locations. You can create site-to-site IPsec
connections between managed devices, and between managed devices and other Cisco or third-party
peers that comply with all relevant standards. These peers can have any mix of inside and outside IPv4
and IPv6 addresses. Site-to-site tunnels are built using the Internet Protocol Security (IPsec) protocol
suite and IKEv1 or IKEv2. After the VPN connection is established, the hosts behind the local gateway
can connect to the hosts behind the remote gateway through the secure VPN tunnel.
VPN Basics
Tunneling makes it possible to use a public TCP/IP network, such as the Internet, to create secure connections
between remote users and private corporate networks. Each secure connection is called a tunnel.
IPsec-based VPN technologies use the Internet Security Association and Key Management Protocol (ISAKMP,
or IKE) and IPsec tunneling standards to build and manage tunnels. ISAKMP and IPsec accomplish the
following:
• Negotiate tunnel parameters.
• Establish tunnels.
• Authenticate users and data.
• Manage security keys.
• Encrypt and decrypt data.
• Manage data transfer across the tunnel.
• Manage data transfer inbound and outbound as a tunnel endpoint or router.
A device in a VPN functions as a bidirectional tunnel endpoint. It can receive plain packets from the private
network, encapsulate them, create a tunnel, and send them to the other end of the tunnel where they are
unencapsulated and sent to their final destination. It can also receive encapsulated packets from the public
network, unencapsulate them, and send them to their final destination on the private network.
After the site-to-site VPN connection is established, the hosts behind the local gateway can connect to the
hosts behind the remote gateway through the secure VPN tunnel. A connection consists of the IP addresses
and hostnames of the two gateways, the subnets behind them, and the method the two gateways use to
authenticate to each other.
Hubs—Devices that enable secure VPN connectivity to and from one or more remote branch devices or
spokes. Hubs also act as a gateway for spokes to communicate with each other.
Spokes—Devices that connect over VPN to a hub to securely access the corporate resources behind the hub.
Spokes communicate with each other through the hub.
When IKE negotiation begins, the peer that starts the negotiation sends all of its policies to the remote peer,
and the remote peer searches for a match with its own policies, in priority order. A match between IKE policies
exists if they have the same encryption, hash (integrity and PRF for IKEv2), authentication, and Diffie-Hellman
values, and an SA lifetime less than or equal to the lifetime in the policy sent. If the lifetimes are not identical,
the shorter lifetime—From the remote peer policy—Applies. By default, the Secure Firewall Management
Center deploys an IKEv1 policy at the lowest priority for all VPN endpoints to ensure a successful negotiation.
IPsec
IPsec is one of the most secure methods for setting up a VPN. IPsec provides data encryption at the IP packet
level, offering a robust security solution that is standards-based. With IPsec, data is transmitted over a public
network through tunnels. A tunnel is a secure, logical communication path between two peers. Traffic that
enters an IPsec tunnel is secured by a combination of security protocols and algorithms.
An IPsec Proposal policy defines the settings required for IPsec tunnels. An IPsec proposal is a collection of
one or more crypto-maps that are applied to the VPN interfaces on the devices. A crypto map combines all
the components required to set up IPsec security associations, including:
• A proposal (or transform set) is a combination of security protocols and algorithms that secure traffic in
an IPsec tunnel. During the IPsec security association (SA) negotiation, peers search for a proposal that
is the same at both peers. When it is found, it is applied to create an SA that protects data flows in the
access list for that crypto map, protecting the traffic in the VPN. There are separate IPsec proposals for
IKEv1 and IKEv2. In IKEv1 proposals (or transform sets), for each parameter, you set one value. For
IKEv2 proposals, you can configure multiple encryption and integration algorithms for a single proposal.
• A crypto map, combines all components required to set up IPsec security associations (SA), including
IPsec rules, proposals, remote peers, and other parameters that are necessary to define an IPsec SA. When
two peers try to establish an SA, they must each have at least one compatible crypto map entry.
Dynamic crypto map policies are used in site-to-site VPNs when an unknown remote peer tries to start
an IPsec security association with the local hub. The hub cannot be the initiator of the security association
negotiation. Dynamic crypto-policies allow remote peers to exchange IPsec traffic with a local hub even
if the hub does not know the remote peer’s identity. A dynamic crypto map policy essentially creates a
crypto map entry without all the parameters configured. The missing parameters are later dynamically
configured (as the result of an IPsec negotiation) to match a remote peer’s requirements.
Dynamic crypto map policies are applicable to both hub-and-spoke and point-to-point VPN topologies.
To apply dynamic crypto map policies, specify a dynamic IP address for one of the peers in the topology
and ensure that the dynamic crypto-map is enabled on this topology. Note that in a full mesh VPN
topology, you can apply only static crypto map policies.
Note Simultaneous IKEv2 dynamic crypto map is not supported for the same interface
for both remote access and site-to-site VPNs on threat defense.
Secure Firewall 1200 series, IPsec connections are offloaded to the Marvell Cryptographic Accelerator (CPT)
to improve device performance.
Offloaded operations specifically relate to the pre-decryption and decryption processing on ingress, and the
pre-encryption and encryption processing on egress. The system software handles the inner flow to apply
your security policies.
IPsec flow offload is enabled by default, and applies to the following device types:
• Secure Firewall 1200
• Secure Firewall 3100
• Secure Firewall 4200
IPsec flow offload is also used when the device's VTI loopback interface is enabled.
VPN Licensing
There is no specific licensing for enabling Secure Firewall Threat Defense VPN, it is available by default.
The management center determines whether to allow or block the usage of strong crypto on the threat defense
device based on attributes provided by the smart licensing server.
This is controlled by whether you selected the option to allow export-controlled functionality on the device
when you registered with the Cisco Smart License Manager. If you are using the evaluation license, or you
did not enable export-controlled functionality, you cannot use strong encryption.
If you have created your VPN configurations with an evaluation license, and upgrade your license from
evaluation to smart license with export-controlled functionality, check, and update your encryption algorithms
for stronger encryption and for the VPNs to work properly. DES-based encryptions are no longer supported.
Note If you are qualified for strong encryption, before upgrading from the evaluation license to a smart license,
check and update your encryption algorithms for stronger encryption so that the VPN configuration works
properly. Choose AES-based algorithms. DES is not supported if you are registered using an account that
supports strong encryption. After registration, you cannot deploy changes until you remove all uses of DES.
provides higher security but a reduction in performance. GCM is a mode of AES that is required to
support NSA Suite B. NSA Suite B is a set of cryptographic algorithms that devices must support to
meet federal standards for cryptographic strength. .
• AES—Advanced Encryption Standard is a symmetric cipher algorithm that provides greater security
than DES and is computationally more efficient than 3DES. AES offers three different key strengths:
128-, 192-, and 256-bit keys. A longer key provides higher security but a reduction in performance.
• DES—Data Encryption Standard, which encrypts using 56-bit keys, is a symmetric secret-key block
algorithm. If your license account does not meet the requirements for export controls, this is your only
option.
• Null, ESP-Null—Do not use. A null encryption algorithm provides authentication without encryption.
This is typically used for testing purposes only. However, it does not work at all on many platforms,
including virtual.
• Null or None (NULL, ESP-NONE)—(IPsec Proposals only.) A null Hash Algorithm; this is typically
used for testing purposes only. However, you should choose the null integrity algorithm if you select
one of the AES-GCM options as the encryption algorithm. Even if you choose a non-null option, the
integrity hash is ignored for these encryption standards.
If you select AES encryption, to support the large key sizes required by AES, you should use Diffie-Hellman
(DH) Group 5 or higher. IKEv1 policies do not support all of the groups listed below.
To implement the NSA Suite B cryptography specification, use IKEv2 and select one of the elliptic curve
Diffie-Hellman (ECDH) options: 19, 20, or 21. Elliptic curve options and groups that use 2048-bit modulus
are less exposed to attacks such as Logjam.
For IKEv2, you can configure multiple groups. The system orders the settings from the most secure to the
least secure and negotiates with the peer using that order. For IKEv1, you can select a single option only.
• 14—Diffie-Hellman Group 14: 2048-bit modular exponential (MODP) group. Considered good protection
for 192-bit keys.
• 15—Diffie-Hellman Group 15: 3072-bit MODP group.
• 16—Diffie-Hellman Group 16: 4096-bit MODP group.
• 19—Diffie-Hellman Group 19: National Institute of Standards and Technology (NIST) 256-bit elliptic
curve modulo a prime (ECP) group.
• 20—Diffie-Hellman Group 20: NIST 384-bit ECP group.
• 21—Diffie-Hellman Group 21: NIST 521-bit ECP group.
• 31—Diffie-Hellman Group 31: Curve25519 256-bit EC Group.
Pre-shared Keys
Pre-shared key enables you to share a secret key between two peers. IKE uses the key in the authentication
phase. You must configure the same shared key on each peer, or the IKE SA cannot be established.
To configure the pre-shared keys, choose whether you want to use a manual or automatically generated key,
and then specify the key in the IKEv1/IKEv2 options. Then, when you deploy your configuration, the key is
configured on all devices in the topology.
Certificates also provide non-repudiation of communication between two peers, meaning that it they prove
that the communication actually took place.
Certificate Enrollment
Using a PKI improves the manageability and scalability of your VPN since you do not have to configure
pre-shared keys between all the encrypting devices. Instead, you individually enroll each participating device
with a CA server, which is explicitly trusted to validate identities and create an identity certificate for the
device. When this has been accomplished, each participating peer sends their identity certificate to the other
peer to validate their identities and establish encrypted sessions with the public keys contained in the certificates.
See Certificate Enrollment Objects, on page 1393 for details on enrolling threat defense devices.
• Using the Simple Certificate Enrollment Protocol (SCEP) or Enrollment over Secure Transport (EST)
to retrieve the CA’s certificate from the CA server
• Manually copying the CA's certificate from another participating device
Trustpoints
Once enrollment is complete, a trustpoint is created on the managed device. It is the object representation of
a CA and associated certificates. A trustpoint includes the identity of the CA, CA-specific parameters, and
an association with a single enrolled identity certificate.
PKCS#12 File
A PKCS#12, or PFX, file holds the server certificate, any intermediate certificates, and the private key in one
encrypted file. This type of file may be imported directly into a device to create a trustpoint.
Revocation Checking
A CA may also revoke certificates for peers that no longer participate in you network. Revoked certificates
are either managed by an Online Certificate Status Protocol (OCSP) server or are listed in a certificate revocation
list (CRL) stored on an LDAP server. A peer may check these before accepting a certificate from another
peer.
Note DES continues to be supported in evaluation mode or for users who do not satisfy
export controls for strong encryption.
NULL is removed in IKEv2 policy, but supported in both IKEv1 and IKEv2
IPsec transform-sets.
Define a pre-shared key for VPN authentication manually or automatically, there is no default key. When
choosing automatic, the Secure Firewall Management Center generates a pre-shared key and assigns it to all
the nodes in the topology.
Implicit Topologies
In addition to the three main VPN topologies, other more complex topologies can be created as combinations
of these topologies. They include:
• Partial mesh—A network in which some devices are organized in a full mesh topology, and other devices
form either a hub-and-spoke or a point-to-point connection to some of the fully meshed devices. A partial
mesh does not provide the level of redundancy of a full mesh topology, but it is less expensive to
implement. Partial mesh topologies are used in peripheral networks that connect to a fully meshed
backbone.
• Tiered hub-and-spoke—A network of hub-and-spoke topologies in which a device can behave as a hub
in one or more topologies and a spoke in other topologies. Traffic is permitted from spoke groups to their
most immediate hub.
• Joined hub-and-spoke—A combination of two topologies (hub-and-spoke, point-to-point, or full mesh)
that connect to form a point-to-point tunnel. For example, a joined hub-and-spoke topology could comprise
two hub-and-spoke topologies, with the hubs acting as peer devices in a point-to-point topology.
VPN Topology
To create a new site-to-site VPN topology you must, specify a unique name, a topology type, choose the IKE
version that is used for IPsec IKEv1 or IKEv2, or both. Also, determine your authentication method. Once
configured, you deploy the topology to threat defense devices. The Secure Firewall Management Center
configures site-to-site VPNs on threat defense devices only.
You can select from three types of topologies, containing one or more VPN tunnels:
• Point-to-point (PTP) deployments establish a VPN tunnel between two endpoints.
• Hub and Spoke deployments establish a group of VPN tunnels connecting a hub endpoint to a group of
spoke nodes.
• Full Mesh deployments establish a group of VPN tunnels among a set of endpoints.
Authentication
For authentication of VPN connections, configure a preshared key in the topology, or a trustpoint on each
device. Preshared keys allow for a secret key, used during the IKE authentication phase, to be shared between
two peers. A trustpoint includes the identity of the CA, CA-specific parameters, and an association with a
single enrolled identity certificate.
Extranet Devices
Each topology type can include extranet devices, devices that you don’t manage in management center. These
include:
• Cisco devices that Secure Firewall Management Center supports, but for which your organization isn’t
responsible. Such as spokes in networks managed by other organizations within your company, or a
connection to a service provider or partner's network.
• Non-Cisco devices. You can’t use Secure Firewall Management Center to create and deploy configurations
to non-Cisco devices.
Add non-Cisco devices, or Cisco devices not managed by the Secure Firewall Management Center, to a VPN
topology as "Extranet" devices. Also specify the IP address of each remote device.
• For Point-to-point VPN, if the endpoint has an RBD threat defense HA WAN interface, VPN
configurations will be removed from the standby device.
SD-WAN Topology Configure a secure branch network Using SD-WAN Wizard for Secure
using the SD-WAN wizard. This Branch Network Deployment, on
wizard simplifies and automates page 1977
VPN and routing configuration of
your network using a hub and
spoke topology, enabling SD-WAN
capabilities.
SASE Topology Configure an IPsec IKEv2 tunnel Configure a SASE Tunnel for
from a threat defense device to an Umbrella, on page 1539
Umbrella Secure Internet Gateway
(SIG). This tunnel forwards all
internet-bound traffic to the
Umbrella SIG for inspection and
filtering.
Supported Domains
Leaf
User Roles
Admin
Supported Interfaces
• Subinterface interfaces
• Redundant interfaces
• Etherchannel interfaces
• VLAN interfaces
Procedure
Select Devices > VPN > Site To Site to manage your threat defense site-to-site VPN configurations and
deployments.
The page lists the site-to-site VPNs topologies and indicates the status of tunnels using color codes:
• Active (Green)–There is an active IPsec Tunnel.
• Unknown (Amber)–No tunnel establishment event has been received from the device yet.
• Down (Red)–There are no active IPsec tunnels.
• Deployment Pending–Topology has not been deployed on the device yet.
Step 1 Choose Devices > VPN > Site to Site, and click Add.
Step 2 Enter a name for the topology in the Topology Name field.
Step 3 Click the Policy-Based VPN radio button.
Step 4 Select the VPN topology and click Create.
Step 5 Choose the IKE versions to use during IKE negotiations. Check the IKEv1 or IKEv2 check box.
Default is IKEv2. Select either or both options as appropriate; select IKEv1 if any device in the topology
doesn’t support IKEv2.
You can also configure a backup peer for point-to-point extranet VPNs. For more information, see Threat
Defense VPN Endpoint Options, on page 1497.
Step 6 Required: Add Endpoints for this VPN deployment by clicking Add ( ) for each node in the topology.
Configure each endpoint field as described in Threat Defense VPN Endpoint Options, on page 1497.
• For Point to point, configure Node A and Node B.
• For Hub and Spoke, configure a Hub Node and Spoke Nodes
• For Full Mesh, configure multiple Nodes
Step 7 (Optional) Specify non-default IKE options for this deployment as described in Threat Defense VPN IKE
Options, on page 1501
Step 8 (Optional) Specify non-default IPsec options for this deployment as described in Threat Defense VPN IPsec
Options, on page 1503
Step 9 (Optional) Specify non-default Advanced options for this deployment as described in Threat Defense Advanced
Site-to-site VPN Deployment Options, on page 1506.
Step 10 Click Save.
The endpoints are added to your configuration.
What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Note Some VPN settings are validated only during deployment. Be sure to verify that your deployment was
successful.
If you get an alert that your VPN tunnel is inactive even when the VPN session is up, follow the VPN
troubleshooting instructions to verify and ensure that your VPN is active. For more information, see VPN
Monitoring and Troubleshooting, on page 1679 and VPN Troubleshooting, on page 1688.
Fields
Device
Choose an endpoint node for your deployment:
• A threat defense device managed by this management center
• A threat defense high availability container managed by this management center
• An Extranet device, any device (Cisco or third party) not managed by this management center.
Device Name
For extranet devices only, provide a name for this device. We recommend naming it such that it is
identifiable as an unmanaged device.
Interface
If you chose a managed device as your endpoint, choose an interface on that managed device.
For 'Point to Point' deployments, you can also configure an endpoint with dynamic interface. An endpoint
with a dynamic interface can pair only with an extranet device and can’t pair with an endpoint, which
has a managed device.
You can configure device interfaces at Devices > Device Management > Add/Edit device > Interfaces.
IP Address
• If you choose an extranet device, a device not managed by the management center, specify an IP
address for the endpoint.
For an extranet device, select Static and specify an IP address or select Dynamic to allow dynamic
extranet devices.
• If you chose a managed device as an endpoint, choose a single IPv4 address or multiple IPv6
addresses from the drop-down list. These IP addresses are already assigned to this interface on the
managed device.
• All endpoints in a topology must have the same IP addressing scheme. IPv4 tunnels can carry IPv6
traffic and vice versa. The Protected Networks define which addressing scheme the tunneled traffic
uses.
• If the managed device is a high-availability container, choose from a list of interfaces.
This IP is Private
Check the check box if the endpoint resides behind a firewall with network address translation (NAT).
Note Use this option only when the peer is managed by the same management center and don’t use this option
if the peer is an extranet device.
Public IP address
If you checked the This IP is Private check box, specify a public IP address for the firewall. If the
endpoint is a responder, specify this value.
Connection Type
Specify the allowed negotiation as bidirectional, answer-only, or originate-only. Supported combinations
for the connection type are:
Originate-Only Answer-Only
Bi-Directional Answer-Only
Bi-Directional Bi-Directional
Certificate Map
Choose a preconfigured certificate map object, or click Add ( ) to add a certificate map object. The
certificate map defines what information is necessary in the received client certificate to be valid for
VPN connectivity. See Certificate Map Objects, on page 1441 for details.
Protected Networks
Caution Hub and Spoke topology—To avoid traffic drop for a dynamic crypto map, ensure that you don’t select
the protected network any for both the endpoints.
If the protected network is configured as any, on both the endpoints, the crypto ACL that works upon
the tunnel is not generated.
Defines the networks that are protected by this VPN endpoint. Select the networks by selecting the list
of Subnet/IP Address that define the networks that are protected by this endpoint. Click Add ( ) to
select from available Network Objects or add new Network Objects. See Creating Network Objects, on
page 1383. Access control lists are generated from the choices made here.
• Subnet/IP Address (Network)—VPN endpoints can’t have the same IP address and protected
networks in a VPN endpoint pair cannot overlap. If protected networks for an endpoint contain IPv4
or IPv6 entries, the other endpoint's protected network must have at least one entry of the same type
(IPv4 or IPv6). If it doesn’t, the other endpoint's IP address must be of the same type and not overlap
with the entries in the protected network. (Use /32 CIDR address blocks for IPv4 and /128 CIDR
address blocks for IPv6.) If both of these checks fail, the endpoint pair is invalid.
• Access List (Extended)—An extended access list provides the capability to control the type of
traffic that will be accepted by this endpoint, like GRE or OSPF traffic. Traffic may be restricted
either by address or port. Click Add ( ) to add access control list objects.
Note Access Control List is supported only in the point to point topology.
If you do not exempt the VPN traffic from the NAT rules, the traffic gets dropped or is not routed through
the VPN tunnel to the remote device. After you enable this option, you can view the NAT exemptions
for the device in the NAT policy page (Device > NAT > NAT Exemptions).
Inside interfaces directly connected to the internal network
Specify the security zone or interface group for the inside interface(s) where the protected networks
reside. By default, the inside interface is any.
Click + to configure one or more interfaces from a security zone or an interface group that can map to
one or more inside interfaces. Ensure that the interface type of the security zone or an interface group is
Routed.
Advanced Settings
Enable Dynamic Reverse Route Injection—Reverse Route Injection (RRI) enables routes to be
automatically inserted into the routing process, for the networks and hosts protected by a remote tunnel
endpoint. Dynamic RRI routes are created only upon the successful establishment of IPsec security
associations (SA’s).
Note • Dynamic RRI is supported only on IKEv2, and not supported on IKEv1 or IKEv1 + IKEv2.
• Dynamic RRI isn’t supported on originate-only peer, Full Mesh topology, and Extranet peer.
• In Point-to-Point, only one peer can have dynamic RRI enabled.
• Between Hub and Spoke, only one of the endpoints can have dynamic RRI enabled.
• Dynamic RRI cannot be combined with a dynamic crypto map.
Send Local Identity to Peers—Select this option to send local identity information to the peer device.
Select one of the following Local Identity Configuration from the list and configure the local identity:
• IP address—Use the IP address of the interface for the identity.
• Auto—Use the IP address for pre-shared key and Cert DN for certificate-based connections.
• Email ID—Specify the email ID to use for the identity. The email ID can be up to 127 characters.
• Hostname—Use the fully qualified hostname.
• Key ID—Specify the key-id to use for the identity. The key ID must be fewer than 65 characters.
The local identity is used to configure a unique identity per IKEv2 tunnel, instead of a global identity
for all the tunnels. The unique identity allows threat defense to have multiple IPsec tunnels behind a
NAT to connect to the Cisco Umbrella Secure Internet Gateway (SIG).
For information about configuring a unique tunnel ID on Umbrella, see Cisco Umbrella SIG User
Guide.
VPN Filter—Select an extended access list from the list or click Add to create a new extended access
list object to filter the site-to-site VPN traffic.
The VPN filter provides more security and filters site-to-site VPN data using an extended access list.
The extended access list object selected for the VPN filter lets you filter pre-encrypted traffic before
entering the VPN tunnel and decrypted traffic that exits a VPN tunnel. The sysopt permit-vpn option,
when enabled, would bypass the access control policy rules for the traffic coming from the VPN tunnel.
When the sysopt permit-vpn option is enabled, the VPN filter helps in identifying and filtering the
site-to-site VPN traffic.
Note The VPN filter is supported only on Point to Point, and Hub and Spoke topologies. It isn’t supported on
Mesh topology.
For Hub and Spoke topology, you can choose to override the hub VPN filter on the spoke endpoints in
case a different VPN filter needs to enabled on a specific tunnel.
Select the Override VPN Filter on the Hub option to override the hub VPN filter on the spokes. Select
the Remote VPN Filter extended access list object or create an access list to override.
Note For an extranet device as a spoke, only the Override VPN filter on the Hub option is available.
For more information about sysopt permit-VPN, see Threat Defense Advanced Site-to-site VPN Tunnel
Options, on page 1508.
Note Settings in this dialog apply to the entire topology, all tunnels, and all managed devices.
Navigation Path
Configure the basic parameters for a point-to-point topology in a route-based VPN as described in Configure
a Policy-based Site-to-Site VPN and click the IKE tab.
Fields
Policy
Choose the required IKEv1 or IKEv2 policy objects from the predefined list or create new objects to
use. You can choose multiple IKEv1 and IKEv2 policies. IKEv1 and IKEv2 support a maximum of 20
IKE policies, each with a different set of values. Assign a unique priority to each policy that you create.
The lower the priority number, the higher the priority.
We recommend that you do not use values such as 10, 20 and so on because the default IKEv2 policy
for remote access VPN can have these values as its priority value. Before deployment, verify that the
priority values of the IKE policies (site-to-site and remote access VPN) do not conflict.
For details, see Threat Defense IKE Policies, on page 1454
Authentication Type
Site-to-site VPN supports two authentication methods, pre-shared key and certificate. For an explanation
of the two methods, see Deciding Which Authentication Method to Use, on page 1484.
Note In a VPN topology that supports IKEv1, the Authentication Method specified in the chosen IKEv1
Policy object becomes the default in the IKEv1 Authentication Type setting. These values must match,
otherwise, your configuration will error.
• Pre-shared Automatic Key—The management center automatically defines the pre-shared key
for this VPN. Specify the Pre-shared Key Length, the number of characters in the key, 1-27.
The character " (double quote) isn’t supported as part of pre-shared keys. If you’ve used " in a
pre-shared key, ensure that you change the character after you upgrade to Secure Firewall Threat
Defense 6.30 or higher.
• Pre-shared Manual Key—Manually assign the pre-shared key for this VPN. Specify the Key and
then reenter the same to Confirm Key.
When you choose this option for IKEv2, the Enforce hex-based pre-shared key only check box
appears, check if desired. If enforced, you must enter a valid hex value for the key, an even number
of 2-256 characters, using numerals 0-9, or A-F.
• Certificate—When you use certificates as the authentication method for VPN connections, peers
obtain digital certificates from a CA server in your PKI infrastructure, and trade them to authenticate
each other.
In the Certificate field, select a preconfigured certificate enrollment object. This enrollment object
generates a trustpoint with the same name on the managed device. The certificate enrollment object
should be associated with and installed on the device, post which the enrollment process is complete,
and then a trustpoint is created.
A trustpoint is a representation of a CA or identity pair. A trustpoint includes the identity of the CA,
CA-specific configuration parameters, and an association with one enrolled identity certificate.
Before you select this option, note the following:
• Ensure you’ve enrolled a certificate enrollment object on all the endpoints in the topology—A
certificate enrollment object contains the Certification Authority (CA) server information and
enrollment parameters that are required for creating Certificate Signing Requests (CSRs) and
obtaining Identity Certificates from the specified CA. Certificate Enrollment Objects are used
to enroll your managed devices into your PKI infrastructure, and create trustpoints (CA objects)
on devices that support VPN connections. For instructions on creating a certificate enrollment
object, see Adding Certificate Enrollment Objects, on page 1394, and for instructions on enrolling
the object on the endpoints see one of the following as applicable:
• Installing a Certificate Using Self-Signed Enrollment , on page 1469
• Installing a Certificate using EST Enrollment, on page 1470
• Installing a Certificate Using SCEP Enrollment, on page 1471
• Installing a Certificate Using Manual Enrollment, on page 1471
• Installing a Certificate Using a PKCS12 File, on page 1472
Note For a site-to-site VPN topology, ensure that the same certificate enrollment object
is enrolled in all the endpoints in the topology. For further details, see the table
below.
• Refer the following table to understand the enrollment requirement for different scenarios.
Some of the scenarios require you to override the certificate enrollment object for specific
devices. See Managing Object Overrides, on page 1342 to understand how to override objects.
Certificate Enrollment Device identity certificate for all endpoints is Device identity
Types from the same CA certificate for all
endpoints is from
Device-specific Device-specific different CAs
parameters are NOT parameters are
specified in the specified in the
certificate enrollment certificate enrollment
object object
• Understand the VPN certificate limitations mentioned in Secure Firewall Threat Defense VPN
Certificate Guidelines and Limitations, on page 1465.
Note If you use a Windows Certificate Authority (CA), the default application policies
extension is IP security IKE intermediate. If you use this default setting, you
must select the Ignore IPsec Key Usage option in the Advanced Settings section
on the Key tab in the PKI Certificate Enrollment dialog box for the object you
select. Otherwise, the endpoints can’t complete the site-to-site VPN connection.
Note Settings in this dialog apply to the entire topology, all tunnels, and all managed devices.
Configure the basic parameters for a point-to-point topology in a route-based VPN as described in Configure
a Policy-based Site-to-Site VPN and click the IPsec tab.
Crypto-Map Type
A crypto map combines all the components required to set up IPsec security associations (SA). When
two peers try to establish an SA, they must each have at least one compatible crypto map entry. The
IPsec security negotiation uses the proposals defined in the crypto map entry to protect the data flows
specified by that crypto map’s IPsec rules. Choose static or dynamic for this deployment's crypto-map:
• Static—Use a static crypto map in a point-to-point or full mesh VPN topology.
• Dynamic—Dynamic crypto-maps essentially create a crypto map entry without all the parameters
configured. The missing parameters are later dynamically configured (as the result of an IPsec
negotiation) to match a remote peer’s requirements.
Dynamic crypto map policies are applicable to both hub-and-spoke and point-to-point VPN
topologies. To apply these policies, specify a dynamic IP address for one of the peers in the topology
and ensure that the dynamic crypto-map is enabled on this topology. In a full mesh VPN topology,
you can apply only static crypto map policies.
IKEv2 Mode
For IPsec IKEv2 only, specify the encapsulation mode for applying ESP encryption and authentication
to the tunnel. This determines what part of the original IP packet has ESP applied.
• Tunnel mode—(default) Encapsulation mode is set to tunnel mode. Tunnel mode applies ESP
encryption and authentication to the entire original IP packet (IP header and data), hiding the ultimate
source and destination addresses and becoming the payload in a new IP packet.
