FPTD FDM Config Guide 621
FPTD FDM Config Guide 621
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on
age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that
is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2015–2018 Cisco Systems, Inc. All rights reserved.
CONTENTS
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
iii
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
iv
Contents
CHAPTER 5 Objects 87
Object Types 87
Managing Objects 89
Configuring Network Objects and Groups 89
Configuring Port Objects and Groups 90
Configuring Security Zones 92
Configuring Application Filter Objects 93
Configuring URL Objects and Groups 94
Configuring Geolocation Objects 96
Configuring Syslog Servers 97
Configuring AD Identity Realms 97
Troubleshooting Directory Server Connections 99
Limitations on Number of Users 101
Supported Directory Servers 101
Determining the Directory Base DN 101
Configuring Certificates 102
Public Key Cryptography 103
Certificate Types Used by Feature 104
Internal Certificate Properties 104
Example: Generating an Internal Certificate using OpenSSL 105
Trusted CA Certificate Properties 106
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
v
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
vi
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
vii
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
viii
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
ix
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
x
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
xi
Contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
xii
CHAPTER 1
Getting Started
The following topics explain how to get started configuring the Firepower Threat Defense (FTD) .
• Is This Guide for You?, on page 1
• New Features in FDM/FTD 6.2, on page 2
• Logging Into the System, on page 4
• Setting Up the System, on page 9
• Configuration Basics, on page 26
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
1
Getting Started
New Features in FDM/FTD 6.2
Feature Description
Cisco Defense Orchestrator (CDO) You can manage the device using the Cisco Defense Orchestrator
cloud management. cloud-based portal. Select Device > System Settings > Cloud
Management. For more information on Cisco Defense Orchestrator,
see http://www.cisco.com/go/cdo.
Drag and drop for access rules. You can drag and drop access rules to move them in the rules table.
Upgrade FTD software through You can install software upgrades through FDM. Select Device >
FDM. Updates.
Default configuration changes. For new or reimaged devices, the default configuration includes
significant changes, including:
• (ASA 5506-X, 5506W-X, 5506H-X.) Except for the first data
interface, and the Wi-Fi interface on an ASA 5506W-X, all other
data interfaces on these device models are structured into the
“inside” bridge group and enabled. There is a DHCP server on the
inside bridge group. You can plug endpoints or switches into any
bridged interface and endpoints get addresses on the 192.168.1.0/24
network.
• The inside interface IP address is now 192.168.1.1, and a DHCP
server is defined on the interface with the address pool
192.168.1.5-192.168.1.254.
• HTTPS access is enabled on the inside interface, so you can open
FDM through the inside interface at the default address,
192.168.1.1. For the ASA 5506-X models, you can do this through
any inside bridge group member interface.
• The management port hosts a DHCP server for the 192.168.45.0/24
network. You can plug a workstation directly into the management
port, get an IP address, and open FDM to configure the device.
• The OpenDNS public DNS servers are now the default DNS servers
for the management interface. Previously, there were no default
DNS servers. You can configure different DNS servers during
device setup.
• The default gateway for the management IP address is to use the
data interfaces to route to the Internet. Thus, you do not need to
wire the Management physical interface to a network.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
2
Getting Started
New Features in FDM/FTD 6.2
Feature Description
Management interface and access Several changes to how the management address, and access to FDM,
changes. works:
• You can now open data interfaces to HTTPS (for FDM) and SSH
(for CLI) connections. You do not need a separate management
network, or to connect the Management/Diagnostic physical port
to the inside network, to manage the device. Select Device > System
Settings > Management Access List.
• The system can obtain system database updates through the gateway
for the outside interface. You do not need to have an explicit route
from the management interface or network to the Internet. The
default is to use internal routes through the data interfaces.
However, you can set a specific gateway if you prefer to use a
separate management network. Select Device > System Settings >
Management Interface.
• You can use FDM to configure the management interface to obtain
its IP address through DHCP. Select Device > System Settings >
Management Interface.
• You can configure a DHCP server on the management address if
you configure a static address. Select Device > System Settings >
Management Interface.
Miscellaneous user interface The following are notable changes to the FDM user interface.
changes.
• Device main menu item. In previous releases, this menu item was
the host name of your device. Also, the page opened is called
Device Summary instead of Device Dashboard.
• You cannot select an alternative outside interface during initial
device setup. The first data interface is the default outside interface.
• Device > System Settings > Cloud Preferences is now called
Device > System Settings > URL Filtering Preferences.
• The System Settings > DHCP Server page is now organized on
two tabs, with the table of DHCP servers separated from the global
parameters.
Site-to-site VPN connections. You can configure site-to-site virtual private network (VPN) connections
using preshared keys. You can configure IKEv1 and IKEv2 connections.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
3
Getting Started
New Features in FDM/FTD 6.2.1
Feature Description
Integrated Routing and Bridging Integrated Routing and Bridging provides the ability to route between
support. a bridge group and a routed interface. A bridge group is a group of
interfaces that the FTD device bridges instead of routes. The FTD device
is not a true bridge in that the FTD device continues to act as a firewall:
access control between interfaces is controlled, and all of the usual
firewall checks are in place.
This feature lets you configure bridge groups and to route between bridge
groups and between a bridge group and a routed interface. The bridge
group participates in routing by using a Bridge Virtual Interface (BVI)
to act as a gateway for the bridge group. Integrated Routing and Bridging
provides an alternative to using an external Layer 2 switch if you have
extra interfaces on the FTD device to assign to the bridge group. The
BVI can be a named interface and can participate separately from
member interfaces in some features, such as DHCP server, where you
configure other features on bridge group member interfaces, such as
NAT and access control rules.
Select Device > Interfaces to configure a bridge group.
Feature Description
Remote access VPN configuration. You can configure remote access SSL VPN for the AnyConnect client.
Configure RA VPN from the Device > Remote Access VPN group.
Configure RA VPN licenses from the Device > Smart License group.
Firepower 2100 series device You can configure FTD on Firepower 2100 series devices using FDM.
configuration.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
4
Getting Started
Logging Into the FDM
The following topics explain how to log into these interfaces and manage your user account.
Note If you type in the wrong password and fail to log in on 3 consecutive attempts, your account is locked
for 5 minutes. You must wait before trying to log in again.
Procedure
Step 1 Using a browser, open the home page of the system, for example, https://ftd.example.com.
You can use any of the following addresses. You can use the IPv4 or IPv6 address or the DNS name, if you
have configured one.
• The management address. By default (on most platforms), this is 192.168.45.45 on the Management
interface.
• The address of a data interface that you have opened for HTTPS access. By default , the “inside” interface
allows HTTPS access, so you can connect to the default inside address 192.168.1.1. On device models
where the inside interface is a bridge group, you can connect to this address through any bridge group
member interface. See Default Configuration Prior to Initial Setup, on page 22 for details about your
model's inside IP address.
Tip If your browser is not configured to recognize the server certificate, you will see a warning about
an untrusted certificate. Accept the certificate as an exception, or in your trusted root certificate
store.
Step 2 Enter the admin username and password, then click Login.
The default admin password is Admin123.
Your session will expire after 30 minutes of inactivity, and you will be prompted to log in again. You can log
out by selecting Log Out from the user icon drop-down menu in the upper right of the page.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
5
Getting Started
Logging Into the Command Line Interface (CLI)
Note On the Firepower device models, the CLI on the Console port is the
Firepower eXtensible Operating System (FXOS).You can get to the FTD
CLI using the connect ftd command. Use the FXOS CLI for chassis-level
troubleshooting only. Use the FTD CLI for basic configuration, monitoring,
and normal system troubleshooting. See the FXOS documentation for
information on FXOS commands.
• Use an SSH client to make a connection to the management IP address. You can also connect to the
address on a data interface if you open the interface for SSH connections (see Configuring the Management
Access List, on page 327). SSH access to data interfaces is disabled by default. Log in using the admin
username or another CLI user account. The default admin password is Admin123.
Tips
• After logging in, for information on the commands available in the CLI, enter help or ?. For usage
information, see Cisco Firepower Threat Defense Command Reference at http://www.cisco.com/c/en/
us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense.html.
• You can create local user accounts that can log into the CLI using the configure user add command.
However, these users can log into the CLI only. They cannot log into the FDM web interface.
Note If you are logged into the CLI, you can change your password using the configure password command.
You can change the password for a different CLI user with the configure user password username
command.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
6
Getting Started
Setting User Profile Preferences
Procedure
Step 1 Select Profile from the user icon drop-down list in the upper right of the menu.
Procedure
Step 1 Select Profile from the user icon drop-down list in the upper right of the menu.
Step 2 On the Profile tab, configure the following and click Save.
• Time Zone for Scheduling Tasks—Select the time zone you want to use for scheduling tasks such as
backups and updates. The browser time zone is used for dashboards and events, if you set a different
zone.
• Color Theme—Select the color theme you want to use in the user interface.
Step 3 On the Password tab, you can enter a new password and click Change.
Procedure
Step 1 Log into the device CLI using an account with config privileges.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
7
Getting Started
Creating Local User Accounts for the FTD CLI
The admin user account has the required privileges, but any account with config privileges will work. You
can use an SSH session or the Console port.
For certain device models, the Console port puts you into the FXOS CLI. Use the connect ftd command to
get to the FTD CLI.
Example:
The following example adds a user account named joecool with config access rights. The password is not
shown as you type it.
Note Tell users they can change their passwords using the configure password command.
Step 3 (Optional.) Adjust the characteristics of the account to meet your security requirements.
You can use the following commands to change the default account behavior.
• configure user aging username max_days warn_days
Sets an expiration date for the user's password. Specify the maximum number of days for the password
to be valid followed by the number of days before expiration the user will be warned about the upcoming
expiration. Both values are 1 to 9999, but the warning days must be less than the maximum days. When
you create the account, there is no expiration date for the password.
• configure user forcereset username
Forces the user to change the password on the next login.
• configure user maxfailedlogins username number
Sets the maximum number of consecutive failed logins you will allow before locking the account, from
1 to 9999. Use the configure user unlock command to unlock accounts. The default for new accounts
is 5 consecutive failed logins.
• configure user minpasswdlen username number
Sets a minimum password length, which can be from 1 to 127.
• configure user strengthcheck username {enable | disable}
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
8
Getting Started
Setting Up the System
Enables or disables password strength checking, which requires a user to meet specific password criteria
when changing their password. When a user’s password expires or if the configure user forcereset
command is used, this requirement is automatically enabled the next time the user logs in.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
9
Getting Started
Connect the Interfaces
For details about the resulting configuration, see Configuration After Initial Setup, on page 24.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
10
Getting Started
Cabling for ASA 5508-X and 5516-X
• Attach GigabitEthernet 1/1 to the ISP/WAN modem or other outside device. By default, the IP address
is obtained using DHCP, but you can set a static address during initial configuration.
• Attach GigabitEthernet 1/2 (or another of the inside bridge group member ports) to your workstation,
the one you will use to configure the device. Configure the workstation to obtain an IP address using
DHCP. The workstation gets an address on the 192.168.1.0/24 network.
Note You have a couple of other options for connecting the management
workstation. You can also directly connect it to the Management port. The
workstation gets an address through DHCP on the 192.168.45.0/24 network.
Another option is to leave your workstation attached to a switch, and attach
that switch to one of the inside ports such as GigabitEthernet1/2. However,
you must ensure that no other device on the switch's network is running a
DHCP server, because it will conflict with the one running on the inside
bridge group, 192.168.1.1.
• Optionally, attach other endpoints or switches to the other ports in the inside bridge group. You might
want to wait until you complete the initial device setup before adding endpoints. If you add switches,
ensure that there are no other DHCP servers running on those networks, as this conflicts with the DHCP
server running on the inside bridge group.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
11
Getting Started
Cabling for ASA 5512-X, 5515-X, 5525-X, 5545-X, and 5555-X
You can later configure the FDM management access from other interfaces.
• Connect the outside network to the GigabitEthernet1/1 interface.
By default, the IP address is obtained using IPv4 DHCP, but you can set a static address during initial
configuration.
• Connect other networks to the remaining interfaces.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
12
Getting Started
Cabling for the Firepower 2100
• Management 0/0—Connect your management computer directly to Management 0/0 for initial
configuration, or connect Management 0/0 to your management network. Management 0/0 has a
default IP address (192.168.45.45) and also runs a DHCP server to provide IP addresses to clients
(including the management computer), so make sure these settings do not conflict with any existing
inside network settings.
If you need to change the Management 0/0 IP address from the default, you must also cable your
management computer to the console port. See (Optional) Change Management Network Settings
at the CLI, on page 14.
You can later configure the FDM management access from other interfaces.
• Connect the outside network to the GigabitEthernet 0/0 interface.
By default, the IP address is obtained using DHCP, but you can set a static address during initial
configuration.
• Connect other networks to the remaining interfaces.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
13
Getting Started
(Optional) Change Management Network Settings at the CLI
If you need to change the Management 1/1 IP address from the default, you must also cable your
management computer to the console port. See (Optional) Change Management Network Settings
at the CLI, on page 14.
Note You cannot repeat the CLI setup script unless you clear the configuration; for example, by reimaging.
However, all of these settings can be changed later at the CLI using configure network commands. See
Cisco Secure Firewall Threat Defense Command Reference.
Procedure
Step 1 Connect to the FTD console port. See Logging Into the Command Line Interface (CLI), on page 6 for more
information.
Step 2 Log in with the username admin.
The default admin password is Admin123.
Step 3 The first time you log into the FTD, you are prompted to accept the End User License Agreement (EULA).
You are then presented with the CLI setup script.
Defaults or previously-entered values appear in brackets. To accept previously entered values, press Enter.
See the following guidelines:
• Enter the IPv4 default gateway for the management interface—If you set a manual IP address, enter
either data-interfaces or the IP address of the gateway router. The data-interfaces setting sends outbound
management traffic over the backplane to exit a data interface. This setting is useful if you do not have
a separate Management network that can access the internet. Traffic originating on the Management
interface includes license registration and database updates that require internet access. If you use
data-interfaces, you can still use the FDM (or SSH) on the Management interface if you are
directly-connected to the Management network, but for remote management for specific networks or
hosts, you should add a static route using the configure network static-routes command. Note that the
FDM management on data interfaces is not affected by this setting. If you use DHCP, the system uses
the gateway provided by DHCP.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
14
Getting Started
Complete the Initial Configuration Using the Setup Wizard
• If your networking information has changed, you will need to reconnect—If you are connected with
SSH to the default IP address but you change the IP address at initial setup, you will be disconnected.
Reconnect with the new IP address and password. Console connections are not affected. Note also that
the DHCP server on Management will be disabled if you change the IP address.
• Manage the device locally?—Enter yes to use the FDM. A no answer means you intend to use the FMC
to manage the device.
Example:
>
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
15
Getting Started
Complete the Initial Configuration Using the Setup Wizard
The Management interface does not need to be connected to a network. By default, the system obtains system
licensing and database and other updates through the data interfaces, typically the outside interface, that
connect to the internet. If you instead want to use a separate management network, you can connect the
Management interface to a network and configure a separate management gateway after you complete initial
setup.
To change the Management interface network settings if you cannot access the default IP address, see (Optional)
Change Management Network Settings at the CLI, on page 14.
Procedure
b) Log in with the username admin. The default admin password is Admin123. .
Step 2 If this is the first time logging into the system, and you did not use the CLI setup wizard, you are prompted
to read and accept the End User License Agreement and change the admin password.
You must complete these steps to continue.
Step 3 Configure the following options for the outside and management interfaces and click Next.
Caution Your settings are deployed to the device when you click Next. The interface will be named “outside”
and it will be added to the “outside_zone” security zone. Ensure that your settings are correct. If
you end up configuring an IP address on the outside interface that is on the same subnet as the inside
interface, and you are connected to the FDM on the inside address, the wizard will hang when you
click Next, because the address on the inside interface will be removed. To recover, see What to
Do if the Outside Subnet Conflicts with the Inside Subnet (Setup Wizard Hangs at Step 1), on page
17.
Outside Interface
• Configure IPv4—The IPv4 address for the outside interface. You can use DHCP or manually enter a
static IP address, subnet mask, and gateway. You can also select Off to not configure an IPv4 address.
Do not configure an IP address on the same subnet as the default inside address (see Default Configuration
Prior to Initial Setup, on page 22), either statically or through DHCP.
• Configure IPv6—The IPv6 address for the outside interface. You can use DHCP or manually enter a
static IP address, prefix, and gateway. You can also select Off to not configure an IPv6 address.
Management Interface
• DNS Servers—The DNS server for the system's management address. Enter one or more addresses of
DNS servers for name resolution. The default is the OpenDNS public DNS servers. If you edit the fields
and want to return to the default, click Use OpenDNS to reload the appropriate IP addresses into the
fields. Your ISP might require that you use specific DNS servers. If after completing the wizard, you
find that DNS resolution is not working, see Troubleshooting DNS for the Management Interface, on
page 351.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
16
Getting Started
What to Do if the Outside Subnet Conflicts with the Inside Subnet (Setup Wizard Hangs at Step 1)
What to do next
• If you want to use features covered by optional licenses, such as category-based URL filtering, intrusion
inspection, or malware prevention, enable the required licenses. See Enabling or Disabling Optional
Licenses, on page 69.
• Connect the other data interfaces to distinct networks and configure the interfaces. For information on
configuring interfaces, see How to Add a Subnet, on page 59 and Interfaces, on page 111.