The major advantage of tunnel mode is that you don’t need to modify the end systems to receive
the benefits of IPsec. This mode allows a network device, such as a router, to act as an IPsec proxy.
That is, the router performs encryption on behalf of the hosts. The source router encrypts packets
and forwards them along the IPsec tunnel. The destination router decrypts the original IP datagram
and forwards it onto the destination system. Tunnel mode also protects against traffic analysis; with
tunnel mode, an attacker can only determine the tunnel endpoints and not the true source and
destination of the tunneled packets, even if they are the same as the tunnel endpoints.
• Transport preferred—Encapsulation mode is set to transport mode with an option to fall back to
tunnel mode if the peer doesn’t support it. In transport mode only the IP payload is encrypted, and
the original IP headers are left intact. Therefore, the admin must select a protected network that
matches the VPN interface IP address.
This mode has the advantages of adding only a few bytes to each packet and allowing devices on
the public network to see the final source and destination of the packet. With transport mode, you
can enable special processing (for example, QoS) on the intermediate network based on the
information in the IP header. However, the layer 4 header is encrypted, which limits examination
of the packet.
• Transport required— Encapsulation mode is set to transport mode only, falling back to tunnel
mode is allowed. If the endpoints can’t successfully negotiate transport mode, due to one endpoint
not supporting it, the VPN connection is not made.
Proposals
Click Edit ( ) to specify the proposals for your chosen IKEv1 or IKEv2 method. Select from the available
IKEv1 IPsec Proposals or IKEv2 IPsec Proposals objects, or create and then select a new one. See
Configure IKEv1 IPsec Proposal Objects, on page 1453 and Configure IKEv2 IPsec Proposal Objects, on
page 1453 for details.
Note You can enable dummy Traffic Flow Confidentiality (TFC) packets at random lengths and intervals on
an IPsec security association (SA). You must have an IKEv2 IPsec proposal set before enabling TFC.
Enabling TFC packets prevents the VPN tunnel from being idle. Thus the VPN idle timeout configured
in the group policy doesn’t work as expected when you enable the TFC packets.
Note Enable or disable this option for all your VPN connections.
Navigation Path
Advanced > Tunnel
Tunnel Options
Only available for Hub and Spoke, and Full Mesh topologies. This section doesn’t appear for Point to Point
configurations.
• Enable Spoke to Spoke Connectivity through Hub—Disabled by default. Choosing this field enables
the devices on each end of the spokes to extend their connection through the hub node to the other device.
NAT Settings
• Keepalive Messages Traversal —Enabled by default. This parameter is a global setting that enables
NAT-T for all endpoints within a topology. Check this check box to enable keepalive messages for NAT
traversal. NAT traversal keepalive is used for the transmission of keepalive messages when there’s a
device (middle device) located between a VPN-connected hub and spoke, and that device performs NAT
on the IPsec flow.
NAT traversal allows seamless communication between the peer threat defense devices when there are
NAT devices between these devices. For hub and spoke topologies, this option is available only for the
spoke.
If you select this option, configure the Interval, in seconds, between the keepalive signals sent between
the spoke and the middle device to indicate that the session is active. The value can be from 5 to 3600
seconds. The default is 20 seconds. You can disable this feature for an endpoint in a topology when you
add it using the VPN wizard (Enable NAT Traversal check box in the Add Endpoint dialog box).
Session Settings
• Enable VPN Idle Timeout—Enabled by default. This timeout is the amount of time that the VPN
connection can be idle, without any activity in the tunnel, before it is disconnected. The default timeout
is 30 minutes.
Note For route-based VPNs, sysopt permit-vpn does not work. You must always create access control rules to
allow route-based VPN traffic.
There are two types of VTI interfaces: static VTI and dynamic VTI.
For more information, see Static VTI, on page 1510 and Dynamic VTI, on page 1511.
Static VTI
Static VTI uses tunnel interfaces to create a tunnel that is always-on between two sites. You must define a
physical interface as a tunnel source for a static VTI. You can associate a maximum of 1024 VTIs per device.
To create a static VTI interface in the management center, see Add a VTI Interface, on page 1516.
The figure below shows a VPN topology using static VTIs.
On Threat Defense 1:
• Static VTI IP address is [Link]
• Tunnel source is [Link]
• Tunnel destination is [Link]
On Threat Defense 2:
• Static VTI IP address is [Link]
• Tunnel source is [Link]
• Tunnel destination is [Link]
Benefits
• Minimizes and simplifies configuration.
You do not have to track all remote subnets for a crypto map access list, and configure complex access
lists or crypto maps.
• Provides a routable interface.
Supports IP routing protocols such as BGP, EIGRP, and OSPFv2/v3, and static routes.
• Supports backup VPN tunnels
• Supports load balancing using ECMP.
• Supports virtual routers.
• Provides differential access control for VPN traffic.
You can configure a VTI with a security zone and use it in an AC policy. This configuration:
• Allows you to classify and differentiate VPN traffic from clear-text traffic and permit VPN traffic
selectively.
• Provides differential access-control for VPN traffic across different VPN tunnels.
Dynamic VTI
Dynamic VTI uses a virtual template for dynamic instantiation and management of IPsec interfaces. The
virtual template dynamically generates a unique virtual access interface for each VPN session. Dynamic VTI
supports multiple IPsec security associations and accepts multiple IPsec selectors proposed by the spoke.
Benefits
• Minimizes and simplifies configuration.
You do not have to configure complex access lists or crypto maps.
• Simplifies management.
• Easily manage peer configuration for large enterprise hub and spoke deployments.
• Use only one dynamic VTI for multiple spokes, instead of configuring one static VTI per spoke.
How Does the Management Center Create a Dynamic VTI Tunnel for a VPN Session
b. After the VPN session ends, the tunnel disconnects and the hub deletes the corresponding virtual
access interface.
To create a dynamic VTI interface in the management center, see Add a VTI Interface, on page 1516.
To configure a route-based site-to-site VPN using dynamic VTI, see Configure Dynamic VTI for a Route-based
Site-to-Site VPN, on page 1530.
A dynamic VTI and its corresponding protected network interface must be part of the same virtual router.
You must map the borrow IP interface and the dynamic VTI to the same virtual router. A tunnel source
interface can be part of multiple virtual routers.
To configure virtual routers using dynamic VTI for a route-based site-to-site VPN, see How to Configure a
Virtual Router with Dynamic VTI, on page 1156.
For more information about a configuration example, see How to Secure Traffic from Networks with Multiple
Virtual Routers over a Site-to-Site VPN with Dynamic VTI, on page 1188
• VTI supports static and dynamic IPv6 addresses as the tunnel source and destination.
• The tunnel source interface can have IPv6 addresses and you can specify the tunnel endpoint address. If
you don’t specify the address, by default, the threat defense uses the first IPv6 global address in the list
as the tunnel endpoint.
Firewall Mode
VTI is supported in routed mode only.
• If a spoke has a dynamic IP address and a hub has a dynamic VTI behind a NAT, the tunnel status will
be unknown.
• For a dynamic extranet, when multiple spokes establish a connection, the site-to-site monitoring dashboard
does not show the individual tunnels.
• If you configure a hub with dynamic VTI behind NAT with dynamic spokes, the VPN monitoring data
will not be accurate.
• We recommend that you configure only a single hub for a route-based hub and spoke topology. To
configure a topology with multiple hubs for a set of spokes, with one hub as the backup hub, configure
multiple topologies with a single hub and the same set of spokes. For more information, see Configure
Multiple Hubs in a Route-based VPN, on page 1525.
• You can use static, BGP, EIGRP IPv4, OSPFv2/v3 routes for traffic using the tunnel interface.
• In an HA configuration with dynamic routing, the standby device cannot access the known subnets
through the VTI tunnels as these tunnels are created with the active IP address.
• You can configure a maximum of 1024 static and dynamic VTIs on a device. While calculating the VTI
count, consider the following:
• Include nameif subinterfaces to derive the total number of VTIs that can be configured on the device.
• You can’t configure nameif on the member interfaces of a portchannel. Therefore, the tunnel count
is reduced by the count of actual main portchannel interfaces alone and not any of its member
interfaces.
• The VTI count on a platform is limited to the number of VLANs configurable on that platform. For
example, Firepower 1120 supports 512 VLANs, the tunnel count is 512 minus the number of physical
interfaces configured.
• If you’re configuring more than 400 VTIs on a device in a high-availability setup, you must configure
45 seconds as the unit holdtime for the threat defense HA.
• The MTU for VTIs is automatically set, according to the underlying physical interface.
• For dynamic VTI, the virtual access interface inherits the MTU from the configured tunnel source
interface. If you don’t specify the tunnel source interface, the virtual access interface inherits the MTU
from the source interface from which the threat defense accepts the VPN session request.
• Static VTI supports IKE versions v1, v2, and uses IPsec for sending and receiving data between the
tunnel's source and destination.
• Dynamic VTI supports only IKE version v2, and uses IPsec for sending and receiving data between the
tunnel's source and destination.
• For static and dynamic VTI, ensure that you don’t use the borrow IP interface as the tunnel source IP
address for any VTI interface.
• When you configure a route-based site-to-site VPN using static or dynamic VTI interfaces, ensure that
the value of the TTL hop is more than one if you use BGP.
• If NAT has to be applied, the IKE and ESP packets are encapsulated in the UDP header.
• IKE and IPsec security associations are re-keyed continuously regardless of data traffic in the tunnel.
This ensures that VTI tunnels are always up.
• Tunnel group name must match what the peer sends as its IKEv1 or IKEv2 identity.
• For IKEv1 in LAN-to-LAN tunnel groups, you can use names which aren’t IP addresses, if the tunnel
authentication method is digital certificates and/or the peer is configured to use aggressive mode.
• VTI and crypto map configurations can coexist on the same physical interface, if the peer address
configured in the crypto map and the tunnel destination for the VTI are different.
• By default, all traffic sent through a VTI is encrypted.
• Access rules can be applied on a VTI interface to control traffic through VTI.
• You can associate VTI interfaces with ECMP zones and configure ECMP static routes to achieve the
following:
• Load balancing (Active/Active VTIs)—Connection can flow over any of the parallel VTI tunnels.
• Seamless connection migration—When a VTI tunnel becomes unreachable, the flows are seamlessly
migrated to another VTI interface that is configured in the same zone.
• Asymmetric routing—Forward traffic flow through one VTI interface and configure the reverse
traffic flow through another VTI interface.
For information on configuring ECMP, see Configure an Equal Cost Static Route, on page 1214.
• For route-based VPNs, Bypass Access Control policy for decrypted traffic (sysopt connection permit-vpn)
does not work. You must always create access control rules to allow route-based VPN traffic.
Related Topics
Guidelines and Limitations for Loopback Interfaces, on page 819
Create a Route-based Site-to-Site VPN, on page 1518
For a Secure Firewall 1200, Secure Firewall 3100 or Secure Firewall 4200 device, IPsec flow offload is also
used when the device's VTI loopback interface is enabled.
Procedure
Step 6 (Optional) Choose a security zone from the Security Zone drop-down list to add the static VTI or dynamic
VTI interface to that zone.
If you want to perform traffic inspection based on a security zone, add the VTI interface to the security zone
and configure an access control (AC) rule. To permit the VPN traffic over the tunnel, you need to add an AC
rule with this security zone as the source zone.
Step 7 Enter the priority to load balance the traffic across multiple VTIs in the Priority field.
The range is from 0 to 65535. The lowest number has the highest priority. This option is not applicable for
dynamic VTI.
Step 9 (Optional for dynamic VTI) Choose the tunnel source interface from the Tunnel Source drop-down list.
The VPN tunnel terminates at this interface, a physical or loopback interface. Choose the IP address of the
interface from the drop-down list. You can select the IP address irrespective of the IPsec tunnel mode. In case
of multiple IPv6 addresses, select the address that you want to use as the tunnel endpoint.
Step 10 Under IPSec Tunnel Mode, click the IPv4 or IPv6 radio button to specify the traffic type over the IPsec
tunnel.
Step 11 Under IP Address:
• Configure IP: Enter the IPv4 or IPv6 address for the static VTI interface. You cannot configure an IP
address for a dynamic VTI interface. Use the Borrow IP field for the dynamic VTI interface.
• Borrow IP (IP unnumbered): Choose a physical or loopback interface from the drop-down list, the
VTI interface inherits this IP address.
Ensure that you use an IP address different from the tunnel source IP address. You can use this option
for a static or dynamic VTI interface.
Click Add to configure a loopback interface. The loopback interface helps to overcome path failures.
If an interface goes down, you can access all interfaces through the IP address assigned to the loopback
interface.
You can configure an extranet device as the hub and managed devices as spokes. You can configure multiple
hubs and spokes, and also configure backup hubs and spokes.
• For extranet hubs and spokes, you can configure multiple IPs as backup.
• For managed spokes, you can configure a backup static VTI interface along with the primary VTI interface.
For more information on VTI, see About Virtual Tunnel Interfaces, on page 1509.
Note All references to VTI stands for static VTI and dynamic VTI, unless mentioned.
Procedure
Step 1 Choose Devices > VPN > Site to Site, and click Add.
Step 2 Enter a name for the VPN topology in the Topology Name field.
Step 3 Choose Route Based (VTI) and do one of the following:
• Select Point to Point as the network topology. To configure endpoints for a route-based Point to Point
topology, see Configure Endpoints for a Point to Point Topology, on page 1519.
• Select Hub and Spoke as the network topology. To configure endpoints for a route-based Hub and
Spoke topology, see Configure Endpoints for a Hub and Spoke Topology, on page 1521.
What to do next
After you configure VTI interfaces and VTI tunnel on both the devices, you must configure:
• A routing policy to route the VTI traffic between the devices over the VTI tunnel. For more information,
see Configure Routing and AC Policies for VTI, on page 1531.
• An access control rule to allow encrypted traffic. Choose Policies > Access Control.
Procedure
Step 1 Under Node A, in the Device drop-down menu, select the name of the registered device (threat defense) or
extranet as the first endpoint of your VTI tunnel.
For an extranet peer, specify the following parameters:
a. Specify the name of the device.
b. Enter the primary IP address in the Endpoint IP address field. If you configure a backup VTI, add a
comma and, specify the backup IP address.
c. Click OK.
After configuring the above parameters for the extranet hub, specify the pre-shared key for the extranet in the
IKE tab.
Note
The AWS VPC has AES-GCM-NULL-SHA-LATEST as the default policy. If the remote peer connects to
AWS VPC, select AES-GCM-NULL-SHA-LATEST from the Policy drop-down list to establish the VPN
connection without changing the default value in AWS.
Step 2 For a registered device, you can specify the VTI interface for Node A from the Virtual Tunnel Interface
drop-down list.
The selected tunnel interface is the source interface for Node A and the tunnel destination for Node B.
If you want to create a new interface on Node A, click the Add icon and configure the fields as described
in Add a VTI Interface, on page 1516.
If you want to edit the configuration of an existing VTI, select the VTI in the Virtual Tunnel Interface
drop-down field and click Edit VTI.
Step 3 If your Node A device is behind a NAT device, check the Tunnel Source IP is Private check box. In the
Tunnel Source Public IP Address field, enter the tunnel source public IP address.
Step 4 Send Local Identity to Peers—Select this option to send local identity information to the peer device. Select
one of the following Local Identity Configuration from the list and configure the local identity:
• IP address—Use the IP address of the interface for the identity.
• Auto—Use the IP address for pre-shared key and Cert DN for certificate-based connections.
• Email ID—Specify the email ID to use for the identity. The email ID can be up to 127 characters.
• Hostname—Use the fully qualified hostname.
• Key ID—Specify the key-id to use for the identity. The key ID must be fewer than 65 characters.
The local identity is used to configure a unique identity per IKEv2 tunnel, instead of a global identity for all
the tunnels. The unique identity allows threat defense to have multiple IPsec tunnels behind a NAT to connect
to a Cisco Umbrella Secure Internet Gateway (SIG).
For information about configuring a unique tunnel ID on Umbrella, see Cisco Umbrella SIG User Guide.
Step 5 (Optional) Click Add Backup VTI to specify an extra VTI as the backup interface and configure the parameters.
Note
Ensure that both peers of the topology do not have the same tunnel source for the backup VTI. A device cannot
have two VTIs with the same tunnel source and tunnel destination; hence, configure a unique tunnel source
and tunnel destination combination.
Though the virtual tunnel interface is specified under Backup VTI, the routing configuration determines which
tunnel to be used as primary or backup.
Step 7 Expand Advance Settings to configure additional configurations for the device. For more information, see
Advanced Configurations for a Point to Point Topology in a Route-based VPN, on page 1521.
Step 8 Repeat the above procedure for Node B.
Step 9 Click OK.
What to do next
• (Optional) Specify the IKE options for the deployment as described in Threat Defense VPN IKE Options,
on page 1501.
• (Optional) Specify the IPsec options for the deployment as described in Threat Defense VPN IPsec
Options, on page 1503.
• (Optional) Specify the Advanced options for the deployment as described in Threat Defense Advanced
Site-to-site VPN Deployment Options, on page 1506.
• Click Save.
• To route traffic to the VTI, choose Devices > Device Management, edit the threat defense device and
click the Routing tab.
You can configure the static routes, or use BGP, OSPF v2/v3, or EIGRP for routing the VPN traffic.
• To permit VPN traffic, choose Policies > Access Control.. Add a rule specifying the security zone of
the VTI. For a backup VTI, ensure that you include the backup VTI in the same security zone as that of
the primary VTI.
Procedure
Step 1 Check the Send Virtual Tunnel Interface IP to the peers check box to send the VTI IP address to the peer
device.
Step 2 Check the Allow incoming IKEv2 routes from the peers check box to allow incoming IKEv2 routes from
the spokes and peers.
Step 3 Choose one of the following from the Connection Type drop-down list:
Answer Only: The device can only respond when a peer device initiates a connection, it can’t initiate any
connection.
Bidirectional: The device can initiate or respond to a connection. This is the default option.
Procedure
After configuring the above parameters for the extranet hub, specify the pre-shared key for the extranet
in the IKE tab.
Note
The AWS VPC has AES-GCM-NULL-SHA-LATEST as the default policy. If the remote peer connects
to AWS VPC, select AES-GCM-NULL-SHA-LATEST from the Policy drop-down list to establish the
VPN connection without changing the default value in AWS.
c) Choose a dynamic VTI from the Dynamic Virtual Tunnel Interface drop-down list.
Tunnel source configuration is mandatory for a dynamic VTI as the management center needs this
information to determine the tunnel destination of the spoke.
Click Add to add a new dynamic VTI. We recommend that you configure the Borrow IP for the dynamic
interface from a loopback interface.
If you want to edit an existing dynamic VTI, select the interface, and click Edit VTI.
d) (Optional) If your endpoint device is behind a NAT device, check the Tunnel Source IP is Private check
box and configure the tunnel source IP address in the Tunnel Source Public IP Address field.
e) Click Routing Policy to configure the routing policy for the hub.
f) Click AC Policy to configure the access control policy.
g) Expand Advance Settings to configure additional configurations on the hub. For more information, see
Advanced Configurations for Hub and Spokes in a Route-based VPN, on page 1524.
h) Click OK.
Step 2 Under Spoke Nodes:
a) Click Add to configure the spoke in the Add Endpoint dialog box.
b) Choose a spoke from the Device drop-down list.
For an extranet spoke, specify the following parameters:
1. Enter the name of the device.
2. Under Endpoint IP Address, choose one of the following:
• Static: Enter the IP address of the device, and the backup IP address, if required.
• Dynamic: Choose this option to dynamically assign the IP addresses for the extranet spokes.
3. Click OK.
c) Choose a static VTI from the Static Virtual Tunnel Interface drop-down list.
Click Add to add a new static VTI. Tunnel IP of the static VTI is auto populated, ensure that this IP
address is unique for the spoke.
If you want to edit an existing static VTI, select the interface, and click Edit VTI.
d) (Optional) If your endpoint device is behind a NAT device, check the Tunnel Source IP is Private check
box. The management center needs the tunnel source interface address to configure the tunnel destination
IP address on the spokes. In the Tunnel Source Public IP Address field, enter the tunnel source public
IP address.
e) (Optional) Send Local Identity to Peers—Check this check box to send the local identity information
to the peer device. Choose one of the following parameters from the Local Identity Configuration
drop-down list and configure the local identity:
• IP address—Use the IP address of the interface for the identity.
• Auto—Use the IP address for pre-shared key and Cert DN for certificate-based connections.
• Email ID—Specify the email ID to use for the identity. The email ID can be up to 127 characters.
• Hostname—Use the fully qualified hostname.
• Key ID—Specify the key-id to use for the identity. The key ID must be less than 65 characters.
The local identity is used to configure a unique identity per IKEv2 tunnel, instead of a global identity for
all the tunnels. The unique identity allows threat defense to have multiple IPsec tunnels behind a NAT to
connect to the Cisco Umbrella Secure internet Gateway (SIG).
For more information about configuring a unique tunnel ID on Umbrella, see Cisco Umbrella SIG User
Guide.
f) (Optional) Click Add Backup VTI to specify an extra VTI interface as the backup interface.
Note
Ensure that both peers of the topology do not have backup VTI configured on the same tunnel source.
For instance, if Peer A is having two VTIs (primary and a backup) configured with a single tunnel source
interface, say, [Link]/30, then Peer B also can’t have its 2 VTIs with a single tunnel source IP, say
[Link]/30.
Though the virtual tunnel interface is specified under backup VTI, the routing configuration determines
which tunnel to be used as primary or backup.
g) Click Routing Policy to configure the routing policy for the spoke.
h) Click AC Policy to configure the access control policy.
i) Expand Advance Settings to configure additional configurations on the spoke. For more information,
see Advanced Configurations for Hub and Spokes in a Route-based VPN, on page 1524.
j) Click OK.
What to do next
• (Optional) Specify the IKE options for the deployment as described in Threat Defense VPN IKE Options,
on page 1501.
• (Optional) Specify the IPsec options for the deployment as described in Threat Defense VPN IPsec
Options, on page 1503.
• (Optional) Specify the Advanced options for the deployment as described in Threat Defense Advanced
Site-to-site VPN Deployment Options, on page 1506.
• Click Save.
Procedure
Step 1 Check the Send Virtual Tunnel Interface IP to the peers check box to send the VTI IP address to the peer
device.
For a hub, you must check this check box if you use BGP as the routing protocol. This configuration ensures
that the loopback IP address is shared in the BGP routing table.
For a spoke, this option is enabled by default.
Step 2 Add the Protected Networks to define the networks protected by the VPN endpoint. Click Add to select
a protected network.
For a hub, configure the protected networks behind the hub. This information and the spoke's protected network
generate the spoke access list.
You cannot create a static route for a virtual access interface on a hub with dynamic VTI. The hub creates
and deletes these interfaces dynamically during tunnel establishment and termination.
For a spoke, configure the spoke's protected network.
To enable static routing for the spokes, after you configure the endpoints for your topology, click the IPsec
tab and check the Enable Reverse Route Injection check box.
You do not need this option if you use BGP, OSPF, or EIGRP.
Step 3 Check the Allow incoming IKEv2 routes from the peers check box to allow incoming IKEv2 routes from
the spokes and peers.
For a hub: During an IKE exchange, the hub advertises the dynamically created virtual access interfaces to
the spokes, and the spokes advertise their VTI IP addresses to the hub.
For a spoke: By default, this option is enabled.
Step 4 In the Connection Type drop-down list, choose one of the following:
Answer Only: The device can only respond when a peer device initiates a connection, it can’t initiate any
connection.
Bidirectional: The device can initiate or respond to a connection. This is the default option.
To configure topology 1:
Procedure
Step 1 Choose Devices > VPN > Site to Site, and click Add.
Step 2 Enter a name for the VPN topology in the Topology Name field.
Step 3 Choose Route Based (VTI) and do one of the following:
• Select Point to Point as the network topology. To configure endpoints for a route-based Point to Point
topology, see Configure Endpoints for a Point to Point Topology, on page 1519.
• Select Hub and Spoke as the network topology. To configure endpoints for a route-based Hub and
Spoke topology, see Configure Endpoints for a Hub and Spoke Topology, on page 1521.
g) Click OK.
Step 8 Under Spoke Nodes:
a) Click Add to add a spoke.
b) Choose Spoke 1 from the Device drop-down list.
c) Choose SVTI-1 as the static VTI for the spoke from the Static Virtual Tunnel Interface drop-down list
or click Add to add a new static VTI.
Choose the outside interface as the tunnel source of SVTI-1. Tunnel IP of SVTI-1 is autopopulated, ensure
that this IP address is unique for spoke 1 across peers in both the topologies.
d) Expand Advance Settings. If you do not use dynamic routing, you can configure these settings to enable
IKEv2 routing for the spoke.
• Check the Send Virtual Tunnel Interface IP to the peers check box to send the VTI IP address to
the peer device.
• Check the Allow incoming IKEv2 routes from the peers check box to allow incoming IKEv2
routes from the peers.
• Choose Connection Type as Bidirectional from the drop-down list.
e) Click OK.
f) Repeat steps 5a to 5e to add spoke 2. Configure SVTI-1 as the static VTI of spoke 2.
Step 9 Configure the IKE and IPSec parameters as required or use the default values.
What to do next
1. Configure topology 2 with hub 2, spoke 1, and spoke 2.
Configure SVTI-2 as the static VTI of spoke 1 and SVTI-2 as the static VTI of spoke 2 (refer the above
illustration). Tunnel source for SVTI-2 should be the same outside interface.
2. For each spoke, configure the routing policy. For more information, see Configure Routing for Multiple
Hubs in a Route-based VPN, on page 1527.
3. Verify the configuration and tunnel statuses. For more information, see Verify the Multiple Hubs
Configuration in a Route-based VPN, on page 1528.
Procedure
What to do next
Verify the configurations and tunnel statuses. For more information, see Verify the Multiple Hubs Configuration
in a Route-based VPN, on page 1528.
1 Review the guidelines and limitations. Guidelines and Limitations for Virtual Tunnel Interfaces,
on page 1513
3 In the Add Endpoint dialog box of the • Configure Endpoints for a Point to Point Topology,
Create New VPN Topology wizard, click on page 1519
Add Backup VTI to configure the
respective backup interface for each peer. • Configure Endpoints for a Hub and Spoke Topology,
on page 1521
4 Configure the routing policy. • Choose Devices > Device Management, and edit
the threat defense device.
• Click Routing.
5 Configure the access control policy. • Choose Policies > Access Control.
• After you configure the backup interfaces, configure the routing policy and access control policy for
routing traffic.
Though primary and backup VTIs are always available, traffic flows only through the tunnel that is
configured in the routing policy. For detailed information, see Configure Routing and AC Policies for
VTI, on page 1531.
• When you configure a backup VTI, ensure that you include the backup tunnel to the same security zone
as that of the primary VTI. No specific settings are required for the backup VTI in the AC policy page.
• If you configure a static route for the backup tunnel, configure a static route with a different metric to
handle the failover of the traffic flow over the backup tunnel.
1 Create a dynamic VTI interface on the hub. Add a VTI Interface, on page 1516
2 Create static VTI interfaces on the spokes. Add a VTI Interface, on page 1516
1 Create a route-based site-to-site VPN with Create a Route-based Site-to-Site VPN, on page
a dynamic VTI interface on the hub and 1518
static VTI(s) on the spoke(s).
3 Assign the interfaces to the virtual router. Configure a Virtual Router, on page 1166
4 Configure routing policies for the hub and Configure Endpoints for a Hub and Spoke
spoke. Topology, on page 1521
5 Configure access control policies for the Configure Endpoints for a Hub and Spoke
hub and spoke. Topology, on page 1521
BGP • Under General Settings > BGP, Configure BGP, on page 1269
enable BGP, provide the AS
number of the local device, and add
Router ID (if you choose Manual).
• Under BGP, enable IPv4/IPv6 and
click the Neighbor tab to configure
the neighbors.
• IP Address—Remote peer’s
VTI interface IP address. For
a backup tunnel, add a
neighbor with the remote
peer's backup VTI interface
IP address.
• Remote AS—Remote peer’s
AS number.
AC Policy Rule
Add an access control rule to the access control policy on the device to allow encrypted traffic between the
VTI tunnels with the following settings:
1. Create the rule with the Allow action.
2. Select the VTI security zone of the local device as the source zone and the VTI security zone of the remote
peer as the destination zone.
3. Select the VTI security zone of the remote peer as the source zone and the VTI security zone of the local
device as the destination zone.
For more information about configuring an access control rule, see Create and Edit Access Control Rules, on
page 1757.
Procedure
Step 1 Select Devices > Device Management and click Edit ( ) for your threat defense device. The Interfaces
page is selected by default.
Step 2 Click the Virtual Tunnels tab.
For each VTI, you can view details such as name, IP address, IPsec mode, tunnel source interface details,
topology, and remote peer IP. You can also view if path monitoring is enabled for each interface.
• Hub and spoke topology, where Umbrella is the hub and the managed threat defense devices are the
spokes.
• Pre-shared key based authentication.
• Threat Defense deployed in HA mode.
• Multi-instance: In a multi-instance deployment, you can integrate only one Umbrella account.
For high availability, you can configure two tunnels from a threat defense device and use the second tunnel
as the backup tunnel. Ensure that you configure different local tunnel IDs for each tunnel.
For ease of configuration, the management center configures the default IPsec and IKEv2 policies.
Default IKEv2 policy configuration:
• Integrity Algorithm: NULL
• Encryption Algorithm: AES-GCM-256
• PRF Algorithm: SHA-256
• DH Group: 19, 20
Related Topics
How to Deploy a SASE Tunnel on Umbrella, on page 1536
• You cannot edit or delete a SASE topology if the deployment to Umbrella is in progress. You can view
the tunnel deployment status in the:
• Cisco Umbrella Configuration dialog box of the wizard
• Notifications page under the Deployments and Tasks tabs
• Site to Site VPN Monitoring dashboard
• If you check the Deploy configuration on threat defense nodes check box in the wizard, the Umbrella
SASE topology configuration is deployed on the threat defense only after the tunnels are deployed on
Umbrella.
The management center requires the local tunnel ID to deploy the Umbrella configuration on the threat
defense. Umbrella generates the complete tunnel ID (<prefix>@<umbrella generated ID>-[Link])
only after the management center deploys the tunnel on Umbrella.
• The management center does not recognize topologies with the Umbrella data center as an extranet hub,
created before version 7.3, as SASE topologies. You must create new SASE topologies in version 7.3
and delete the existing topology.
• After a threat defense HA switchover, the SASE topology will not appear in the site-to-site
monitoring/VPN summary dashboard. We recommend that you bring the tunnel down using the
vpn-sessiondb logoff index command and bring it up using packet tracer.
Limitations
SASE topology does not support:
• Clustering
• Certificate-based authentication
• IKEv1
1 Review the guidelines and limitations. Guidelines and Limitations for Configuring SASE
Tunnels on Umbrella, on page 1535
2 Ensure that you meet the prerequisites. Prerequisites for Configuring Umbrella SASE Tunnels,
on page 1537
4 Configure a SASE tunnel on Umbrella. Configure a SASE Tunnel for Umbrella, on page 1539
5 View the status of the SASE tunnel. View SASE Tunnel Status, on page 1540
• Ensure that Umbrella data center is reachable from the threat defense.
• You can deploy a tunnel only between Cisco Umbrella and a threat defense version 7.1.0 and later.
Map Management Center Umbrella Parameters and Cisco Umbrella API Keys
To register the Cisco Umbrella with the management center and configure the Umbrella parameters in the
management center, you must:
1. Log in to Cisco Umbrella.
2. Choose Admin > API Keys > Legacy Keys.
3. Generate and copy the required API keys.
4. Use the API keys to configure the Cisco Umbrella connection parameters in the management center.
The figure below shows the parameters that you must configure in the Cisco Umbrella Connection in the
management center. DNScrypt Public Key is an optional parameter.
The figure below shows the Cisco Umbrella API keys that you must use to register the Cisco Umbrella with
the management center.
Table 79: Map Management Center Umbrella Parameters and Cisco Umbrella API Keys
Procedure
Step 1 Choose Devices > VPN > Site to Site, and click Add.
Step 2 Enter a name for the topology in the Topology Name field.
Step 3 Click the SASE Topology radio button and click Create.
Step 4 Pre-shared Key: This key is auto-generated according to the Umbrella PSK requirements. For a single
topology, the pre-shared key is common for all threat defense spokes and Umbrella.
The device and Umbrella share this secret key, and IKEv2 uses it for authentication. If you want to configure
this key, it must be between 16 and 64 characters in length, include at least one uppercase letter, one lowercase
letter, one numeral, and have no special characters. Each topology must have a unique pre-shared key. If a
topology has multiple tunnels, all the tunnels have the same pre-shared key.
Step 5 Choose a data center from the Umbrella Data center drop-down list. (Configure routing on the threat defense
to ensure reachability of the umbrella DC from the threat defense.)
Step 6 Click Add to add a threat defense node.
a) Choose a threat defense from the Device drop-down list.
Only devices managed by the management center appear in the list. For high availability pairs, the HA
pair names appear in the endpoint list.
b) Choose a static VTI interface from the VPN Interface drop-down list.
To create a new static VTI interface, click Add . The Add Virtual Tunnel Interface dialog box appears
with the following pre-populated default configurations.
• Tunnel Type is static.
• Name is <tunnel_source interface logical name>+ static_vti +<tunnel ID>. For example,
outside_static_vti_2.
• Tunnel ID is auto-populated with a unique ID.
• Tunnel Source Interface is auto-populated with an interface with an 'outside' prefix.
• IPsec tunnel mode is IPv4.
• IP address is from the 169.254.x.x/30 private IP address range.
c) Enter a prefix for the local tunnel ID in the Local Tunnel ID field.
The prefix can have a minimum of eight characters and a maximum of 100 characters. Umbrella generates
the complete tunnel ID (<prefix>@<umbrella generated ID>-[Link]) after the management center
deploys the tunnel on Umbrella. The management center then retrieves and updates the complete tunnel
ID and deploys it on the threat defense device. Each tunnel has a unique local tunnel ID.
d) Click Save to add the endpoint device to the topology.
You can add multiple endpoints in a SASE topology.
Step 7 Click Next to view the summary of the Umbrella SASE tunnel configuration.
• Endpoints pane: Displays the summary of the configured endpoints.
• Encryption Settings pane: Displays the default IKEv2 policies and IKEv2 IPsec transform sets for the
topology.
Step 8 Check the Deploy configuration on threat defense nodes check box to trigger deployment of the network
tunnels to the threat defense. This deployment occurs after the tunnels are deployed on Umbrella. Local tunnel
ID is required for the threat defense deployment.
Step 9 Click Save.
This action:
a. Saves the topology in the management center.
b. Triggers deployment of the network tunnels to the Umbrella.
c. Triggers deployment of the network tunnels to the threat defense devices, if the option is enabled. This
action commits and deploys all the updated configurations and policies, including non-VPN policies,
since the last deployment on the device.
d. Opens the Cisco Umbrella Configuration window and displays the status of the tunnel deployment on
Umbrella. For more details, see View SASE Tunnel Status, on page 1540.
What to do next
For the interesting traffic intended to flow through the SASE tunnel, configure a PBR policy with a specific
match criteria to send the traffic through the VTI interface.
Ensure that you configure a PBR policy for each endpoint of the SASE topology.
Procedure
Step 1 Choose Devices > VPN > Site to Site, and click Add.
Step 2 Enter a name for the topology in the Topology Name field.
Step 3 Click the SASE Topology radio button and click Create.
Step 4 Enter a unique Pre-shared Key, choose a data center, add a device, and click Next.
Step 5 View the summary of the Umbrella SASE Tunnel configuration and click Save. The Cisco Umbrella
Configuration window appears.
You can view the topology details such as name, data center, data center IP address, start, and end time of the
tunnel deployment.
You can view the deployment status of the tunnels on Umbrella. The different tunnel deployment statuses
are:
• Pending: The management center hasn’t pushed the configuration to Umbrella.
• Success: The management center successfully configured a tunnel on Umbrella.
• In Progress: The management center is deploying the tunnel on Umbrella.
• Failure: The management center couldn’t configure a tunnel on Umbrella.
If the status appears as pending, or failure, use the transcript to troubleshoot the tunnel creation. Click the
Transcript button to view the transcript details such as the APIs, request payload, and the response received
from Umbrella.
Step 6 Click Umbrella Dashboard to view the network tunnels in Cisco Umbrella.
Step 7 View the Umbrella tunnel deployment status in:
• The Notifications page under the Deployments and Tasks tabs.
• The Site to Site VPN dashboard (Overview > Dashboards > Site to Site VPN).
The dashboard provides a summary of the site to site VPN topologies including the Umbrella SASE
topologies. You can view the tunnels between the peer devices and the status of each tunnel. You can
also troubleshoot any problems with the tunnel deployment using CLI commands and packet tracer.
For information about configuring crypto-map based site to site VPNs, see Configure a Policy-based Site-to-Site
VPN, on page 1496.
For information about VTIs, see About Virtual Tunnel Interfaces, on page 1509.
For information about threat defense VPN monitoring and troubleshooting, see VPN Monitoring and
Troubleshooting, on page 1679.
• When a threat defense switches over to a secondary threat defense, there is a mismatch between the status
of the VPN tunnels in the management center and the threat defense. When the device switches back to
the primary device, the correct tunnel status appears.
• The management center does not update the tunnel status of threat defense devices earlier than 7.3 after
the devices reboot. We recommend that you bring the tunnel down using the command vpn-sessiondb
logoff index and bring it up using the packet tracer.
Tunnel Status
This table lists the site-to-site VPNs, including SASE topology VPN, configured using the management center.
Hover over a topology and click View ( ) to view the following details about the topology:
• General—Displays more information about the nodes such as IP address and interface name.
• CLI Details—Displays the CLI outputs for the following commands:
• show crypto ipsec sa peer <node A/B_ip_address>: Displays the IPsec SAs built between Node
A and B.
• show vpn-sessiondb l2l filter ipaddress <node A/B_ip_address>: Displays information about
VPN sessions.
• Packet Tracer—Use packet tracer to troubleshoot the threat defense VPN tunnels.
Packet Tracer
Packet tracer allows you to troubleshoot VPN tunnels between two threat defense devices. You can check if
the VPN connection between device A and device B is up. This tool injects a packet into the device and tracks
the packet flow from the ingress to the egress ports. The tool simulates traffic after you configure the ingress
interfaces of the devices along with the protected networks. Packet tracer evaluates the packet against modules
such as flow and route lookups, ACLs, protocol inspection, NAT, and QoS.
Figure 426: Packet Tracer
For each device, the tool runs an encrypted trace and a decrypted trace (packet is treated as decrypted VPN
traffic). You can run four different traces between the ingress and egress ports of the devices. Click the
individual encrypt and decrypt options to enable or disable the trace.
When you run the trace, the tool executes the trace sequentially in the following order:
1. Encrypted trace of A.
2. Decrypted trace of B.
3. Encrypted trace of B.
4. Decrypted trace of A.
After the trace completes, you can view the output of the trace with the results of each module.
Note You cannot run a decrypt trace for route-based (VTI-based) VPNs.
3. Choose the ingress interface for both the devices on which to trace the packet from the Ingress Interface
drop-down lists.
4. Enter an IP address from the same subnet as the ingress interface in the Protected Network IP Address
fields.
5. Click Trace Now.
After you initiate the trace, you can view if the trace is successful or not for each module. If the tunnel is
down, the path appears in red. If the tunnel is up, the path appears in green. If a tunnel is down, click
Re-trace to run the tool again. For a crypto-map based VPN, when the tunnel is inactive with no interesting
traffic, the initial trace can be red. Click Re-trace to run the trace again.
Extranet Nodes: You can initiate a packet trace for VPN tunnels with one node as an extranet. For an extranet
node, you cannot choose the ingress interface. The remaining steps for the packet trace are the same. You
can’t run trace on the extranet side.
For example, if Node A is a managed threat defense and Node B is an extranet:
• Configure the ingress interface for node A.
• Configure the protected network for Node A and B.
• Click Trace Now. The traces appear for Node A and not for Node B.
Click Pause to stop the automatic data refresh for as long as you want. You can click the same button to
resume refreshing the tunnel data.
Figure 429: Pause the Periodic Data Refresh
You can use multiple filtering criteria to view the data based on your requirement.
For example, you can choose to view only the tunnels that are in the Up and Down states, and ignore the ones
in the Unknown state.
Figure 431: Example: Filter Tunnel Data
Sort the data—To sort the data by a column, click the column heading.
Related Topics
About Site-to-Site VPN, on page 1491
About Virtual Tunnel Interfaces, on page 1509
View Virtual Tunnel 7.4.1 Any You can view details of dynamic and static VTIs of route-based VPNs on the
Information device. For every VPN topology, you can also view details of all the virtual
access interfaces of the dynamic VTIs.
New/Modified screens: Device > Device Management > Edit a device >
Interfaces and click the Virtual Tunnels tab.
IPsec flow offload 7.4 Any IPsec flow offload is automatically enabled on the VTI loopback interface on
Secure Firewall 3100 and Secure Firewall 4200 devices.
Umbrella SASE 7.3 Any You can configure an Umbrella SASE topology and deploy IPsec IKEv2 tunnels
Topology between a threat defense device and Umbrella. This tunnel forwards all
internet-bound traffic to the Umbrella Secure Internet Gateway (SIG) for
inspection and filtering.
Support for Dynamic 7.3 Any You can create a dynamic VTI and use it to configure a route-based site-to-site
Virtual Tunnel Interface VPN in a hub and spoke topology.
EIGRP IPv4 support for 7.3 Any Static and dynamic VTI interfaces support EIGRP IPv4 routing protocol.
VTI
OSPFv2/v3 IPv4/v6 7.3 Any Static and dynamic VTI interfaces support OSPFv2/v3 IPv4/v6 routing protocol.
support for VTI
Packet Tracer in Site to 7.3 Any Use the packet tracer tool in the site-to-site VPN monitoring dashboard to
Site VPN Monitoring troubleshoot the threat defense VPN tunnels.
Dashboard
New/Modified screens:
Overview > Dashboards > Site to Site VPN
Remote Access VPN 7.3 Any Use the Remote Access VPN dashboard to monitor real-time data from active
Dashboard remote access VPN sessions on the devices.
New/Modified screens:
Overview > Dashboards > Remote Access VPN
IPsec flow offload 7.2 Any On the Secure Firewall 3100, IPsec flows are offloaded by default. After the
initial setup of an IPsec site-to-site VPN or remote access VPN security
association (SA), IPsec connections are offloaded to the field-programmable
gate array (FPGA) in the device, which should improve device performance.
You can change the configuration using FlexConfig and the flow-offload-ipsec
command.
Site-to-Site VPN Filter 7.1 Any You can control site-to-site VPN traffic by using an access control policy.
Local tunnel ID support 7.1 Any For each endpoint on a site-to-site VPN, you can configure a unique tunnel ID
to be shared with the peers.
Multiple IKE Policy 7.1 Any You can add multiple IKEv1 and IKEv2 policy objects for each endpoint.
Support
Site-to-Site VPN 7.1 Any Use the Site-to-Site VPN Monitoring dashboard to view and monitor the status
Monitoring Dashboard of site-to-site VPN tunnels.
Backup virtual tunnel 7.0 Any When you configure a site-to-site VPN that uses virtual tunnel interfaces, you
interfaces (VTI) for can select a backup VTI for the tunnel. Specifying a backup VTI provides
route-based site-to-site resiliency, so that if the primary connection goes down, the backup connection
VPN. might still be functional. For example, you could point the primary VTI to the
endpoint of one service provider, and the backup VTI to the endpoint of a
different service provider.
You can add a backup VTI in the site-to-site VPN wizard by selecting
route-based as the VPN type for a point-to-point connection.
Enhance the number of 7.0 Any Support for maximum number of VTIs is enhanced from 100 per physical
VTI from 100 per interface to 1024 VTIs per device.
interface to 1024 per
device
IPv6 Support 7.0 Any You can configure IPv6 addressed VTIs. While only static IPv6 address is
supported as the tunnel source and destination, IPv6 BGP isn’t supported over
VTI.
Removal and deprecation 6.7 Any Support has been removed for less secure ciphers. We recommend that you
of weak ciphers update your VPN configuration before you upgrade to threat defense 6.70 to
supported DH and encryption algorithms to ensure the VPN works correctly.
Update your IKE proposals and IPSec policies to match the ones supported in
threat defense 6.70 and then deploy the configuration changes.
The following less secure ciphers have been removed or deprecated in threat
defense 6.70 onwards:
• Diffie-Hellman GROUP 5 is deprecated for IKEv1 and removed for
IKEv2
• Diffie-Hellman groups 2 and 24 have been removed.
• Encryption algorithms: 3DES, AES-GMAC, AES-GMAC-192,
AES-GMAC-256 have been removed.
Note
DES is supported in evaluation mode or for users who do not satisfy
export controls for strong encryption.
NULL is removed in IKEv2 policy, but supported in both IKEv1 and
IKEv2 IPsec transform-sets.
Dynamic RRI support 6.7 Any Dynamic Reverse Route Injection is supported with IKEv2 based static crypto
maps.
Backup peer for 6.6 Any You can use the management center to add a backup peer to a site-to-site VPN
site-to-site VPN connection. For example, if you have two ISPs, you can configure the VPN
connection to fail over to the backup ISP if the connection to the first ISP
becomes unavailable.
New/modified pages:
Devices > VPN > Site to Site. When adding or editing a point to point or hub
and spoke FTD VPN topology to add an endpoint, the IP Address field supports
comma-separated backup peers.
Description
Secure Firewall Threat Defense remote access VPN • SSL and IPsec-IKEv2 remote access using the
features Secure Client.
• Secure Firewall Management Center supports
all combinations such as IPv6 over an IPv4
tunnel.
• Configuration support on both management
center and device manager. Device-specific
overrides.
• Support for both Secure Firewall Management
Center and threat defense HA environments.
• Support for multiple interfaces and multiple
AAA servers.
• Rapid Threat Containment support using
RADIUS CoA or RADIUS dynamic
authorization.
• Support for DTLS v1.2 protocol with Cisco
Secure Client version 4.7 or higher.
• Secure Client modules support for additional
security services for remote access VPN
connections.
• VPN load balancing.
Description
Remote access VPN monitoring features • New VPN Dashboard Widget showing VPN
users by various characteristics such as duration
and client application.
• Remote access VPN events including
authentication information such as username and
OS platform.
• Tunnel statistics available using the threat
defense Unified CLI.
certificate under the device certificate homepage. The status provides a clear standing as to whether the
certificate enrollment was successful or not. Your remote access VPN policy configuration is now fully
completed and ready for deployment.
Obtaining a certificate for the secure gateway, also known as PKI enrollment, is explained in Certificates, on
page 1465. This chapter contains a full description of configuring, enrolling, and maintaining gateway certificates.
Note If you are using client certificates in your deployment, they must be added to your client's platform independent
of the Secure Firewall Threat Defense or Secure Firewall Management Center. Facilities such as SCEP or
CA Services are not provided to populate your clients with certificates.
AAA servers enable managed devices acting as secure gateways to determine who a user is (authentication),
what the user is permitted to do (authorization), and what the user did (accounting). Some examples of the
AAA servers are RADIUS, LDAP/AD, TACACS+, and Kerberos. For Remote Access VPN on threat defense
devices, AD, LDAP, and RADIUS AAA servers are supported for authentication.
Refer to the section Understanding Policy Enforcement of Permissions and Attributes to understand more
about remote access VPN authorization.
Before you add or edit the remote access VPN policy, you must configure the Realm and RADIUS server
groups you want to specify. For more information, see Create an LDAP Realm or an Active Directory Realm
and Realm Directory, on page 2376 and Add a RADIUS Server Group, on page 1344.
Without DNS configured, the device cannot resolve AAA server names, named URLs, and CA Servers with
FQDN or Hostnames, it can only resolve IP addresses.
The login information provided by a remote user is validated by an LDAP or AD realm or a RADIUS server
group. These entities are integrated with the Secure Firewall Threat Defense secure gateway.
Note If users authenticate with remote access VPN using Active Directory as the authentication source, users must
log in using their username; the format domain\username or username@domain fails. (Active Directory
refers to this username as the logon name or sometimes as sAMAccountName.) For more information, see
User Naming Attributes on MSDN.
If you use RADIUS to authenticate, users can log in with any of the preceding formats.
Once authenticated via a VPN connection, the remote user takes on a VPN Identity. This VPN Identity is used
by identity policies on the Secure Firewall Threat Defense secure gateway to recognize and filter network
traffic belonging to that remote user.
Identity policies are associated with access control policies, which determine who has access to network
resources. It is in this way that the remote user blocked or allowed to access your network resources.
For more information, see the About Identity Policies, on page 2503 and Access Control Policies, on page 1721
sections.
Related Topics
Configure AAA Settings for Remote Access VPN, on page 1575
Note The threat defense device does not support inheriting system default attributes from the default group policy,
DfltGrpPolicy. The attributes on the group policy assigned to the connection profile are used for the user
session, if they are not overridden by user attributes or the group policy from the AAA server as indicated
above.
Related Topics
Configure AAA Settings for Remote Access VPN, on page 1575
To use the same AAA servers for both activities, we recommend specifying the Management interface as the
source interface.
For more information about various interfaces, see Regular Firewall Interfaces, on page 807.
After deployment, use the following CLI commands to monitor and troubleshoot AAA server connectivity
from the threat defense device:
• show aaa-server to display AAA server statistics.
• show network and show network-static-routes to view the Management interface default route and
static routes.
• show route to view data traffic routing table entries.
• ping system and traceroute system to verify the path to the AAA server through the Management
interface.
• ping interface ifname and traceroute destination to verify the path to the AAA server through the
data interfaces.
• test aaa-server authentication and test aaa-server authorization to test authentication and authorization
on the AAA server.
• clear aaa-server statistics groupname or clear aaa-server statistics protocol protocol to clear AAA
server statistics by group or protocol.
• aaa-server groupname active host hostname to activate a failed AAA server, or aaa-server
groupname fail host hostname to fail a AAA server.
• debug ldap level, debug aaa authentication, debug aaa authorization, and debug aaa accounting.
Supported Domains
Any
User Roles
Admin
memory and device model. Before deploying remote access VPN policy changes, review the Best Practices
for Deploying Configuration Changes, on page 250.
• Issuing commands such as curl against the RA VPN headend is not directly supported, and might not
have desirable results. For example, the headend does not respond to HTTP HEAD requests.
• Threat Defense does not accept remote access VPN sessions if the third-party client sends a null user
agent.
• You can configure browser proxy using FlexConfig.
• In a remote branch deployment (RBD) with High Availability, when you break a High Availability pair,
the RA VPN policy assignment and VPN configurations will be removed on the RBD WAN interface
of the standby unit.
Firepower 1010 75
ISA 3000 25
Note The threat defense device denies the VPN connections once the maximum session limit per platform is reached.
The connection is denied with a syslog message. Refer the syslog messages %ASA-4-113029 and
%ASA-4-113038 in the syslog messaging guide. For more information, see Cisco Secure Firewall ASA Series
Syslog Messages.
Client Certificates
If you are using client certificates in your deployment, they must be added to your client's platform independent
of the Secure Firewall Threat Defense or Secure Firewall Management Center. Facilities such as SCEP or
CA Services are not provided to populate your clients with certificates.
Note Using multiple Secure Client packages on threat defense devices can increase memory usage and affect the
device's performance. We recommend that you do not use multiple Secure Client packages on low-end threat
defense devices to avoid continuous reboots because of memory exhaustion.
The following Secure Client features are not supported when connecting to a threat defense secure gateway:
• TACACS, Kerberos (KCD Authentication and RSA SDI), and SDI.
1 Review the guidelines and prerequisites. Guidelines and Limitations for Remote Access VPNs,
on page 1558
Prerequisites for Configuring Remote Access VPN, on
page 1562
2 Create a new remote access VPN policy Create a New Remote Access VPN Policy, on page 1562
using the wizard.
3 Update the access control policy deployed Update the Access Control Policy on the Secure Firewall
on the device. Threat Defense Device, on page 1565
4 (Optional) Configure a NAT exemption (Optional) Configure NAT Exemption, on page 1566
rule if NAT is configured on the device.
6 Add Secure Client Profile. Add Secure Client Profile XML File, on page 1567
7 Deploy the remote access VPN policy. Deploy Configuration Changes, on page 251
8 (Optional) Verify the remote access VPN Verify the Configuration, on page 1570
policy configuration.
Procedure
You must proceed through the entire wizard to create a new policy; the policy is not saved if you cancel before
you complete the wizard.
Step 10 Select the Secure Client Image that the VPN users will use to connect to the remote access VPN.
The Secure Client provides secure SSL or IPSec (IKEv2) connections to the Secure Firewall Threat Defense
device for remote users with full VPN profiling to corporate resources. After the remote access VPN policy
is deployed on the threat defense device, VPN users can enter the IP address of the configured device interface
in their browser to download and install the Secure Client.
For information about configuring the client profile and client modules, see Group Policy Secure Client
Options, on page 1448.
(Optional) Check the Enable DTLS on member interfaces check box, if required. DTLS is applicable only
for SSL protocol.
Step 18 Click Finish to complete the basic configuration for the remote access VPN policy.
When you complete the Remote Access VPN Policy Wizard, the policy listing page appears. Later, set up
DNS configuration, configure access control for VPN users, and enable NAT exemption (if necessary) to
complete a basic remote access VPN Policy configuration.
What to do next
Use the Remote Access VPN dashboard (Overview > Dashboards > Remote Access VPN) to monitor
real-time data from active remote access VPN sessions on the devices. You can quickly determine problems
related to user sessions and mitigate the problems for your network and users. For more information, see
Remote Access VPN Dashboard, on page 1679.
Update the Access Control Policy on the Secure Firewall Threat Defense
Device
Before deploying the remote access VPN policy, you must update the access control policy on the targeted
Secure Firewall Threat Defense device with a rule that allows VPN traffic. The rule must allow all traffic
coming in from the outside interface, with source as the defined VPN pool networks and destination as the
corporate network.
Note If you have selected the Bypass Access Control policy for decrypted traffic (sysopt permit-vpn) option
on the Access Interface tab, you need not update the access control policy for remote access VPN.
Enable or disable the option for all your VPN connections. If you disable this option, make sure that the traffic
is allowed by the access control policy or pre-filter policy.
For more information, see Configure Access Interfaces for Remote Access VPN, on page 1591.
Procedure
Step 1 On your Secure Firewall Management Center web interface, choose Policies > Access Control.
Step 2 Click Edit on the access control policy that you want to update.
Step 3 Click Add Rule to add a new rule.
Step 4 Specify the Name for the rule and select Enabled.
Step 5 Select the Action, Allow or Trust.
Step 6 Select the following on the Zones tab:
a) Select the outside zone from Available Zones and click Add to Source.
b) Select the inside zone from Available Zones and click Add to Destination.
Step 7 Select the following on the Networks tab:
a) Select the inside network (inside interface and/or a corporate network) from Available networks and click
Add to Destination.
b) Select the VPN address pool network from Available Networks and click Add to Source Networks.
Step 8 Configure other required access control rule settings and click Add.
Step 9 Save the rule and access control policy.
Procedure
Step 1 On your Secure Firewall Management Center web interface, click Devices > NAT.
Step 2 Select a NAT policy to update or click New Policy to create a NAT policy with a NAT rule to allow
connections through all interfaces.
Step 3 Click Add Rule to add a NAT rule.
Step 4 On the Add NAT Rule window, select the following:
a) Select the NAT Rule as Manual NAT Rule.
b) Select the Type as Static.
c) Click Interface Objects and select the Source and destination interface objects.
Note
This interface object must be the same as the interface selected in the remote access VPN policy.
For more information, see Configure Access Interfaces for Remote Access VPN, on page 1591.
a) Click Translation and select the source and destination networks:
• Original Source and Translated Source
Step 5 On the Advanced tab, select Do not proxy ARP on Destination Interface.
Do not proxy ARP on Destination Interface—Disables proxy ARP for incoming packets to the mapped IP
addresses. If you use addresses on the same network as the mapped interface, the system uses proxy ARP to
answer any ARP requests for the mapped addresses, thus intercepting traffic destined for a mapped address.
This solution simplifies routing because the device does not have to be the gateway for any additional networks.
You can disable proxy ARP if desired, in which case you need to be sure to have proper routes on the upstream
router.
Configure DNS
Configure DNS on each threat defense device in order to use remote access VPN. Without DNS, the devices
cannot resolve AAA server names, named URLs, and CA Servers with FQDN or Hostnames. It can only
resolve IP addresses.
Procedure
Step 1 Configure DNS server details and domain-lookup interfaces using the Platform Settings. For more information,
see DNS, on page 939 and DNS Server Group, on page 1364.
Step 2 Configure split-tunnel in group policy to allow DNS traffic through remote access VPN tunnel if the DNS
server is reachable through VNP network. For more information, see Configure Group Policy Objects, on
page 1445.
Procedure
c) Click Save.
Step 7 Save your changes.
Procedure
Step 7 Click Standard Access List or Extended Access List, and select an access list from the drop-down or add
a new one.
Step 8 If you choose to add a new standard or extended access list, do the following:
a) Specify the Name for the new access list and click Add.
b) Choose Allow from the Action drop-down.
c) Select the network traffic that you want to allow over the VPN tunnel and click Add.
Step 9 Save your changes.
Related Topics
Access List, on page 1349
Procedure
What to do next
1. Deploy the configuration to threat defense.
2. Verify the configured dynamic split tunnel configuration on the threat defense and the Secure Client. For
more information, see Verify Dynamic Split Tunneling Configuration, on page 1570.