• If you are managing the device through the inside interface, and you want to open CLI sessions through
the inside interface, open the inside interface to SSH connections. See Configuring the Management
Access List, on page 327.
• Go through the use cases to learn how to use the product. See Best Practices: Use Cases for FTD, on
page 33.
What to Do if the Outside Subnet Conflicts with the Inside Subnet (Setup Wizard
Hangs at Step 1)
If you connect to the FDM through the inside interface, you might find that the setup wizard hangs when you
click Next during step 1, where you configure the outside interface. Note that normally it takes a while to
complete this step, so hanging means that it continues for 10+ minutes. If you refresh the browser, you will
see that you have lost the connection to the FDM. (If you connected through the management IP address, the
wizard does not hang, but you might still have a problem as described in the symptoms below.)
The most likely reason this happens is that both the outside and inside interfaces were assigned addresses on
the same subnet, which results in the inside interface losing its configuration.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
17
Getting Started
What to Do if the Outside Subnet Conflicts with the Inside Subnet (Setup Wizard Hangs at Step 1)
The default configuration includes a static address on the inside interface, and a DHCP server, so that the
device is functional and can pass traffic and support attached workstations immediately after you complete
the setup wizard.
However, having a default inside address works only if you do not configure an address on the same subnet
on the outside interface. This includes the situation where you attach to an ISP device that provides an address
through DHCP to the outside address. Some ISPs use the same 192.168.1.0/24 subnet for their inside interface
(which attaches to your outside interface) as FTD uses for the inside address.
To resolve this problem, you must change the IP address on the inside interface.
Symptoms for an inside/outside subnet conflict
Following are the symptoms that you have addresses on the same subnet on the inside and outside interfaces.
• During the device setup wizard, the wizard hangs when you click Next in step 1. Note that normally it
takes a while to complete this step, so hanging means that it continues for 10+ minutes.
• If you are connected to the Console port, you would see the following message in the CLI. You will also
get this message if you try to deploy the configuration (without subsequent change) from the FDM.
• If you get through setup, or exit it, the connection graphic will show no connection to any external
services, such as the gateway, DNS and NTP servers, and Smart Licensing. The Deploy icon in the menu
will also show that a deployment is needed.
• From the CLI, the interface and dhcp configurations are inconsistent for the inside and outside interfaces
when viewed using the show running-config and show startup-config commands.
Procedure
Step 1 If you were connected to the inside interface during device setup, complete the setup.
a) Reconnect to the device by plugging into the Management port. If necessary, release and renew your
workstation’s DHCP address to get a new address on the management network (192.168.45.0/24). If
necessary, configure a static address for your workstation in the 192.168.45.1-192.168.45.44 range.
b) Open the FDM at https://192.168.45.45.
c) You should see a prompt asking you to start your 90-day evaluation license. Select this option and click
Confirm.
d) Choose Device > System Settings > NTP, configure the NTP servers, and click Save. If the default
servers fit your requirements, you can skip this step.
e) Select Profile from the user icon drop-down list in the upper right of the menu, select the time zone for
the device, and click Save.
f) If you do not want to use the evaluation license, choose Device > Smart License > View Configuration,
click Request Register, then follow the instructions to register the device. See Registering the Device,
on page 68. (You can also enable any optional licenses you need at this time.)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
18
Getting Started
Configure the Wireless Access Point (ASA 5506W-X)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
19
Getting Started
Configure the Wireless Access Point (ASA 5506W-X)
The access point connects internally over the GigabitEthernet1/9 interface. All Wi-Fi clients belong to the
GigabitEthernet1/9 network. Your security policy determines how the Wi-Fi network can access any networks
on other interfaces. The access point does not contain any external interfaces or switch ports.
The following procedure explains how to configure the access point. The procedure assumes that you completed
the device setup wizard. If you instead manually configured the device, you might need to adjust the steps
based on your configuration.
For more information, see the following manuals:
• For details about using the wireless LAN controller, see the Cisco Wireless LAN Controller Software
documentation.
• For details about the wireless access point hardware and software, see the Cisco Aironet 700 Series
documentation.
firepower> enable
Password: <press enter, by default, the password is blank>
firepower# hw-module module wlan recover configuration
If you need to troubleshoot the access point further, connect to the access point CLI using the session wlan
console command.
Procedure
d) Click Save.
Step 2 Add the Wi-Fi interface to the same security zone as the inside interfaces.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
20
Getting Started
Configure the Wireless Access Point (ASA 5506W-X)
The device setup wizard puts the members of the inside bridge group in a security zone named inside_zone.
The Wi-Fi interface needs to be in the same zone so that you can reach the access point web interface (made
possible by the default Inside_Inside_Rule access rule).
a) Click Objects in the menu, then select Security Zones from the table of contents.
b) Click the edit icon ( ) for inside_zone.
c) Click + under Interfaces and select the wifi interface.
Step 3 Verify that there is an access control rule to allow traffic between interfaces in the inside_zone security zone.
The device setup wizard creates a rule to allow traffic to flow from the inside_zone to the outside_zone,
which allows inside users to get to the Internet.
The wizard also create a rule to allow traffic to flow between the inside_zone and inside_zone, so that internal
hosts can reach each other.
By adding the wifi interface to inside_zone, Wi-Fi users are also included in both of these rules, so that they
can reach the Internet and other internal users.
If you did not complete the wizard, these rules might not exist. Because the default action is to block all traffic,
you must create these rules. The following procedure explains how to create a rule to enable traffic between
the interfaces in the inside_zone security zone.
a) Click Policies in the menu.
b) Click + above the Access Control table to add a rule.
c) Configure at least the following options in the rule.
• Title—Enter a name for the rule. For example, Inside_Inside.
• Action—Either Allow or Trust.
• Source/Destination > Source Zones—Select inside_zone.
• Source/Destination > Destination Zones—Select inside_zone.
d) Click OK.
Step 4 Configure the DHCP server on the wireless interface.
The DHCP server supplies IP addresses to devices that connect to the access point. It also supplies an address
to the access point itself.
a) Click Device.
b) Click System Settings > DHCP Server.
c) Click the DHCP Servers tab.
d) Click + above the DHCP server table.
e) Configure the following DHCP server properties.
• Enable DHCP Server—Click the slider to enable the DHCP server.
• Interface—Select the wifi interface.
• Address Pool—Enter the address pool for DHCP clients. For example, if you used the example
address for the wireless interface, the pool would be 192.168.10.2-192.168.10.254. The pool must
be on the same subnet as the IP address for the interface, and it cannot include the address of the
interface or the broadcast address.
f) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
21
Getting Started
Default Configuration Prior to Initial Setup
Step 5 Click the Deploy button in the menu, then click the Deploy Now button, to deploy your changes to the device.
Step 7 While in the wireless access point web interface, enable the radios.
a) On the left, click Summary, and then on the main page under Network Interfaces, click the link for the
2.4 GHz radio.
b) Click the Settings tab.
c) For the Enable Radio setting, click the Enable radio button, and then click Apply at the bottom of the
page.
d) Repeat the process for the 5 GHz radio.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
22
Getting Started
Default Configuration Prior to Initial Setup
Note You can pre-configure many of these settings using the CLI setup ((Optional) Change Management
Network Settings at the CLI, on page 14) before you perform setup using the wizard.
Password for admin user. Admin123 Yes. You must change the default
password.
DHCP server on the management interface. Enabled with the address pool No.
192.168.45.46-192.168.45.254.
DNS servers for the management interface. The OpenDNS public DNS servers, Yes
208.67.220.220 and 208.67.222.222.
DHCP server for inside clients. Running on the inside interface with the No.
address pool 192.168.1.5 - 192.168.1.254.
DHCP auto-configuration for inside clients. Enabled on outside interface. Yes, but indirectly. If you configure a static
(Auto-configuration supplies clients with IPv4 address for the outside interface,
addresses for WINS and DNS servers.) DHCP server auto-configuration is
disabled.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
23
Getting Started
Configuration After Initial Setup
Management gateway. The data interfaces on the device. Typically the outside interface Default.
becomes the route to the Internet. The management gateway works
for from-the-device traffic only.
DHCP server on management Enabled with the address pool 192.168.45.46-192.168.45.254. Default.
interface.
DNS servers for the The OpenDNS public DNS servers, 208.67.220.220, Explicit.
management interface. 208.67.222.222, or whatever you entered. DNS servers obtained
from DHCP are never used.
Management access through A data interface management access list rule allows HTTPS access Implied.
data interfaces. through the inside interface. SSH connections are not allowed.
Both IPv4 and IPv6 connections are allowed.
System time. The time zone and NTP servers you selected. Explicit.
Smart license. Either registered with a base license, or the evaluation period Explicit.
activated, whichever you selected.
Subscription licenses are not enabled. Go to the smart licensing
page to enable them.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
24
Getting Started
Configuration After Initial Setup
DHCP server for inside clients. Running on the inside interface with the address pool 192.168.1.5 Default.
- 192.168.1.254.
DHCP auto-configuration for Enabled on outside interface if you use DHCP to obtain the outside Explicit, but indirectly.
inside clients. interface IPv4 address.
(Auto-configuration supplies
If you use static addressing, DHCP auto-configuration is disabled.
clients with addresses for WINS
and DNS servers.)
Data interface configuration. • ASA 5506-X —All data interfaces (such as Default.
GigabitEthernet1/2) except the outside interface are enabled
and part of the inside bridge group. You can plug end points
or switches into these ports and obtain addresses from the
DHCP server for the inside interface. These interfaces are
named inside_1, inside_2, and so forth.
• All other models—The outside and inside interfaces are the
only ones configured and enabled. All other data interfaces
are disabled.
Outside physical interface and The default outside port based on the device model. See Default Interface is Default.
IP address. Configuration Prior to Initial Setup, on page 22.
Addressing is Explicit.
The IP address is obtained by DHCP, or it is a static address as
entered (IPv4, IPv6, or both).
Static routes. If you configure a static IPv4 or IPv6 address for the outside Implied.
interface, a static default route is configured for IPv4/IPv6 as
appropriate, pointing to the gateway you defined for that address
type. If you select DHCP, the default route is obtained from the
DHCP server.
Network objects are also created for the gateway and the "any"
address, that is, 0.0.0.0/0 for IPv4, ::/0 for IPv6.
Security zones. inside_zone, containing the inside interface. For models that have Implied.
an inside bridge group, the zone contains all members of the inside
bridge group interface.
outside_zone, containing the outside interface.
(You can edit these zones to add other interfaces, or create your
own zones.)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
25
Getting Started
Configuration Basics
Access control policy. A rule trusting all traffic from the inside_zone to the outside_zone. Implied.
This allows without inspection all traffic from users inside your
network to get outside, and all return traffic for those connections.
For models that have an inside bridge group, a second rule trusting
all traffic between the interfaces in the inside_zone. This allows
without inspection all traffic between users on your inside
network.
The default action for any other traffic is to block it. This prevents
any traffic initiated from outside to enter your network.
NAT (Models that do not have an inside bridge group.) An interface Implied.
dynamic PAT rule translates the source address for any IPv4
traffic destined to the outside interface to a unique port on the
outside interface's IP address.
(Models that have an inside bridge group.) For each member of
the inside bridge group, an interface dynamic PAT rule translates
the source address for any IPv4 traffic destined to the outside
interface to a unique port on the outside interface’s IP address.
These appear in the NAT rule table and you can edit them later
if desired.
There are additional hidden PAT rules to enable HTTPS access
through the inside interfaces, and routing through the data
interfaces for the management address. These do not appear in
the NAT table, but you will see them if you use the show nat
command in the CLI.
Configuration Basics
The following topics explain the basic methods for configuring the device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
26
Getting Started
Configuring the Device
Procedure
Step 2 Click the links in each group to configure the settings or perform the actions.
Following is a summary of the groups:
• Interface—You should have at least two data interfaces configured in addition to the management
interface. See Interfaces, on page 111.
• Routing—The routing configuration. You must define a default route. Other routes might be necessary
depending on your configuration. See Routing, on page 131.
• Updates—Geolocation, intrusion rule, and vulnerability database updates, and system software upgrades.
Set up a regular update schedule to ensure that you have the latest database updates if you use those
features. You can also go to this page if you need to download an update before the regularly schedule
update occurs. See Updating System Databases , on page 337.
• System Settings—This group includes a variety of settings. Some are basic settings that you would
configure when you initially set up the device and then rarely change. See System Settings, on page 327.
• Smart License—Shows the current state of the system licenses. You must install the appropriate licenses
to use the system. Some features require additional licenses. See Licensing the System, on page 65.
• Backup and Restore—Back up the system configuration or restore a previous backup. See Backing Up
and Restoring the System, on page 341.
• Troubleshoot—Generate a troubleshooting file at the request of the Cisco Technical Assistance Center.
See Creating a Troubleshooting File, on page 355.
• Site-to-Site VPN—The site-to-site virtual private network (VPN) connections between this device and
remote devices. See Managing Site-to-Site VPNs, on page 263.
• Remote Access VPN—The remote access virtual private network (VPN) configuration that allows
outside clients to connect to your inside network. See Configuring Remote Access VPN, on page 292.
Step 3 Click the Deploy button in the menu to deploy your changes.
Changes are not active on the device until you deploy them. See Deploying Your Changes, on page 28.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
27
Getting Started
Configuring Security Policies
What to do next
Click Policies in the main menu and configure the security policy for the system. You can also click Objects
to configure the objects needed in those policies.
Procedure
Step 3 Click the Deploy button in the menu to deploy your changes.
Changes are not active on the device until you deploy them. See Deploying Your Changes, on page 28.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
28
Getting Started
Configuration Changes that Restart Inspection Engines
This process gives you the opportunity to make a group of related changes without forcing you to run a device
in a “partially configured” manner. In most cases, the deployment includes just your changes. However, if
necessary, the system will reapply the entire configuration, which might be disruptive to your network. In
addition, some changes require inspection engines to restart, with traffic dropping during the restart. Thus,
consider deploying changes when potential disruptions will have the least impact.
Note If the deployment job fails, the system must roll back any partial changes to the previous configuration.
Rollback includes clearing the data plane configuration and redeploying the previous version. This will
disrupt traffic until the rollback completes.
After you complete the changes you want to make, use the following procedure to deploy them to the device.
Caution The FTD device drops traffic when the inspection engines are busy because of a software resource issue,
or down because a configuration requires the engines to restart during configuration deployment. For
detailed information on changes that require a restart, see Configuration Changes that Restart Inspection
Engines, on page 29.
Procedure
Step 1 Click the Deploy Changes icon in the upper right of the web page.
The icon is highlighted with a dot when there are undeployed changes.
The Deployment Summary page opens. The window shows a list of previous deployments with summary
information on the changes (“modified objects”), when the deployment was initiated and completed, and the
status of each deployment.
If the icon is not highlighted, you can still click it to see the results of previous deployment jobs.
Caution When you deploy, resource demands may result in a small number of packets dropping without inspection.
Additionally, deploying some configurations requires inspection engines to restart, which interrupts
traffic inspection and drops traffic.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
29
Getting Started
Viewing Interface and Management Status
Deployment
Any deployment restarts the inspection engines.
System Updates
Installing a system update or patch that does not reboot the system and includes a binary change requires
inspection engines to restart. Binary changes can include changes to inspection engines, a preprocessor, the
vulnerability database (VDB), or a shared object rule. Note also that a patch that does not include a binary
change can sometimes require a Snort restart.
Note The interface portion of the graphic, including interface status information, is also available on the
Interfaces page and the Monitoring > System dashboard.
Interface Status
Mouse over a port to see its IP addresses, and enabled and link statuses. The IP addresses can be statically
assigned or obtained using DHCP. Mousing over a Bridge Virtual Interface (BVI) also shows the list of
member interfaces.
Interface ports use the following color coding:
• Green—The interface is configured, enabled, and the link is up.
• Gray—The interface is not enabled.
• Orange/Red—The interface is configured and enabled, but the link is down. If the interface is wired, this
is an error condition that needs correction. If the interface is not wired, this is the expected status.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
30
Getting Started
Viewing System Task Status
• Outside Network—The port for the outside network is shown for the interface named “outside” only.
As with the inside network, this name is required, or no port is marked as the outside port.
Procedure
The task list opens, displaying the status and details of system tasks.
• Click the delete icon ( ) for a task to remove it from the list.
• Click Remove All Completed Tasks to empty the list of all tasks that are not in progress.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
31
Getting Started
Viewing System Task Status
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
32
CHAPTER 2
Best Practices: Use Cases for FTD
The following topics explain some common tasks you might want to accomplish with FTD using the FDM.
These use cases assume that you completed the device configuration wizard and that you retained this initial
configuration. Even if you modified the initial configuration, you should be able to use these examples to
understand how to use the product.
• How to Configure the Device in FDM, on page 33
• How to Gain Insight Into Your Network Traffic, on page 38
• How to Block Threats, on page 45
• How to Block Malware, on page 48
• How to Implement an Acceptable Use Policy (URL Filtering), on page 51
• How to Control Application Usage, on page 55
• How to Add a Subnet, on page 59
• More Examples, on page 64
The following steps provide an overview of additional features you might want to configure. Please click the
help button (?) on a page to get detailed information about each step.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
33
Best Practices: Use Cases for FTD
How to Configure the Device in FDM
Procedure
Step 1 Choose Device, then click View Configuration in the Smart License group.