Click the Statistics ( ) icon and choose VPN > Statistics. You can confirm the domains under the
Dynamic Split Exclusion/Inclusion category.
Procedure
The VPN prompts you to download Secure Client if Secure Client is not installed.
Step 4 Download Secure Client if it is not installed and connect to the VPN.
The Secure Client installs itself. On successful authentication, you establish connection to the Secure Firewall
Threat Defense remote access VPN gateway. The remote access VPN enforces the applicable identity or QoS
policy according to your VPN policy configuration.
Note Users with read-only permission for remote access VPN cannot create copy of the VPN. Users with read-only
privileges in the domain can copy the remote access VPNs.
Procedure
What to do next
To assign devices to the new policy, see Set Target Devices for a Remote Access VPN Policy, on page 1571.
Procedure
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Procedure
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Procedure
Note You can use the IP address from the existing IP pools in the Management Center or create a new pool using
the Add option. Also, you can create an IP pool in Management Center using the Objects > Object
Management > Address Pools path. For more information, see Address Pools, on page 1354.
Procedure
a) Click + next to Address Pools to add IP addresses, and select IPv4 or IPv6 to add the corresponding
address pool. Select the IP address pool from Available Pools and click Add.
Note
If you share your remote access VPN policy among multiple Secure Firewall Threat Defense devices,
bear in mind that all devices share the same address pool unless you use device-level object overrides to
replace the global definition with a unique address pool for each device. Unique address pools are required
to avoid overlapping addresses in cases where the devices are not using NAT.
b) Click + next to Available Pools in the Address Pools window to add a new IPv4 or IPv6 address pool.
When you choose the IPv4 pool, provide a starting and ending IP address. When you choose to include
a new IPv6 address pool, enter Number of Addresses in the range 1-16384. Select the Allow
Overrides option to avoid conflicts with IP address when objects are shared across many devices. For
more information, see Address Pools, on page 1354.
c) Click OK.
If you plan to edit the IP address pools, we recommend that you perform the following steps during a
maintenance window:
1. Unassign the device from the remote access VPN.
2. Select the device and click Deploy.
This deployment removes all the remote access VPN configurations from the device, terminates the
remote access VPN sessions, the sessions are not reestablished.
3. Click the edit icon next to the IP address pools to edit it, edit any other remote access VPN
configurations, if required, on the Management Center.
4. Assign the device to the updated remote access VPN policy.
5. Deploy the configurations on the device.
The remote access VPN clients can connect to the device after the maintenance window.
Related Topics
Configure Connection Profile Settings, on page 1572
Procedure
• Default OS Browser—Choose this option to configure the operating system that default or
native browser that supports WebAuthN (FIDO2 standard for web authentication). This option
enables single sign-on(SSO) support for web authentication methods such as biometric
authentication.
The default browser requires an external browser package for web authentication. The package
Default-External-Browser-Package is configured by default. You can change the default external
browser package by editing a remote access VPN policy and selecting the file under Advanced >
Secure Client Images > Package File.
You can also add a new package file by selecting. Objects > Object Management > VPN >
Secure Client File > Add Secure Client File.
• Client Certificate Only—Each user is authenticated with a client certificate. The client certificate
must be configured on VPN client endpoints. By default, the user name is derived from the client
certificate fields CN and OU. If the user name is specified in other fields in the client certificate,
use 'Primary' and 'Secondary' field to map appropriate fields.
Select Enable multiple certificate authentication to authenticate the VPN client using the machine
and user certificates.
If have enabled multiple certificate authentication, you can select one of the following certificates
to map the username and authenticate the VPN user:
• First Certificate—Select this option to map the username from the machine certificate sent
from the VPN client.
• Second Certificate—Select this option to map the username from the user certificate sent from
the client.
Note
If you do not enable multiple certificate authentication, the user certificate (second certificate) is
used for authentication by default.
If you select the Map specific field option, which includes the username from the client certificate,
the Primary and Secondary fields display default values: CN (Common Name) and OU
(Organisational Unit) respectively. If you select the Use entire DN as username option, the system
automatically retrieves the user identity. A distinguished name (DN) is a unique identification, made
up of individual fields used as the identifier when matching users to a connection profile. DN rules
are used for enhanced certificate authentication.
The primary and Secondary fields pertaining to the Map specific field option contain these common
values:
• C (Country)
• CN (Common Name)
• DNQ (DN Qualifier)
• EA (Email Address)
• GENQ (Generational Qualifier)
• GN (Given Name)
• I (Initial)
• L (Locality)
• N (Name)
• O (Organisation)
• OU (Organisational Unit)
• SER (Serial Number)
• SN (Surname)
• SP (State Province)
• T (Title)
• UID (User ID)
• UPN (User Principal Name)
• Client Certificate & AAA— Each user is authenticated with both a client certificate and AAA
server. Select the required certificate and AAA configurations for authentication.
Whichever authentication method you choose, select or deselect Allow connection only if user
exists in authorization database.
• Client Certificate & SAML— Each user is authenticated with both a client certificate and SAML
server. Select the required certificate and SAML configurations for authentication.
• Allow connection only if username from certificate and SAML are the same—Select to
allow VPN connection only if the username from the certificate matches the SAML single
sign-on username.
• Use username from client certificate for Authorization—When you choose the option to
pick username from client certificate for authorization, you must configure the fields to pick
from the client certificate.
You can choose to map a specific filed as the username or use the entire distinguished name
(DN) for authorization:
• Map specific field— Select to include the username from the client certificate; the Primary
and Secondary fields display default values: CN (Common Name) and OU
(Organisational Unit) respectively.
• Use entire DN as username— The system automatically retrieves the user identity for
authorization.
You can also create a Dynamic Access Policy (DAP) to match user-specific SAML assertion
attributes or username to DAP certificate attributes. See Configure AAA Criteria Settings for DAP,
on page 1669.
• Authentication Server—Authentication is the way a user is identified before being allowed access to
the network and network services. Authentication requires valid user credentials, a certificate, or both.
You can use authentication alone, or with authorization and accounting.
Select an authentication server from the list if you have added a server already or else create an
authentication server:
• LOCAL—Use a local database from the threat defense for user authentication. To configure local
authentication, threat defense must be Version 7.0 and later.
• Local Realm—Select a local realm or click Add to configure a realm. See Create an LDAP
Realm or an Active Directory Realm and Realm Directory, on page 2376.
Fallback to LOCAL Authentication— The user is authenticated using the local database and the VPN tunnel
can be established even if the AAA server group is unavailable, provided that the local database is configured.
• Use secondary authentication — Secondary authentication is configured in addition to primary
authentication to provide additional security for VPN sessions. Secondary authentication is applicable
only to AAA only and Client Certificate & AAA authentication methods.
Secondary authentication is an optional feature that requires a VPN user to enter two sets of username
and password on the Secure Client login screen. You can also configure to pre-fill the secondary username
from the authentication server or client certificate. Remote access VPN authentication is granted only if
both primary and secondary authentications are successful. VPN authentication is denied if any one of
the authentication servers is not reachable or one authentication fails.
You must configure a secondary authentication server group (AAA server) for the second username and
password before configuring secondary authentication. For example, you can set the primary authentication
server to an LDAP or Active Directory realm and the secondary authentication to a RADIUS server.
Note
By default, secondary authentication is not required.
Authentication Server— Secondary authentication server to provide secondary username and password
for VPN users.
• Fallback to LOCAL Authentication— This user is authenticated using the local database and the
VPN tunnel can be established even if the AAA server group is unavailable, provided that the local
database is configured.
• Second Certificate— Select this option to map the username from the user certificate sent
from the client.
• If you select Map specific field option, which includes the username from the client certificate.
The Primary and Secondary fields display default values: CN (Common Name) and OU
(Organisational Unit) respectively. If you select the Use entire DN (Distinguished Name)
as username option, the system automatically retrieves the user identity.
See Authentication Method descriptions for more information about primary and secondary
field mapping.
• Prefill username from certificate on user login window: Prefills the secondary username
from the client certificate when the user connects via Secure Client.
• Hide username in login window: The secondary username is pre-filled from the client
certificate, but hidden to the user so that the user does not modify the pre-filled username.
• Use secondary username for VPN session: The secondary username is used for reporting user
activity during a VPN session.
• Add realm for the AD Server. See Create an LDAP Realm or an Active Directory Realm and Realm
Directory, on page 2376.
• Select the realm object as the Authorization Server in remote access VPN connection profile.
• Configure LDAP attribute map for the selected realm.
For information about configuring LDAP attribute maps, see Configuring LDAP Attribute Mapping, on
page 1597.
Related Topics
Understanding Policy Enforcement of Permissions and Attributes, on page 1556
Manage a Realm, on page 2405
Note Secure Firewall Threat Defense devices support attributes with vendor ID 3076.
The following user authorization attributes are sent to the threat defense device from the RADIUS server.
• RADIUS attributes 146 and 150 are sent from threat defense devices to the RADIUS server for
authentication and authorization requests.
• All three (146, 150, and 151) attributes are sent from threat defense devices to the RADIUS server for
accounting start, interim-update, and stop requests.
Table 81: RADIUS Attributes Sent from Secure Firewall Threat Defense to RADIUS Server
Attribute Single or
Attribute Number Syntax, Type Multi-valued Description or Value
Client Type 150 Integer Single 2 = Secure Client SSL VPN, 6 = Secure Client IPsec
VPN (IKEv2)
Session Type 151 Integer Single 1 = Secure Client SSL VPN, 2 = Secure Client IPsec
VPN (IKEv2)
Access-Hours Y 1 String Single Name of the time range, for example, Busine
Address-Pools Y 217 String Single The name of a network object defined on the
defense device that identifies a subnet, which
as the address pool for clients connecting to t
access VPN. Define the network object on th
page and then associate the network object w
policy or a connection profile.
Allow-Network-Extension-Mode Y 64 Boolean Single 0 = Disabled 1 = Enabled
Authorization-DN-Field Y 67 String Single Possible values: UID, OU, O, CN, L, SP, C, EA,
GN, SN, I, GENQ, DNQ, SER, use-entire-name
Banner1 Y 15 String Single Banner string to display for Cisco VPN remote a
sessions: IPsec IKEv1, Secure Client
SSL-TLS/DTLS/IKEv2, and Clientless SSL
Banner2 Y 36 String Single Banner string to display for Cisco VPN remote a
sessions: IPsec IKEv1, Secure Client
SSL-TLS/DTLS/IKEv2, and Clientless SSL. The B
string is concatenated to the Banner1 string , if con
Client Type Y 150 Integer Single 1 = Cisco VPN Client (IKEv1) 2 = Secure Clien
VPN 3 = Clientless SSL VPN 4 = Cut-Through-
= L2TP/IPsec SSL VPN 6 = Secure Client IPsec
(IKEv2)
Framed-IPv6-Prefix Y 97 String Single Assigned IPv6 prefix and length. Combines with
Framed-Interface-Id to create a complete assigne
address. For example: prefix [Link]/64 com
with Framed-Interface-Id=[Link] gives the IP ad
[Link]. You can use this attribute to
an IP address without using Framed-Interface-Id
assigning the full IPv6 address with prefix length
for example, Framed-IPv6-Prefix=[Link]
Group-Policy Y 25 String Single Sets the group policy for the remote access V
You can use one of the following formats:
• group policy name
• OU=group policy name
• OU=group policy name;
IE-Proxy-Exception-List 82 String Single New line (\n) separated list of DNS domains
IPsec-Split-Tunnel-List Y 27 String Single Specifies the name of the network or ACL that d
the split tunnel inclusion list.
Engineering, Sales
Session Type Y 151 Integer Single 0 = None 1 = Secure Client SSL VPN 2 = Se
IPSec VPN (IKEv2) 3 = Clientless SSL VPN
Clientless Email Proxy 5 = Cisco VPN Clien
= IKEv1 LAN-LAN 7 = IKEv2 LAN-LAN 8 =
Balancing
Smart-Tunnel-Auto-Signon-Enable Y 139 String Single Name of a Smart Tunnel Auto Signon list appen
the domain name
WebVPN-Smart-Tunnel-Auto-Sign-On Y 139 String Single Name of a Smart Tunnel auto sign-on list append
the domain name
Attribute Single or
Attribute Number Syntax, Type Multi-valued Description or Value
Address-Pools 217 String Single The name of a network object defined on the threat
defense device that identifies a subnet, which will be
used as the address pool for clients connecting to the
remote access VPN. Define the network object on the
Objects page.
Banner1 15 String Single The banner to display when the user logs in.
Banner2 36 String Single The second part of the banner to display when the user
logs in. Banner2 is appended to Banner1.
Filter ACLs 86, 87 String Single Filter ACLs are referred to by ACL name in the
RADIUS server. It requires the ACL configuration to
be already present on the threat defense device, so that
it can be used during RADIUS authorization.
86=Access-List-Inbound
87=Access-List-Outbound
Group-Policy 25 String Single The group policy to use in the connection. You must
create the group policy on the remote access VPN
Group Policy page. You can use one of the following
formats:
• group policy name
• OU=group policy name
• OU=group policy name;
Attribute Single or
Attribute Number Syntax, Type Multi-valued Description or Value
VLAN 140 Integer Single The VLAN on which to confine the user's connection,
0 - 4094. You must also configure this VLAN on a
subinterface on the threat defense device.
You must set the values of the IE-Proxy-Server-Method attribute returned from ISE to one of the following:
• IE_PROXY_METHOD_PACFILE: 8
• IE_PROXY_METHOD_PACFILE_AND_AUTODETECT: 11
• IE_PROXY_METHOD_PACFILE_AND_USE_SERVER: 12
• IE_PROXY_METHOD_PACFILE_AND_AUTODETECT_AND_USE_SERVER: 15
Threat Defense will deliver a proxy setting only if one of the above values is used for the
IE-Proxy-Server-Method attribute.
Procedure
d) Click OK.
Step 7 Save your changes.
Related Topics
Configure Connection Profile Settings, on page 1572
Procedure
Step 7 For IPsec-IKEv2 Settings, select the IKEv2 Identity Certificate from the list or add an identity certificate.
Step 8 Configure Service Access Control. Choose a service access object from the Service Access Object drop-down
list or click + to create a new object.
You can use a service access object to control remote clients' access to VPN on threat defense devices with
Version 7.7 or later. This object provides geolocation-based access control to clients before VPN authentication.
By default, there is no access control for RA VPN, and remote clients can connect from any geolocation unless
specified by a service access object. For more information, see Manage VPN Access of Remote Users Based
on Geolocation, on page 1622and Configure a Service Access Object, on page 1352.
Step 9 Under the Access Control for VPN Traffic section, select the following option if you want to bypass access
control policy:
• Bypass Access Control policy for decrypted traffic (sysopt permit-vpn) — Decrypted traffic is
subjected to Access Control Policy inspection by default. Enabling the Bypass Access Control policy
for decrypted traffic option bypasses the ACL inspection, but VPN Filter ACL and authorization ACL
downloaded from AAA server are still applied to VPN traffic.
Note
If you select this option, you need not update the access control policy for remote access VPN as specified
in Update the Access Control Policy on the Secure Firewall Threat Defense Device, on page 1565.
Related Topics
Interface, on page 1378
Procedure
Step 1 Choose Devices > Remote Access, choose and edit a listed remote access policy, then choose the Advanced
tab.
Step 2 Click Add to add a Secure Client image.
Step 3 Click Add in the Available Secure Client Images portion of the Secure Client Images dialog.
Step 4 Enter the Name and Description(optional) for the available Secure Client Image.
Step 5 Click Browse, locate and select the client image that you want to upload.
Step 6 Click Save to upload the image to the management center.
When you upload the client image to the Secure Firewall Management Center, the operating system information
for the image appears automatically.
Step 7 To change the order of client images, Click Show Re-order buttons and move the client image up or down.
Related Topics
Cisco Secure Client Image, on page 1593
Procedure
Step 1 On your Secure Firewall Management Center web interface, choose Devices > VPN > Remote Access.
Step 2 Click Edit on the remote access VPN policy that you want to update.
Step 3 Click Advanced > Secure Client Image > Add.
Step 4 Select a client image file from Available Secure Client Images and click Add.
If the required client image is not listed, click Add to browse and upload an image.
Add a Cisco Secure Client External Browser Package to the Secure Firewall Management Center
If you have the Secure Client external browser package image on your local disk, use this procedure to upload
the same to the Secure Firewall Management Center. After you upload the external browser package, you can
update the external browser package for your remote access VPN connections.
You can upload the external browser package file to the Secure Firewall Management Center by using the
Secure Client File object. For more information, see File Objects, on page 1458.
Points to Remember
• Only one external browser package can be added to the threat defense device.
• After the external browser package is added to the management center, the browser is pushed to the threat
defense only after the external browser is enabled in the remote access VPN configuration.
Procedure
Step 1 On the Secure Firewall Management Center web interface, choose Devices > Remote Access, choose and
edit a listed remote access policy, then choose the Advanced tab.
Step 2 Click Add in the Secure Client External Browser Package portion of the Secure Client Images page.
Step 3 Enter the Name and Description for the Secure Client package.
Step 4 Click Browse and locate the external browser package file to upload.
Step 5 Click Save to upload the image to the Secure Firewall Management Center.
Note
If you want to update the remote access VPN connection with an existing external browser package, select
the file from the Package File drop-down.
Related Topics
Cisco Secure Client Image, on page 1593
• Allow reuse an IP address so many minutes after it is released—Delays the reuse of an IP address
after its return to the address pool. Adding a delay helps to prevent problems firewalls can experience
when an IP address is reassigned quickly. By default, the delay is set to zero. If you want to extend the
delay, enter the number of minutes in the range of 0–480 to delay the IP address reassignment. This
configurable element is available for IPv4 assignment policies.
Related Topics
Configure Connection Profile Settings, on page 1572
Remote Access VPN Authentication, on page 1554
Procedure
Note
Configuring a certificate mapping implies certificate-based authentication. The remote user will be prompted
for a client certificate regardless of the configured authentication method.
Step 5 Under the Certificate to Connection Profile Mapping section, click Add Mapping to create certificate to
connection profile mapping for this policy.
a) Choose or create a Certificate Map Name object.
b) Select the Connection Profile that want to use if the rules in the certificate map object are satisfied.
c) Click OK to create the mapping.
Step 6 Click Save.
The group policy applied to a user is determined when the VPN tunnel is being established. The RADIUS
authorization server assigns the group policy, or it is obtained from the current connection profile.
Note There is no group policy attribute inheritance on the threat defense. A group policy object is used, in its
entirety, for a user. The group policy object identified by the AAA server upon login is used, or, if that is not
specified, the default group policy configured for the VPN connection is used. The provided default group
policy can be set to your default values, but will only be used if it is assigned to a connection profile and no
other group policy has been identified for the user.
Procedure
Related Topics
Configure Group Policy Objects, on page 1445
The group policies that are used in an LDAP attribute map get added to the list of group policies in the remote
access VPN configuration. Removing a group policy from the remote access VPN configuration also removes
the associated LDAP attribute mapping.
In versions 6.4 to 6.6, you can configure LDAP attribute maps only using FlexConfig. For more information,
see Configure AnyConnect Modules and Profiles Using FlexConfig.
In versions 7.0 and later, you can use the following procedure:
Procedure
a) Specify the LDAP Attribute Name and then select the required Cisco Attribute Name from the list.
b) Click Add Value Map and Specify the LDAP Attribute Value and Cisco Attribute Value.
Repeat this step to add more value maps.
Example
For a detailed example, see Configure RA VPN with LDAP Authentication and Authorization for
FTD.
Related Topics
Configure AAA Settings for Remote Access VPN, on page 1575
• IP Address Pool—Choose unique IP address pool for member devices, and override the IP pool in
management center for each of the member devices.
• Devices that are behind Network Address Translation (NAT) can also be part of a load balancing group.
Procedure
Step 6 Select the Communication Interface for the load-balancing group. Click Add to add an interface group or
security zone.
Communication interface is a private interface through which the director and members share information
about their load.
Step 7 Enter the UDP Port for communication between the director and members in a group. The default port is
9023.
Step 8 Enable the IPsec Encryption toggle button to activate IPsec encryption for the communication between the
director and members.
Enabling the encryption establishes an IPsec tunnel between the director and members using a pre-shared
key.
When you upgrade or downgrade threat defense devices with the IPsec Encryption option enabled, ensure
there is no configuration mismatch between the management center and the threat defense to prevent deployment
failures.
Step 9 Enter Encryption Key for IPsec encryption and confirm the encryption key.
Step 10 Click OK.
Procedure
Procedure
Procedure
Step 4 Use the navigation pane to edit the following IPsec options:
a) Crypto Maps—The Crypto Maps page lists the interface groups on which IKEv2 protocol is enabled.
Crypto Maps are auto generated for the interfaces on which IKEv2 protocol is enabled. To edit a Crypto
Map, see Configure Remote Access VPN Crypto Maps, on page 1603. You can add or remove interface
groups to the selected VPN policy in Access Interface. See Configure Access Interfaces for Remote
Access VPN, on page 1591 for more information.
b) IKE Policy—The IKE Policy page lists all the IKE policy objects applicable for the selected VPN policy
when Secure Client endpoints connect using the IPsec protocol. See IKE Policies in Remote Access VPNs,
on page 1605 for more information. To add a new IKE policy, see Configure IKEv2 Policy Objects , on
page 1456. Threat Defense supports only Secure Client IKEv2 clients. Third-party standard IKEv2 clients
are not supported.
c) IPsec/IKEv2 Parameters—The IPsec/IKEv2 Parameters page enables you to modify the IKEv2 session
settings, IKEv2 Security Association settings, IPsec settings, and NAT Transparency settings. See Configure
Remote Access VPN IPsec/IKEv2 Parameters, on page 1606 for more information.
Step 5 Click Save.
Procedure
Step 7 Select Enable Perfect Forward Secrecy and select the Modulus group.
Use Perfect Forward Secrecy (PFS) to generate and use a unique session key for each encrypted exchange.
The unique session key protects the exchange from subsequent decryption, even if the entire exchange was
recorded and the attacker has obtained the preshared or private keys used by the endpoint devices. If you
select this option, also select the Diffie-Hellman key derivation algorithm to use when generating the PFS
session key in the Modulus Group list.
Modulus group is the Diffie-Hellman group to use for deriving a shared secret between the two IPsec peers
without transmitting it to each other. A larger modulus provides higher security but requires more processing
time. The two peers must have a matching modulus group. Select the modulus group that you want to allow
in the remote access VPN configuration:
• 1—Diffie-Hellman Group 1 (768-bit modulus).
• 2—Diffie-Hellman Group 2 (1024-bit modulus).
• 5—Diffie-Hellman Group 5 (1536-bit modulus, considered good protection for 128-bit keys, but group
14 is better). If you are using AES encryption, use this group (or higher).
• 14—Diffie-Hellman Group 14 (2048-bit modulus, considered good protection for 128-bit keys).
• 19—Diffie-Hellman Group 19 (256-bit elliptical curve field size).
• 20—Diffie-Hellman Group 20 (384-bit elliptical curve field size).
• 21—Diffie-Hellman Group 21 (521-bit elliptical curve field size).
• 24—Diffie-Hellman Group 24 (2048-bit modulus and 256-bit prime order subgroup).
• Select Enable Traffic Flow Confidentiality (TFC) Packets— Enable dummy TFC packets that mask
the traffic profile which traverses the tunnel. Use the Burst, Payload Size, and Timeout parameters to
generate random length packets at random intervals across the specified SA.
Note
Enabling traffic flow confidentiality (TFC) packets prevents the VPN tunnel from being idle. Thus the
VPN idle timeout configured in the group policy does not work as expected when you enable the TFC
packets. See Group Policy Advanced Options, on page 1451.
Related Topics
Interface, on page 1378
Note threat defense supports only IKEv2 for remote access VPNs.
Unlike IKEv1, in an IKEv2 proposal, you can select multiple algorithms and modulus groups in one policy.
Since peers choose during the Phase 1 negotiation, this makes it possible to create a single IKE proposal, but
consider creating multiple, different proposals to give higher priority to your most desired options. For IKEv2,
the policy object does not specify authentication, other policies must define the authentication requirements.
An IKE policy is required when you configure a remote access IPsec VPN.
Note threat defense supports only IKEv2 for remote access VPNs.
Procedure
Procedure
Step 5 Select the following for IKEv2 Security Association (SA) Settings:
• Cookie Challenge—Whether to send cookie challenges to peer devices in response to SA initiated
packets, which can help thwart denial of service (DoS) attacks. The default is to use cookie challenges
when 50% of the available SAs are in negotiation. Select one of these options:
• Custom—Specify Threshold to Challenge Incoming Cookies, the percentage of the total allowed
SAs that are in-negotiation. This triggers cookie challenges for any future SA negotiations. The
range is zero to 100%. The default is 50%.
• Always— Select to send cookie challenges to peer devices always.
• Number of SAs Allowed in Negotiation—Limits the maximum number of SAs that can be in negotiation
at any time. If used with Cookie Challenge, configure the cookie challenge threshold lower than this
limit for an effective cross-check. The default is 100 %.
• Maximum number of SAs Allowed—Limits the number of allowed IKEv2 connections.
GUI text and messages Customize or localize Secure Client Customize and Localize Secure
GUI text and informational/error Client GUI Text and Messages, on
messages. page 1609
Icons and images Customize the logo, images, or Customize Secure Client Icons and
icons of the Secure Client GUI. Images, on page 1610
Custom Installer Transforms Customize the Secure Client Customize the Secure Client
installer. Installer, on page 1614
Localized Installer Transforms Localize the Secure Client installer. Localize the Client Installer, on
page 1615
General Limitations
• If there are any customizations earlier than 7.4 configured directly on the threat defense using the CLI,
the management center removes these customizations during deployment.
• No clustering support.
Customization Limitations
GUI Text and Message • You must restart Secure Client before you use this customization.
Customizations
• No support for right-to-left languages.
• Some strings are truncated in the GUI due to hardcoded field
lengths.
• Some messages are hardcoded in the client. For example:
• Status messages (during an update)
• Untrusted server messages
• Deferred update messages
• Localization is version-specific.
If an Administrator created a translation table based on a template
of an old Secure Client version, the new messages do not appear
to the remote users. The Administrator must merge the latest
template with the translation table so that the table has the new
messages. You can use third-party tools like Get text to perform
the merge.
Customization Limitations
Icons and Images Customizations • You must restart Secure Client before you use this customization.
• The customization object names must match the Secure Client GUI
filenames. File names are different for each operating system and
are case-sensitive. For more information about the filenames,
extensions, and sizes for each OS, see the Cisco Secure Client
Administrator Guide.
• Images do not appear properly if the image size is not correct. The
management center or the threat defense device does not verify the
image size.
• MacOS does not support customization of Secure Client images
and icons.
Deploy Customized Scripts • Secure Client runs only one OnConnect and one OnDisconnect
script; however, these scripts may launch other scripts.
• Scripts can only execute functions that the user has the right to
invoke.
• You cannot launch the OnConnect script from the Start Before
Logon (SBL) GUI.
Deploy Custom Applications Using • After you use this customization, if you deploy an updated version
Cisco Secure Client APIs (Binaries) of the Secure Client on the management center, the client will
download the update and replace your custom UI.
Customize the Client Installer • This customization is available only for Windows.
• For Cisco Secure Client 5.0, the default localization files for various languages are part of the application.
• For AnyConnect Clients 4.x, you can download the localization files for a few languages from [Link]
and upload them to the management center.
Procedure
Step 1 Get the base template or translation file either from the Secure Client package or from [Link]. For example,
[Link].
Step 2 Use a text editor to add the translations or customize the labels or messages.
Step 3 Update the msgstr string corresponding to each msgid.
Step 4 Save the file.
Step 5 Create a new Secure Client Customization object.
a) Choose Objects > Object Management > VPN > Secure Client Customization.
b) Click Add Secure Client Customization.
c) Enter the name and description for the customization.
d) From the Customization Type drop-down list, choose GUI Text and Messages.
e) From the Language drop-down list, choose a language for which you are adding the translation.
f) Click Browse and select the translation file. The supported file extensions are .po, .mo, and .txt.
Step 6 Add the customization to the remote access VPN policy.
a) Choose Devices > Remote Access.
b) Click the edit icon of the remote access VPN policy.
c) Click Advanced > Secure Client Customizations > Localization.
d) Click + to select the translation file.
e) Click Add.
f) Click OK.
Step 7 Click Save.
Step 8 Choose Deploy > Deployment and deploy the policy to assigned devices. The changes are not active until
you deploy them.
What to do next
Verify the Secure Client customizations. For more information, see Verify Secure Client Customizations, on
page 1616.
To customize the logo, images, and icons of the Secure Client GUI, you must create a Secure Client
customization object in the management center. The name of this customization object must match the Secure
Client GUI filename. File names are different for each operating system and are case-sensitive. For more
information about the filenames, extensions, and sizes for each OS, see the Cisco Secure Client Administrator
Guide.
For example, if you want to replace the corporate logo for Windows clients, you must create a customization
object with the name as company_logo and add this customization object to the remote access VPN policy.
If you use a different name for the customization object, the Secure Client installer does not change the
component. However, if you deploy your own executable to customize the GUI, the customization object can
have any name.
Location of all images files:
• Windows: %PROGRAMFILES%\Cisco\Cisco Secure Client\res\
• Linux: /opt/cisco/secure client/pixmaps
• macOS: Not supported
Procedure
Step 1 Create the icons or images using the correct extensions, and sizes.
Images do not appear properly if the image size is not correct. The management center or the threat defense
device does not verify the image size.
For more information about the filenames, extensions, and sizes, see the Cisco Secure Client Administrator
Guide.
What to do next
Verify the Secure Client customizations. For more information, see Verify Secure Client Customizations, on
page 1616.
These scripts run asynchronously and do not delay the connection establishment or disconnection. They can
be of any extension and must be executable on the endpoint. Secure Client identifies the OnConnect and
OnDisconnect scripts by the filename. It looks for a file whose name begins with OnConnect or OnDisconnect
regardless of the file extension.
Some examples of this feature are:
• Refresh the group policy upon VPN connection.
• Mount a network drive upon a VPN connection.
• Unmount a network drive upon a VPN disconnection.
To enable scripts, check the Enable Scripting option in the VPN profile. By default, the client does not launch
scripts. The client does not require the script to be written in a specific language. It requires an application
that can run the script to be installed on the client computer. For the client to launch the script, the script must
run from the command line.
Secure Client can only launch scripts after the user logs in and establishes a VPN session. You cannot launch
the OnConnect script from the Start Before Logon (SBL) GUI. You must check the Enable Post SBL On
Connect Script option in the VPN profile to trigger the scripts once the user logs in. Secure Client is a 32-bit
application. When the scripts run on a 64-bit Windows version, they use the 32-bit version of [Link].
3. Add the VPN profile to the remote access VPN group policy.
Procedure
g) Click Browse and select the script you want to execute on the endpoint.
Step 3 Add the customization to the remote access VPN policy.
a) Choose Devices > Remote Access.
b) Click the edit icon of the remote access VPN policy.
c) Click Advanced > Secure Client Customizations > Localization.
d) Click + to select the translation file.
e) Click Add.
f) Click OK.
Step 4 Click Save.
Step 5 Choose Deploy > Deployment and deploy the policy to assigned devices. The changes are not active until
you deploy them.
What to do next
Verify the Secure Client customizations. For more information, see Verify Secure Client Customizations, on
page 1616.
Procedure
Step 1 Create the custom application using the Cisco Secure Client APIs.
Step 2 Create a new Secure Client Customization object.
a) Choose Objects > Object Management > VPN > Secure Client Customization.
b) Click Add Secure Client Customization.
c) Enter the name and description for the customization.
d) From the Customization Type drop-down list, choose Binary.
e) From the Platform drop-down list, choose a platform.
f) Click Browse and select the custom application.
Step 3 Add the customization to the remote access VPN policy.
a) Choose Devices > Remote Access.
b) Click the edit icon of the remote access VPN policy.
c) Click Advanced > Secure Client Customizations > Binaries.
d) Click + to select the translation file.
e) Click Add.
f) Click OK.
Step 4 Click Save.
Step 5 Choose Deploy > Deployment and deploy the policy to assigned devices. The changes are not active until
you deploy them.
Procedure
2. The example below shows the transcript details of customized icons and images: customization of the
Secure Client logo to ABC logo.
import webvpn AnyConnect-customization type resource platform win name company_logo.png
disk0:/company_logo.png
3. The example below shows the transcript details of the customized OnConnect and OnDisconnect scripts.
The On connect script mounts the network drive and the On disconnect script unmounts the network drive.
import webvpn AnyConnect-customization type binary platform win name
scripts_OnConnect_mount.bat disk0:/[Link]
import webvpn AnyConnect-customization type binary platform win name
scripts_OnDisconnect_unmount.bat disk0:/[Link]
• show import webvpn AnyConnect-customization detailed: Shows the details of the Secure Client
customizations.
HQ-FTD# show import webvpn AnyConnect-customization detailed
OEM resources for AnyConnect client:
linux-64/binary/scripts_OnConnect_conn.sh w6+n7z80D/8AR+ul2f7DvTmcDTw=
linux-64/binary/scripts_OnDisconnect_discon.sh jx5LJC2XBEmEkGeww59CAkszvnI=
linux-64/resource/[Link] GsfBDroqGSQEEwuBDS/3DJNVv88=
win/binary/scripts_OnConnect_mount.bat dzjfsLYYft/XMlPlzskKl+Wv1bw=
win/binary/scripts_OnDisconnect_unmount.bat k6xlKhF1l2IRyJu08+sdYXgKNgM=
win/resource/company_logo.png cmEvxwqvtaS+Pz/6sb9n3NZudS4=
Customization Verification
GUI text and message • Verify if Secure Client has the language localization or customized
customizations files in the following locations:
• Windows: %ProgramData%\Cisco\Cisco AnyConnect Secure
Mobility Client\l10n\<language-code>\LC_MESSAGES
(AnyConnect versions 4.9 and earlier)
• Windows: %ProgramData%\Cisco\Cisco Secure
Client\l10n\<language-code>\LC_MESSAGES (Secure Client
versions 5.0 and later)
• For Mac OS and Linux:
/opt/cisco/anyconnect/l10n/<LANGUAGE-CODE>/LC_MESSAGES
Image and icon customizations • Verify if Secure Client has the customized files in the following
locations:
• Windows: %PROGRAMFILES%\ Cisco\Cisco AnyConnect
Secure Mobility Client\res\ (AnyConnect versions 4.10 and
earlier)
• Windows: %PROGRAMFILES%\ Cisco\Cisco Secure
Client\UI\res (Cisco Secure Client 5.0 and above)
• Mac OS and Linux: /opt/cisco/anyconnect/res
Customized OnConnect and • Verify if the customized scripts are in the following locations:
OnDisconnect scripts
• Windows: %ProgramData%\Cisco\Cisco Secure Client\Script
(Cisco Secure Client 5.0 and above)
• Windows: %ProgramData%\Cisco\ Cisco AnyConnect Secure
Mobility Client\Script (AnyConnect versions 4.9 and earlier)
• Mac OS and Linux: /opt/cisco/anyconnect/Script
up-to-date with software patches and updates. Management tunnel disconnects when the user-initiated VPN
tunnel is established.
This section provides information about configuring Secure Client management VPN tunnel on threat defense.
Configuring the Secure Client management tunnel on threat defense using the management center web interface
requires the following settings:
• A Connection profile with certificate-based authentication and a group URL.
• Secure Client management VPN profile file, configured a server with group URL and backup servers
if required.
• A Group policy with the management VPN profile, split tunneling with explicitly included networks,
client bypass protocol, and no banner.
For detailed instructions on configuring the Secure Client Management VPN tunnel, see Configuring Secure
Client Management VPN Tunnel on Threat Defense, on page 1619.
Certificate Requirements
• Threat Defense must have a valid identity certificate for remote access VPN and the root certificate from
the local certifying authority (CA) must be present on the threat defense.
• Endpoints connecting to the management VPN tunnel must have a valid identity certificate.
• CA certificate for threat defense's identity certificate must be installed on the endpoints and the CA
certificate for the endpoints must be installed on the threat defense.
• The identity certificate issued by the same local CA must be present in the Machine store.
Certificate Store (For Windows) and/or in System Keychain (For macOS).
• Secure Client upgrade and AnyConnect module download are not supported when the management VPN
tunnel is connected.
Procedure
Step 1 Create a remote access VPN policy configuration using the wizard:
For information about configuring a remote access VPN, see Configuring a New Remote Access VPN
Connection, on page 1561.
Step 3 Create a management tunnel profile using the Secure Client profile editor:
a) Download the Secure Client VPN Management Tunnel Standalone Profile Editor from Cisco Software
Download Center if you have not done already.
b) Create a management tunnel profile with the required settings for your VPN users and save the file.
c) Configure a server in the Server List with the group URL you have configured in the connection profile.
For information about creating a management profile using the Profile Editor, see the Cisco Secure Client
(including AnyConnect) Administrator Guide.
Step 5 Associate a management profile with a group policy and configure group policy settings:
You must add the management VPN profile to the group policy associated with the connection profile used
for the management tunnel VPN connection. When the user connects, the management VPN profile is
downloaded along with the user VPN profile already mapped to the group policy, enabling the management
VPN tunnel feature.
Caution
No Banner: Check and ensure that no banner is configured in the group policy settings. You can check the
banner settings under Group Policy > General Settings > Banner.
a) Edit the connect profile you have created for management VPN tunnel.
b) Click Edit Group Policy > Secure Client > Management Profile.
c) Click the Management VPN Profile drop-down and select the management profile file object you have
created.
Note
You can also click + and add a new Secure Client Management VPN Profile object.
d) Click Save.
Step 6 Configure split tunneling in group policy:
a) Click Edit Group Policy > General > Split Tunneling.
b) From the IPv4 or IPv6 split tunneling drop-down, select Tunnel networks specified below.
c) Select the Split Tunnel Network List Type: Standard Access List or Extended Access List, and then
select the required access list to allow the traffic over the management VPN tunnel.
d) Click Save to save the split tunnel settings.
Secure Client Custom Attribute
Secure Client Management VPN tunnel requires split include tunneling configuration by default. If you are
configuring Secure Client custom attribute in the group policy to deploy the management VPN tunnel with
split tunneling to tunnel all, you can do so using FlexConfig because management center 6.7 web interface
does not support Secure Client custom attribute.
The following is an example command for Secure Client custom attribute:
webvpn
anyconnect-custom-attr ManagementTunnelAllAllowed description ManagementTunnelAllAllowed
anyconnect-custom-data ManagementTunnelAllAllowed true true
group-policy MGMT_Tunnel attributes
anyconnect-custom ManagementTunnelAllAllowed value true
Step 7 Deploy, verify, and monitor the remote access VPN policy:
a) Deploy the management VPN tunnel configuration to threat defense.
Note
Client systems must connect to the threat defense remote access VPN once to download the management
tunnel VPN profile to the client machines.
b) You can verify the Secure Client management VPN tunnel at Secure Mobility Client > VPN > Statistics.
You can also check the management VPN session details on the threat defense command prompt using
the show vpn-sessiondb anyconnect command.
c) On your management center web interface, click Analysis to view the management tunnel session
information.
Related Topics
Configure Connection Profile Settings, on page 1572
Threat Defense Group Policy Objects, on page 1445
•
Note When you configure multiple certificate authentication, ensure that you set the
value of AutomaticCertSelection to true in the Cisco Secure Client Profile
settings.
Procedure
Note
If you have not configured a remote access VPN, click Add to create a new remote access VPN policy.
Step 3 Select and Edit a connection profile to configure multiple certificate authentication.
Step 4 Click AAA settings and select Authentication Method > Client Certificate Only or Client Certificate &
AAA.
Note
Select the Authentication Server if you have selected the Client Certificate & AAA authentication method
The username sent from the client is used as the VPN session username when certificate only authentication
is enabled. When AAA and certificate authentication is enabled, VPN session username will be based on
prefill option.
Note
If you select the Map specific field option, which includes the username from the client certificate, the
Primary and Secondary fields display default values: CN (Common Name) and OU (Organisational Unit)
respectively.
If you select the Use entire DN (Distinguished Name) as username option, the system automatically retrieves
the user identity. A distinguished name (DN) is a unique identification, made up of individual fields that can
be used as the identifier when matching users to a connection profile DN rules are used for enhanced certificate
authentication.
If you have selected the Client Certificate & AAA authentication, select the Prefill username from certificate
on user login window option to prefill the secondary username from the client certificate when the user
connects via AnyConnect VPN module of Cisco Secure Client.
• Hide username in login window: The secondary username is pre-filled from the client certificate, but
hidden to the user so that the user does not modify the pre-filled username.
Step 7 Configure the required AAA settings and connection profile settings for the remote access VPN.
Step 8 Save the connection profile and remote access VPN configuration and deploy it on your threat defense device.
Related Topics
Configure AAA Settings for Remote Access VPN, on page 1575
before authentication and the details are logged in the management center (Devices > Troubleshoot >
Troubleshooting Logs).
This feature supports all versions of Secure Client.
Prerequisites
Threat Defense device must be Version 7.7.0 or later.
2 Update the remote access VPN configuration Configure Access Interfaces for
with the policy. Remote Access VPN, on page 1591
4 After clients connect to the threat defense device: Monitor and Troubleshoot Service
Access Policies, on page 1624
1. Verify the active remote access VPN sessions
in the Remote Access VPN dashboard.
2. Verify the logs for the denied remote access
VPN sessions at Devices > Troubleshoot >
Troubleshooting Logs.
Guidelines and Limitations for Managing Remote Access VPN Users Based on Geolocation
Guidelines
• In a service access object, if you use a geolocation object (country, continent, or geolocation object), use
it only in one rule.
• Configure the service access rules in the correct order because you cannot reorder these rules.
Limitations
• Clustering is not supported.
• Geolocation-based unclassified IP addresses are not categorized according to their geographic origin.
For such unclassified IP addresses, the management center enforces the default service access policy
action.
• Geolocation-based service access policies are not applied to WebLaunch pages ensuring that you can
download the Secure Client seamlessly without any restrictions.
Monitor Active Remote Access VPN Sessions in Remote Access VPN Dashboard
Choose Overview > Dashboards > Remote Access VPN.
Note You cannot view the denied remote access VPN sessions if the All Logs option is configured with a Logging
Level between 0 and 2.
• show geodb{ipv4|ipv6}location country_name detail: Displays the details of the IPv4 or IPv6
address mappings.
firepower# show geodb ipv4 location Antarctica detail
Geolocation Table - IPv4
id=0x00007fff82c284e0, geo_id=10, hits=0
range_lower=[Link], range_upper=[Link]
id=0x00007fff82cca360, geo_id:10, hits=0
range_lower=[Link], range_upper=[Link]
Total number of mappings available: 28
• show geodb counters: Displays the details of active, permitted, and denied sessions.
firepower# show geodb counters
current – ongoing sessions
permitted – cumulative permitted sessions
denied – cumulative denied sessions
Location current permitted denied
Egypt 0 0 5
India 45 1345 45
• Commands
• Use the show running-config service-access, and show service-access commands to view details
of user-defined service access policies.
• Use the show geodb command to view details of the geolocation table.
• Use the debug geolocation <debug-level> command to capture debug logs related to geolocation.
The debug levels can be 1 (Error), 2 (Warning), 3 and 4 (Info), 5 (Debug), or 255 (Debug all).
• Use the clear geodb counters command to clear the geolocation table counters such as the hit counts
of the service access policies. However, you cannot clear the actual permitted and denied counters
for locations using this command; you can clear these counters only after you reboot the device.
Procedure
Step 1 On your Secure Firewall Management Center web interface, choose Devices > VPN > Remote Access.
Step 2 Select a remote access policy and click Edit; or click Add to create a new remote access VPN policy.
Step 3 For a new remote access VPN policy, configure the authentication while selecting connection profile settings.
For an existing configuration, select the connection profile that includes the client profile, and click Edit.
Step 4 Click AAA > Authentication Method > Client Certificate Only.
With this authentication method, the user is authenticated using a client certificate. You must configure the
client certificate on VPN client endpoints. By default, the user name is derived from client certificate fields
CN and OU respectively. If the user name is specified in other fields in the client certificate, use 'Primary'
and 'Secondary' field to map appropriate fields.
If you select Map specific field option, which includes the username from the client certificate. The Primary
and Secondary fields display the following default values, respectively: CN (Common Name) and OU
(Organisational Unit). If you select the Use entire DN as username option, the system automatically retrieves
the user identity. A distinguished name (DN) is a unique identification, made up of individual fields, that can
be used as the identifier when matching users to a connection profile. DN rules are used for enhanced certificate
authentication.
• Primary and Secondary fields pertaining to the Map specific field option contain these common values:
• C (Country)
• CN (Common Name)
• DNQ (DN Qualifier
• EA (Email Address)
• Whichever authentication method you choose, select or deselect Allow connection only if user exists
in authorization database.
For more information, see Configure AAA Settings for Remote Access VPN, on page 1575.
Related Topics
Configure Connection Profile Settings, on page 1572
Adding Certificate Enrollment Objects, on page 1394
Configure VPN User Authentication via Client Certificate and AAA Server
When you configure remote access VPN authentication to use both client certificate and authentication server,
VPN client authentication is done using both the client certificate validation and AAA server.
Procedure
Step 1 On your Secure Firewall Management Center web interface, choose Devices > Remote Access.
Step 2 Click Edit on the remote access VPN policy for which you want to update the authentication or click Add to
create new one.
Step 3 If you choose to create new remote access VPN policy, configure the authentication while selecting connection
profile settings. For an existing configuration, select the connection profile that includes the client profile,
and click Edit.
Step 4 Go to AAA and from the Authentication Method drop-down, choose Client Certificate & AAA.
• When you select the Authentication Method as:
Client Certificate & AAA—Both types of authentication are done.
• AAA—If you select the Authentication Server as RADIUS, by default, the Authorization Server
has the same value. Select the Accounting Server from the drop-down list. Whenever you select
AD and LDAP from the Authentication Server drop-down list, you must manually select the
Authorization Server and Accounting Server respectively.
• Client Certificate—Authenticates the user with client certificate. You must configure client
certificate on the VPN client endpoints. By default, the username is derived from client certificate
fields CN & OU respectively. If you use any other field in the client profile to specify the username,
use Primary Field and Secondary Field to map appropriate fields.
If you select Map specific field option, which includes the username from the client certificate.
The Primary and Secondary fields display default values: CN (Common Name) and OU
(Organisational Unit) respectively. If you select the Use entire DN as username option, the system
automatically retrieves the user identity. A distinguished name (DN) is a unique identification, made
up of individual fields that can be used as the identifier when matching users to a connection profile.
DN rules are used for enhanced certificate authentication.
Primary and Secondary fields pertaining to the Map specific field option contains these common
values:
• C (Country)
• CN (Common Name)
• DNQ (DN Qualifier
• EA (Email Address)
• GENQ (Generational Qualifier)
• GN (Given Name)
• I (Initial)
• L (Locality)
• N (Name)
• O (Organisation)
• OU (Organisational Unit)
• Whichever authentication method you choose, select or deselect Allow connection only if user
exists in authorization database.
For more information, see Configure AAA Settings for Remote Access VPN, on page 1575.
Related Topics
Configure Connection Profile Settings, on page 1572
Adding Certificate Enrollment Objects, on page 1394
Procedure
Step 1 On your Secure Firewall Management Center web interface, choose Devices > Remote Access.
Step 2 Click Edit on the remote access VPN policy that you want to update.
Step 3 Click Edit on the connection profile that includes AAA settings.
Step 4 Choose AAA > Advanced Settings >.
Step 5 Check the Enable Password Management check-box and select one of the following:
• Notify User - days ahead of password expiry and specify the number of days in the box.
• Notify user on the day of password expiration.
Related Topics
Configure Connection Profile Settings, on page 1572
Note You can use the same RADIUS server or separate RADIUS servers for authentication, authorization, and
accounting in remote access VPN AAA settings.
Procedure
Step 1 On your Secure Firewall Management Center web interface, choose Devices > Remote Access.
Step 2 Click Edit on the remote access policy for which you want to configure RADIUS server, or create new remote
access VPN policy.
Step 3 Click Edit on the connection profile that includes AAA settings and choose AAA.
Step 4 Select the RADIUS server from the Accounting Server drop-down.
Step 5 Save your changes.
Related Topics
Configure Connection Profile Settings, on page 1572
Configure AAA Settings for Remote Access VPN, on page 1575
You can configure ISE or the RADIUS Server to set the Authorization Profile for a user or user-group by
sending IETF RADIUS Attribute 25 and map to the corresponding group policy name. You can configure
specific group policy to a user or user group to push a Downloadable ACL, set a banner, Restrict VLAN, and
configure the advanced option of applying an SGT to the session. These attributes are applied to all users that
are part of that group when the VPN connection is established.
For more information, see the Configure Standard Authorization Policies section of Cisco Identity Services
Engine Administrator Guide and RADIUS Server Attributes for Secure Firewall Threat Defense, on page 1580.
Figure 432: Remote Access VPN Group Policy Selection by AAA Server
Related Topics
Configure Group Policy Objects, on page 1445
Configure Connection Profile Settings, on page 1572
Override the Selection of Group Policy or Other Attributes by the Authorization Server
When a remote access VPN user connects to the VPN, the group policy and other attributes configured in the
connection profile are assigned to the user. However, the remote access VPN system administrator can delegate
the selection of group policy and other attributes to the authorization server by configuring ISE or the RADIUS
Server to set the Authorization Profile for a user or user-group. Once users are authenticated, these specific
authorization attributes are pushed to the threat defense device.
Procedure
Step 1 On your Secure Firewall Management Center web interface, choose Devices > VPN > Remote Access.
Step 2 Select a remote access policy and click Edit.
Step 3 Select RADIUS or ISE as the authorization server if not configured already.
Step 4 Select Advanced > Group Policies and add the required group policy. For detailed information about a group
policy object, see Configure Group Policy Objects, on page 1445.
You can map only one group policy to a connection profile; but you can create multiple group policies in a
remote access VPN policy. These group policies can be referenced in ISE or the RADIUS server and configured
to override the group policy configured in the connection profile by assigning the authorization attributes in
the authorization server.
Related Topics
Configure Group Policy Objects, on page 1445
Procedure
Step 1 On your Secure Firewall Management Center web interface, choose Devices > VPN > Remote Access.
Step 2 Select a remote access policy and click Edit.
Step 3 Select Advanced > Group Policies.
Step 4 Select a group policy and click Edit or add a new group policy.
Step 5 Select Advanced > Session Settings and set Simultaneous Login Per User to 0 (zero).
This stops the user or user group from connecting to the VPN even once.
Step 6 Click Save to save the group policy and then save the remote access VPN configuration.
Step 7 Configure ISE or the RADIUS server to set the Authorization Profile for that user/user-group to send IETF
RADIUS Attribute 25 and map to the corresponding group policy name.
Step 8 Configure the ISE or RADIUS server as the authorization server in the remote access VPN policy.
Step 9 Save and deploy the remote access VPN policy.
Related Topics
Configure Connection Profile Settings, on page 1572
Procedure
Step 1 On your Secure Firewall Management Center web interface, choose Devices > VPN > Remote Access.
Step 2 Select a remote access policy and click Edit.
Step 3 Select Access Interfaces and disable Allow users to select connection profile while logging in.
Step 4 Click Advanced > Certificate Maps.
Step 5 Select Use the configured rules to match a certificate to a Connection Profile.
Step 6 Select the Certificate Map Name or click the Add icon to add a certificate rule.
Step 7 Select the Connection Profile, and click Ok.
With this configuration, when a user connects from the AnyConnect VPN module of Cisco Secure Client, the
user will have the mapped connection profile and will be authenticated to use the VPN.
Related Topics
Configure Group Policy Objects, on page 1445
Configure Connection Profile Settings, on page 1572
Update the Secure Client Profile for Remote Access VPN Clients
Secure Client Profile is an XML file that contains an administrator-defined end user requirements and
authentication policies to be deployed on a VPN client system as part of Secure Client. It makes the
preconfigured network profiles available to end users.
You can use the GUI-based Secure Client Profile Editor, an independent configuration tool, to create them.
The standalone profile editor can be used to create a new or modify existing Secure Client profile. You can
download the profile editor from Cisco Software Download Center.
See the Secure Client Profile Editor chapter in the appropriate release of the Cisco Secure Client (including
AnyConnect) Administrator Guide for details.
Procedure
Step 1 On your Secure Firewall Management Center web interface, choose Devices > VPN > Remote Access.
Step 2 Select a remote access VPN policy and click Edit.
Step 3 Select the connection profile that includes the client profile to be edited, and click Edit.
Step 4 Click Edit Group Policy > Secure Client > Profiles.
Step 5 Select the client profile XML file from the list or click Add to add a new client profile.
Step 6 Save the group policy, connection profile, and then the remote access VPN policy.
Step 7 Deploy the changes.
Changes to the client profile will be updated on the VPN clients when they connect to the remote access VPN
gateway.
Related Topics
Configure Group Policy Objects, on page 1445
is either permitted or denied by the ACL. Secure Firewall Threat Defense deletes the ACL when the
authentication session expires.
Related Topics
Add a RADIUS Server Group, on page 1344
Interface, on page 1378
Configuring RADIUS Dynamic Authorization, on page 1636
RADIUS Server Attributes for Secure Firewall Threat Defense, on page 1580
Step Configure a RADIUS server object with RADIUS Server Group Options, on page 1344
2 dynamic authorization.
Step Configure a route to ISE server through an RADIUS Server Group Options, on page 1344
3 interface enabled for change of
Ways to Configure the Cisco Identity Services Engine
authorization (CoA) to establish
(Cisco ISE) Identity Source, on page 2461
connectivity from threat defense to
RADIUS server through routing or a
specific interface.
Step Configure a remote access VPN policy and Create a New Remote Access VPN Policy, on page 1562
4 select the RADIUS server group object that
you have created with dynamic
authorization.
Step Configure the DNS server details and Configure DNS, on page 1567
5 domain-lookup interfaces using the
DNS Server Group, on page 1364
Platform Settings.
Step Configure a split-tunnel in group policy to Configure Group Policy Objects, on page 1445
6 allow DNS traffic through Remote Access
VPN tunnel if the DNS server is reachable
through VNP network.
Step Deploy the configuration changes. Deploy Configuration Changes, on page 251
7
Two-Factor Authentication
You can configure two-factor authentication for the remote access VPN. With two-factor authentication, the
user must supply a username and static password, plus an additional item such as an RSA token or a passcode.
Two-factor authentication differs from using a second authentication source in that two-factor is configured
on a single authentication source, with the relationship to the RSA server tied to the primary authentication
source.
Secure Firewall Threat Defense supports RSA tokens and Duo Push authentication requests to Duo Mobile
for the second factor in conjunction with any RADIUS or AD server as the first factor in the two-factor
authentication process.
Step Create a RADIUS server group. RADIUS Server Group Options, on page 1344
2
Step Create a RADIUS Server object within the RADIUS Server Group Options, on page 1344
3 new RADIUS server group, with RADIUS
Note
or AD server as the host and with a timeout
The RADIUS or AD server must be the same server that
of 60 seconds or more.
is configured as the authentication agent in RSA server.
For two-factor authentication, make sure that the timeout
is updated to 60 seconds or more in the Secure Client
Profile XML file as well.
Step Configure a new remote access VPN policy Create a New Remote Access VPN Policy, on page 1562
4 using the wizard or edit an existing remote
access VPN policy.
Step Select RADIUS as the authentication server Configure AAA Settings for Remote Access VPN, on
5 and then select the newly-created RADIUS page 1575
server group as the authentication server.
Step Deploy the configuration changes. Deploy Configuration Changes, on page 251
7
• push. For example, my-password,push. Use push to tell Duo to send a push authentication to the Duo
Mobile app, which the user must have already installed and registered.
• sms. For example, my-password,sms. Use sms to tell Duo to send an SMS message with a new batch of
passcodes to the user’s mobile device. The user’s authentication attempt will fail when using sms. The
user must then re-authenticate and enter the new passcode as the secondary factor.
• phone. For example, my-password,phone. Use phone to authenticate using phone callback.
Step Create a RADIUS server group. RADIUS Server Group Options, on page 1344
2
Step Create a RADIUS Server object within the RADIUS Server Options, on page 1346
3 new RADIUS server group with Duo proxy
Note
server as the host with a timeout of 60
For two-factor authentication, make sure that the timeout
seconds or more.
is updated to 60 seconds or more in the Secure Client
Profile XML file as well.
Step Configure a new remote access VPN policy Create a New Remote Access VPN Policy, on page 1562
4 using the wizard or edit an existing remote
access VPN policy.
Step Select RADIUS as the authentication server Configure AAA Settings for Remote Access VPN, on
5 and then select the RADIUS server group page 1575
created with the Duo proxy server as the
authentication server.
Step Deploy the configuration changes. Deploy Configuration Changes, on page 251
7
Secondary Authentication
Secondary authentication or double authentication in Secure Firewall Threat Defense adds an additional layer
of security to remote access VPN connections by using two different authentication servers. With secondary
authentication enabled, the Secure Client VPN users must provide two sets of credentials to login to the VPN
gateway.
Secure Firewall Threat Defense remote access VPN supports secondary authentication in AAA Only and
Client Certificate & AAA authentication methods.
Related Topics
Configure Remote Access VPN Secondary Authentication, on page 1641
Procedure
Step 1 On your Secure Firewall Management Center web interface, choose Devices > VPN > Remote Access.