Click Enable for each of the optional licenses you want to use: Threat, Malware, URL. If you registered the
device during setup, you can also enable the RA VPN license desired. Read the explanation of each license
if you are unsure of whether you need it.
If you have not registered, you can do so from this page. Click Request Register and follow the instructions.
Please register before the evaluation license expires.
For example, an enabled Threat license should look like the following:
Step 2 If you wired other interfaces, choose Device, then click the link in the Interfaces summary.
• Because the ASA 5506-X and comes pre-configured with a bridge group containing all non-outside data
interfaces, there is no need to configure these interfaces. If you want to break apart the bridge group, you
can edit it to remove the interfaces you want to treat separately. Then you can configure those interfaces
as hosting separate networks.
For other models, you can create a bridge group for the other interfaces, or configure separate networks,
or some combination of both.
Click the edit icon ( ) for each interface to define the IP address and other settings.
The following example configures an interface to be used as a “demilitarized zone” (DMZ), where you place
publically-accessible assets such as your web server. Click Save when you are finished.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
34
Best Practices: Use Cases for FTD
How to Configure the Device in FDM
Step 3 If you configured new interfaces, choose Objects, then select Security Zones from the table of contents.
Edit or create new zones as appropriate. Each interface must belong to a zone, because you configure policies
based on security zones, not interfaces. You cannot put the interfaces in zones when configuring them, so you
must always edit the zone objects after creating new interfaces or changing the purpose of existing interfaces.
The following example shows how to create a new dmz-zone for the dmz interface.
Step 4 If you want internal clients to use DHCP to obtain an IP address from the device, choose Device, then System
Settings > DHCP Server. Select the DHCP Servers tab.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
35
Best Practices: Use Cases for FTD
How to Configure the Device in FDM
There is already a DHCP server configured for the inside interface, but you can edit the address pool or even
delete it. If you configured other inside interfaces, it is very typical to set up a DHCP server on those interfaces.
Click + to configure the server and address pool for each inside interface.
You can also fine-tune the WINS and DNS list supplied to clients on the Configuration tab.
The following example shows how to set up a DHCP server on the inside2 interface with the address pool
192.168.4.50-192.168.4.240.
Step 5 Choose Device, then click View Configuration (or Create First Static Route) in the Routing group and
configure a default route.
The default route normally points to the upstream or ISP router that resides off the outside interface. A default
IPv4 route is for any-ipv4 (0.0.0.0/0), whereas a default IPv6 route is for any-ipv6 (::0/0). Create routes for
each IP version you use. If you use DHCP to obtain an address for the outside interface, you might already
have the default routes that you need.
The routes you define on this page are for the data interfaces only. They do not impact the management
interface. Set the management gateway on System Settings > Management Interface.
The following example shows a default route for IPv4. In this example, isp-gateway is a network object that
identifies the IP address of the ISP gateway (you must obtain the address from your ISP). You can create this
object by clicking Create New Network at the bottom of the Gateway drop-down list.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
36
Best Practices: Use Cases for FTD
How to Configure the Device in FDM
Step 6 Choose Policies and configure the security policies for the network.
The device setup wizard enables traffic flow between the inside-zone and outside-zone, and interface NAT
for all interfaces when going to the outside interface. Even if you configure new interfaces, if you add them
to the inside-zone object, the access control rule automatically applies to them.
However, if you have multiple inside interfaces, you need an access control rule to allow traffic flow from
inside-zone to inside-zone. If you add other security zones, you need rules to allow traffic to and from those
zones. These would be your minimum changes.
In addition, you can configure other policies to provide additional services, and fine-tune NAT and access
rules to get the results that your organization requires. You can configure the following policies:
• Identity—If you want to correlate network activity to individual users, or control network access based
on user or user group membership, use the identity policy to determine the user associated with a given
source IP address.
• NAT (Network Address Translation)—Use the NAT policy to convert internal IP addresses to externally
routeable addresses.
• Access Control—Use the access control policy to determine which connections are allowed on the
network. You can filter by security zone, IP address, protocol, port, application, URL, user or user group.
You also apply intrusion and file (malware) policies using access control rules. Use this policy to
implement URL filtering.
The following example shows how to allow traffic between the inside-zone and dmz-zone in the access control
policy. In this example, no options are set on any of the other tabs except for Logging, where At End of
Connection is selected.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
37
Best Practices: Use Cases for FTD
How to Gain Insight Into Your Network Traffic
The initial access rule can provide some insight into traffic, including policies, destinations, and security
zones. But to obtain user information, you need to configure an identity policy that requires users to authenticate
(identify) themselves. To obtain information on applications used on the network, you need to make some
additional adjustments.
The following procedure explains how to set up the FTD device to monitor traffic and provides an overview
of the end-to-end process of configuring and monitoring policies.
Note This procedure does not provide insight into the web site categories and reputations of sites visited by
users, so you cannot see meaningful information in the web categories dashboard. You must implement
category-based URL filtering, and enable the URL license, to obtain category and reputation data. If
you just want to obtain this information, you can add a new access control rule that allows access to an
acceptable category, such as Financial Services, and make it the first rule in the access control policy.
For details on implementing URL filtering, see How to Implement an Acceptable Use Policy (URL
Filtering), on page 51.
Procedure
Step 1 To gain insight into user behavior, you need to configure an identity policy to ensure that the user associated
with a connection is identified.
By enabling the identity policy, you can collect information about who is using the network, and what resources
they are using. This information is available in the User monitoring dashboard. User information is also
available for connection events shown in Event Viewer.
Users are authenticated only when they use a web browser for HTTP connections.
If a user fails to authenticate, the user is not prevented from making web connections. This just means that
you do not have user identity information for the connections. If you want, you can create an access control
rule to drop traffic for Failed Authentication users.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
38
Best Practices: Use Cases for FTD
How to Gain Insight Into Your Network Traffic
• Base DN—The directory tree for searching or querying user and group information, that is, the
common parent for users and groups. For example, dc=example,dc=com. For information on finding
the base DN, see Determining the Directory Base DN, on page 101.
• AD Primary Domain— The fully qualified Active Directory domain name that the device should
join. For example, example.com.
• Hostname/IP Address—The hostname or IP address of the directory server. If you use an encrypted
connection to the server, you must enter the fully-qualified domain name, not the IP address.
• Port—The port number used for communications with the server. The default is 389. Use port 636
if you select LDAPS as the encryption method.
• Encryption—To use an encrypted connection for downloading user and group information, select
the desired method, STARTTLS or LDAPS. The default is None, which means that user and group
information is downloaded in clear text.
• STARTTLS negotiates the encryption method, and uses the strongest method supported by the
directory server. Use port 389. This option is not supported if you use the realm for remote
access VPN.
• LDAPS requires LDAP over SSL. Use port 636.
• Trusted CA Certificate—If you select an encryption method, upload a Certificate Authority (CA)
certificate to enable a trusted connection between the system and the directory server. If you are
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
39
Best Practices: Use Cases for FTD
How to Gain Insight Into Your Network Traffic
using a certificate to authenticate, the name of the server in the certificate must match the server
Hostname / IP Address. For example, if you use 10.10.10.250 as the IP address but ad.example.com
in the certificate, the connection fails.
Example:
For example, the following image shows how to create an unencrypted connection for the ad.example.com
server. The primary domain is example.com, and the directory username is Administrator@ad.example.com.
All user and group information is under the Distinguished Name (DN) ou=user,dc=example,dc=com.
e) In the Identity Policy Configuration dialog box, Realm Server list, select the realm server you just created.
f) In the Identity Policy Configuration dialog box, configure the Active Authentication captive portal settings.
When an identity rule requires active authentication for a user, the user is redirected to the captive portal
port on the interface through which they are connected and then they are prompted to authenticate.
• Server Certificate—Select the internal certificate to present to users during active authentication.
You can select the predefined self-signed DefaultInternalCertificate, or you can click Create New
Internal Certificate and upload a certificate that your browsers already trust.
Users will have to accept the certificate if you do not upload a certificate that their browsers already
trust.
• Port—The captive portal port. The default is 885 (TCP). If you configure a different port, it must
be in the range 1025-65535.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
40
Best Practices: Use Cases for FTD
How to Gain Insight Into Your Network Traffic
Example:
The Identity Policy Configuration dialog box should now look like the following.
g) Click Save.
Now, create a rule to require active authentication.
h) Click the Create Identity Rule button, or the + button.
i) Fill in the identity rule properties.
Assuming you want to require everyone to authenticate, you could use the following settings:
• Name—Anything you choose, for example, Require_Authentication.
• User Authentication—Active should already be selected; keep it.
• Type—Select HTTP Negotiate. This allows the browser and directory server to negotiate the
strongest authentication protocol, in order, NTLM, then HTTP basic.
Note For the HTTP Basic, HTTP Response Page, and NTLM authentication methods, the user
is redirected to the captive portal using the IP address of the interface. However, for HTTP
Negotiate, the user is redirected using the fully-qualified DNS name
firewall-hostname.AD-domain-name. If you want to use HTTP Negotiate, you must also
update your DNS server to map this name to the IP addresses of all inside interfaces where
you are requiring active authentication. Otherwise, the redirection cannot complete, and
users cannot authenticate. If you cannot, or do not want to, update the DNS server, select
one of the other authentication methods.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
41
Best Practices: Use Cases for FTD
How to Gain Insight Into Your Network Traffic
You can constrain the policy as you see fit to a more limited set of traffic. However, active authentication
will only be attempted for HTTP traffic, so it does not matter that non-HTTP traffic matches the
source/destination criteria. For more details about identity policy properties, see Configure Identity Rules,
on page 142.
Step 2 Change the action on the Inside_Outside_Rule access control rule to Allow.
The Inside_Outside_Rule access rule is created as a trust rule. However, trusted traffic is not inspected, so
the system cannot learn about some of the characteristics of trusted traffic, such as application, when the traffic
matching criteria does not include application or other conditions besides zone, IP address, and port. If you
change the rule to allow rather than trust traffic, the system fully inspects the traffic.
Note (ASA 5506-X .) Also consider changing the Inside_Inside_Rule from Trust to Allow. This rule
covers traffic going between the inside interfaces.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
42
Best Practices: Use Cases for FTD
How to Gain Insight Into Your Network Traffic
Dashboards contain information about connections only if the connection matches an access control rule that
enables connection logging. The Inside_Outside_Rule enables logging, but the default action has logging
disabled. Thus, dashboards show information for the Inside_Outside_Rule only, and do not reflect connections
that do not match any rules.
a) Click anywhere in the default action at the bottom of the access control policy page.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
43
Best Practices: Use Cases for FTD
How to Gain Insight Into Your Network Traffic
e) Click Save.
Step 5 Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
b) Click the Deploy Now button and wait for deployment to finish.
The deployment summary should indicate that you have successfully deployed your changes, and the task
status for the job should be Deployed.
What to do next
At this point, the monitoring dashboards and events should start showing information about users and
applications. You can evaluate this information for undesirable patterns and develop new access rules to
constrain unacceptable use.
If you want to start collecting information about intrusions and malware, you need to enable intrusion and
file policies on one or more access rule. You also need to enable the licenses for those features.
If you want to start collecting information about URL categories, you must implement URL filtering.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
44
Best Practices: Use Cases for FTD
How to Block Threats
Procedure
Step 1 If you have not already done so, enable the Threat license.
You must enable the Threat license to use intrusion policies. If you are currently using the evaluation license,
you are enabling an evaluation version of the license. If you have registered the device, you must purchase
the required license and add it to your Smart Software Manager account on Cisco.com.
a) Click Device.
b) Click View Configuration in the Smart License group.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
45
Best Practices: Use Cases for FTD
How to Block Threats
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
46
Best Practices: Use Cases for FTD
How to Block Threats
either manually download updates, or you can set up a regular schedule. The following procedure shows how
to set up a schedule. By default, database updates are disabled, so you need to take action to get updated rules.
a) Click Device.
b) Click View Configuration in the Updates group.
e) Click Save.
Step 4 Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
47
Best Practices: Use Cases for FTD
How to Block Malware
What to do next
At this point, the monitoring dashboards and events should start showing information about attackers, targets,
and threats, if any intrusions are identified. You can evaluate this information to determine if your network
needs more security precautions, or if you need to reduce the level of intrusion policy you are using.
Procedure
Step 1 If you have not already done so, enable the Malware and Threat licenses.
You must enable the Malware to use file policies in addition to the Threat license, which is required for
intrusion policies. If you are currently using the evaluation license, you are enabling an evaluation version of
the licenses. If you have registered the device, you must purchase the required licenses and add them to your
Smart Software Manager account on Cisco.com.
a) Click Device.
b) Click View Configuration in the Smart License group.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
48
Best Practices: Use Cases for FTD
How to Block Malware
c) Click Enable in the Malware group, and if not already enabled, the Threat group.
The system registers the license with your account, or activates the evaluation license, as appropriate. The
group should indicate that the license is enabled, and the button changes to a Disable button.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
49
Best Practices: Use Cases for FTD
How to Block Malware
f) Click the Logging tab and verify that Log Files under File Events is selected.
By default, file logging is enabled whenever you select a file policy. You must enable file logging to get
file and malware information in events and dashboards.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
50
Best Practices: Use Cases for FTD
How to Implement an Acceptable Use Policy (URL Filtering)
What to do next
At this point, the monitoring dashboards and events should start showing information about file types and file
and malware events, if any files or malware are transmitted. You can evaluate this information to determine
if your network needs more security precautions related to file transmissions.
Procedure
Step 1 If you have not already done so, enable the URL license.
You must enable the URL license to use URL category and reputation information, or to see the information
in dashboards and events. If you are currently using the evaluation license, you are enabling an evaluation
version of the license. If you have registered the device, you must purchase the required license and add it to
your Smart Software Manager account on Cisco.com.
a) Click Device.
b) Click View Configuration in the Smart License group.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
51
Best Practices: Use Cases for FTD
How to Implement an Acceptable Use Policy (URL Filtering)
d) On the Source/Destination tab, click + for Source > Zones, select inside_zone, then click OK in the
zones dialog box.
Adding any of the criteria works the same way. Clicking + opens a little dialog box, where you click the
items you want to add. You can click multiple items, and clicking a selected item de-selects it; the check
marks indicate the selected items. But nothing is added to the policy until you click the OK button; simply
selecting the items is not sufficient.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
52
Best Practices: Use Cases for FTD
How to Implement an Acceptable Use Policy (URL Filtering)
e) Using the same technique, select outside_zone for Destination > Zones.
h) To implement reputation-sensitive blocking for the Social Network category, click Reputation: Risk
Any for that category, deselect Any, then move the slider to Benign sites with security risks. Click away
from the slider to close it.
The left of the reputation slider indicates sites that will be allowed, the right side are sites that will be
blocked. In this case, only Social Networking sites with reputations in the Suspicious Sites and High Risk
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
53
Best Practices: Use Cases for FTD
How to Implement an Acceptable Use Policy (URL Filtering)
ranges will be blocked. Thus, your users should be able to get to commonly-used Social Networking sites,
where there are fewer risks.
Using reputation, you can selectively block sites within a category you otherwise want to allow.
i) Click the + next to the URLS list to the left of the categories list.
j) At the bottom of the popup dialog box, click the Create New URL link.
k) Enter badsite.example.com for both the name and URL, then click OK to create the object.
You can name the object the same as the URL or give the object a different name. For the URL, do not
include the protocol portion of the URL, just add the server name.
m) Click the Logging tab and select Select Log Action > At Beginning and End of Connection.
You must enable logging to get category and reputation information into the web category dashboard and
connection events.
n) Click OK to save the rule.
Step 3 (Optional.) Set preferences for URL filtering.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
54
Best Practices: Use Cases for FTD
How to Control Application Usage
When you enable the URL license, the system automatically enables updates to the web category database.
The system checks for updates every 30 minutes, although the data is typically updated once per day. You
can turn off these updates if for some reason you do not want them.
You can also elect to send URLs that are not categorized to Cisco for analysis. Thus, if the installed URL
database does not have a categorization for a site, the Cisco Cloud might have one. The cloud returns the
category and reputation, and your category-based rules can then be applied correctly to the URL request.
Selecting this option is important for lower-end systems, which install a smaller URL database due to memory
limitations.
a) Click Device.
b) Click System Settings > Traffic Settings > URL Filtering Preferences.
c) Select Query Cisco CSI for Unknown URLs.
d) Click Save.
Step 4 Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
What to do next
At this point, the monitoring dashboards and events should start showing information about web categories
and reputations, and which connections were dropped. You can evaluate this information to determine if your
URL filtering is dropping just those sites that are objectionable, or if you need to ease up on the reputation
setting for certain categories.
Consider informing users beforehand that you will be blocking access to web sites based on their categorization
and reputation.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
55
Best Practices: Use Cases for FTD
How to Control Application Usage
Cisco frequently updates and adds additional application detectors via system and vulnerability database
(VDB) updates. Thus, a rule blocking high risk applications can automatically apply to new applications
without you having to update the rule manually.
In this use case, we will block any application that belongs to the anonymizer/proxy category.
Procedure
d) On the Source/Destination tab, click + for Source > Zones, select inside_zone, then click OK in the
zones dialog box.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
56
Best Practices: Use Cases for FTD
How to Control Application Usage
e) Using the same technique, select outside_zone for Destination > Zones.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
57
Best Practices: Use Cases for FTD
How to Control Application Usage
i) Click the Logging tab and select Select Log Action > At Beginning and End of Connection.