Step 2 Select a remote access policy and click Edit; or click Add to create a new remote access VPN policy.
Step 3 For a new remote access VPN policy, configure the authentication while selecting connection profile settings.
For an existing configuration, select the connection profile that includes the client profile, and click Edit.
Step 4 Click AAA > Authentication Method, AAA or Client Certificate & AAA.
• When you select the Authentication Method as:
Client Certificate & AAA—Authentication is done using both client certificate and AAA server.
• AAA—If you select the Authentication Server as RADIUS, by default, the Authorization Server
has the same value. Select the Accounting Server from the drop-down list. Whenever you select
AD and LDAP from the Authentication Server drop-down list, you must manually select the
Authorization Server and Accounting Server respectively.
• Whichever authentication method you choose, select or deselect Allow connection only if user
exists in authorization database.
Authentication Server— Secondary authentication server to provide secondary username and password
for VPN users.
Select the following under Username for secondary authentication:
• Prompt: Prompts the users to enter the username and password while logging on to VPN gateway.
• Use primary authentication username: The username is taken from the primary authentication
server for both primary and secondary authentication; you must enter two passwords.
• Map username from client certificate: Prefills the secondary username from the client certificate.
• If you select Map specific field option, which includes the username from the client certificate.
The Primary and Secondary fields display default values: CN (Common Name) and OU
(Organisational Unit) respectively. If you select the Use entire DN (Distinguished Name)
as username option, the system automatically retrieves the user identity.
See Authentication Method descriptions for more information about primary and secondary
field mapping.
• Prefill username from certificate on user login window: Prefills the secondary username
from the client certificate when the user connects via Secure Client.
• Hide username in login window: The secondary username is pre-filled from the client
certificate, but hidden to the user so that the user does not modify the pre-filled username.
• Use secondary username for VPN session: The secondary username is used for reporting user
activity during a VPN session.
For more information, see Configure AAA Settings for Remote Access VPN, on page 1575.
Related Topics
Configure Connection Profile Settings, on page 1572
• Threat Defense supports SAML 2.0 Redirect-POST binding , which is supported by all SAML IdPs.
• The Threat Defense functions as a SAML SP only. It cannot act as an Identity Provider in gateway mode
or peer mode.
• You can enforce an access policy on a SAML-authenticated user if you have an associated identity policy
with an AD realm matching the SAML domain. However, it does not work for Azure AD SAML because
it requires additional mapping from the tenant ID of the Azure AD to an associated realm ID on the threat
defense device.
• Having SAML authentication attributes available in DAP evaluation (similar to RADIUS attributes sent
in RADIUS auth response from AAA server) is not supported. Threat Defense supports SAML enabled
group policy on DAP policy; however, you cannot check the username attribute while using SAML
authentication, because the username attribute is masked by the SAML Identity provider.
• Threat Defense administrators need to ensure clock synchronization between the threat defense and the
SAML IdP for proper handling of authentication assertions and proper timeout behavior.
• Threat Defense administrators have the responsibility to maintain a valid signing certificate on both threat
defense and IdP considering the following:
• The IdP signing certificate is mandatory when configuring an IdP on the threat defense.
• The threat defense does not do a revocation check on the signing certificate received from the IdP.
• In SAML assertions, there are NotBefore and NotOnOrAfter conditions. The threat defense SAML
configured timeout interacts with these conditions as follows:
• Timeout overrides NotOnOrAfter if the sum of NotBefore and timeout is earlier than NotOnOrAfter.
• If NotBefore + timeout is later than NotOnOrAfter, then NotOnOrAfter takes effect.
• If the NotBefore attribute is absent, the threat defense denies the login request. If the NotOnOrAfter
attribute is absent and SAML timeout is not set, threat defense denies the login request.
• Threat Defense does not work with Duo in a deployment using an internal SAML, which forces the threat
defense to proxy for the client to authenticate, due to the FQDN change that occurs during
challenge/response for Two-factor authentication (push, code, password).
• When using SAML with Secure Client, follow these guidelines:
• Untrusted server certificates are not allowed in the embedded browser.
• The embedded browser SAML integration is not supported in CLI or SBL modes.
• SAML authentication established in a web browser is not shared with Secure Client and vice versa.
• Depending on the configuration, various methods are used when connecting to the headend with
the embedded browser. For example, while Secure Client might prefer an IPv4 connection over an
IPv6 connection, the embedded browser might prefer IPv6, or vice versa. Similarly, Secure Client
may fall back to no proxy after trying proxy and getting a failure, while the embedded browser may
stop navigation after trying proxy and getting a failure.
• You must synchronize your threat defense's Network Time Protocol (NTP) server with the IdP NTP
server in order to use the SAML feature.
• You cannot access internal servers with SSO after logging in using an internal IdP.
• The SAML IdP NameID attribute determines the user's username and is used for authorization,
accounting, and VPN session database.
Sign-on Server). Hence, you cannot use multiple SAML objects with the same Identity Provider Entity
ID on a single firewall.
• Create a SAML single sign-on server object. For more information, see Add a Single Sign-on Server,
on page 1347.
Note You can create a single sign-on server object in the Connection Profile settings
when you create a new policy using the Remote Access VPN policy Wizard.
Procedure
Related Topics
Configure AAA Settings for Remote Access VPN, on page 1575
Multi-Valued Attributes
Multi-valued attributes are also supported in DAP and the DAP table is indexed :
[Link].1 = "value”
[Link].2 = "value"
Procedure
Step 2 Configure SAML authentication in the remote access VPN connection profile.
a) Choose Devices > Remote Access.
b) Click Edit on the remote access VPN policy for which you want to configure SAML authorization or
create a new policy.
c) Edit the required connection profile and select AAA.
d) Select the single sign-on server object from the Authentication Server drop-down.
e) Save the remote access VPN configuration.
Step 3 Match a SAML criteria in DAP policy.
a) Select Devices > Dynamic Access Policy.
b) Create a new DAP or edit an existing one.
c) Create a DAP record or edit and existing record.
d) Click AAA Criteria > SAML Criteria > Add SAML Criteria.
e) Create a SAML criteria based on the SAML assertions returned by the SSO server.
Step 4 Deploy the remote access VPN configuration.
Related Topics
Configure Connection Profile Settings, on page 1572
Threat Defense Group Policy Objects, on page 1445
You can use the managed headend threat defense to distribute and manage Secure Client modules to the
endpoints. When a user connects to the threat defense, it downloads and installs Secure Client and the required
modules on the endpoint.
In version 6.7 and later, you can use the headend threat defense, managed by a management center, to distribute
and manage Secure Client modules to the endpoints. These modules then integrate with the corresponding
Cisco endpoint security solution.
In versions 6.4 to 6.6, you can enable these modules and profiles on a threat defense using FlexConfig. For
more information, see Configure AnyConnect Modules and Profiles Using FlexConfig.
Benefits
If you use a threat defense to distribute and manage Secure Client modules to the endpoints, you can easily
perform the following tasks:
• Distribute and manage Secure Client modules and profiles on each endpoint.
• Upgrade Secure Client on each endpoint.
AMP Enabler
Use this module to deploy Secure EndpointAMP for Endpoints, on endpoints. The module pushes Secure
EndpointAMP for Endpoints to endpoints from a server hosted locally within the enterprise. This module
provides an additional security agent that detects potential malware threats in the network, removes these
threats, and protects the enterprise.
In Cisco Secure Client 5.0, AMP Enabler is only for macOS. Cisco Secure Client for Windows offers full
integration with Cisco Secure Endpoint.
ISE Posture
Use this module to perform endpoint posture checks such as antivirus, antispyware, operating system and so
on using Cisco Identity Services Engine (ISE) and assess the endpoint's compliance. ISE provides next
generation identity and access control policy. ISE Posture performs a client-side evaluation. The client receives
the posture requirement policy from the headend, performs the posture data collection, compares the results
against the policy, and sends the assessment results back to the headend.
Network Visibility
Use this module to monitor the endpoint application usage using the Network visibility module. You can
uncover potential behavior anomalies and make informed network design decisions. It enhances the enterprise
administrator's ability to do capacity and service planning, auditing, compliance, and security analytics. You
can share the usage data with NetFlow analysis tools such as Cisco Stealthwatch.
Web Security
Use this module to enable Cisco Secure Web Appliance (SWA), powered by Cisco Talos. This module protects
the endpoint by blocking risky sites and testing unknown sites before allowing users to access them. It can
deploy web security either through the on-prem WSA or the cloud-based Cisco Cloud Web Security. This
module is not part of the AnyConnect package from release 4.5 and in Secure Client 5.0.
DART
Diagnostics and Reporting Tool (DART) collates system logs and other diagnostic information to troubleshoot
AnyConnect installation and connection problems. You can send this data to Cisco TAC for troubleshooting.
By default, DART is not enabled in new RA VPN group policies for 6.7 and later versions. In 6.6 and earlier
versions, DART is enabled by default.
Feedback
The customer experience feedback (CEF) module provides information about which features and modules
you use and have enabled. This information gives an insight into the user experience so that Cisco can continue
to improve the quality, reliability, performance, and user experience of the Cisco Secure Client. Secure Client
does not download the Feedback module to the endpoint. The feedback data is sent to the Cisco Feedback
Server.
Feedback Yes
DART No
• Licensing
• You need one of the following Secure Client licenses: Secure Client Premier, Secure Client
Advantage, or Secure Client VPN Only
• Your management center Essentials license must allow export-controlled functionality.
Choose System > Licenses > Smart Licenses to verify this functionality in the management center.
Feedback *.xml
• You can add only one entry per client module. You can edit or delete an entry for a module.
• If you plan to use ISE posture and Network Access Manager modules on a Windows OS, you must install
Network Access Manager before you use the ISE Posture module.
• If you enable the Umbrella Roaming Security module, ensure that you disable the Always send DNS
requests over tunnel option under split tunnelling in the VPN group policy.
• If you want to use SBL, then you must enable SBL in the Secure Client VPN profile.
Procedure
Step 1 The administrator creates profiles, if needed, for the required Secure Client modules.
Step 2 The administrator uses the management center to:
a) Configure the modules and add the profiles in the remote access VPN group policy.
b) Deploy the configuration on the threat defense.
Step 3 The user uses Secure Client to initiate a VPN connection to the threat defense.
Step 4 The threat defense authenticates the user.
Step 5 The Secure Client checks for updates.
Step 6 The threat defense distributes the Secure Client modules and the profiles on the endpoint.
What to do next
Configure a Remote Access VPN Group Policy with Secure Client Modules, on page 1651.
Configure a Remote Access VPN Group Policy with Secure Client Modules
To install and update the Secure Client modules on the endpoint using a threat defense managed by a
management center, you must update the remote access VPN group policy with the Secure Client module
configurations.
Procedure
What to do next
1. Deploy the configuration on the threat defense.
2. Launch the Secure Client, select the VPN profile, and connect to the VPN. Secure Client installs the
configured modules on it.
3. Verify the configuration. For more information, see Verify Secure Client Modules Configuration, on page
1652.
On the Endpoint
1. Use the Secure Client to establish a VPN connection to the threat defense.
2. Verify if the configured modules are downloaded and installed as part of the Secure Client.
3. Verify if the configured profiles, if any, are available in the locations documented in Profile Locations
for all Operating Systems.
Benefits
Benefits of restricting the remote access VPN to approved applications include:
• Performance—Limits VPN traffic over the corporate network and frees up resources of the VPN headend.
• Protection—Protects the corporate VPN tunnel from unapproved malicious applications on the mobile
device.
Prerequisites
• Install and configure a third-party Mobile Device Manager (MDM).
You must configure the applications that will be allowed in the VPN in the MDM itself, not on the threat
defense headend device.
• Download the Cisco AnyConnect Enterprise Application Selector from Cisco Software Download Center.
You need this tool to define the Per App VPN policy.
Licensing
• Secure Client Premier, or Secure Client Advantage.
• Essentials license must allow export-controlled functionality.
To verify this functionality in the management center, choose System > Licenses > Smart Licenses.
We strongly recommend that you configure the per-app policy in the MDM on the user’s mobile device. This
simplifies the headend configuration. If you decide to configure the list of allowed applications on the headend,
you must determine the application IDs for each application on each type of endpoint.
The application ID, called the bundle ID in iOS, is a reverse DNS name. You can use an asterisk as a wildcard.
For example, *.* indicates all applications, [Link].* indicates all Cisco applications.
To determine the application IDs:
• Android—Go to Google Play in a web browser and select the Apps category. Click (or hover over) an
application that you want to allow, then look at the URL. The app id is in the URL, on the id= parameter.
For example, the following URL is for Facebook Messenger, so the app id is [Link].
[Link]
For applications that are not available through Google Play, such as your own applications, download a
package name viewer application to extract the app ID. There are many of these applications available,
one of them should provide what you need, but Cisco does not endorse any of them.
• iOS—There is no straight-forward way to get the bundle ID. Following is one way to find it:
1. Use a desktop web browser such as Chrome to search for the application name.
2. In the search results, look for the link to download the app from the Apple App Store. For example,
Facebook Messager would be similar to:
[Link]
3. Copy the number after the id string. In this example, 454638411.
4. Open a new browser window, and add the number to the end of the following URL:
[Link]
For this example: [Link]
5. You will be prompted to download a text file, usually named [Link]. Download the file.
6. Open the file in a text editor such as WordPad, and search for bundleId. For example:
"bundleId":"[Link]",
In this example, the bundle ID is [Link]. Use this as the app ID.
Once you have your list of application IDs, you can configure the policy as explained in .
Procedure
Step 1 Use the Cisco AnyConnect Enterprise Application Selector to define the Per App VPN policy.
We recommend that you create a simple Allow All policy, and define the allowed applications in the MDM.
However, you can specify a list of applications to allow and control the list from the headend. If you want to
include specific applications, create a separate rule for each application, using a unique name and the
application’s app ID. For more information on getting the app IDs, see Determine the Application IDs for
Mobile Applications.
To create an Allow All policy that supports both Android and iOS platforms using the AnyConnect Enterprise
Application Selector:
a) Choose Android from the drop-down list as the platform type and configure the following options:
• Friendly Name—Enter a name for the policy. For example, Allow_All.
• App ID—Enter *.* to match all possible applications.
• Leave the other options.
b) Choose iOS from the drop-down list as the platform type and configure the following options:
• Friendly Name—Enter a name for the policy. For example, Allow_All.
• App ID—Enter *.* to match all possible applications.
• Leave the other options.
c) Choose Policy > View Policy to get the base64 encoded string for the policy.
This string contains an encrypted XML file that allows the threat defense to see the policies. Copy this
value. You need this string when you configure Per App VPN on the threat defense.
Step 2 Use the management center to enable the Per App on the threat defense headend device.
a) Choose Devices > Remote Access.
b) Select a remote access VPN policy and click Edit.
c) Select a connection profile and click Edit.
d) Click Edit Group Policy.
e) Click the Secure Client tab.
f) Click Custom Attributes and click +.
g) Choose Per App VPN from the Secure Client Attribute drop-down list.
h) Choose an object from the Custom Attribute Object drop-down list or click + to add an object.
When you add a new custom attribute object for Per App VPN, enter the name, description, and the base64
encoded policy string from the Cisco AnyConnect Enterprise Application Selector.
i) Click Save.
j) Click Add and click Save.
Step 3 Deploy your changes on the management center.
What to do next
1. Launch the Secure Client, select the VPN profile, and connect to the VPN.
2. Verify the configuration. For more information, see Verify Per App Configuration, on page 1656.
On the Endpoint
After the endpoint establishes a VPN connection with the threat defense:
1. Click the Statistics icon of the Secure Client.
2. Tunnel Mode will be “Application Tunnel” instead of “Tunnel All Traffic.”
3. Tunneled Apps will list the applications you enabled for tunneling in the MDM.
1 Create and set up a realm. Create an LDAP Realm or an Active Directory Realm
and Realm Directory, on page 2376
2 Create a QoS policy and QoS rule for the • See Creating a QoS Policy, on page 925 to create a
user or group available in the newly created QoS policy.
realm.
• See Configuring QoS Rules, on page 926 to create
a QoS rule.
3 Configure remote access VPN policy and Create a New Remote Access VPN Policy, on page 1562
select the newly created realm for user
authentication.
4 Deploy the remote access VPN policy. Deploy Configuration Changes, on page 251
How to Use VPN Identity for User-Id Based Access Control Rules
Step Do This More Info
1 Create and set up a realm. Create an LDAP Realm or an Active Directory Realm
and Realm Directory, on page 2376.
2 Create an identity policy and add an • See Create an Identity Policy, on page 2505 to create
identity rule. an identity policy.
• See Create an Identity Rule, on page 2513 to create
an identity rule.
3 Associate the identity policy with an access Associating Other Policies with Access Control, on page
control policy. 1737
4 Configure remote access VPN policy and Create a New Remote Access VPN Policy, on page 1562
select the newly created realm for user
authentication.
5 Deploy the remote access VPN policy. Deploy Configuration Changes, on page 251
For detailed information about threat defense certificates, see Managing Threat Defense Certificates, on page
1466.
Limitations
• Multiple certificate authentication currently limits the number of certificates to two.
• Secure Client supports only RSA-based certificates.
• Only SHA256, SHA384, and SHA512 based certificates are supported during the Secure Client aggregate
authentication.
• Certificate authentication cannot be combined with SAML authentication.
Figure 434:
• Client Certificate Only—User is authenticated using client certificate. Client certificate must be
configured on VPN client endpoints. By default, the username is derived from client certificate fields
CN & OU respectively. In case, the username is specified in other fields in the client certificate, use
'Primary' and 'Secondary' field to map appropriate fields.
• Client Certificate & AAA—User is authenticated using both the types of authentication, AAA and
client certificate.
7. Configure the required connection profile settings and remote access VPN settings.
8. Save the connection profile and remote access VPN policy. Deploy the remote access VPN on threat
defense.
For information about remote access VPN AAA settings, see Configure AAA Settings for Remote Access
VPN, on page 1575.
For more information about DAP, see Dynamic Access Policies , on page 1665.
Geolocation-based RA 7.7 7.7 You can now allow or block remote access VPN connections based on country
VPN or region. Connections that don't meet your location-based criteria are blocked
before authentication and logged for auditing purposes.
New/Modified Screens:
• Objects > Object Management > Access List > Service Access
• Devices > VPN > Remote Access
IPsec flow offload on the 7.4 Any On the Secure Firewall 3100 and Secure Firewall 4200 devices, IPsec flow
VTI loopback interface offload is enabled automatically on the VTI loopback interface.
Secure Client 7.4 Any You can configure Secure Client customizations and deploy them to the VPN
Customizations headend. The threat defense distributes these customizations to the endpoint
when a user connects from the Secure Client:
• GUI text and messages
• Icons and images
• Scripts
• Binaries
• Customized Installer Transforms
• Localized Installer Transforms
New/Modified Screens:
• Objects > Object Management > VPN > Secure Client Customization
• Devices > Remote Access > Advanced > Secure Client Customizations
WAN Summary 7.4 Any The WAN Summary dashboard provides a snapshot of your WAN devices and
Dashboard their interfaces.
New/Modified Screen:
Overview > Dashboards > WAN Summary
SAML with Certificate 7.2 Any We have updated the remote access VPN configuration wizard to support user
Support authentication with Certificate and SAML. You can configure a remote access
VPN to authenticate machine or user certificate before a SAML authentication
is initiated.
IPsec flow offload. 7.2 Any On the Secure Firewall 3100, IPsec flows are offloaded by default. After the
initial setup of an IPsec site-to-site VPN or remote access VPN security
association (SA), IPsec connections are offloaded to the field-programmable
gate array (FPGA) in the device, which should improve device performance.
You can change the configuration using FlexConfig and the flow-offload-ipsec
command.
Multiple IDP trustpoint 7.1 Any Secure Firewall Management Center supports multiple identity provider
support trustpoints with Microsoft Azure that can have multiple applications for the
same Entity ID, but a unique identity certificate.
AnyConnect VPN SAML 7.1 Any You can now configure AnyConnect VPN SAML External Browser to enable
External Browser additional authentication choices, such as password less authentication,
WebAuthN, FIDO, SSO, U2F, and an improved SAML experience due to the
persistence of cookies. When you use SAML as the primary authentication
method for a remote access VPN connection profile, you can elect to have the
AnyConnect client use the client’s local browser instead of the AnyConnect
embedded browser to perform the web authentication. This option enables
single sign-on (SSO) between your VPN authentication and other corporate
logins. Also choose this option if you want to support web authentication
methods, such as biometric authentication and Yubikeys, that cannot be
performed in the embedded browser.
We updated the remote access VPN connection profile wizard to allow you to
configure the SAML Login Experience.
Multi-Certificate 7.0 Any Secure Firewall Management Center now supports multiple certificate-based
Authentication authentication for threat defense to validate the machine or device certificate,
to ensure that the device is a corporate-issued device in addition to
authenticating the user’s identity certificate to allow VPN access using
AnyConnect client.
VPN Load balancing 7.0 Any VPN load balancing logically group two or more devices and distributes remote
access VPN sessions among the grouped devices equally without considering
throughput and other traffic parameters.
AnyConnect Custom 7.0 Any Secure Firewall Management Center now supported AnyConnect custom
Attributes attributes and provides an infrastructure to configure the AnyConnect client
feature without adding hard-coded support for these features on threat defense.
Local User 7.0 Any You can now configure and manage users locally on threat defense using the
Authentication Secure Firewall Management Center web interface, and configure the local
users for primary and secondary remote access VPN authentication.
Selective Policy 7.0 Any You can now choose to include or exclude changes to remote access VPN and
Deployment site-to-site VPN configurations during the deployment.
Support for AnyConnect 6.7 Any Secure Firewall Management Center now supports configuring AnyConnect
Modules Configuration modules and profiles for additional security.
Support for LDAP 6.7 Any You can configure LDAP authorization for remote access VPN using the Secure
Authorization Firewall Management Center.
SAML single sign-on 6.7 Any You can configure a SAML 2.0 server as the single sign-on authentication
support for remote access server for remote access VPNs.
VPN
AnyConnect 6.7 Any Threat Defense remote access VPN supports configuring AnyConnect
Management VPN tunnel Management VPN tunnel that allows VPN connectivity to endpoints when the
support corporate endpoints are powered on, without the VPN users connecting to the
VPN.
Support for Datagram 6.6 Any DTLS 1.2 is now part of the default SSL cipher group and it can be configured
Transport Layer Security along with TLS 1.2.
(DTLS) 1.2
If the threat defense device receives attributes from all sources, the device evaluates, merges, and applies the
attributes to the user policy. If there are conflicts between attributes coming from the DAP, the AAA server,
or the group policy, the attributes from the DAP always take precedence.
The threat defense device applies attributes in the following order:
Figure 436: Policy Enforcement Flow
1. DAP attributes on the FTD—The DAP attributes take precedence over all others.
2. User attributes on the external AAA server—The server returns these attributes after successful user
authentication and/or authorization.
3. Group policy configured on the FTD —If a RADIUS server returns the value of the RADIUS Class
attribute IETF-Class-25 (OU= group-policy) for the user, the threat defense device places the user in the
group policy of the same name and enforces any attributes in the group policy that are not returned by the
server.
4. Group policy assigned by the Connection Profile (also known as Tunnel Group)—The Connection
Profile has the preliminary settings for the connection, and includes a default group policy that is applied
to the user before authentication.
Note The threat defense device does not support inheriting system default attributes from the default group policy,
DfltGrpPolicy. For the user session, the device uses the attributes on the group policy that you assign to the
connection profile, unless the user attributes or the group policy from the AAA server overrides them.
Procedure
Step 1 Choose Devices > Dynamic Access Policy > Create Dynamic Access Policy.
Step 2 Specify the Name for the DAP policy and an optional Description.
Step 3 Choose the Secure Firewall Posture Package from the drop-down list.
Step 4 Click Save.
What to do next
To configure DAP record, see Create a Dynamic Access Policy Record
Procedure
Step 7 Select one of the following actions to take when a DAP record matches:
• Continue—Applies access policy attributes to the session.
• Terminate—Terminates the session.
• Quarantine—Quarantines the connection.
Step 8 Check the Display User Message on Criterion Match check-box and add the user message.
The threat defense displays this message to the user when the DAP record matches.
Step 9 Check the Apply a Network ACL on Traffic check box and select the access control list from the drop-down.
Step 10 Check the Apply one or more Secure Client Custom Attributes check box and select the custom attributes
object from the drop-down.
Step 11 Click Save.
Procedure
Note
You cannot edit an Endpoint ID once it is saved.
What to do next
You can use the endpoint IDs to configure advanced posture assessment criteria using Lua scripts. For more
information, see Configure Advanced Settings for DAP, on page 1676.
Procedure
Step 7 Select LDAP Criteria, RADIUS Criteria, or SAML Criteria and specify the Attribute ID and Value.
Step 8 Click Save.
Procedure
Step 1 Choose Devices > Dynamic Access Policy > Create Dynamic Access Policy.
Step 2 Edit a DAP policy and then DAP record.
Note
Create a DAP policy and DAP record if not done already.
Step 3 Click Endpoint Criteria and configure the following endpoint criteria attributes:
Note
You can create multiple instances of each type of endpoint attribute. There is no limit for the number of
endpoint attributes for each DAP record.
Procedure
Step 1 Edit a DAP record and select Endpoint Criteria > Anti-Malware.
Step 2 Select the Match Criteria All or Any.
Step 3 Click Add to add anti-malware attributes.
Step 4 Click Installed to indicate whether the selected endpoint attribute and its accompanying qualifiers are installed
or not installed.
Step 5 Choose Enabled or Disabled to activate or deactivate real-time malware scanning.
Step 6 Select the name of the anti-malware Vendor from the list.
Step 7 Select the anti-malware Product Description.
Step 8 Choose the Version of the anti-malware product.
Step 9 Specify the number of days since the Last Update.
You can indicate that an anti-malware update must occur in less than (<) or more than (>) the number of days
you specify.
Procedure
Step 1 Edit a DAP record and choose Endpoint Criteria > Device.
Step 2 Select the Match Criteria All or Any.
Step 3 Click Add and select the = or ≠ operator to check the attribute to be equal to or not equal to the value you
enter for the following attributes:
• Host Name—Hostname of the device you are testing for. Use the computer’s host name only, not the
fully qualified domain name (FQDN).
• MAC Address—MAC address of the network interface card you are testing for. The address must be
in the format [Link] where x is a hexadecimal character.
• BIOS Serial Number—BIOS serial number value of the device you are testing for. The number format
is manufacturer-specific.
• Port Number—Listening port number of the device.
• Secure Desktop Version—Version of the Host Scan image running on the endpoint.
• OPSWAT Version—The OPSWAT client version.
• Privacy Protection—None, Cache cleaner, Secure Desktop.
• TCP/UDP Port Number—TCP or UDP port in the listening state that you are testing for.
Procedure
Step 1 Edit a DAP record and select Endpoint Criteria > Secure Client.
Step 2 Select the Match Criteria All or Any.
Step 3 Click Add and select the = or ≠ operator to check the attribute to be equal to or not equal to the value you
enter.
Step 4 Select the Client Version and Platform.
Step 5 Select the Platform Version, and specify the Device Type and Device Unique ID.
Step 6 Add the MAC Addresses the MAC Address Pool.
Note
The MAC Address must be in the format XX-XX-XX-XX-XX-XX, where each X is a hexadecimal character.
You can click Add another MAC Address to add more addresses.
Procedure
Step 1 Edit a DAP record and select Endpoint Criteria > NAC.
Step 2 Select the Match Criteria All or Any.
Step 3 Click Add to add NAC attributes.
Step 4 Set the operator to be equal to = or not equal to ≠ the posture token string. Enter the posture token string in
the Posture Status box.
Step 5 Click Save.
Procedure
Step 1 Edit a DAP record and select Endpoint Criteria > Application.
Step 2 Select the Match Criteria All or Any.
Step 3 Click Add to add application attributes.
Step 4 Choose equals ( = ) or does not equal (≠ ) and specify the Client Type to indicate the type of remote access
connection.
Step 5 Click Save.
Procedure
Step 1 Edit a DAP record and select Endpoint Criteria > Personal Firewall.
Step 2 Select the Match Criteria All or Any.
Step 3 Click Add to add personal firewall attributes.
Step 4 Click Installed to indicate whether the personal firewall endpoint attribute and its accompanying qualifiers
(fields below the Name/Operation/Value column) are installed or not installed.
Step 5 Choose Enabled or Disabled to activate or deactivate firewall protection.
Step 6 Select the name of the firewall Vendor from the list.
Step 7 Select the firewall Product Description.
Step 8 Select the equals ( = ) or does not equal (≠ ) operator and choose the Version of the personal firewall product.
Procedure
Step 1 Edit a DAP record and select Endpoint Criteria > Operating System .
Step 2 Select the Match Criteria All or Any.
Step 3 Click Add to add endpoint attributes.
Step 4 Select the equals ( = ) or does not equal (≠ ) operator and then select the Operating System.