You must enable logging to get information about any connections blocked by this rule.
j) Click OK to save the rule.
Step 2 Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
58
Best Practices: Use Cases for FTD
How to Add a Subnet
Wait for deployment to finish. The deployment summary should indicate that you have successfully
deployed your changes, and the task status for the job should be Deployed.
Note This example assumes the unused interface is not part of a bridge group. If it is currently a bridge group
member, you must first remove it from the bridge group before following this procedure.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
59
Best Practices: Use Cases for FTD
How to Add a Subnet
• Name—A unique name for the interface. For this example, inside_2.
• Status—Click the status toggle to enable the interface.
• IPv4 Address tab—Select Static for Type, then enter 192.168.2.1/24.
d) Click Save.
The interface list shows the updated interface status and the configured IP address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
60
Best Practices: Use Cases for FTD
How to Add a Subnet
f) Click Add.
e) Click Save.
Step 4 Create an access control rule that allows traffic between the inside networks.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
61
Best Practices: Use Cases for FTD
How to Add a Subnet
Traffic is not automatically allowed between any interfaces. You must create access control rules to allow the
traffic that you want. The only exception is if you allow traffic in the access control rule's default action. For
the purposes of this example, we will assume you retained the block default action that the device setup wizard
configures. Thus, you need to create a rule that will allow traffic between the inside interfaces. If you have
already created a rule like this, skip this step.
a) Click Policies in the main menu.
Ensure that the Access Control policy is displayed.
b) Click + to add a new rule.
c) Configure the order, title, and action.
• Order—The default is to add new rules to the end of the access control policy. However, you must
place this rule ahead of (above) any rule that would match the same Source/Destination and other
criteria, or the rule will never be matched (a connection matches one rule only, and that is the first
rule it matches in the table). For this rule, we will use unique Source/Destination criteria, so adding
the rule to the end of the list is acceptable.
• Title—Give the rule a meaningful name, such as Allow_Inside_Inside.
• Action—Select Allow.
d) On the Source/Destination tab, click + for Source > Zones, select inside_zone, then click OK in the
zones dialog box.
e) Using the same technique, select inside_zone for Destination > Zones.
A security zone must contain at least two interfaces to select the same zone for source and destination.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
62
Best Practices: Use Cases for FTD
How to Add a Subnet
Although the inside interfaces are in a trusted zone, it is typical for users to connect laptops to the network.
Thus, a user might unknowingly bring a threat inside your network from an outside network or a Wi-Fi
hot spot. Thus, you might want to scan for intrusions and malware in traffic that goes between your inside
networks.
Consider doing the following.
• Click the Intrusion Policy tab, enable the intrusion policy, and use the slider to select the Balanced
Security and Connectivity policy.
• Click the File Policy tab, then select the Block Malware All policy.
g) Click the Logging tab and select Select Log Action > At Beginning and End of Connection.
You must enable logging to get information about any connections that match this rule. Logging adds
statistics to the dashboard as well as showing events in the event viewer.
h) Click OK to save the rule.
Step 5 Verify that required policies are defined for the new subnet.
By adding the interface to the inside_zone security zone, any existing policies for inside_zone automatically
apply to the new subnet. However, take the time to inspect your policies and ensure that no additional policies
are needed.
If you completed the initial device configuration, the following policies should already apply.
• Access Control—The Inside_Outside_Rule should allow all traffic between the new subnet and the
outside network. If you followed the previous use cases, the policy also provides intrusion and malware
inspection. You must have a rule that allows some traffic between the new network and the outside
network, or users cannot access the Internet or other external networks.
• NAT—The InsideOutsideNATrule applies to any interface going to the outside interface, and applies
interface PAT. If you kept this rule, traffic from the new network going to the outside will have the IP
address translated to a unique port on the outside interface's IP address. If you do not have a rule that
applies to all interfaces, or the inside_zone interfaces, when going to the outside interface, you might
need to create one now.
• Identity—There is no default identity policy. However, if you followed previous use cases, you might
have an identity policy that already requires authentication for the new network. If you do not have an
identity policy that applies, create one now if you want to have user-based information for the new
network.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
63
Best Practices: Use Cases for FTD
More Examples
What to do next
Verify that workstations on the new subnet are getting IP addresses using DHCP, and that they can reach
other inside networks and the outside network. Use the monitoring dashboards and the event viewer to evaluate
network usage.
More Examples
In addition to the examples in the Use Case chapter, there are example configurations in some of the chapters
that explain specific services. You might find the following examples of interest.
Network Address Translation (NAT)
NAT for IPv4 addresses
• Providing Access to an Inside Web Server (Static Auto NAT), on page 223
• Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation), on page 225
• Different Translation Depending on the Destination (Dynamic Manual PAT), on page 231
• Different Translation Depending on the Destination Address and Port (Dynamic Manual PAT), on
page 237
• DNS Reply Modification, DNS Server on Outside, on page 249
• DNS Reply Modification, DNS Server on Host Network, on page 252
• Exempting Site-to-Site VPN Traffic from NAT, on page 276
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
64
CHAPTER 3
Licensing the System
The following topics explain how to license the FTD device.
• Smart Licensing for the Firewall System, on page 65
• Managing Smart Licenses, on page 67
To use Smart Licensing, you must first set up a Smart Account on Cisco Software Central (software.cisco.com).
For a more detailed overview on Cisco Licensing, go to cisco.com/go/licensingguide
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
65
Licensing the System
Periodic Communication with the License Authority
When you register a device with Cisco Smart Software Manager, you create a Product Instance Registration
Token in the manager, and then enter it in FDM. A registered device becomes associated with a virtual account
based on the token that is used.
For more information about the Cisco Smart Software Manager, see the online help for the manager.
Base Perpetual All features not covered by the optional term licenses.
The Base license is automatically added to your
account when you register.
You must also specify whether to Allow
export-controlled functionality on the products
registered with this token. You can select this option
only if your country meets export-control standards.
This option controls your use of advanced encryption
and the features that require advanced encryption.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
66
Licensing the System
Impact of Expired or Disabled Optional Licenses
RA VPN: Term-based or perpetual Remote access VPN configuration. Your base license
based on license type. must allow export-controlled functionality to
• AnyConnect Plus
configure RA VPN. You select whether you meet
• AnyConnect Apex export requirements when you register the device.
• AnyConnect VPN The FDM can use any valid AnyConnect Client
Only license. The available features do not differ based on
license type. If you have not already purchased one,
see Licensing Requirements for Remote Access VPN,
on page 291.
Also see Cisco AnyConnect Ordering Guide,
http://www.cisco.com/c/dam/en/us/products/collateral/
security/anyconnect-og.pdf.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
67
Licensing the System
Registering the Device
• Authorized (“Connected,” “Sufficient Licenses”)—The device has contacted and registered successfully
with the License Authority, which has authorized the license entitlements for the appliance. The device
is now In-Compliance.
• Out-of-Compliance—There is no available license entitlement for the device. Licensed features continue
to work. However, you must either purchase or free up additional entitlements to become In-Compliance.
• Authorization Expired—The device has not communicated with the Licensing Authority in 90 or more
days. Licensed features continue to work. In this state, the Smart License Agent retries its authorization
requests. If a retry succeeds, the agent enters either an Out-of-Compliance or Authorized state, and begins
a new Authorization Period. Try manually synchronizing the device.
Note Click the i button next to the Smart License status to view the virtual account, export-controlled features,
and get a link to open the Cisco Smart Software Manager. Export-Controlled Features control software
that is subject to national security, foreign policy, and anti-terrorism laws and regulations.
The following procedure provides an overview of how to manage licenses for the system.
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 Register the device.
You must register with the Cisco Smart Software Manager before you can assign the optional licenses. Register
before the end of the evaluation period.
See Registering the Device, on page 68.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
68
Licensing the System
Enabling or Disabling Optional Licenses
When you register the device, your virtual account allocates the license to the device. Registering the device
also registers any optional licenses that you have enabled.
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 Click Request Register and follow the instructions.
a) Click the link to open the Cisco Smart Software Manager and log into your account, or create a new one
if necessary.
b) Generate a new token.
When you create the token, you specify the amount of time the token is valid for use. The recommended
expiration period is 30 days. This period defines the expiration date of the token itself, and has no impact
on the device that you register using the token. If the token expires before you can use it, you can simply
generate a new token.
You must also specify whether to Allow export-controlled functionality on the products registered
with this token. You can select this option only if your country meets export-control standards. This
option controls your use of advanced encryption and the features that require advanced encryption.
c) Copy and paste the token into the edit box on the Smart License Registration dialog box.
d) Click Request Register.
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 Click the Enable/Disable control for each optional license as desired.
• Enable—Registers the license with your Cisco Smart Software Manager account and enables the controlled
features. You can now configure and deploy policies controlled by the license.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
69
Licensing the System
Synchronizing with the Cisco Smart Software Manager
• Disable—Unregisters the license with your Cisco Smart Software Manager account and disables the
controlled features. You cannot configure the features in new policies, nor can you deploy policies that
use the feature.
Step 3 If you enabled the RA VPN license, select the type of license you have available in your account.
You can use any of the AnyConnect licenses: Plus, Apex, or VPN Only. You can select Plus and Apex if
you have both licenses and you want to use them both.
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 Select Resync Connection from the gear drop-down list.
Procedure
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 Select Unregister Device from the gear drop-down list.
Step 3 Read the warning and click Unregister if you really want to unregister the device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
70
CHAPTER 4
Monitoring the Device
The system includes dashboards and an Event Viewer that you can use to monitor the device and traffic that
is passing through the device.
• Enable Logging to Obtain Traffic Statistics, on page 71
• Monitoring Traffic and System Dashboards, on page 73
• Monitoring Additional Statistics Using the Command Line, on page 75
• Viewing Events, on page 76
Event Types
The system can generate the following types of events. You must generate these events to see related statistics
in the monitoring dashboards.
Connection Events
You can generate events for connections as users generate traffic that passes through the system. Enable
connection logging on access rules to generate these events.
Connection events include a wide variety of information about a connection, including source and
destination IP addresses and ports, URLs and applications used, and the number of bytes or packets
transmitted. The information also includes the action taken (for example, allowing or blocking the
connection), and the policies applied to the connection.
Intrusion Events
The system examines the packets that traverse your network for malicious activity that could affect the
availability, integrity, and confidentiality of a host and its data. When the system identifies a possible
intrusion, it generates an intrusion event, which is a record of the date, time, type of exploit, and contextual
information about the source of the attack and its target. Intrusion events are generated for any intrusion
rule set to block or alert, regardless of the logging configuration of the invoking access control rule.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
71
Monitoring the Device
Configurable Connection Logging
File Events
File events represent files that the system detected, and optionally blocked, in network traffic based on
your file policies. You must enable file logging on the access rule that applies the file policy to generate
these events.
When the system generates a file event, the system also logs the end of the associated connection regardless
of the logging configuration of the invoking access control rule.
Malware Events
The system can detect malware in network traffic as part of your overall access control configuration.
The AMP for Networks can generate a malware event, containing the disposition of the resulting event,
and contextual data about how, where, and when the malware was detected. You must enable file logging
on the access rule that applies the file policy to generate these events.
The disposition of a file can change, for example, from clean to malware or from malware to clean. If
AMP for Networks queries the AMP Cloud about a file, and the cloud determines the disposition has
changed within a week of the query, the system generates retrospective malware events.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
72
Monitoring the Device
Sending Events to an External Syslog Server
reach its final destination. Note, however, that by default file and intrusion inspection is disabled for
encrypted payloads. If the intrusion or file policies find reason to block a connection, the system
immediately logs an end-of-connection event regardless of your connection log settings. Logging allowed
connections provides the most statistical information on the traffic in your network.
• A trusted connection is one that is handled by a Trust access control rule or the default action in an access
control policy. However, trusted connections are not inspected for discovery data, intrusions, or prohibited
files and malware. Therefore, connection events for trusted connections contain limited information.
• For access control rules and access control policy default actions that block traffic, the system logs
beginning-of-connection events. Matching traffic is denied without further inspection.
• Logging blocked TCP connections during a Denial of Service (DoS) attack can affect system performance
and overwhelm the database with multiple similar events. Before you enable logging for a Block rule,
consider whether the rule monitors traffic on an Internet-facing interface or other interface vulnerable
to DoS attack.
Note The data used in traffic-related dashboards is collected from access control rules that enable connection
or file logging. The dashboards do not reflect traffic that matches rules for which no logging is enabled.
Ensure that you configure your rules to log the information that matters to you. In addition, user
information is available only if you configure identity rules to collect user identity. And finally, intrusion,
file, malware, and URL category information is available only if you have a license for those features
and configure rules that use the features.
Procedure
Step 1 Click Monitoring in the main menu to open the Dashboards page.
You can select predefined time ranges, such as the last hour or week, or define a custom time range with
specific start and end times, to control the data shown in the dashboard graphs and tables.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
73
Monitoring the Device
Monitoring Traffic and System Dashboards
Step 2 Click the Dashboard links in the table of contents to see dashboards for the following data:
• Network Overview—Shows summary information about the traffic in the network, including the access
rules (policies) matched, users initiating traffic, applications used in connections, intrusion threats
(signatures) matched, web categories for URLs accessed, and the most frequent destinations for
connections.
• Users—Shows the top users of your network. You must configure identity policies to see user information.
You might see the following special entities:
• Failed Authentication—The user was prompted to authenticate, but failed to enter a valid
username/password pair within the maximum number of allowed attempts. Failure to authenticate
does not itself prevent the user from accessing the network, but you can write an access rule to limit
network access for these users.
• Guest—Guest users are like Failed Authentication users, except that your identity rule is configured
to call these users Guest. Guest users were prompted to authenticate and failed to do so within the
maximum number of attempts.
• No Authentication Required—The user was not prompted to authentication, because the user's
connections matched identity rules that specified no authentication.
• Unknown—There is no user mapping for the IP address, and there is no record of failed
authentication yet. Typically, this means that no HTTP traffic has yet been seen from that address.
• Applications—Shows the top applications, such as HTTP, that are being used in the network. The
information is available only for connections that are inspected. Connections are inspected if they match
an “allow” rule, or a block rule that uses criteria other than zone, address, and port. Thus, application
information is not available if the connection is trusted or blocked prior to hitting any rule that requires
inspection.
• Web Categories—Shows the top categories of web sites, such as Gambling or Educational Institutions,
that are being used in the network based on the categorization of web sites visited. You must have at
least one access control rule that uses URL category as a traffic matching criteria to get this information.
The information will be available for traffic that matches the rule, or for traffic that has to be inspected
to determine if it matches the rule. You will not see category (or reputation) information for connections
that match rules that come before the first web-category access control rule.
• Policies—Shows the top access rules matched by network traffic.
• Ingress Zones—Shows the top security zones through which traffic is entering the device.
• Egress Zones—Shows the top security zones through which traffic is exiting the device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
74
Monitoring the Device
Monitoring Additional Statistics Using the Command Line
Step 3 You can also click these links in the table of contents:
• Events—To view events as they occur. You must enable connection logging in individual access rules
to see connection events related to those rules. These events can help you resolve connection problems
for your users.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
75
Monitoring the Device
Viewing Events
• show dhcpd provides information about the DHCP servers you configure on the interfaces.
• show interface provides usage statistics for each interface.
Viewing Events
You can view events that are generated from your security policies that enable logging. Events are also
generated for intrusion and file policies that are triggered.
The event viewer table shows the events generated in real time. As new events are generated, older events
are rolled out of the table.
Procedure
Step 3 Click the tab that shows the type of event you want to view.
You can do the following with the event list:
• Click Pause to stop the addition of new events so that you can more easily find and analyze an event.
Click Resume to allow new events to appear.
• Select a different refresh rate (5, 10, 20, or 60 seconds) to control how fast new events are shown.
• Create a custom view that includes the columns you want. To create a custom view, either click the +
button in the tab bar, or click Add/Remove Columns. You cannot change the pre-set tabs, so adding or
removing columns creates a new view. For more information, see Configuring Custom Views, on page
77.
• To change the width of a column, click and drag the column heading divider to the desired width.
• Mouse over an event and click View Details to see complete information on an event. For a description
of the various fields in an event, see Event Field Descriptions, on page 79.
Step 4 If necessary, apply a filter to the table to help you locate the desired events based on various event attributes.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
76
Monitoring the Device
Configuring Custom Views
To create a new filter, either manually type in the filter by selecting atomic elements from the drop-down list
and entering the filter value, or build a filter by clicking a cell in the events table that includes a value on
which you want to filter. You can click multiple cells in the same column to create an OR condition among
the values, or click cells in different columns to create an AND condition among the columns. If you build
the filter by clicking cells, you can also edit the resulting filter to fine-tune it. For detailed information about
creating filter rules, see Filtering Events, on page 78.
Once you build the filter, do any of the following:
• To apply the filter and update the table to show only those events that match the filter, click the Filter
button.
• To clear an entire filter that you have applied and return the table to a non-filtered state, click Reset
Filters in the Filter box.
• To clear one of the atomic elements of a filter, mouse over the element and click the X for the element.
Then, click the Filter button.
Procedure
Step 3 Click the Add/Remove Columns link above the events table on the right, and select or deselect columns until
the selected list includes only those columns to include in the view.
Click and drag columns between the available (but not used) and selected lists. You can also click and drag
columns in the selected list to change the left-to-right order of the columns in the table. For a description of
the columns, see Event Field Descriptions, on page 79.