Step 5 Select the equals ( = ) or does not equal (≠ ) operator and then specify the operating system Version.
Step 6 Click Save.
Procedure
Procedure
Procedure
Procedure
Step 1 Edit a DAP record and select Endpoint Criteria > Certificate.
Step 2 Select the Match Criteria All or Any.
Step 3 Click Add to add certificate attributes.
Step 4 Select the certificate Cert1 or Cert2.
Step 5 Select the Subject and specify the subject value.
Step 6 Select the Issuer and specify the issuer value.
Step 7 Select the Subject Alternate Name and specify the subject value.
Step 8 Specify the Serial Number.
Step 9 Choose the Certificate Store: None, Machine, or User.
The VPN client sends the certificate store information.
Procedure
Example:
In the following example, DAPTESTFILE, LIBAGENT, vpnagent, and DUOAGENT were inserted in the
Lua script:
EVAL([Link]["DAPTESTFILE"].exists,"EQ","true") or
EVAL([Link]["LIBAGENT"].exists,"EQ","true") and
EVAL([Link][""vpnagent""].exists,"EQ","true") and
EVAL([Link][""DUOAGENT""].exists,"EQ","true")
Procedure
When the remote access VPN user tries to connect, the VPN checks the configured dynamic access policy
records and attributes. VPN creates a dynamic access policy based on the matching dynamic access policy
records and takes appropriate action on the VPN session.
Easily configure posture 7.7 Any For a DAP policy, you can configure file, process, or registry endpoint attributes
assessment criteria for with unique endpoint IDs. These IDs can be used as endpoint criteria in Lua
dynamic access policies scripts to configure a DAP record.
New/Modified Screens:
• Devices > Dynamic Access Policy > Add/Edit Policy > Add Posture
Assessment Criteria
• Devices > Dynamic Access Policy > Add/Edit Policy > Add/Edit DAP
Record > Advanced > Endpoint Criteria
If a client device supports dual address stack and the RA VPN configuration on the threat defense device
allows IPv4 and IPv6 address pools, when a client establishes an RA VPN session with the headend device,
it assigns an IPv4 and an IPv6 address to the client's tunnel interface. The RA VPN session has two IP addresses,
an IPv4 and an IPv6 address on the threat defense device. The management center shows two sessions for the
same user, one with an IPv4 address and another with an IPv6 address, and the session count is two.
Hence, even when there is only a single RA VPN session from a user as per show vpn-sessiondb l2l filter
ipaddress command on the device, the management center shows two different sessions.
Sessions
This widget allows you to monitor real-time data from active RA VPN sessions on the devices. You can filter
and view the distribution of active RA VPN sessions according to:
• Device: Displays the number of sessions per device.
• Encryption Type: Displays the number of Secure Client SSL or IPsec sessions.
• Secure Client Version: Displays the sessions per Secure Client version.
• Operating System: Displays the sessions per operating systems. For example, Windows, Linux, Mac,
Mobile OS, and so on.
• Connection Profile: Displays the sessions per connection profile.
For more information about PBR policy and path monitoring, see Policy Based Routing, on page 1311.
Click Uplink Decisions to view the VPN Troubleshooting page. You can view syslogs with ID: 880001.
These syslogs show the threat defense interfaces through which it steers traffic based on the configured PBR
policy.
To view the above syslogs and to view the data on this dashboard, ensure that you review Prerequisites for
Using SD-WAN Summary Dashboard, on page 1681.
For clusters, this dashboard displays application performance metrics of only the control node and not the
data nodes.
3. Click the edit icon adjacent to the interface that you want to edit.
4. Click the Path Monitoring tab.
5. Check the Enable IP based Monitoring check box.
6. Check the Enable HTTP based Application Monitoring check box.
7. Click OK.
• Configure a PBR policy with at least one application configured to monitor it:
1. Choose Devices > Device Management.
2. Click the edit icon adjacent to the device that you want to edit.
3. Click Routing.
4. In the left pane, click Policy Based Routing.
5. Click Add.
6. From the Ingress Interface drop-down list, choose an interface.
7. Click Add to configure a forwarding action.
8. Configure the parameters.
9. Click Save.
• To view the application performance metrics for the WAN interfaces, you must:
• Threat defense devices must be Version 7.4.1.
• Enable data collection from the SD-WAN module in the health policy.
1. Choose System > Policy.
2. Click the Edit health policy icon.
3. In the Health Modules tab, under SD-WAN, click the SD-WAN Monitoring toggle button.
• Configure the forwarding action for the policy with one of the four application metrics.
1. Choose Devices > Device Management.
2. Click the edit icon adjacent to the device that you want to edit.
3. Click Routing.
4. In the left pane, click Policy Based Routing.
5. Click the edit icon adjacent to the policy that you want to edit.
6. In the Edit Policy Based Route dialog box, click the edit icon adjacent to the corresponding
ACL.
7. In the Edit Forwarding Actions dialog box, from the Interface Ordering drop-down list,
choose one of the following options:
• Minimal Jitter
• Maximum Mean Opinion Score
• Minimal Round-Trip Time
• Minimal Packet Loss
If you choose Interface Priority or Order, application monitoring is not enabled on the interface.
Monitor WAN Devices and Interfaces Using the SD-WAN Summary Dashboard
The SD-WAN Summary dashboard has the following widgets under the Overview tab:
• Top Applications, on page 1684
• WAN Connectivity, on page 1684
• VPN Topology, on page 1685
• WAN Interface Throughput, on page 1685
• Device Inventory, on page 1685
• WAN Device Health, on page 1685
Top Applications
This widget displays the top 10 applications ranked according to throughput.
You can choose a time range for the widget data from the Show Last drop-down list. The range is 15 minutes
to two weeks.
WAN Connectivity
This widget provides a summary of the WAN interfaces statuses. It shows the number of WAN interfaces
that are in the Online, Offline or No Data states. Note that you cannot monitor subinterfaces using this widget.
Click View All Interfaces to view more details about the interfaces in the health monitor page.
If a WAN interface is in the Offline or No Data state, you can troubleshoot it from the health monitor page:
1. In the Monitoring pane, expand Devices.
2. Click the corresponding WAN device to view the device-specific health details.
3. Click the Interface tab to view the interface status and aggregate traffic statistics for a specific time.
Alternatively, you can click View System & Troubleshoot Details. The health monitor page is displayed
with all the necessary details.
VPN Topology
This widget provides a summary of the site-to-site VPN tunnel statuses. It shows the number of Active,
Inactive, and No Active Data VPN tunnels.
Click View All Connections to view the VPN tunnel details in the Site-to-site VPN Monitoring dashboard.
If the tunnels are in the Inactive or No Active Data state, you can troubleshoot using the Site-to-site VPN
Monitoring dashboard. In the Tunnel Status widget, hover your cursor over a topology, click View ( )
and do one of the following:
• Click the CLI Details tab to view the details of the VPN tunnels.
• Click the Packet Tracer tab to use the packet tracer tool for the topology.
Device Inventory
This widget lists all the managed WAN devices and groups them according to the model.
Click View Device Management to view more details about the device in the Device Management page.
A device can be in Disabled state for multiple reasons, including the following:
• Management interface is disabled.
• Device is powered off.
• Device is being upgraded.
Note If you configure your VPN in a high-availability deployment, the device name displayed against active VPN
sessions can be the primary or secondary device that identified the user session.
dashboard of the management center displays the IP address of the VPN peer (peer’s IKE address) which
encrypts or decrypts the traffic and displays the VPN action as follows:
• If the connection is decrypted by the VPN, the column Decrypt Peer displays the IP address of the peer's
address from where the flow was received and displays Decrypt as the VPN action.
• If the connection is encrypted by the VPN, the column Encrypt Peer displays the IP address of the VPN
peer to which the flow is sent and displays Encrypt as the VPN action.
• If the VPN server cascades the connection, it gets decrypted on one tunnel and gets re-encrypted on
another tunnel. In this case, both Encrypt Peer and Decrypt Peer IP addresses get appears in the event.
The column VPN Action displays VPN Routing as the action to indicate that the connection transit
through the VPN server.
If you enable the bypass Access Control Policy for decrypted traffic (sysopt permit-vpn) option, the system
bypasses the Access Control Policy and do not log events for decrypted traffic. This option is disabled by
default and all decrypted traffic in the VPN tunnel undergoes ACL inspection.
Procedure
VPN Troubleshooting
This section describes VPN troubleshooting tools and debug information.
System Messages
The Message Center is the place to start your troubleshooting. This feature allows you to view messages that
are continually generated about system activities and status. To open the Message Center, click System Status,
located to the immediate right of the Deploy button in the main menu.
Note When you configure a device with site-to-site or remote access VPN, it automatically enables sending VPN
syslogs to the management center by default.
Debug Commands
This section explains how you use debug commands to help you diagnose and resolve VPN-related problems.
The commands described here are not exhaustive, this section include commands according to their usefulness
in assisting you to diagnose VPN-related problems.
Usage Guidelines Because debugging output is assigned high priority in the CPU process, it can render the system unusable.
For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions
with the Cisco Technical Assistance Center (TAC). Moreover, it is best to use debug commands during
periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood
that increased debug command processing overhead will affect system use.
You can view debug output in a CLI session only. Output is directly available when connected to the Console
port, or when in the diagnostic CLI (enter system support diagnostic-cli). You can also view output from
the regular Firepower Threat Defense CLI using the show console-output command.
To show debugging messages for a given feature, use the debug command. To disable the display of debug
messages, use the no form of this command. Use no debug all to turn off all debugging commands.
Syntax Description feature Specifies the feature for which you want to enable debugging. To see the available
features, use the debug ? command for CLI help.
subfeature (Optional) Depending on the feature, you can enable debug messages for one or
more subfeatures. Use ? to see the available subfeatures.
level (Optional) Specifies the debugging level. Use ? to see the available levels.
Example
With multiple sessions running on remote access VPN, troubleshooting can be difficult, given the
size of the logs. You can use the debug webvpn condition command to set up filters to target your
debug process more precisely.
debug webvpn condition {group name | p-ipaddress ip_address [{subnet subnet_mask | prefix
length}] | reset | user name}
Where:
• group name filters on a group policy (not a tunnel group or connection profile).
• p-ipaddress ip_address [{subnet subnet_mask | prefix length}] filters on the public IP address
of the client. The subnet mask (for IPv4) or prefix (for IPv6) is optional.
• reset resets all filters. You can use the no debug webvpn condition command to turn off a
specific filter.
• user name filters by username.
If you configure more than one condition, the conditions are conjoined (ANDed), so that debugs
appear only if all conditions are met.
After setting up the condition filter, use the base debug webvpn command to turn on the debug.
Setting the conditions alone does not enable the debug. Use the show debug and show webvpn
debug-condition commands to view the current state of debugging.
The following shows an example of enabling a conditional debug on the user jdoe.
undebug Disables debugging for a feature. This command is a synonym for no debug.
debug aaa
See the following commands for debugging configurations or authentication, authorization, and accounting
(AAA) settings.
Syntax Description aaa Enables debugging for AAA. Use ? to see the available subfeatures.
common (Optional) Specifies the AAA common debug level. Use ? to see the available
levels.
shim (Optional) Specifies the AAA shim debug level. Use ? to see the available levels.
show debug aaa Shows the currently active debug settings for AAA.
undebug aaa Disables debugging for AAA. This command is a synonym for no debug aaa.
debug crypto
See the following commands for debugging configurations or settings associated with crypto.
debug crypto [ca | condition | engine | ike-common | ikev1 | ikev2 | ipsec | ss-apic]
Syntax Description crypto Enables debugging for crypto. Use ? to see the available subfeatures.
ca (Optional) Specifies the PKI debug levels. Use ? to see the available subfeatures.
condition (Optional) Specifies the IPsec/ISAKMP debug filters. Use ? to see the available
filters.
engine (Optional) Specifies the crypto engine debug levels. Use ? to see the available
levels.
ike-common (Optional) Specifies the IKE common debug levels. Use ? to see the available
levels.
ikev1 (Optional) Specifies the IKE version 1 debug levels. Use ? to see the available
levels.
ikev2 (Optional) Specifies the IKE version 2 debug levels. Use ? to see the available
levels.
ipsec (Optional) Specifies the IPsec debug levels. Use ? to see the available levels.
condition (Optional) Specifies the Crypto Secure Socket API debug levels. Use ? to see the
available levels.
vpnclient (Optional) Specifies the EasyVPN client debug levels. Use ? to see the available
levels.
show debug crypto Shows the currently active debug settings for crypto.
undebug crypto Disables debugging for crypto. This command is a synonym for no debug crypto.
debug crypto ca
See the following commands for debugging configurations or settings associated with crypto ca.
Syntax Description crypto ca Enables debugging for crypto ca. Use ? to see the available subfeatures.
cluster (Optional) Specifies the PKI cluster debug level. Use ? to see the available levels.
cmp (Optional) Specifies the CMP transactions debug level. Use ? to see the available
levels.
messages (Optional) Specifies the PKI Input/Output message debug level. Use ? to see the
available levels.
periodic-authentication (Optional) Specifies the PKI periodic-authentication debug level. Use ? to see
the available levels.
scep-proxy (Optional) Specifies the SCEP proxy debug level. Use ? to see the available
levels.
server (Optional) Specifies the local CA server debug level. Use ? to see the available
levels.
transactions (Optional) Specifies the PKI transaction debug level. Use ? to see the available
levels.
trustpool (Optional) Specifies the trustpool debug level. Use ? to see the available levels.
show debug crypto ca Shows the currently active debug settings for crypto ca.
undebug Disables debugging for crypto ca. This command is a synonym for no debug
crypto ca.
Syntax Description ikev1 Enables debugging for ikev1. Use ? to see the available subfeatures.
show debug crypto ikev1 Shows the currently active debug settings for IKEv1.
undebug crypto ikev1 Disables debugging for IKEv1. This command is a synonym for no debug crypto
ikev1.
Syntax Description ikev2 Enables debugging ikev2. Use ? to see the available subfeatures.
ha (Optional) Specifies the IKEv2 HA debug level. Use ? to see the available levels.
platform (Optional) Specifies the IKEv2 platform debug level. Use ? to see the available
levels.
protocol (Optional) Specifies the IKEv2 protocol debug level. Use ? to see the available
levels.
show debug crypto ikev2 Shows the currently active debug settings for IKEv2.
undebugcrypto ikev2 Disables debugging for IKEv2. This command is a synonym for no debug crypto
ikev2.
Syntax Description ipsec Enables debugging for ipsec. Use ? to see the available subfeatures.
show debug crypto ipsec Shows the currently active debug settings for IPsec.
undebugcrypto ipsec Disables debugging for IPsec. This command is a synonym for no debug crypto
ipsec.
debug ldap
See the following commands for debugging configurations or settings associated with LDAP (Lightweight
Directory Access Protocol).
Syntax Description ldap Enables debugging for LDAP. Use ? to see the available subfeatures.
show debug ldap Shows the currently active debug settings for LDAP.
undebugldap Disables debugging for LDAP. This command is a synonym for no debug ldap.
debug ssl
See the following commands for debugging configurations or settings associated with SSL sessions.
Syntax Description ssl Enables debugging for SSL. Use ? to see the available subfeatures.
cipher (Optional) Specifies the SSL cipher debug level. Use ? to see the available levels.
device (Optional) Specifies the SSL device debug level. Use ? to see the available levels.
show debug ssl Shows the currently active debug settings for SSL.
undebug ssl Disables debugging for SSL. This command is a synonym for no debug ssl.
debug webvpn
See the following commands for debugging configurations or settings associated with WebVPN.
Syntax Description webvpn Enables debugging for WebVPN. Use ? to see the available subfeatures.
anyconnect (Optional) Specifies the WebVPN Secure Client debug level. Use ? to see the
available levels.
chunk (Optional) Specifies the WebVPN chunk debug level. Use ? to see the available
levels.
cifs (Optional) Specifies the WebVPN CIFS debug level. Use ? to see the available
levels.
citrix (Optional) Specifies the WebVPN Citrix debug level. Use ? to see the available
levels.
compression (Optional) Specifies the WebVPN compression debug level. Use ? to see the
available levels.
condition (Optional) Specifies the WebVPN filter conditions debug level. Use ? to see the
available levels.
cstp-auth (Optional) Specifies the WebVPN CSTP authentication debug level. Use ? to see
the available levels.
customization (Optional) Specifies the WebVPN customization debug level. Use ? to see the
available levels.
failover (Optional) Specifies the WebVPN failover debug level. Use ? to see the available
levels.
html (Optional) Specifies the WebVPN HTML debug level. Use ? to see the available
levels.
javascript (Optional) Specifies the WebVPN Javascript debug level. Use ? to see the
available levels.
kcd (Optional) Specifies the WebVPN KCD debug level. Use ? to see the available
levels.
listener (Optional) Specifies the WebVPN listener debug level. Use ? to see the available
levels.
mus (Optional) Specifies the WebVPN MUS debug level. Use ? to see the available
levels.
nfs (Optional) Specifies the WebVPN NFS debug level. Use ? to see the available
levels.
request (Optional) Specifies the WebVPN request debug level. Use ? to see the available
levels.
response (Optional) Specifies the WebVPN response debug level. Use ? to see the available
levels.
saml (Optional) Specifies the WebVPN SAML debug level. Use ? to see the available
levels.
session (Optional) Specifies the WebVPN session debug level. Use ? to see the available
levels.
task (Optional) Specifies the WebVPN task debug level. Use ? to see the available
levels.
transformation (Optional) Specifies the WebVPN transformation debug level. Use ? to see the
available levels.
url (Optional) Specifies the WebVPN URL debug level. Use ? to see the available
levels.
util (Optional) Specifies the WebVPN utility debug level. Use ? to see the available
levels.
xml (Optional) Specifies the WebVPN XML debug level. Use ? to see the available
levels.
show debug webvpn Shows the currently active debug settings for WebVPN.
undebug webvpn Disables debugging for WebVPN. This command is a synonym for no debug
webvpn.
Each type of traffic inspection and control occurs where it makes the most sense for maximum flexibility and
performance. For example, reputation-based blocking uses simple source and destination data, so it can block
prohibited traffic early in the process. In contrast, detecting and blocking intrusions and exploits is a last-line
defense.
Introduction to Rules
Rules in various policy types (access control, SSL, identity, and so on) exert granular control over network
traffic. The system evaluates traffic against rules in the order that you specify, using a first-match algorithm.
Although these rules might include other configurations that are not consistent across policies, they share
many basic characteristics and configuration mechanics, including:
• Conditions: Rule conditions specify the traffic that each rule handles. You can configure each rule with
multiple conditions. Traffic must match all conditions to match the rule.
• Action: A rule's action determines how the system handles matching traffic. Note that even if a rule does
not have an Action list you can choose from, the rule still has an associated action. For example, a custom
network analysis rule uses a network analysis policy as its "action." As another example, QoS rules do
not have an explicit action because all QoS rules do the same thing: rate limit traffic.
• Position: A rule's position determines its evaluation order. When using a policy to evaluate traffic, the
system matches traffic to rules in the order you specify. Usually, the system handles traffic according to
the first rule where all the rule’s conditions match the traffic. (Monitor rules, which are designed to track
and log, are an exception.) Proper rule order reduces the resources required to process network traffic,
and prevents rule preemption.
• Category: To organize some rule types, you can create custom rule categories in each parent policy.
• Logging: For many rules, logging settings govern whether and how the system logs connections handled
by the rule. Some rules (such as identity and network analysis rules) do not include logging settings
because the rules neither determine the final disposition of connections, nor are they specifically designed
to log connections. As another example, QoS rules do not include logging settings; you cannot log a
connection simply because it was rate limited.
• Comments: For some rule types, each time you save changes, you can add comments. For example, you
might summarize the overall configuration for the benefit of other users, or note when you change a rule
and the reason for the change.
Tip A right-click menu in many policy editors provides shortcuts to many rule management options, including
editing, deleting, moving, enabling, and disabling.
For more information, see the chapter that discusses the rules you're interested in (for example, access control
rules).
Related Topics
Configuring Application Conditions and Filters, on page 1763
Best Practices for Application Control, on page 1708
Note The following procedure does not apply to the access control policy. To see the rules that apply to a specific
device or set of devices in the access control policy, click the filter icon and select the devices.
Procedure
Step 1 In the policy editor, click Rules, then click Filter by Device.
A list of targeted devices and device groups appears.
Step 2 Check one or more check boxes to display only the rules that apply to those devices or groups. Or, check All
to reset and display all of the rules.
Tip
Hover your pointer over a rule criterion to see its value. If the criterion represents an object with device-specific
overrides, the system displays the override value when you filter the rules list by only that device. If the
criterion represents an object with domain-specific overrides, the system displays the override value when
you filter the rules list by devices in that domain.
Tip Hover your pointer over an icon to read the warning, error, or informational text.
Errors ( ) If a rule or configuration has an A rule that performs category and reputation-based
error, you cannot deploy until you URL filtering is valid until you target a device that
correct the issue, even if you does not have a URL Filtering license. At that point,
disable any affected rules. an error icon appears next to the rule, and you cannot
deploy until you edit or delete the rule, retarget the
policy, or enable the license.
Warning ( ) You can deploy a policy that Preempted rules or rules that cannot match traffic due
displays rule or other warnings. to misconfiguration have no effect. This includes
However, misconfigurations conditions using empty object groups, application
marked with warnings have no filters that match no applications, excluded LDAP
effect. users, invalid ports, and so on.
If you disable a rule with a However, if a warning icon marks a licensing error
warning, the warning icon or model mismatch, you cannot deploy until you
disappears. It reappears if you correct the issue.
enable the rule without correcting
the underlying issue.
Information Information icons convey helpful The system might skip matching the first few packets
information about configurations of a connection against some rules, until the system
( )
that may affect the flow of traffic. identifies the application or web traffic in that
These issues do not prevent you connection. This allows connections to be established
from deploying. so that applications and HTTP requests can be
identified.
Rule Conflict When you enable rule conflict Conflicts include redundant rules, redundant objects,
( ) analysis, this icon appears in the and shadowed rules. Redundant and shadowed rules
rule table for rules that have do not match traffic because previous rules would
conflicts. already match the criteria. Redundant objects make
your rules unnecessarily complex.
The access control policy default action can block or trust traffic without further inspection, or inspect traffic
for intrusions and discovery data.
Note You cannot perform file or malware inspection on traffic handled by the default action. Logging for connections
handled by the default action is initially disabled, though you can enable it.
If you are using policy inheritance, the default action for the lowest-level descendant determines final traffic
handling. Although an access control policy can inherit its default action from its base policy, you cannot
enforce this inheritance.
The following table describes the types of inspection you can perform on traffic handled by each default
action.
Access Control: Block All Traffic block without further inspection none
Access Control: Trust All Traffic trust (allow to its final destination none
without further inspection)
Intrusion Prevention allow, as long as it is passed by the intrusion, using the specified
intrusion policy you specify intrusion policy and associated
variable set, and
discovery, using the network
discovery policy
Inherit from base policy defined in base policy defined in base policy
The following diagrams illustrate the Block All Traffic and Trust All Traffic default actions.
The following diagrams illustrate the Intrusion Prevention and Network Discovery Only default actions.
Tip The purpose of Network Discovery Only is to improve performance in a discovery-only deployment. Different
configurations can disable discovery if you are only interested in intrusion detection and prevention.
Access control occurs before deep inspection; access control rules and the access control default action
determine which traffic is inspected by intrusion and file policies.
By associating an intrusion or file policy with an access control rule, you are telling the system that before it
passes traffic that matches the access control rule’s conditions, you first want to inspect the traffic with an
intrusion policy, a file policy, or both.
In an access control policy, you can associate one intrusion policy with each Allow and Interactive Block
rule, as well as with the default action. Every unique pair of intrusion policy and variable set counts as one
policy.
To associate intrusion and file policies with an access control rule, see:
• Access Control Rule Configuration to Perform Intrusion Prevention
• Configuring an Access Control Rule to Perform Malware Protection, on page 2167
Note By default, the system disables intrusion and file inspection of encrypted payloads. This helps reduce false
positives and improve performance when an encrypted connection matches an access control rule that has
intrusion and file inspection configured.
Related Topics
How Policies Examine Traffic For Intrusions
File Policies, on page 2160
In the scenario above, the first three access control rules in the policy—Monitor, Trust, and Block—cannot
inspect matching traffic. Monitor rules track and log but do not inspect network traffic, so the system continues
to match traffic against additional rules to determine whether to permit or deny it. (However, see an important
exception and caveat at Access Control Rule Monitor Action, on page 1752.) Trust and Block rules handle
matching traffic without further inspection of any kind, while traffic that does not match continues to the next
access control rule.
The fourth and final rule in the policy, an Allow rule, invokes various other policies to inspect and handle
matching traffic, in the following order:
• Discovery: Network Discovery Policy—First, the network discovery policy inspects traffic for discovery
data. Discovery is passive analysis and does not affect the flow of traffic. Although you do not explicitly
enable discovery, you can enhance or disable it. However, allowing traffic does not automatically guarantee
discovery data collection. The system performs discovery only for connections involving IP addresses
that are explicitly monitored by your network discovery policy.
• malware defense and File Control: File Policy—After traffic is inspected by discovery, the system
can inspect it for prohibited files and malware. malware defense detects and optionally blocks malware
in many types of files, including PDFs, Microsoft Office documents, and others. If your organization
wants to block not only the transmission of malware files, but all files of a specific type (regardless of
whether the files contain malware), file control allows you to monitor network traffic for transmissions
of specific file types, then either block or allow the file.
• Intrusion Prevention: Intrusion Policy—After file inspection, the system can inspect traffic for intrusions
and exploits. An intrusion policy examines decoded packets for attacks based on patterns, and can block
or alter malicious traffic. Intrusion policies are paired with variable sets, which allow you to use named
values to accurately reflect your network environment.
• Destination—Traffic that passes all the checks described above passes to its destination.
An Interactive Block rule (not shown in the diagram) has the same inspection options as an Allow rule. This
is so you can inspect traffic for malicious content when a user bypasses a blocked website by clicking through
a warning page.
Traffic that does not match any access control rules in the policy with an action other than Monitor is handled
by the default action. In this scenario, the default action is an Intrusion Prevention action, which allows traffic
to its final destination as long as it is passed by the intrusion policy you specify. In a different deployment,
you might have a default action that trusts or blocks all traffic without further inspection. Note that the system
can inspect traffic allowed by the default action for discovery data and intrusions, but not prohibited files or
malware. You cannot associate a file policy with the access control default action.
Note Sometimes, when a connection is analyzed by an access control policy, the system must process the first few
packets in that connection, allowing them to pass, before it can decide which access control rule (if any) will
handle the traffic. However, so these packets do not reach their destination uninspected, you can specify an
intrusion policy (in the Advanced settings for the access control policy) to inspect these packets and generate
intrusion events.
Note Traffic allowed by an Intrusion Prevention or Network Discovery Only default action can be inspected for
discovery data and intrusions, but cannot be inspected for prohibited files or malware. You cannot associate
a file policy with the access control default action.
You do not have to perform both file and intrusion inspection in the same rule. For a connection matching an
Allow or Interactive Block rule:
• without a file policy, traffic flow is determined by the intrusion policy
• without an intrusion policy, traffic flow is determined by the file policy
• without either, allowed traffic is inspected by network discovery only
Tip The system does not perform any kind of inspection on trusted traffic. Although configuring an Allow rule
with neither an intrusion nor file policy passes traffic like a Trust rule, Allow rules let you perform discovery
on matching traffic.
The diagram below illustrates the types of inspection you can perform on traffic that meets the conditions of
either an Allow or user-bypassed Interactive Block access control rule. For simplicity, the diagram displays
traffic flow for situations where both (or neither) an intrusion and a file policy are associated with a single
access control rule.
For any single connection handled by an access control rule, file inspection occurs before intrusion inspection.
That is, the system does not inspect files blocked by a file policy for intrusions. Within file inspection, simple
blocking by type takes precedence over malware inspection and blocking.
For example, consider a scenario where you normally want to allow certain network traffic as defined in an
access control rule. However, as a precaution, you want to block the download of executable files, examine
downloaded PDFs for malware and block any instances you find, and perform intrusion inspection on the
traffic.
You create an access control policy with a rule that matches the characteristics of the traffic you want to
provisionally allow, and associate it with both an intrusion policy and a file policy. The file policy blocks the
download of all executables, and also inspects and blocks PDFs containing malware:
• First, the system blocks the download of all executables, based on simple type matching specified in the
file policy. Because they are immediately blocked, these files are subject to neither malware nor intrusion
inspection.
• Next, the system performs malware cloud lookups for PDFs downloaded to a host on your network. Any
PDFs with a malware disposition are blocked, and are not subject to intrusion inspection.
• Finally, the system uses the intrusion policy associated with the access control rule to inspect any remaining
traffic, including files not blocked by the file policy.
Note Until a file is detected and blocked in a session, packets from the session may be subject to intrusion inspection.
You can lock the following settings to enforce them in all descendant policies. Descendant policies can override
unlocked settings.
• Security Intelligence — connections that are allowed or blocked based on the latest reputation intelligence
for IP addresses, URLs, and domain names.
• HTTP Response pages — Displaying a custom or system-provided response page when you block a
user's website request.
• Advanced settings — Specifying associated subpolicies, network analysis settings, performance settings,
and other general options.
When using policy inheritance, the default action for the lowest-level descendant determines final traffic
handling. Although an access control policy can inherit its default action from an ancestor policy, you cannot
enforce this inheritance.
Note Although the most useful implementation of access control inheritance and enforcement complements
multitenancy, you can create a hierarchy of access control policies within a single domain. You can also assign
and deploy access control policies at any level.
Configure Your Policy to Examine the Packets That Must Pass Before an Application Is Identified
The system cannot perform application control, including Intelligent Application Bypass (IAB) and rate
limiting, before both of the following occur:
• A monitored connection is established between a client and server
• The system identifies the application in the session
This identification should occur in 3 to 5 packets, or after the server certificate exchange in the SSL handshake
if the traffic is encrypted.
If early traffic matches all other criteria but application identification is incomplete, the system allows the
packet to pass and the connection to be established (or the SSL handshake to complete). After the system
completes its identification, the system applies the appropriate action to the remaining session traffic.
Note A server must adhere to the protocol requirements of an application for the system to be able to recognize it.
For example, if you have a server that sends a keep-alive packet rather than an ACK when an ACK is expected,
that application might not be identified, and the connection will not match the application-based rule. Instead,
it will be handled by another matching rule or the default action. This might mean that connections you want
to allow can be denied instead. If you run into this problem, and you cannot fix the server to follow the protocol
standards, you need to write a non-application-based rule to cover traffic for that server, for example, by
matching the IP address and port number.
• Encrypted traffic—The system can detect application traffic encrypted with StartTLS, including SMTPS,
POPS, FTPS, TelnetS, and IMAPS. In addition, it can identify certain encrypted applications based on
the Server Name Indication in the TLS ClientHello message, or the subject distinguished name value
from the server certificate. These applications are tagged SSL Protocol; in an SSL rule, you can
choose only these applications. Applications without this tag can only be detected in unencrypted or
decrypted traffic.
• Decrypted traffic—The system assigns the decrypted traffic tag to applications that the system
can detect in decrypted traffic only, not encrypted or unencrypted.
Caution Failure to set up your access control rules properly can have unexpected results, including traffic being allowed
that should be blocked. In general, application control rules should be lower in your access control list because
it takes longer for those rules to match than rules based on IP address, for example.
Access control rules that use specific conditions (such as networks and IP addresses) should be ordered before
rules that use general conditions (such as applications). If you're familiar with the Open Systems Interconnect
(OSI) model, use similar numbering in concept. Rules with conditions for layers 1, 2, and 3 (physical, data
link, and network) should be ordered first in your access control rules. Conditions for layers 5, 6, and 7 (session,
presentation, and application) should be ordered later in your access control rules. For more information about
the OSI model, see this Wikipedia article.
The following table provides an example of how to set up your access control rules:
Type of control Action Zones, Users Applications Ports URLs SGT/ISE Inspection,
Networks, Attributes Logging,
VLAN Tags Comments
Application Your Destination Any Do not set Available Any Use only Any
from more choice zones or Ports : with
secure to less (Allow in networks SSH ISE/ISE-PIC.
secure network this using the
Add to
when example) outside
Selected
application interface
Destination
uses a port (for
Ports
example, SSH)
Type of control Action Zones, Users Applications Ports URLs SGT/ISE Inspection,
Networks, Attributes Logging,
VLAN Tags Comments
Application Your Destination Any Do not set Selected Do Use only Any
from more choice zones or Destination not with
secure to less (Allow in networks Ports set ISE/ISE-PIC.
secure network this using the Protocol:
when example) outside ICMP
application interface
Type: Any
does not use a
port (for
example,
ICMP)
Application Your Your Choose a Choose the Do not set Do Use only Your
access by a choice choice user group name of the not with choice
user group (Block in (Contractors application set ISE/ISE-PIC.
this group in ( Facebook
example) this in this
example) example)
Application Characteristics
The system characterizes each application that it detects using the criteria described in the following table.
Use these characteristics as application filters.
Type Application protocols represent communications HTTP and SSH are application
between hosts. protocols.
Clients represent software running on a host. Web browsers and email clients
are clients.
Web applications represent the content or requested
URL for HTTP traffic. MPEG video and Facebook are
web applications.
Risk The likelihood that the application is being used for Peer-to-peer applications tend to
purposes that might be against your organization’s have a very high risk.
security policy.
Business The likelihood that the application is being used within Gaming applications tend to have
Relevance the context of your organization’s business operations, a very low business relevance.
as opposed to recreationally.
Category A general classification for the application that describes Facebook is in the social
its most essential function. Each application belongs to networking category.
at least one category.
• Zoho:
See Recommendations for Application Control, on page 1708
• Evasive applications such as Bittorrent, Tor, Psiphon, and Ultrasurf:
For evasive applications, only the highest-confidence scenarios are detected by default. If you need to
take action on this traffic (such as block or implement QoS), it may be necessary to configure more
aggressive detection with better effectiveness. To do this, contact TAC to review your configurations as
these changes may result in false positives.
• WeChat:
It is not possible to selectively block WeChat Media if you allow WeChat.
• RDP (Remote Desktop Protocol):
If allowing the RDP application does not allow file transfers, ensure that the rule for RDP includes both
the TCP and UDP port 3389. RDP file transfer uses UDP.
Note When you deploy configuration changes, the system evaluates all rules together and creates an expanded set
of criteria that target devices use to evaluate network traffic. If these criteria exceed the resources (physical
memory, processors, and so on) of a target device, you cannot deploy to that device.
• You cannot perform file or malware inspection on traffic handled by the access control policy's default
action.
• Some features are only available on certain device models. Warning icons and confirmation dialog boxes
designate unsupported features.
• If you will use syslog or store events externally, avoid special characters in object names such as policy
and rule names. Object names should not contain special characters, such as commas, that the receiving
application may use as separators.
• Logging for connections handled by the default action is initially disabled, though you can enable it.
• Best practices for creating, ordering, and implementing access control rules are detailed in Best Practices
for Access Control Rules, on page 1714 and subtopics.
Exceptions and additions to the above guidelines are noted in the sections below.
Rule Preemption
Rule preemption occurs when a rule will never match traffic because a rule earlier in the evaluation order
matches the traffic first. A rule's conditions govern whether it preempts other rules. In the following example,
the second rule cannot block Admin traffic because the first rule allows it:
Access Control Rule 1: allow Admin users
Note Certain managed devices support encrypting and decrypting TLS/SSL traffic in hardware, which significantly
improves performance. For more information, see TLS Crypto Acceleration, on page 2218.
1. Monitor—Rules that log matching connections, but take no other action on traffic.
2. Block, Block with reset—Rules that block traffic without further inspection.
3. Do not decrypt—Rules that do not decrypt encrypted traffic, passing the encrypted session to access
control rules. The payloads of these sessions are not subject to deep inspection.
4. Decrypt - Known Key—Rules that decrypt incoming traffic with a known private key.
5. Decrypt - Resign—Rules that decrypt outgoing traffic by re-signing the server certificate.
If you configure exceptions to a rule, put the exception above the other rule.
Combining elements into objects does not improve performance. For example, using a network object that
contains 50 individual IP addresses gives you only an organizational—not a performance—benefit over
including those IP addresses in the condition individually.
For recommendations related to application detection, see Best Practices for Configuring Application Control,
on page 1711.
For maximum performance benefit, constrain rules by interface. If a rule excludes all of a device’s interfaces,
that rule does not affect that device's performance.
If you exceed the maximum supported by your device, you cannot deploy your access control policy and must
reevaluate.
Guidelines for intrusion policies:
• In an access control policy, you can associate one intrusion policy with each Allow and Interactive Block
rule, as well as with the default action. Every unique pair of intrusion policy and variable set counts as
one policy.
• You may want to consolidate intrusion policies or variable sets so you can associate a single intrusion
policy-variable set pair with multiple access control rules. On some devices you may find you can use
only a single variable set for all your intrusion policies, or even a single intrusion policy-variable set pair
for the whole device.
Default Action
The default action determines how the system handles and logs traffic that is not handled by any other
access control configuration. The default action can block or trust all traffic without further inspection,
or inspect traffic for intrusions and discovery data.
Although an access control policy can inherit its default action from an ancestor policy, you cannot
enforce this inheritance.
Security Intelligence
Security Intelligence is a first line of defense against malicious internet content. This feature allows you
to block connections based on the latest IP address, URL, and domain name reputation intelligence. To
ensure continual access to vital resources, you can override Block list entries with custom Do Not Block
list entries.
HTTP Responses
When the system blocks a user’s website request, you can either display a generic system-provided
response page, or a custom page. You can also display a page that warns users, but also allows them to
continue to the originally requested site.
Logging
Settings for access control policy logging allow you to configure default syslog destinations for the
current access control policy. The settings are applicable to the access control policy and all the included
SSL, prefilter, and intrusion policies unless the syslog destination settings are explicitly overridden with
custom settings in included rules and policies.
Advanced Access Control Options
Advanced access control policy settings typically require little or no modification. Often, the default
settings are appropriate. Advanced settings you can modify include traffic preprocessing, SSL inspection,
identity, and various performance options.
Supported Domains
Any
User Roles
• Admin
• Access Admin
• Network Admin
• You can define custom user roles to differentiate between the intrusion configuration in access control
policy and rules and the rest of the access control policy and rules. Using these permissions, you can
separate the responsibilities of your network administration team and your intrusion administration teams.
The existing pre-defined user roles that included the Modify Access Control Policy permission support
all sub-permissions; you need to create your own custom roles if you want to apply granular permissions.
The granular permissions are:
• Policies > Access Control > Access Control Policy > Modify Access Control Policy > Modify
Threat Configuration allows the selection of intrusion policy, variable set, and file policy in a rule,
the configuration of the advanced options for Network Analysis and Intrusion Policies, the
configuration of the Security Intelligence policy for the access control policy, and intrusion actions
in the policy default action. If a user has this option only, the user can modify no other part of the
policy or rule.
• Modify Remaining Access Control Policy Configuration controls the ability to edit all other
aspects of the policy.
Procedure
Step 1 Choose Policies > Access Control heading > Access Control.
At the top of the page, there are convenient links to some related features: Object management, Intrusion
policies, Network Analysis policies, DNS policies, and policy Import/Export.
After completing analysis and optimization, you can download the reports by selecting the following
options from the More ( ) menu: Download Last Policy Analysis, Remediation History.
Note
To use the Policy Analysis feature, you must be using a Cloud-delivered Firewall Management Center
or an connected to Cisco Security Cloud Control (Security Cloud Control). If your setup does not meet
requirements, the explanatory dialog that opens when you click this button includes an Integrate button
to help get you started. Policy Analyzer & Optimizer operates in the cloud only.
• Create—Click New Policy; see Creating a Basic Access Control Policy, on page 1724.
• Columns—Click the Show/Hide Columns icon above the list of rules to select which information to
show in the table. Click Show All/Hide All to quickly add or remove all listed columns, excepting name
and actions. Click Default to undo all of your customizations.
• Inheritance—Click Plus next to a policy with descendants to expand your view of the policy's hierarchy.
• Delete—Click Delete ( ). You must remove any device assignments before deleting a policy.
To delete more than one policy at a time, select the check boxes for the policies, then select Delete
Policies above the table.
• Copy—Select Clone from the More ( ) menu. Device assignments are not retained in the copy.
• Report—Select Generate Report from the More ( ) menu..
• View the Audit Log—Click Go to Audit Log from the More ( ).
• Lock or unlock a policy—See Locking an Access Control Policy, on page 1727.
Procedure
Step 1 Choose Policies > Access Control heading > Access Control.
Step 2 Click New Policy.
Step 3 Enter a unique Name and, optionally, a Description.
Step 4 Optionally, choose a base policy from the Select Base Policy drop-down list.
If an access control policy is enforced on your domain, this step is not optional. You must choose the enforced
policy or one of its descendants as the base policy.
If you select a base policy, the base policy defines the default action and you cannot select a new one in this
dialog box. Logging for connections handled by the default action depends on the base policy.
Step 5 When you do not select a base policy, specify the initial Default Action:
• Block all traffic creates a policy with the Access Control: Block All Traffic default action.
• Intrusion Prevention creates a policy with the Intrusion Prevention: Balanced Security and
Connectivity default action, associated with the default intrusion variable set.
• Network Discovery creates a policy with the Network Discovery Only default action.
When you select a default action, logging of connections handled by the default action is initially disabled.
You can enable it later when you edit the policy.
Tip
If you want to trust all traffic by default, or if you chose a base policy and do not want to inherit the default
action, you can change the default action later.
Step 6 Optionally, choose the Available Devices where you want to deploy the policy, then click Add to Policy (or
drag and drop) to add the selected devices. To narrow the devices that appear, type a search string in the
Search field. The list includes both devices and device templates.
If you want to deploy this policy immediately, you must perform this step.
Note If you do not lock the policy, consider the following: Only one person should edit a policy at a time, using a
single browser window. If multiple users save the same policy, the last saved changes are retained. For your
convenience, the system displays information on who (if anyone) is currently editing each policy. To protect
the privacy of your session, a warning appears after 30 minutes of inactivity on the policy editor. After 60
minutes, the system discards your changes.
Procedure
Step 1 Choose Policies > Access Control heading > Access Control.
Step 2 Click Edit ( ) next to the access control policy you want to edit.
If View ( ) appears instead, the configuration belongs to an ancestor domain, or you do not have permission
to modify the configuration.
• Default Action Settings—Click Cog ( ), make your changes, and click OK. You can configure settings
for logging, the location of an external syslog server or SNMP trap server, and the variable set associated
with an intrusion prevention default action.
• Associated Policies—To edit or change policies in the packet flow, click the policy type in the packet
flow representation below the policy name. You can select the Prefilter Rules, Decryption, Security
Intelligence, and Identity policies. When necessary, click Access Control to return to the access control
rules.
• Policy Assignment—To identify the managed devices targeted by this policy, or enforce this policy in
a subdomain, click the Targeted: x devices link. You can assign the policy to devices or device templates.
• Rules—To manage access control rules, and to inspect and block malicious traffic using intrusion and
file policies, click Add Rule, or right-click an existing rule and select Edit or another appropriate action.
The actions are also available from the More ( ) button for each rule. See Create and Edit Access Control
Rules, on page 1757.
• Layout—Use the Grid/Table View icon above the list of rules to change the layout. Grid view provides
color-coded objects in an easy-to-see layout. Table view provides a summary list so that you can see
more rules at once. You can freely switch views without impacting the rules.
• Columns (Table view only)—Click the Show/Hide Columns icon above the list of rules to select which
information to show in the table. Click Hide Empty Columns to quickly remove all columns that have
no information, that is, you are not using those conditions in any rule. Click Revert to Default to undo
all of your customizations.
• Analyze rule logic. You can select the following options from the Analyze menu to examine the logic
of your rules:
• Hit Count—To view statistics on how many connections matched each rule.
• Enable/Disable Rule Conflicts—Select whether you want to see information on whether rules
interfere with each other.
• Show Rule Conflicts—See whether you have redundant or shadowed rules. These conflicts could
prevent certain rules from ever being matched by connections, meaning either that you need to fix
the match criteria, move the rule, or simply delete the rule.
• Show Warnings—See whether there are rules with configuration issues that you need to address.
• Additional Settings—To change additional settings for the policy, select one of the following options
from the More drop-down arrow at the end of the packet flow line.
• Advanced Settings—To set preprocessing, SSL inspection, identity, performance, and other
advanced options. See Access Control Policy Advanced Settings, on page 1732.
• HTTP Responses—To specify what the user sees in a browser when the system blocks a website
request. See Choosing HTTP Response Pages, on page 1853.
• Inheritance Settings—To change the base access control policy for this policy, and to enforce this
policy's settings in its descendant policies. See Choosing a Base Access Control Policy, on page 1729
and Locking Settings in Descendant Access Control Policies, on page 1730 .
• Logging—To set the default logging options for the policy.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Procedure
Step 1 Choose Policies > Access Control heading > Access Control.
Step 2 Click Edit ( ) next to the access control policy you want to lock or unlock.
The Lock Status column shows whether a policy is already locked, and if so, who locked it. An empty cell
indicates that the policy is not locked.
If View ( ) appears instead, the configuration belongs to an ancestor domain, or you do not have permission
to modify the configuration. Or, it is locked by another user.
Step 3 Click the lock icon next to the policy name to lock or unlock the policy.
If the policy inherits settings from a parent policy, you must choose one of the following options when you
click the lock icon.
• Lock/Unlock This Policy—The locking or unlocking is for this policy only.
• Lock/Unlock This Policy and Parents in the Hierarchy—This policy and all parent policies are locked
or unlocked. If a parent policy is already locked by another administrator, you will see a message and
you will not be able to lock that parent policy. When unlocking policies, if you have the Override Access
Control Policy Lock permission, all parent policies are unlocked even if they were locked by other users.
Procedure
Step 1 Edit the access control policy whose inheritance settings you want to change; see Editing an Access Control
Policy, on page 1725.
Step 2 Manage policy inheritance:
• Change Base Policy — To change the base access control policy for this policy, select Inheritance
Settings from the More drop-down arrow at the end of the packet flow line and proceed as described in
Choosing a Base Access Control Policy, on page 1729.
• Lock Settings in Descendants — To enforce this policy's settings in its descendant policies, select
Inheritance Settings from the More drop-down arrow at the end of the packet flow line and proceed as
described in Locking Settings in Descendant Access Control Policies, on page 1730 .
• Required in Domains — To enforce this policy in a subdomain, click the Targeted: x devices link and
proceed as described in Requiring an Access Control Policy in a Domain, on page 1730.
• Inherit Settings from Base Policy — To inherit settings from a base access control policy, click Security
Intelligence, or select HTTP Responses or Advanced Settings from the drop-down arrow at the end
of the packet flow line, and proceed as directed in Inheriting Access Control Policy Settings from the
Base Policy, on page 1729.
Procedure
Step 1 In the access control policy editor, select Inheritance Settings from the More drop-down arrow at the end
of the packet flow line.
Step 2 Choose a policy from the Select Base Policy drop-down list.
Step 3 Click Save.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Procedure
Step 1 In the access control policy editor, click Security Intelligence, or select HTTP Responses or Advanced
Settings from the More drop-down arrow at the end of the packet flow line
Step 2 Check the Inherit from base policy check box for each setting you want to inherit.
If the controls are dimmed, settings are inherited from an ancestor policy, or you do not have permission to
modify the configuration.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Procedure
Step 1 In the access control policy editor, select Inheritance Settings from the More drop-down arrow at the end
of the packet flow line.
Step 2 In the Child Policy Inheritance Settings area, check the settings you want to lock.
If the controls are dimmed, settings are inherited from an ancestor policy, or you do not have permission to
modify the configuration.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Procedure
Step 1 In the access control policy editor, click the Targeted: x devices link.
Step 2 Click Required on Domains.
Step 3 Build your domain list:
• Add — Select the domains where you want to enforce the current access control policy, then click Add
or drag and drop into the list of selected domains.
• Delete — Click Delete ( ) next to a leaf domain, or right-click an ancestor domain and choose Delete
Selected.
• Search — Type a search string in the search field. Click Clear ( ) to clear the search.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Procedure
Step 1 In the access control policy editor, click the Targeted: x devices link.
Step 2 On Targeted Devices, build your target list:
• Add — Select one or more Available Devices, then click Add to Policy or drag and drop into the list
of Selected Devices.
• Delete — Click Delete ( ) next to a single device, or select multiple devices, right-click, then choose
Delete Selected.
• Search — Type a search string in the search field. Click Clear ( ) to clear the search.
Under Impacted Devices, the system lists the devices whose assigned access control policies are children of
the current policy. Any change to the current policy affects these devices.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
IPS Settings
• Send Syslog messages for IPS events—Send IPS events as syslog messages. The defaults set above are
used unless you override them.
• Show/Hide Overrides—If you want to use the default syslog destination and severity, leaves these
options empty. Otherwise, you can set a different syslog server destination for IPS events, and change
the severity of the events.
Caution See Configurations that Restart the Snort Process When Deployed or Activated, on page 248 for a list of
advanced setting modifications that restart the Snort process, temporarily interrupting traffic inspection.
Whether traffic drops during this interruption or passes without further inspection depends on how the target
device handles traffic. See Snort Restart Traffic Behavior, on page 246 for more information.
General Settings
Option Description
Maximum URL characters to To customize the number of characters you store for each URL requested
store in connection events by your users. See Limiting Logging of Long URLs in the Cisco Secure
Firewall Management Center Administration Guide for more
information.
To customize the length of time before you re-block a website after a
user bypasses an initial block, see Setting the User Bypass Timeout for
a Blocked Website, on page 1854.
Allow an Interactive Block to See Setting the User Bypass Timeout for a Blocked Website, on page
bypass blocking for (seconds) 1854.
Retry URL cache miss lookup The first time the system encounters a URL that does not have a locally
stored category and reputation, it looks up that URL in the cloud and
adds the result to the local data store, for faster processing of that URL
in the future.
This setting determines what the system does when it needs to look up
a URL's category and reputation in the cloud.
By default, this setting is enabled: The system momentarily delays the
traffic while it checks the cloud for the URL's reputation and category,
and uses the cloud verdict to handle the traffic.
If you disable this setting: When the system encounters a URL that is
not in its local cache, the traffic is immediately passed and handled
according to the rules configured for Uncategorized and reputationless
traffic.
In passive deployments, the system does not retry the lookup, as it cannot
hold packets.
Enable Threat Intelligence Disable this option to stop publishing TID data to your configured
Director devices.
Option Description
Enable reputation enforcement This option is enabled by default, for improved URL filtering
on DNS traffic performance and efficacy. For details and additional instructions, see
DNS Filtering: Identify URL Reputation and Category During DNS
Lookup , on page 1848 and subtopics.
Inspect traffic during policy To inspect traffic when you deploy configuration changes unless specific
apply configurations require restarting the Snort process, ensure that Inspect
traffic during policy apply is set to its default value (enabled).
When this option is enabled, resource demands could result in a small
number of packets dropping without inspection. Additionally, deploying
some configurations restarts the Snort process, which interrupts traffic
inspection. Whether traffic drops during this interruption or passes
without further inspection depends on how the target device handles
traffic. See Snort Restart Scenarios, on page 244 for more information.
Associated Policies
Use advanced settings to associate subpolicies (decryption, identity, prefilter) with access control; see
Associating Other Policies with Access Control, on page 1737.
We strongly recommend enabling it for any traffic you want to match on application or URL criteria, especially
if you want to perform deep inspection of that traffic. A decryption policy is not required because traffic is
not decrypted in the process of extracting the server certificate.
Note • Because the certificate is decrypted, TLS server identity discovery can reduce performance depending
on the hardware platform.
• TLS server identity discovery is not supported in inline tap mode or passive mode deployments.
• Enabling TLS server identity discovery is not supported on any Secure Firewall Threat Defense Virtual
deployed to AWS. If you have any such managed devices managed by the Secure Firewall Management
Center, the connection event PROBE_FLOW_DROP_BYPASS_PROXY increments every time the
device attempts to extract the server certificate.
• TLS Server Identity Discovery also operates on TLS 1.2 sessions.
will be ignored for any other device type. The service policy rules are applied after the access control rules.
For more information, see Service Policies, on page 1915.
For more information, see the Elephant Flow Detection chapter in the Cisco Secure Firewall Management
Center Snort 3 Configuration Guide.
Caution Snort 2 only. Adding or removing an SSL policy restarts the Snort process when
you deploy configuration changes, temporarily interrupting traffic inspection.
Whether traffic drops during this interruption or passes without further inspection
depends on how the target device handles traffic. See Snort Restart Traffic
Behavior, on page 246 for more information.
• Identity policy—Performs user identification based on the realm and authentication method associated
with the traffic.
Procedure
Step 1 In the access control policy editor, select Advanced Settings from the More drop-down arrow at the end of
the packet flow line.
Step 2 Click Edit ( ) in the appropriate Policy Settings area.
If View ( ) appears instead, settings are inherited from an ancestor policy, or you do not have permission
to modify the settings. If the configuration is unlocked, uncheck Inherit from base policy to enable editing.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes, on page 251.
Note Before optimizing a policy, create a copy of the policy. If you are then dissatisfied with the results of
optimization, you can easily reassign the managed devices to the copy and return the system to its starting
state.
Procedure
Step 1 Choose Policies > Access Control heading > Access Control.
If you have already run an analysis, the Anomaly column shows the number of issues with the policy and the
percentage the policy can be optimized, and the state of the policy analysis, such as Error or Completed. Last
Analyzed shows the date/time when the analysis was run.
• You can also start an analysis when editing the policy by selecting Analyze > Policy. Other options from
that menu allow you to show hit counts and warnings.
• If you have not connected to the cloud yet, the explanatory dialog that opens when you click this button
includes an Integrate button to help get you started. Policy Analyzer & Optimizer operates in the cloud
only.
Step 3 When the analysis is complete, click the % Optimizable link in the Anomaly column to launch Policy Analyzer
& Optimizer in the cloud.
Maintaining unique MAC addresses is critical in a multi-instance secure setup because it allows for proper packet classification and routing within shared interfaces. The chassis uses these unique MAC addresses assigned to shared interfaces to determine which instance should receive incoming packets. If multiple instances share an interface, traffic is classified based on the MAC address of the intended instance, ensuring that each instance processes its own traffic without interference from others. This method provides isolation and accurate distribution of packets to their respective instances .
Template application and reapplication are necessary when device configurations become out-of-sync with the intended template settings, such as after manual device adjustments or updates that bypass template constraints. The initial template application aligns the device configuration with the management center's template settings, while reapplication ensures ongoing synchronization, especially important after changes like network interface reconfigurations or device replacements where default settings might disrupt intended operations .
When configuring VLAN subinterfaces for container instances, they must be created at the chassis level, not within individual instances, to allow for sharing and scalability. Subinterfaces cannot be used by native instances or multi-instance clusters except for the cluster control link. They provide flexible traffic segregation while maintaining resource separation. Using VLAN subinterfaces can affect the maximum number of deployable instances, so they must be planned based on network design needs and available resources .
The management center ensures configuration synchronization in a cluster by periodically collecting metrics and maintaining a unified configuration across all nodes. It uses audit logs and diff files for tracking changes and discrepancies. The CLI allows administrators to configure interfaces and monitor cluster status, which aids in resolving any issues if the management center detects configuration changes or a node fails to register, ensuring that all nodes in the cluster remain synchronized .
Multi-instance mode is beneficial because it allows independent container instances with hard resource separation, separate configuration management, separate reloads, and software updates, providing full threat defense feature support. In contrast, multiple context mode partitions a single application instance, leading to shared resources and limiting the number of contexts that can be supported on a given platform. Additionally, multi-instance mode allows for VLAN subinterfaces and shared interfaces between multiple instances, which is not possible in multiple context mode .
Applying a device template with incorrect VPN settings can lead to failed deployments and disruptions in network connectivity. VPN connections are not included when exporting templates, requiring reconfiguration upon import. If certificate-based authentication is used, deployment may fail without manual certificate enrollment. Errors in VPN settings can prevent successful VPN tunnels, affecting secure communications between sites and potentially disrupting business operations that rely on VPN connectivity .
Enabling a redundant manager access data interface improves management performance and redundancy by providing an alternative path for management traffic if the primary data interface fails. It utilizes SLA monitoring to switch traffic based on interface availability, ensuring continuous management access. The secondary interface must be in a separate security zone, and any configured static routes must be viable under both operational scenarios. This setup enhances fault tolerance and increases management uptime .
High availability in Cisco Secure Firewalls is maintained by configuring devices in a high availability (HA) pair, which requires both data and failover links. The failover link ensures state information, including connection states and health checks, is synchronized between the primary and secondary devices, enabling seamless transitions if an active device fails. The failover configuration comprises both a failover link for heartbeat and monitoring signals and, optionally, a stateful failover link for state information .
The Management DNS server is used for management traffic, set with the setup script or using the "configure network dns servers" command. In contrast, the Data DNS server is utilized for DDNS (if configured) or for security policies applied to that interface. If the threat defense is added to the management center, local data DNS server settings are maintained but not added to a Platform Settings policy .
Challenges in using shared data-sharing interfaces include potential security risks, as all instances can communicate over the backplane, potentially impacting isolation. This can limit the number of instances deployed, as shared interfaces are not suitable for certain configurations like failover links or bridge group member interfaces. Additionally, overuse of shared interfaces might lead to throughput bottlenecks and configuration complexity, complicating management and increasing the risk of configuration errors and resource contention between instances .