When finished, click OK to save your column changes.
Note If you change column selection while viewing a pre-defined view, a new view is created.
Step 4 If necessary, change column widths by clicking and dragging the column separators.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
77
Monitoring the Device
Filtering Events
Filtering Events
You can create complex filters to limit the events table to the events that currently interest you. You can use
the following techniques, alone or in combination, to build a filter:
Clicking columns
The easiest way to build a filter is to click on cells in the events table that contain the values on which
you intend to filter. Clicking a cell updates the Filter field with a correctly-formulated rule for that value
and field combination. However, using this technique requires that the existing list of events contains
the desired values.
You cannot filter on all columns. If you can filter on the contents of a cell, it is underlined when you
mouse over it.
Selecting atomic elements
You can also build a filter by clicking in the Filter field and selecting the desired atomic element from
the drop-down list, then typing in the match value. These elements include event fields that are not shown
as columns in the events table. They also include operators to define the relationship between the value
you type in and the events to display. Whereas clicking columns always results in an “equals (=)” filter,
when you select an element, you can also select “greater than (>)” or “less than (<)” for numeric fields.
Regardless of how you add an element to the Filter field, you can type into the field to adjust the operator or
value. Click Filter to apply the filter to the table.
!= Not equals. The event does not match the specified value. You must type in the !
(exclamation point) to build a not-equals expression.
> Greater than. The event contains a value that is greater than the specified value. This
operator is available for numeric values only, such as port and IP address.
< Less than. The event contains a value that is less than the specified value. This operator
is available for numeric values only.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
78
Monitoring the Device
Event Field Descriptions
Default Action
The connection was handled by the default action.
For file or malware events, the file rule action associated with the rule action for the rule the file matched,
and any associated file rule action options.
Allowed Connection
Whether the system allowed the traffic flow for the event.
Application
The application detected in the connection.
Application Business Relevance
The business relevance associated with the application traffic detected in the connection: Very High,
High, Medium, Low, or Very Low. Each type of application detected in the connection has an associated
business relevance; this field displays the lowest (least relevant) of those.
Application Categories, Application Tag
Criteria that characterize the application to help you understand the application's function.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
79
Monitoring the Device
Event Field Descriptions
Application Risk
The risk associated with the application traffic detected in the connection: Very High, High, Medium,
Low, or Very Low. Each type of application detected in the connection has an associated risk; this field
displays the highest of those.
Block Type
The type of block specified in the access control rule matching the traffic flow in the event: block or
interactive block.
Client Application, Client Version
The client application and version of that client detected in the connection.
Client Business Relevance
The business relevance associated with the client traffic detected in the connection: Very High, High,
Medium, Low, or Very Low. Each type of client detected in the connection has an associated business
relevance; this field displays the lowest (least relevant) of those.
Client Category, Client Tag
Criteria that characterize the application to help you understand the application's function.
Client Risk
The risk associated with the client traffic detected in the connection: Very High, High, Medium, Low,
or Very Low. Each type of client detected in the connection has an associated risk; this field displays the
highest of those.
Connection
The unique ID for the traffic flow, internally generated.
Connection Blocktype Indicator
The type of block specified in the access control rule matching the traffic flow in the event: block or
interactive block.
Connection Bytes
The total bytes for the connection.
Connection Time
The time for the beginning of the connection.
Connection Timestamp
The time the connection was detected.
Denied Connection
Whether the system denied the traffic flow for the event.
Destination Country and Continent
The country and continent of the receiving host.
Destination IP
The IP address used by the receiving host in an intrusion, file, or malware event.
Destination Port/ICMP Code; Destination Port; Destination Icode
The port or ICMP code used by the session responder.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
80
Monitoring the Device
Event Field Descriptions
Direction
The direction of transmission for a file.
Disposition
The file's disposition:
Malware
Indicates that the AMP Cloud categorized the file as malware or the file’s threat score exceeded the
malware threshold defined in the file policy. Local malware analysis can also mark files as malware.
Clean
Indicates that the AMP Cloud categorized the file as clean, or that a user added the file to the clean
list.
Unknown
Indicates that the system queried the AMP Cloud, but the file has not been assigned a disposition;
in other words, the AMP Cloud has not categorized the file.
Unavailable
Indicates that the system could not query the AMP Cloud. You may see a small percentage of events
with this disposition; this is expected behavior.
N/A
Indicates that a Detect Files or Block Files rule handled the file and the system did not query the
AMP Cloud.
Egress Interface, Egress Security Zone
The interface and zone through which the connection exited the device.
Event, Event Type
The type of event.
Event Seconds, Event Microseconds
The time, in seconds or microseconds, when the event was detected.
File Category
The general categories of file type, for example: Office Documents, Archive, Multimedia, Executables,
PDF files, Encoded, Graphics, or System Files.
File Event Timestamp
The time and date the file or malware file was created.
File Name
The name of the file.
File Rule Action
The action associated with file policy rule that detected the file, and any associated file rule action options.
File SHA-256
The SHA-256 hash value of the file.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
81
Monitoring the Device
Event Field Descriptions
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
82
Monitoring the Device
Event Field Descriptions
Reason Description
File Block The connection contained a file or malware file that the system prevented
from being transmitted. A reason of File Block is always paired with an action
of Block.
File Monitor The system detected a particular type of file in the connection.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
83
Monitoring the Device
Event Field Descriptions
Reason Description
File Resume Allow File transmission was originally blocked by a Block Files or Block Malware
file rule. After a new access control policy allowing the file was deployed,
the HTTP session automatically resumed.
File Resume Block File transmission was originally allowed by a Detect Files or Malware Cloud
Lookup file rule. After a new access control policy blocking the file was
deployed, the HTTP session automatically stopped.
Intrusion Block The system blocked or would have blocked an exploit (intrusion policy
violation) detected in the connection. A reason of Intrusion Block is paired
with an action of Block for blocked exploits and Allow for
would-have-blocked exploits.
Intrusion Monitor The system detected, but did not block, an exploit detected in the connection.
This occurs when the state of the triggered intrusion rule is set to Generate
Events.
Receive Times
The date and time the event was generated.
Referenced Host
If the protocol in the connection is HTTP or HTTPS, this field displays the hostname that the respective
protocol was using.
Responder Bytes, Responder Packets
The total number of bytes or packets transmitted by the session responder.
Responder Country and Continent
The country and continent of the host that responded to the session. Available only if the responder IP
address is routable.
Responder IP
The host IP address (and hostname, if DNS resolution is enabled) of the session responder in a connection
or Security Intelligence event.
Signature
The signature ID for a file/malware event.
Source Country and Continent
The country and continent of the sending host. Available only if the source IP address is routable.
Source IP
The IP address used by the sending host in an intrusion, file, or malware event.
Source Port/ICMP Type; Source Port; Source Port Itype
The port or ICMP type used by the session initiator.
TCP Flags
The TCP flags detected in the connection.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
84
Monitoring the Device
Event Field Descriptions
Total Packets
The total number of packets transmitted in the connection, which is Initiator Packets + Responder
Packets.
URL, URL Category, URL Reputation, URL Reputation Score
The URL requested by the monitored host during the session and its associated category, reputation, and
reputation score, if available.
If the system identifies or blocks an SSL application, the requested URL is in encrypted traffic, so the
system identifies the traffic based on an SSL certificate. For SSL applications, therefore, the URL indicates
the common name contained in the certificate.
User
The user associated with the initiator IP address.
VLAN
The innermost VLAN ID associated with the packet that triggered the event.
Web App Business Relevance
The business relevance associated with the web application traffic detected in the connection: Very High,
High, Medium, Low, or Very Low. Each type of web application detected in the connection has an
associated business relevance; this field displays the lowest (least relevant) of those.
Web App Categories, Web App Tag
Criteria that characterize the web application to help you understand the web application's function.
Web App Risk
The risk associated with the web application traffic detected in the connection: Very High, High, Medium,
Low, or Very Low. Each type of web application detected in the connection has an associated risk; this
field displays the highest of those.
Web Application
The web application, which represents the content or requested URL for HTTP traffic detected in the
connection.
If the web application does not match the URL for the event, the traffic is probably referred traffic, such
as advertisement traffic. If the system detects referred traffic, it stores the referring application (if available)
and lists that application as the web application.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
85
Monitoring the Device
Event Field Descriptions
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
86
CHAPTER 5
Objects
Objects are reusable containers that define criteria that you want to use in policies or other settings. For
example, network objects define host and subnet addresses.
Objects let you define criteria so that you can easily reuse the same criteria in different policies. When you
update an object, all policies that use the object are automatically updated.
• Object Types, on page 87
• Managing Objects, on page 89
Object Types
You can create the following types of object. In most cases, if a policy or setting allows an object, you must
use an object.
AnyConnect Client Remote access VPN. AnyConnect Client profiles are downloaded to clients along with
Profile the AnyConnect Client software. These profiles define many
client-related options, such as auto connect on startup and auto
reconnect, and whether the end user is allowed to change the
option from the AnyConnect Client preferences and advanced
settings.
See Configure and Upload Client Profiles, on page 292.
Application Filter Access control rules. An application filter object defines the applications used in an
IP connection, or a filter that defines applications by type,
category, tag, risk, or business relevance. You can use these
objects in policies to control traffic instead of using port
specifications.
See Configuring Application Filter Objects, on page 93.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
87
Objects
Object Types
Geolocation Security policies. A geolocation object defines countries and continents that host
the device that is the source or destination of traffic. You can
use these objects in policies to control traffic instead of using IP
addresses.
See Configuring Geolocation Objects, on page 96.
Identity Realm Identity policies. An identity realm is a directory server plus other attributes
required to provide authentication services. The directory server
Remote access VPN.
contains information about the users and user groups who are
allowed access to your network.
See Configuring AD Identity Realms, on page 97.
IKE Policy VPN. Internet Key Exchange (IKE) Policy objects define the IKE
proposal used to authenticate IPsec peers, negotiate and distribute
IPsec encryption keys, and automatically establish IPsec security
associations (SAs). There are separate objects for IKEv1 and
IKEv2.
See Configuring the Global IKE Policy, on page 266.
IPsec Proposal VPN. IPsec Proposal objects configure the IPsec proposal used during
IKE Phase 2 negotiations. The IPsec proposal defines the
combination of security protocols and algorithms that secure
traffic in an IPsec tunnel. There are separate objects for IKEv1
and IKEv2.
See Configuring IPsec Proposals, on page 271.
Network Security policies and Network groups and network objects (collectively referred to as
a wide variety of network objects) define the addresses of hosts or networks.
device settings.
See Configuring Network Objects and Groups, on page 89.
Port Security policies. Port groups and port objects (collectively referred to as port
objects) define the protocols, ports, or ICMP services for traffic.
See Configuring Port Objects and Groups, on page 90.
Security Zone Security policies. A security zone is a grouping of interfaces. Zones divide the
network into segments to help you manage and classify traffic.
See Configuring Security Zones, on page 92.
Syslog Servers Access control rules. A syslog server object identifies a server that can receive
connection-oriented or diagnostic system log (syslog) messages.
Diagnostic logging.
See Configuring Syslog Servers, on page 97.
URL Access control rules. URL objects and groups (collectively referred to as URL objects)
define the URL or IP addresses of web requests.
See Configuring URL Objects and Groups, on page 94.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
88
Objects
Managing Objects
Managing Objects
You can configure objects directly through the Objects page, or you can configure them while editing policies.
Either method yields the same results, a new or updated object, so use the technique that suits your needs at
the time.
The following procedure explains how you can create and manage your objects directly through the Objects
page.
Note When you edit a policy or setting, if a property requires an object, you are shown a list of the ones that
are already defined, and you select the appropriate object. If the desired object does not yet exist, simply
click the Create New Object link shown in the list.
Procedure
Step 2 Select the object type from the table of contents and do any of the following:
• To create an object, click the + button. The content of the objects differ based on type; see the configuration
topic for each object type for specific information.
• To create a group object, click the Add Group ( ) button. Group objects include more than one item.
• To edit an object, click the edit icon ( ) for the object. You cannot edit the contents of a pre-defined
object.
• To delete an object, click the delete icon ( ) for the object. You cannot delete an object if it is currently
being used in a policy or another object, or if it is a pre-defined object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
89
Objects
Configuring Port Objects and Groups
Procedure
Step 1 Select Objects, then select Network from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
• To create a group, click the Add Group ( ) button.
• To edit an object or group, click the edit icon ( ) for the object.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Step 3 Enter a Name for the object and optionally, a description, and define the object contents.
We recommend that you do not use an IP address alone for the name so that you can easily tell object names
from object contents or standalone IP addresses. If you want to use an IP address in the name, prefix it with
something meaningful, such as host-192.168.1.2 or network-192.168.1.0. If you use an IP address as the name,
the system adds a vertical bar as a prefix, for example, |192.168.1.2. FDM does not show the bar in the object
selectors, but you will see this naming standard if you examine the running configuration using the show
running-config command in the CLI.
Network Groups
Click the + button to select network objects to add to the group. You can also create new objects.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
90
Objects
Configuring Port Objects and Groups
A port object defines a single protocol, TCP/UDP port or port range, or ICMP service, whereas a port group
object can define more than one service.
The system includes several pre-defined objects for common services. You can use these objects in your
policies. However, you cannot edit or delete system-defined objects.
Note When creating port group objects, ensure that the combination of objects makes sense. For example,
you cannot have a mixture of protocols in an object if you use it to specify both source and destination
ports in an access rule. Exercise care when editing an object that is already being used, or you could
invalid (and disable) policies that use the object.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create port objects while editing a service property by clicking the Create New Port link shown in
the object list.
Procedure
Step 1 Select Objects, then select Ports from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
• To create a group, click the Add Group ( ) button.
• To edit an object or group, click the edit icon ( ) for the object.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Step 3 Enter a name for the object and optionally, a description, and define the object contents.
Port Objects
Select the Protocol, then configure the protocol as follows:
• TCP, UDP—Enter the single port or port range number, for example, 80 (for HTTP) or 1-65535 (to
cover all ports).
• ICMP, IPv6-ICMP—Select the ICMP Type and optionally, the Code. Select Any for the type to apply
to all ICMP messages. For information on the types and codes, see the following pages:
• ICMP—http://www.iana.org/assignments/icmp-parameters/icmp-parameters.xml
• ICMPv6—http://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xml
Port Groups
Click the + button to select port objects to add to the group. You can also create new objects.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
91
Objects
Configuring Security Zones
Typically, you would group interfaces by the role they play in your network. For example, you would place
the interface that connects to the Internet in the outside_zone security zone, and all of the interfaces for your
internal networks in the inside_zone security zone. Then, you could apply access control rules to traffic
coming from the outside zone and going to the inside zone.
Before creating zones, consider the access rules and other policies you want to apply to your networks. For
example, you do not need to put all internal interfaces into the same zone. If you have 4 internal networks,
and you want to treat one differently than the other three, you can create two zones rather than one. If you
have an interface that should allow outside access to a public web server, you might want to use a separate
zone for the interface.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create security zones while editing a security zone property by clicking the Create New Security
Zone link shown in the object list.
Procedure
Step 1 Select Objects, then select Security Zones from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
92
Objects
Configuring Application Filter Objects
Note Cisco frequently updates and adds additional application detectors via system and vulnerability database
(VDB) updates. Thus, a rule blocking high risk applications can automatically apply to new applications
without you having to update the rule manually.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create application filter objects while editing an access control rule by clicking the Save As Filter
link after adding application criteria to the Applications tab.
Procedure
Step 1 Select Objects, then select Application Filters from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
93
Objects
Configuring URL Objects and Groups
Note Multiple selections within a single filter criteria have an OR relationship. For example, Risk is High
OR Very High. The relationship between filters is AND, so Risk is High OR Very High, AND
Business Relevance is Low OR Very Low. As you select filters, the list of applications in the display
updates to show only those that meet the criteria. You can use these filters to help you find
applications that you want to add individually, or to verify that you are selecting the desired filters
to add to the rule.
Risks
The likelihood that the application is used for purposes that might be against your organization's security
policy, from very low to very high.
Business Relevance
The likelihood that the application is used within the context of your organization's business operations, as
opposed to recreationally, from very low to very high.
Types
The type of application:
• Application Protocol—Application protocols such as HTTP and SSH, which represent communications
between hosts.
• Client Protocol—Clients such as web browsers and email clients, which represent software running on
the host.
• Web Application—Web applications such as MPEG video and Facebook, which represent the content
or requested URL for HTTP traffic.
Categories
A general classification for the application that describes its most essential function.
Tags
Additional information about the application, similar to category.
For encrypted traffic, the system can identify and filter traffic using only the applications tagged SSL Protocol.
Applications without this tag can only be detected in unencrypted or decrypted traffic. Also, the system assigns
the decrypted traffic tag to applications that the system can detect in decrypted traffic only, not encrypted
or unencrypted.
Applications List (bottom of the display)
This list updates as you select filters from the options above the list, so you can see the applications that
currently match the filter. Use this list to verify that your filter is targeting the desired applications when you
intend to add filter criteria to the rule. If your intention is to add specific applications, select them from this
list.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
94
Objects
Configuring URL Objects and Groups
A URL object defines a single URL or IP address, whereas a URL group object can define more than one
URL or address.
When creating URL objects, keep the following points in mind:
• If you do not include a path (that is, there is no / character in the URL), the match is based on the server’s
hostname only. The hostname is considered a match if it comes after the :// separator, or after any dot in
the hostname. For example, ign.com matches ign.com and www.ign.com, but it does not match
verisign.com.
• If you include one or more / character, the entire URL string is used for a substring match, including the
server name, path, and any query parameters. However, we recommend that you do not use manual URL
filtering to block or allow individual web pages or parts of sites, as servers can be reorganized and pages
moved to new paths. Substring matching can also lead to unexpected matches, where the string you
include in the URL object also matches paths on unintended servers or strings within query parameters.
• The system disregards the encryption protocol (HTTP vs HTTPS). In other words, if you block a website,
both HTTP and HTTPS traffic to that website is blocked, unless you use an application condition to
target a specific protocol. When creating a URL object, you do not need to specify the protocol when
creating an object. For example, use example.com rather than http://example.com.
• If you plan to use a URL object to match HTTPS traffic in an access control rule, create the object using
the subject common name in the public key certificate used to encrypt the traffic. Also, the system
disregards subdomains within the subject common name, so do not include subdomain information. For
example, use example.com rather than www.example.com.
However, please understand that the subject common name in the certificate might be completely unrelated
to a web site’s domain name. For example, the subject common name in the certificate for youtube.com
is *.google.com (this of course might change at any time). You will get more consistent results if you
use the SSL Decryption policy to decrypt HTTPS traffic so that URL filtering rules work on decrypted
traffic.
Note URL objects will not match HTTPS traffic if the browser resumes a TLS
session because the certificate information is no longer available. Thus,
even if you carefully configure the URL object, you might get inconsistent
results for HTTPS connections.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create URL objects while editing a URL property by clicking the Create New URL link shown in
the object list.
Procedure
Step 1 Select Objects, then select URL from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
• To create a group, click the Add Group ( ) button.
• To edit an object or group, click the edit icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
95
Objects
Configuring Geolocation Objects
To delete an unreferenced object, click the trash can icon ( ) for the object.
Note To ensure that you are using up-to-date geographical location data to filter your traffic, Cisco strongly
recommends that you regularly update the geolocation database (GeoDB).
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create geolocation objects while editing a network property by clicking the Create New Geolocation
link shown in the object list.
Procedure
Step 1 Select Objects, then select Geolocation from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
96
Objects
Configuring Syslog Servers
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create syslog server objects while editing a syslog server property by clicking the Add Syslog Server
link shown in the object list.
Procedure
Step 1 Select Objects, then select Syslog Servers from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
97
Objects
Configuring AD Identity Realms
Work with your directory administrator to get the values required to configure the directory server properties.
Note If the directory server is not on an attached network or available through the default route, create a static
route for the server. Select Device > Routing > View Configuration to create static routes.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create identity realm objects while editing a realm property by clicking the Create New Identity
Realm link shown in the object list.
Procedure
Step 1 Select Objects, then select Identity Realm from the table of contents.
Step 2 Do one of the following:
• To create a realm, click the + button. You can create at most one realm.
• To edit a realm, click the edit icon ( ) for the realm.
You cannot delete a realm once you create it. To stop using the realm, disable the configured feature that uses
it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
98
Objects
Troubleshooting Directory Server Connections
Note The system generates ldap-login-dn and ldap-login-password from this information. For
example, Administrator@example.com is translated as
cn=administrator,cn=users,dc=example,dc=com. Note that cn=users is always part of this
translation, so you must configure the user you specify here under the common name “users”
folder.
• Base DN—The directory tree for searching or querying user and group information, that is, the common
parent for users and groups. For example, cn=users,dc=example,dc=com. For information on finding the
base DN, see Determining the Directory Base DN, on page 101.
• AD Primary Domain— The fully qualified Active Directory domain name that the device should join.
For example, example.com.
• Trusted CA Certificate—If you select an encryption method, upload a Certificate Authority (CA)
certificate to enable a trusted connection between the system and the directory server. If you are using
a certificate to authenticate, the name of the server in the certificate must match the server Hostname /
IP Address. For example, if you use 10.10.10.250 as the IP address but ad.example.com in the certificate,
the connection fails.
Step 5 Click the Test button to verify the system can contact the server.
The system uses separate processes and interfaces to access the server, so you might get errors indicating that
the connection works for one type of use but not another, for example, available for Identity policies but not
for remote access VPN. If the server cannot be reached, verify that you have the right IP address and host
name, that the DNS server has an entry for the hostname, and so forth. You might need to configure a static
route for the server. For more information, see Troubleshooting Directory Server Connections, on page 99.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
99
Objects
Troubleshooting Directory Server Connections
These processes use different interfaces to communicate with the directory server. You must ensure connectivity
from these interfaces.
• Management interface, for: identity policies.
• Data interface, for: remote access VPN (outside interface).
When you configure the identity realm, use the Test button to verify that the connection can work. Failure
messages should indicate the feature that is having connection problems. The following are the general issues
you might encounter, based on authentication attributes and routing/interface configuration.
Directory user authentication issues.
If the problem is that the system could not log into the directory server because of the username or
password, ensure that the name and password are correct and valid on the directory server. For Active
Directory, the user does not need elevated privileges. You can specify any user in the domain. The
username must be fully qualified; for example, Administrator@example.com (not simply Administrator).
Also, the system generates ldap-login-dn and ldap-login-password from the username and password
information. For example, Administrator@example.com is translated as
cn=administrator,cn=users,dc=example,dc=com. Note that cn=users is always part of this translation, so
you must configure the user you specify here under the common name “users” folder.
The directory server is accessible through a data interface.
If the directory server is on a network that is either directly connected to a data interface (such as a
GigabitEthernet interface), or routeable from a directly-connected network, you must ensure that there
is a route between the virtual management interface and the directory server.
• Using data-interfaces as the management gateway should make routing successful.
• If you have an explicit gateway on the management interface, that gateway router needs to have a
route to the directory server.
• You do not need to configure an IP address on the diagnostic interface, which is the physical
interface used by the virtual management interface. However, if you do configure an address, do
not also configure a static route (such as a default route) that would redirect traffic to the directory
server to the diagnostic interface.
• If there is a router between the directly-connected network and the network that hosts the directory
server, configure a static route for the directory server (Device > Routing).
• Verify that the data interface has the correct IP address and subnet mask.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
100
Objects
Limitations on Number of Users
last name sn
department department
distinguishedname (if department has no value)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
101
Objects
Configuring Certificates
Tip To get the correct bases, consult the administrator who is responsible for the directory servers.
For active directory, you can determine the correct bases by logging into the Active Directory server as domain
administrator, and using the dsquery command at a command prompt as follows to determine the bases:
User search base
Enter the dsquery user command with a known username (partial or complete) to determine the base
distinguished name. For example, the following command uses the partial name “John*” to return
information for all users that start with “John.”
Configuring Certificates
Digital certificates provide digital identification for authentication. A digital certificate includes information
that identifies a device or user, such as the name, serial number, company, department, or IP address. A digital
certificate also includes a copy of the public key for the user or device. Certificates are used for SSL (Secure
Socket Layer), TLS (Transport Layer Security), and DTLS (Datagram TLS) connections, such as HTTPS and
LDAPS.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
102
Objects
Public Key Cryptography
Certificate Authorities (CAs) are trusted authorities that “sign” certificates to verify their authenticity, thereby
guaranteeing the identity of the device or user. CAs issue digital certificates in the context of a PKI, which
uses public-key or private-key encryption to ensure security. A CA can be a trusted third party, such as
VeriSign, or a private (in-house) CA that you establish within your organization. CAs are responsible for
managing certificate requests and issuing digital certificates. For more information, see Public Key
Cryptography, on page 103.
FTD supports X509 certificates in PEM or DER format. Use OpenSSL to generate certificates if needed, or
obtain them from a trusted Certificate Authority.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create certificate objects while editing a certificate property by clicking the Create New Certificate
link shown in the object list.
Procedure
Step 1 Select Objects, then select Certificates from the table of contents.
The system comes with a pre-defined certificate, DefaultInternalCertificate. You can edit and replace the
certificate or use it as is.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
103
Objects
Certificate Types Used by Feature
This process relies on the receiver having a copy of the public key of the sender and a high degree of certainty
that this key belongs to the sender, not to someone pretending to be the sender.
Obtaining the public key of a sender is normally handled externally or through an operation performed at
installation. For example, most web browsers are configured with the root certificates of several CAs by
default.
You can learn more about digital certificates and public key cryptography through openssl.org, Wikipedia,
or other sources. Having a firm understanding of SSL/TLS cryptography will help you establish secure
connections to your device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
104
Objects
Example: Generating an Internal Certificate using OpenSSL
Server Certificate
Click Upload Certificate (or Replace Certificate when editing) and select the server identity certificate
file (for example, *.crt). Alternatively, paste in the server identity certificate. The certificate must be an
X509 certificate in PEM or DER format.
The certificate you paste must include the BEGIN CERTIFICATE and END CERTIFICATE lines. For
example:
-----BEGIN CERTIFICATE-----
MIICMTCCAZoCCQDdUV3NGK/cUjANBgkqhkiG9w0BAQsFADBdMQswCQYDVQQGEwJV
UzETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50ZXJuZXQgV2lkZ2l0
(...5 lines removed...)
shGJDReRYJQqilhHZrYTWZAYTrD7NQPHutK+ZiJng67cPgnNDuXEn55UwMOQoHBp
HMUwmhiGZlzJM8BpX2Js2yQ3ms30pr8rO+gPCPMCAwEAATANBgkqhkiG9w0BAQsF
AAOBgQCB02CebA6YjJCGr2CJZrQSeUwSveRBpmOuoqm98o2Z+5gJM5CkqgfxwCUn
RV7LRfQGFYd76V/5uor4Wx2ZCjqy6+zuQEm4ZxWNSZpA9UBixFXJCs9MBO4qkG5D
vlk3WYJfcgyJ10h4E4b0W2xiixBU+xoOTLRATnbKY36EWAG5cw==
-----END CERTIFICATE-----
Certificate Key
Click Upload Key (or Replace Key when editing) and select the server identity certificate file (for
example, *.key). Alternatively, paste in the key for the server certificate. The key cannot be encrypted.
For example:
Note The OpenSSL commands shown here are examples only. Adjust the parameters to fit your security
requirements.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
105
Objects
Trusted CA Certificate Properties
openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
Because the FDM does not support encrypted keys, try to skip the challenge password by just pressing return
when generating a self signed certificate.
Step 4 Upload the files into the appropriate fields when creating an internal certificate object in the FDM.
You can also copy/paste the file contents. The sample commands create the following files:
• server.crt—Upload or paste the contents into the Server Certificate field.
• server.key—Upload or paste the contents into the Certificate Key field. If you provided a password when
generating the key, you can decrypt it using the following command. The output is sent to stdout, where
you can copy it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
106
Objects
Trusted CA Certificate Properties
The certificate you paste must include the BEGIN CERTIFICATE and END CERTIFICATE lines. For
example:
-----BEGIN CERTIFICATE-----
MIIFgTCCA2mgAwIBAgIJANvdcLnabFGYMA0GCSqGSIb3DQEBCwUAMFcxCzAJBgNV
BAYTAlVTMQswCQYDVQQIDAJUWDEPMA0GA1UEBwwGYXVzdGluMRQwEgYDVQQKDAsx
OTIuMTY4LjEuMTEUMBIGA1UEAwwLMTkyLjE2OC4xLjEwHhcNMTYxMDI3MjIzNDE3
WhcNMTcxMDI3MjIzNDE3WjBXMQswCQYDVQQGEwJVUzELMAkGA1UECAwCVFgxDzAN
BgNVBAcMBmF1c3RpbjEUMBIGA1UECgwLMTkyLjE2OC4xLjExFDASBgNVBAMMCzE5
Mi4xNjguMS4xMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5NceYwtP
ES6Ve+S9z7WLKGX5JlF58AvH82GPkOQdrixn3FZeWLQapTpJZt/vgtAI2FZIK31h
(...20 lines removed...)
hbr6HOgKlOwXbRvOdksTzTEzVUqbgxt5Lwupg3b2ebQhWJz4BZvMsZX9etveEXDh
PY184V3yeSeYjbSCF5rP71fObG9Iu6+u4EfHp/NQv9s9dN5PMffXKieqpuN20Ojv
2b1sfOydf4GMUKLBUMkhQnip6+3W
-----END CERTIFICATE-----
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
107
Objects
Trusted CA Certificate Properties
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
108
PA R T I
The Basics
• Interfaces, on page 111
• Routing, on page 131
CHAPTER 6
Interfaces
The following topics explain how to configure the interfaces on your FTD device.
• About FTD Interfaces, on page 111
• Guidelines and Limitations for Interfaces, on page 114
• Configure a Physical Interface, on page 116
• Configure Bridge Groups, on page 119
• Configure VLAN Subinterfaces and 802.1Q Trunking, on page 122
• Configure Advanced Interface Options, on page 125
• Monitoring Interfaces, on page 128
• Examples for Interfaces, on page 129
Interface Modes
You can configure one of the following modes for each interface:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
111
The Basics
Management/Diagnostic Interface
Routed
Each Layer 3 routed interface requires an IP address on a unique subnet. You would typically attach
these interfaces to switches, a port on another router, or to an ISP/WAN gateway.
BridgeGroupMember
A bridge group is a group of interfaces that the FTD device bridges instead of routes. All interfaces are
on the same network. The bridge group is represented by a Bridge Virtual Interface (BVI) that has an IP
address on the bridge network.
You can route between routed interfaces and BVIs, if you name the BVI. In this case, the BVI acts as
the gateway between member interfaces and routed interfaces. If you do not name the BVI, traffic on
the bridge group member interfaces cannot leave the bridge group. Normally, you would name the
interface so that you can route member interfaces to the internet.
One use for a bridge group in routed mode is to use extra interfaces on the FTD device instead of an
external switch. You can attach endpoints directly to bridge group member interfaces. You can also
attach switches to add more endpoints to the same network as the BVI.
Management/Diagnostic Interface
The physical port labeled Management actually has two separate interfaces associated with it.
• Management virtual interface—This IP address is used for system communication. This is the address
the system uses for Smart Licensing and to retrieve database updates. You can open management sessions
to it (FDM and CLI). You must configure a management address, which is defined on System Settings >
Management Interface.
• Diagnostic virtual interface—You can use this interface to send syslog messages to an external syslog
server. Configuring an IP address for the Diagnostic interface is optional. The main reason to configure
the interface is if you want to use it for syslog messages. This interface appears, and is configurable, on
the Device > Interfaces page. The Diagnostic interface only allows management traffic, and does not
allow through traffic.
One way to configure Management/Diagnostic is to not wire the physical port to a network. Instead, configure
the Management IP address only, and configure it to use the data interfaces as the gateway for obtaining
updates from the internet. Then, open the inside interfaces to HTTPS/SSH traffic (by default, HTTPS is
enabled) and open the FDM using the inside IP address (see Configuring the Management Access List, on
page 327).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
112
The Basics
Limitations for Management/Diagnostic Interface Configuration for a Separate Management Network
IP address and cannot be the in DHCP server pool. For example, if you use 192.168.45.45 as the
management address, and 192.168.45.46-192.168.45.254 as the DHCP pool, you can configure Diagnostic
using any address from 192.168.45.1 to 192.168.45.44.
Security Zones
Each interface can be assigned to a single security zone. You then apply your security policy based on zones.
For example, you can assign the inside interface to the inside zone; and the outside interface to the outside
zone. You can configure your access control policy to enable traffic to go from inside to outside, but not from
outside to inside, for example.
For bridge groups, you add member interfaces to the zones, you cannot add the Bridge Virtual Interface (BVI).
You do not include the Management/Diagnostic interface in a zone. Zones apply to data interfaces only.
You can create security zones on the Objects page.
IPv6 Addressing
You can configure two types of unicast addresses for IPv6:
• Global—The global address is a public address that you can use on the public network. For a bridge
group, you configure the global address on the Bridge Virtual Interface (BVI), not on each member
interface. You cannot specify any of the following as a global address.
• Internally reserved IPv6 addresses: fd00::/56 (from=fd00:: to= fd00:0000:0000:00ff:ffff:ffff:ffff:ffff)
• An unspecified address, such as ::/128
• The loopback address, ::1/128
• multicast addresses, ff00::/8
• Link-local addresses, fe80::/10
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
113
The Basics
Auto-MDI/MDIX Feature
• Link-local—The link-local address is a private address that you can only use on the directly-connected
network. Routers do not forward packets using link-local addresses; they are only for communication
on a particular physical network segment. They can be used for address configuration or for the Network
Discovery functions such as address resolution and neighbor discovery. In a bridge group, enabling IPv6
on the BVI automatically configures link-local addresses for each bridge group member interface. Each
interface must have its own address because the link-local address is only available on a segment, and
is tied to the interface MAC address.
At a minimum, you need to configure a link-local address for IPv6 to operate. If you configure a global address,
a link-local address is automatically configured on the interface, so you do not also need to specifically
configure a link-local address. If you do not configure a global address, then you need to configure the link-local
address, either automatically or manually.
Auto-MDI/MDIX Feature
For RJ-45 interfaces, the default auto-negotiation setting also includes the Auto-MDI/MDIX feature.
Auto-MDI/MDIX eliminates the need for crossover cabling by performing an internal crossover when a
straight cable is detected during the auto-negotiation phase. Either the speed or duplex must be set to
auto-negotiate to enable Auto-MDI/MDIX for the interface. If you explicitly set both the speed and duplex
to a fixed value, thus disabling auto-negotiation for both settings, then Auto-MDI/MDIX is also disabled. For
Gigabit Ethernet, when the speed and duplex are set to 1000 and full, then the interface always auto-negotiates;
therefore Auto-MDI/MDIX is always enabled and you cannot disable it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
114
The Basics
Maximum Number of VLAN Subinterfaces by Device Model
• For the ASA 5512-X, 5515-X, 5525-X, 5545-X, and 5555-X, you can install an optional network interface
module. Modules are only discovered during bootstrap (that is, during installation, when switching
between local/remote management, and during a major/minor release upgrade, but not patch or hot fix
upgrades). For a module that includes SFP interfaces, the FDM sets the speed and duplex to auto; however,
the SFP interfaces do not support the speed and duplex set to auto. For these interfaces, select the right
speed (for example, 1000), or select Default for the speed and duplex. The Default setting tells FDM to
simply not configure the options, and thus leave them at their default settings (any existing configuration
is not cleared). Please refer to the network module documentation to determine the maximum speed
supported by the interface. You can also select No Negotiate for the speed setting if the interface accepts
it, but select this option only if you are certain it is supported.
Note If you make a mistake and need to unconfigure No Negotiate, set the option
to Auto and deploy. The deployment will fail. You can then set the option
to Default and deploy again, and this should result in a successful
deployment.
ASA 5506-X 30
ASA 5506W-X
ASA 5506H-X
ASA 5508-X 50
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
115
The Basics
Configure a Physical Interface
Procedure
Step 1 Click Device, then click the link in the Interfaces summary.
The interface list shows the available interfaces, their names, addresses, and states.
Step 2 Click the edit icon ( ) for the physical interface you want to edit.
Step 3 Set the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
116
The Basics
Configure a Physical Interface
Set the name for the interface, up to 48 characters. Alphabetic characters must be lower case. For example,
inside or outside. Without a name, the rest of the interface configuration is ignored. Unless you configure
subinterfaces, the interface should have a name.
Note If you change the name, the change is automatically reflected everywhere you used the old
name, including security zones, syslog server objects, and DHCP server definitions. However,
you cannot remove the name until you first remove all configurations that use the name, because
you typically cannot use an unnamed interface for any policy or setting.
Step 4 Click the IPv4 Address tab and configure the IPv4 address.
Select one of the following options from the Type field:
• DHCP—Choose this option if the address should be obtained from the DHCP server on the network.
Change the following options if necessary:
• Route Metric—If you obtain the default route from the DHCP server, the administrative distance
to the learned route, between 1 and 255. The default is 1.
• Obtain Default Route—Whether to get the default route from the DHCP server. You would
normally select this option, which is the default.
• Static—Choose this option if you want to assign an address that should not change. Type in the interface's
IP address and the subnet mask for the network attached to the interface. For example, if you attach the
10.100.10.0/24 network, you could enter 10.100.10.1/24. Ensure that the address is not already used on
the network.
Note For an existing interface, your ability to change the address is constrained if you have a DHCP
server configured for the interface. The new IP address must be on the same subnet as the
DHCP address pool, and it cannot be part of that pool. If you need to configure an address on
a different subnet, first delete the DHCP server configuration. See Configuring the DHCP
Server, on page 330.
Step 5 (Optional.) Click the IPv6 Address tab and configure the IPv6 address.
• State—To enable IPv6 processing and to automatically configure the link-local address when you do
not configure the global address, select Enabled. The link local address is generated based on the interface
MAC addresses (Modified EUI-64 format).
Note Disabling IPv6 does not disable IPv6 processing on an interface that is configured with an
explicit IPv6 address or that is enabled for autoconfiguration.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
117
The Basics
Configure a Physical Interface
• Address Auto Configuration—Select this option to have the address automatically configured. IPv6
stateless autoconfiguration will generate a global IPv6 address only if the link on which the device resides
has a router configured to provide IPv6 services, including the advertisement of an IPv6 global prefix
for use on the link. If IPv6 routing services are not available on the link, you will get a link-local IPv6
address only, which you cannot access outside of the device's immediate network link. The link local
address is based on the Modified EUI-64 interface ID.
Although RFC 4862 specifies that hosts configured for stateless autoconfiguration do not send Router
Advertisement messages, the FTD device does send Router Advertisement messages in this case. Select
Suppress RA to suppress messages and conform to the RFC.
• Static Address/Prefix—If you do not use stateless autoconfiguration, enter the full static global IPv6
address and network prefix. For example, 2001:0DB8::BA98:0:3210/48. For more information on IPv6
addressing, see IPv6 Addressing, on page 113.
If you want to use the address as link local only, select the Link - Local option. Link local addresses are
not accessible outside the local network. You cannot configure a link-local address on a bridge group
interface.
Note A link-local address should start with FE8, FE9, FEA, or FEB, for example
fe80::20d:88ff:feee:6a82. Note that we recommend automatically assigning the link-local
address based on the Modified EUI-64 format. For example, if other devices enforce the use
of the Modified EUI-64 format, then a manually-assigned link-local address may cause packets
to be dropped.
• Suppress RA—Whether to suppress router advertisements. The FTD can participate in router
advertisements so that neighboring devices can dynamically learn a default router address. By default,
router advertisement messages (ICMPv6 Type 134) are periodically sent out each IPv6 configured
interface.
Router advertisements are also sent in response to router solicitation messages (ICMPv6 Type 133).
Router solicitation messages are sent by hosts at system startup so that the host can immediately
autoconfigure without needing to wait for the next scheduled router advertisement message.
You might want to suppress these messages on any interface for which you do not want the FTD device
to supply the IPv6 prefix (for example, the outside interface).
What to do next
• Add the interfaces to the appropriate security zones. See Configuring Security Zones, on page 92.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
118
The Basics
Configure Bridge Groups
Procedure
Step 1 Click Device, then click the link in the Interfaces summary.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
119
The Basics
Configure Bridge Groups
The interface list shows the available interfaces, their names, addresses, and states. If there is already a bridge
group, it is a folder. Click the open/close arrow to view the member interfaces. Member interfaces also appear
separately in the list.
• Click the delete icon ( ) for the bridge group if you no longer need it. When you delete a bridge group,
its members become standard routed interfaces, and any NAT rules or security zone membership are
retained. You can edit the interfaces to give them IP addresses. If you want to add them to a new bridge
group, first you need to remove the NAT rules and remove the interface from its security zone.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
120
The Basics
Configure Bridge Groups
Note If you change the name, the change is automatically reflected everywhere you used the old
name, including security zones, syslog server objects, and DHCP server definitions. However,
you cannot remove the name until you first remove all configurations that use the name, because
you typically cannot use an unnamed interface for any policy or setting.
• Add an interface—Click the plus icon ( ) , click one or more interfaces, and then click OK.
• Remove an interface—Mouse over an interface and click the x on the right side.
Step 4 Click the IPv4 Address tab and configure the IPv4 address.
Select one of the following options from the Type field:
• Static—Choose this option if you want to assign an address that should not change. Type in the bridge
group's IP address and the subnet mask. All attached endpoints will be on this network. For models with
a pre-configured bridge group, the default for the BVI1 “inside” network is 192.168.1.1/24 (i.e.
255.255.255.0). Ensure that the address is not already used on the network.
Note For an existing bridge group, your ability to change the address is constrained if you have a
DHCP server configured for the group. The new IP address must be on the same subnet as the
DHCP address pool, and it cannot be part of that pool. If you need to configure an address on
a different subnet, first delete the DHCP server configuration. See Configuring the DHCP
Server, on page 330.
• Dynamic (DHCP)—Choose this option if the address should be obtained from the DHCP server on the
network. This is not the typical option for bridge groups, but you can configure it if needed. Change the
following options if necessary:
• Route Metric—If you obtain the default route from the DHCP server, the administrative distance
to the learned route, between 1 and 255. The default is 1.
• Obtain Default Route—Whether to get the default route from the DHCP server. You would
normally select this option, which is the default.
Step 5 (Optional.) Click the IPv6 Address tab and configure the IPv6 address.
• State—To enable IPv6 processing and to automatically configure the link-local address when you do
not configure the global address, select Enabled. The link local address is generated based on the interface
MAC addresses (Modified EUI-64 format).
Note Disabling IPv6 does not disable IPv6 processing on an interface that is configured with an
explicit IPv6 address or that is enabled for autoconfiguration.
• Static Address/Prefix—If you do not use stateless autoconfiguration, enter the full static global IPv6
address and network prefix. For example, 2001:0DB8::BA98:0:3210/48. For more information on IPv6
addressing, see IPv6 Addressing, on page 113.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
121
The Basics
Configure VLAN Subinterfaces and 802.1Q Trunking
If you want to use the address as link local only, select the Link - Local option. Link local addresses are
not accessible outside the local network. You cannot configure a link-local address on a bridge group
interface.
Note A link-local address should start with FE8, FE9, FEA, or FEB, for example
fe80::20d:88ff:feee:6a82. Note that we recommend automatically assigning the link-local
address based on the Modified EUI-64 format. For example, if other devices enforce the use
of the Modified EUI-64 format, then a manually-assigned link-local address may cause packets
to be dropped.
• Suppress RA—Whether to suppress router advertisements. The FTD device can participate in router
advertisements so that neighboring devices can dynamically learn a default router address. By default,
router advertisement messages (ICMPv6 Type 134) are periodically sent out each IPv6 configured
interface.
Router advertisements are also sent in response to router solicitation messages (ICMPv6 Type 133).
Router solicitation messages are sent by hosts at system startup so that the host can immediately
autoconfigure without needing to wait for the next scheduled router advertisement message.
You might want to suppress these messages on any interface for which you do not want the FTD device
to supply the IPv6 prefix (for example, the outside interface).
What to do next
• Ensure that all member interfaces that you intend to use are enabled.
• Configure a DHCP server for the bridge group. See Configuring the DHCP Server, on page 330.
• Add the member interfaces to the appropriate security zones. See Configuring Security Zones, on page
92.
• Ensure that policies, such as identity, NAT, and access, supply the required services for the bridge group
and member interfaces.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
122
The Basics
Configure VLAN Subinterfaces and 802.1Q Trunking
Create subinterfaces if you attach the physical interface to a trunk port on a switch. Create a subinterface for
each VLAN that can appear on the switch trunk port. If you attach the physical interface to an access port on
the switch, there is no point in creating a subinterface.
Guidelines and Limitations
• Preventing untagged packets on the physical interface—If you use subinterfaces, you typically do not
also want the physical interface to pass traffic, because the physical interface passes untagged packets.
Because the physical interface must be enabled for the subinterface to pass traffic, ensure that the physical
interface does not pass traffic by not naming the interface. If you want to let the physical interface pass
untagged packets, you can name the interface as usual.
• You cannot configure IP addresses on bridge group member interfaces, although you can modify advanced
settings as needed.
• All subinterfaces on the same parent interface must be either bridge group members or routed interfaces;
you cannot mix and match.
• FTD does not support the Dynamic Trunking Protocol (DTP), so you must configure the connected
switch port to trunk unconditionally.
• You might want to assign unique MAC addresses to subinterfaces defined on the FTD device, because
they use the same burned-in MAC address of the parent interface. For example, your service provider
might perform access control based on the MAC address. Also, because IPv6 link-local addresses are
generated based on the MAC address, assigning unique MAC addresses to subinterfaces allows for unique
IPv6 link-local addresses, which can avoid traffic disruption in certain instances on the FTD device.
Procedure
Step 1 Click Device, then click the link in the Interfaces summary.
The interface list shows the available interfaces, their names, addresses, and states.
If you no longer need a subinterface, click the delete icon ( ) for the subinterface to delete it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
123
The Basics
Configure VLAN Subinterfaces and 802.1Q Trunking
Note If you change the name, the change is automatically reflected everywhere you used the old
name, including security zones, syslog server objects, and DHCP server definitions. However,
you cannot remove the name until you first remove all configurations that use the name, because
you typically cannot use an unnamed interface for any policy or setting.
Step 5 Click the IPv4 Address tab and configure the IPv4 address.
Select one of the following options from the Type field:
• DHCP—Choose this option if the address should be obtained from the DHCP server on the network.
Change the following options if necessary:
• Route Metric—If you obtain the default route from the DHCP server, the administrative distance
to the learned route, between 1 and 255. The default is 1.
• Obtain Default Route—Whether to get the default route from the DHCP server. You would
normally select this option, which is the default.
• Static—Choose this option if you want to assign an address that should not change. Type in the interface's
IP address and the subnet mask for the network attached to the interface. For example, if you attach the
10.100.10.0/24 network, you could enter 10.100.10.1/24. Ensure that the address is not already used on
the network.
Note For an existing interface, your ability to change the address is constrained if you have a DHCP
server configured for the interface. The new IP address must be on the same subnet as the
DHCP address pool, and it cannot be part of that pool. If you need to configure an address on
a different subnet, first delete the DHCP server configuration. See Configuring the DHCP
Server, on page 330.
Step 6 (Optional.) Click the IPv6 Address tab and configure the IPv6 address.
• State—To enable IPv6 processing and to automatically configure the link-local address when you do
not configure the global address, select Enabled. The link local address is generated based on the interface
MAC addresses (Modified EUI-64 format).
Note Disabling IPv6 does not disable IPv6 processing on an interface that is configured with an
explicit IPv6 address or that is enabled for autoconfiguration.
• Address Auto Configuration—Select this option to have the address automatically configured. IPv6
stateless autoconfiguration will generate a global IPv6 address only if the link on which the device resides
has a router configured to provide IPv6 services, including the advertisement of an IPv6 global prefix
for use on the link. If IPv6 routing services are not available on the link, you will get a link-local IPv6
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
124
The Basics
Configure Advanced Interface Options
address only, which you cannot access outside of the device's immediate network link. The link local
address is based on the Modified EUI-64 interface ID.
Although RFC 4862 specifies that hosts configured for stateless autoconfiguration do not send Router
Advertisement messages, the FTD device does send Router Advertisement messages in this case. Select
Suppress RA to suppress messages and conform to the RFC.
• Static Address/Prefix—If you do not use stateless autoconfiguration, enter the full static global IPv6
address and network prefix. For example, 2001:0DB8::BA98:0:3210/48. For more information on IPv6
addressing, see IPv6 Addressing, on page 113.
If you want to use the address as link local only, select the Link - Local option. Link local addresses are
not accessible outside the local network. You cannot configure a link-local address on a bridge group
interface.
Note A link-local address should start with FE8, FE9, FEA, or FEB, for example
fe80::20d:88ff:feee:6a82. Note that we recommend automatically assigning the link-local
address based on the Modified EUI-64 format. For example, if other devices enforce the use
of the Modified EUI-64 format, then a manually-assigned link-local address may cause packets
to be dropped.
• Suppress RA—Whether to suppress router advertisements. The FTD can participate in router
advertisements so that neighboring devices can dynamically learn a default router address. By default,
router advertisement messages (ICMPv6 Type 134) are periodically sent out each IPv6 configured
interface.
Router advertisements are also sent in response to router solicitation messages (ICMPv6 Type 133).
Router solicitation messages are sent by hosts at system startup so that the host can immediately
autoconfigure without needing to wait for the next scheduled router advertisement message.
You might want to suppress these messages on any interface for which you do not want the FTD device
to supply the IPv6 prefix (for example, the outside interface).
What to do next
• Add the subinterfaces to the appropriate security zones. See Configuring Security Zones, on page 92.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
125
The Basics
About the MTU
Note The FTD device can receive frames larger than the configured MTU as long as there is room in memory.
Note Increasing the MTU assigns more memory for jumbo frames, which might
limit the maximum usage of other features, such as access rules. If you
increase the MTU above the default 1500 on ASA 5500-X series devices ,
you must reboot the system. You do not need to reboot other models, where
jumbo frame support is always enabled.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
126
The Basics
Configure Advanced Options
The following procedure assumes the interface is already defined. You can also edit these settings while
initially editing or creating the interface.
Limitations
• For bridge groups, you configure most of these options on the member interfaces. Except for DAD
attempts, these options are not available for the Bridge Virtual Interface (BVI).
• You cannot set MTU, duplex, or speed for the Management interface on a Firepower 2100 device.
Procedure
Step 1 Click Device, then click the link in the Interfaces summary.
The interface list shows the available interfaces, their names, addresses, and states.
Step 2 Click the edit icon ( ) for the interface you want to edit.
Step 3 Click Advanced Options.
Step 4 To make a data interface management only, select Management Only.
A management only interface does not allow through traffic, so there is very little value in setting a data
interface as management only. You cannot change this setting for the Management/Diagnostic interface, which
is always management only.
Step 5 Change the MTU (maximum transmission unit) to the desired value.
The default MTU is 1500 bytes. The minimum and maximum depend on your platform. Set a high value if
you typically see jumbo frames on your network.
Note If you increase MTU above 1500 on ASA 5500-X series devices, , you must reboot the device. You
do not need to reboot other models, where jumbo frame support is always enabled.
Step 6 (Physical interface only.) Modify the speed and duplex settings.
The default is that the interface negotiates the best duplex and speed with the interface at the other end of the
wire, but you can force a specific duplex or speed if necessary. Before setting these options for interfaces on
a network module, please read Limitations for Interface Configuration, on page 114.
• Duplex—Choose Auto, Half or Full. SFP interfaces only support Full duplex.
• Speed—Choose a speed (varies depending on the model), or Auto.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
127
The Basics
Monitoring Interfaces
duplicate address is a global address, the address is not used. The interface uses neighbor solicitation
messages to perform Duplicate Address Detection. Set the value to 0 to disable duplicate address detection
(DAD) processing.
Monitoring Interfaces
You can view some basic information about interfaces in the following areas:
• Device. Use the port graphic to monitor the current state of the interfaces. Mouse over a port to see its
IP addresses and enabled and link statuses. The IP addresses can be statically assigned or obtained using
DHCP.
Interface ports use the following color coding:
• Green—The interface is configured, enabled, and the link is up.
• Gray—The interface is not enabled.
• Orange/Red—The interface is configured and enabled, but the link is down. If the interface is wired,
this is an error condition that needs correction. If the interface is not wired, this is the expected
status.
• Monitoring > System. The Throughput dashboard shows information on traffic flowing through the
system. You can view information on all interfaces, or you can select a specific interface to examine.
• Monitoring > Ingress Zones and Egress Zones. These dashboards show statistics based on zones, which
are composed of interfaces. You can drill into this information for more detail.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
128
The Basics
Examples for Interfaces
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
129
The Basics
Examples for Interfaces
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
130
CHAPTER 7
Routing
The system uses a routing table to determine the egress interface for packets entering the system. The following
topics explain routing basics and how to configure routing on the device.
• Routing Overview, on page 131
• Static Routes, on page 133
• Monitoring Routing, on page 135
Routing Overview
The following topics describe how routing behaves within the FTD device. Routing is the act of moving
information across a network from a source to a destination. Along the way, at least one intermediate node is
typically encountered. Routing involves two basic activities: determining optimal routing paths and transporting
packets through a network.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
131
The Basics
Routing Table for Management Traffic
• If the destination matches more than one entry in the routing table, then the packet is forwarded out of
the interface associated with the route that has the longer network prefix length.
For example, a packet destined for 192.168.32.1 arrives on an interface with the following routes in the routing
table:
• 192.168.32.0/24 gateway 10.1.1.2
• 192.168.32.0/19 gateway 10.1.1.3
In this case, a packet destined to 192.168.32.1 is directed toward 10.1.1.2, because 192.168.32.1 falls within
the 192.168.32.0/24 network. It also falls within the other route in the routing table, but 192.168.32.0/24 has
the longest prefix within the routing table (24 bits verses 19 bits). Longer prefixes are always preferred over
shorter ones when forwarding a packet.
Note Existing connections continue to use their established interfaces even if a new similar connection would
result in different behavior due to a change in routes.
Note The Management virtual interface uses its own Linux routing table that is not part of the FTD route
lookup. Traffic originating on the Management interface includes the FDM management sessions,
licensing communication, and database updates. The Diagnostic logical interface, on the other hand,
uses the management-only routing table described in this section.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
132
The Basics
Equal-Cost Multi-Path (ECMP) Routing
In this case, traffic is load-balanced on the outside interface between 10.1.1.2, 10.1.1.3, and 10.1.1.4. Traffic
is distributed among the specified gateways based on an algorithm that hashes the source and destination IP
addresses, incoming interface, protocol, source and destination ports.
Static Routes
You can create static routes to provide basic routing for your network.
Default Route
The simplest option is to configure a default static route to send all traffic to an upstream router, relying on
the router to route the traffic for you. A default route identifies the gateway IP address to which the FTD
device sends all IP packets for which it does not have a learned or static route. A default static route is simply
a static route with 0.0.0.0/0 (IPv4) or ::/0 (IPv6) as the destination IP address.
You should always define a default route.
Because the FTD device uses separate routing tables for data traffic and for management traffic, you can
optionally configure a default route for data traffic and another default route for management traffic. Note
that from-the-device traffic uses either the management-only or data routing table by default depending on
the type, but will fall back to the other routing table if a route is not found. Default routes will always match
traffic, and will prevent a fall back to the other routing table. In this case, you must specify the interface you
want to use for egress traffic if that interface is not in the default routing table. The Diagnostic interface is
included in the management-only table. The special Management interface uses a separate Linux routing table,
and has its own default route.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
133
The Basics
Static Routes
Static Routes
You might want to use static routes in the following cases:
• Your networks use an unsupported router discovery protocol.
• Your network is small and you can easily manage static routes.
• You do not want the traffic or CPU overhead associated with routing protocols.
• In some cases, a default route is not enough. The default gateway might not be able to reach the destination
network, so you must also configure more specific static routes. For example, if the default gateway is
outside, then the default route cannot direct traffic to any inside networks that are not directly connected
to the FTD device.
• You are using a feature that does not support dynamic routing protocols.
Procedure
Step 1 Click Device, then click the link in the Routing summary.
Step 2 On the Static Routing page, do one of the following:
• To add a new route, click +.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
134
The Basics
Monitoring Routing
• Click the edit icon ( ) for the route you want to edit.
If you no longer need a route, click the trash can icon for the route to delete it.
Monitoring Routing
To monitor and troubleshoot routing, log into the device CLI and use the following commands.
• show route displays the routing table for the data interfaces, including routes for directly-connected
networks.
• show ipv6 route displays the IPv6 routing table for the data interfaces, including routes for
directly-connected networks.
• show network displays the configuration for the virtual Management interface, including the management
gateway. Routing through the virtual Management interface is not handled by the data interface routing
table, unless you specify data-interfaces as the management gateway.
• show network-static-routes displays static routes configured for the virtual Management interface using
the configure network static-routes command. Normally, there will not be any static routes, as the
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
135
The Basics
Monitoring Routing
management gateway suffices for management routing in most cases. These routes are not available to
traffic on the data interfaces. This command is not available in the CLI console.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
136
PA R T II
Security Policies
• Identity Policies, on page 139
• Access Control, on page 149
• Network Address Translation (NAT), on page 171
CHAPTER 8
Identity Policies
You can use identity policies to collect user identity information from connections. You can then view usage
based on user identity in the dashboards, and configure access control based on user or user group.
• Identity Policy Overview, on page 139
• Configuring Identity Policies, on page 140
• Enabling Transparent User Authentication, on page 145
• Monitoring Identity Policies, on page 147
• Examples for Identity Policies, on page 148
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
139
Security Policies
Dealing with Unknown Users
Note You can check whether new or deleted user information is on the system by going to Policies > Access
Control, clicking the Add Rule (+) button, and looking at the list of users on the Users tab. If you
cannot find a new user, or you can find a deleted user, then the system has old information.
Procedure
• To change the identity policy settings, click the Identity Policy Configuration button ( ).
• To move a rule, edit it and select the new location from the Order drop-down list.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
140
Security Policies
Configure Identity Policy Settings
• To configure rules:
• To create a new rule, click the + button.
• To edit an existing rule, click the edit icon ( ) for the rule (in the Actions column). You can also
selectively edit a rule property by clicking on the property in the table.
• To delete a rule you no longer need, click the delete icon ( ) for the rule (in the Actions column).
For more information on creating and editing identity rules, see Configure Identity Rules, on page 142.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
141
Security Policies
Configure Identity Rules
Note For the HTTP Basic, HTTP Response Page, and NTLM authentication methods, the user is
redirected to the captive portal using the IP address of the interface. However, for HTTP
Negotiate, the user is redirected using the fully-qualified DNS name
firewall-hostname.AD-domain-name. If you want to use HTTP Negotiate, you must also update
your DNS server to map this name to the IP addresses of all inside interfaces where you are
requiring active authentication. Otherwise, the redirection cannot complete, and users cannot
authenticate.
Note Also keep in mind that a failure to authentication has no impact on network access. Identity policies
collect user identity information only. You must use access rules if you want to prevent users who failed
to authenticate from accessing the network.
Procedure
To delete a rule you no longer need, click the delete icon ( ) for the rule.
Step 3 In Order, select where you want to insert the rule in the ordered list of rules.
Rules are applied on a first-match basis, so you must ensure that rules with highly specific traffic matching
criteria appear above policies that have more general criteria that would otherwise apply to the matching
traffic.
The default is to add the rule to the end of the list. If you want to change a rule's location later, edit this option.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
142
Security Policies
Configure Identity Rules
• Active—Use active authentication to determine user identity. Active authentication is applied to HTTP
traffic only. If any other type of traffic matches an identity policy that requires or allows active
authentication, then active authentication will not be attempted.
• No Auth—Do not obtain user identity. Identity-based access rules will not be applied to this traffic.
These users are marked as No Authentication Required.
Step 5 (Active Authentication only.) Select the authentication method (Type) supported by your directory server.
• HTTP Basic—Authenticate users using an unencrypted HTTP Basic Authentication (BA) connection.
Users log in to the network using their browser's default authentication popup window. This is the default.
• NTLM—Authenticate users using an NT LAN Manager (NTLM) connection. This selection is only
available when you select an AD realm. Users log in to the network using their browser's default
authentication popup window, although you can configure IE and Firefox browsers to transparently
authenticate using their Windows domain login (see Enabling Transparent User Authentication, on page
145).
• HTTP Negotiate—Allow the device to negotiate the method between the user agent (the application
the user is using to initiate the traffic flow) and the Active Directory server. Negotiation results in the
strongest commonly supported method being used, in order, NTLM, then basic. Users log in to the
network using their browser's default authentication popup window.
• HTTP Response Page—Prompt users to authenticate using a system-provided web page. This is a form
of HTTP Basic authentication.
Note For the HTTP Basic, HTTP Response Page, and NTLM authentication methods, the user is redirected
to the captive portal using the IP address of the interface. However, for HTTP Negotiate, the user
is redirected using the fully-qualified DNS name firewall-hostname.AD-domain-name. If you want
to use HTTP Negotiate, you must also update your DNS server to map this name to the IP addresses
of all inside interfaces where you are requiring active authentication. Otherwise, the redirection
cannot complete, and users cannot authenticate.
Step 6 (Active authentication only.) Select Fall Back as Guest > On/Off to determine whether users who fail active
authentication are labeled as Guest users.
Users get 3 chances to successfully authenticate. If they fail, your selection for this option determines how
the user is marked. You can write access rules based on these values.
• Fall Back as Guest > On—Users are marked as Guest.
• Fall Back as Guest > Off—Users are marked as Failed Authentication.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
143
Security Policies
Configure Identity Rules
Use this criteria when the rule should apply based on where the traffic enters or exits the device. For example,
if you want to ensure that user identity is collected from all traffic originating from inside networks, select an
inside zone as the Source Zones while leaving the destination zone empty.
Source Networks, Destination Networks
The network objects or geographical locations that define the network addresses or locations of the traffic.
• To match traffic from an IP address or geographical location, configure the Source Networks.
• To match traffic to an IP address or geographical location, configure the Destination Networks.
• If you add both source and destination network conditions to a rule, matching traffic must originate from
one of the specified IP addresses and be destined for one of the destination IP addresses.
When you add this criteria, you select from the following tabs:
• Network—Select the network objects or groups that define the source or destination IP addresses for
the traffic you want to control.
• Geolocation—Select the geographical location to control traffic based on its source or destination country
or continent. Selecting a continent selects all countries within the continent. Besides selecting geographical
location directly in the rule, you can also select a geolocation object that you created to define the location.
Using geographical location, you could easily restrict access to a particular country without needing to
know all of the potential IP addresses used there.
Note To ensure you are using up-to-date geographical location data to filter your traffic, Cisco
strongly recommends that you regularly update the geolocation database (GeoDB).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
144
Security Policies
Enabling Transparent User Authentication
Tip Not all browsers support integrated Windows authentication, such as Chrome and Safari (based on the
versions available when this was written). Users will be prompted for username and password. Consult
the browser’s documentation to determine if support is available in the version you use.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
145
Security Policies
Configuring Internet Explorer for Transparent Authentication
Regardless of browser or user agent, you must implement the following general configuration:
• Add the FTD interface through which users connect to the network to the Trusted Sites list. You can use
the IP address or if available, the fully-qualified domain name (for example, inside.example.com). You
can also use wildcards or partial addresses to create a generalized trusted site. For example, you can
typically cover all internal sites using *.example.com or simply example.com, trusting all servers in your
network (use your own domain name). If you add the specific address of the interface, you might need
to add several addresses to the trusted sites to account for all user access points to the network.
• Integrated Windows authentication does not work through a proxy server. Therefore, you must either
not use a proxy, or you must add the FTD interface to the addresses excluded from going through the
proxy. If you decide that you must use a proxy, users will be prompted for authentication even if you
use NTLM.
Tip Configuring transparent authentication is not a requirement, but a convenience to end users. If you do
not configure transparent authentication, users are presented with a login challenge for all authentication
methods.
Procedure
c) Click Advanced to open the Local Intranet Sites dialog box, then paste the URL you want to trust into
the Add Site box and click Add.
Repeat the process if you have more than one URL. Use wildcards to specify a partial URL, such as
http://*.example.com or simply *.example.com.
Close the dialog boxes to return to the Internet Options dialog box.
d) With Local Intranet still selected, click Custom Level to open the Security Settings dialog box. Find
the User Authentication > Logon setting and select Automatic logon only in Intranet zone. Click OK.
Step 3 In the Internet Options dialog box, click the Connections tab, then click LAN Settings.
If Use a proxy server for your LAN is selected, you need to ensure that the FTD interface bypasses the
proxy. Do any of the following as appropriate:
• Select Bypass proxy server for local addresses.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
146
Security Policies
Configuring Firefox for Transparent Authentication
• Click Advanced and enter the address into the Do not use proxy server for addresses beginning with
box. You can use wildcards, for example, *.example.com.
Procedure
Step 1 Open about:config. Use the filter bar to help you locate the preferences that you need to modify.
Step 2 To support NTLM, modify the following preferences (filter on network.automatic):
• network.automatic-ntlm-auth.trusted-uris—Double-click the preference, enter the URL, and click
OK. You can enter multiple URLs by separating them with commas; including the protocol is optional.
For example:
You can also use partial URLs. Firefox matches the end of the string, not a random substring. Thus, you
could include your entire internal network by specifying just your domain name. For example:
example.com
Step 3 Check the HTTP proxy settings. You can find these by selecting Tools > Options, then click the Network
tab in the Options dialog box. Click the Settings button in the Connection group.
• If No Proxy is selected, there is nothing to configure.
• If Use System Proxy Settings is selected, you need to modify the network.proxy.no_proxies_on
property in about:config to add the trusted URIs you included in
network.automatic-ntlm-auth.trusted-uris.
• If Manual Proxy Configuration is selected, update the No Proxy For list to include these trusted URIs.
• If one of the other options is selected, ensure that the properties used for those configurations exclude
the same trusted URIs.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
147
Security Policies
Examples for Identity Policies
If you do not see any user information, verify that the directory server is functioning correctly. Use the Test
button in the directory server configuration dialog box to verify connectivity.
If the directory server is functioning and usable, verify that the traffic matching criteria on the identity rules
that require active authentication are written in a way that will match your users. For example, ensure that the
source zone contains the interfaces through which your user traffic will enter the device. The active
authentication identity rules match HTTP traffic only, so users must be sending that type of traffic through
the device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
148
CHAPTER 9
Access Control
The following topics explain access control rules. These rules control which traffic is allowed to pass through
the device, and apply advanced services to the traffic, such as intrusion inspection.
• Access Control Overview, on page 149
• License Requirements for Access Control, on page 156
• Guidelines and Limitations for Access Control Policies, on page 157
• Configuring the Access Control Policy, on page 158
• Monitoring Access Control Policies, on page 168
• Examples for Access Control, on page 169
For unencrypted traffic that you allow, you can apply IPS inspection to check for threats and block traffic that
appears to be an attack. You can also use file policies to check for prohibited files or malware.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
149
Security Policies
Application Filtering
Any traffic that does not match an access rule is handled by the access control Default Action. If you allow
traffic by default, you can apply intrusion inspection to the traffic. However, you cannot perform file or
malware inspection on traffic handled by the default action.
Application Filtering
You can use access control rules to filter traffic based on the application used in the connection. The system
can recognize a wide variety of applications, so that you do not need to figure out how to block one web
application without blocking all web applications.
For some popular applications, you can filter on different aspects of the application. For example, you could
create a rule that blocks Facebook Games without blocking all of Facebook.
You can also create rules based on general application characteristics, blocking or allowing entire groups of
applications by selecting risk or business relevance, type, category, or tag. However, as you select categories
in an application filter, look over the list of matching applications to ensure you are not including
unintended applications. For a detailed explanation of the possible groupings, see Application Criteria, on
page 162.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
150
Security Policies
URL Filtering
• The system can detect multiple types of Skype application traffic. To control Skype traffic, choose the
Skype tag from the Application Filters list rather than selecting individual applications. This ensures that
the system can detect and control all Skype traffic the same way.
• To control access to Zoho mail, select both the Zoho and Zoho Mail applications.
URL Filtering
You can use access control rules to filter traffic based on the URL used in an HTTP or HTTPS connection.
Note that URL filtering for HTTP is more straight-forward than it is for HTTPS, because HTTPS is encrypted.
You can use the following techniques to implement URL filtering.
• Category and reputation-based URL filtering—With a URL filtering license, you can control access to
web sites based on the URL’s general classification (category) and risk level (reputation). This is by far
the easiest and most effective way to block unwanted sites.
• Manual URL filtering—With any license, you can manually specify individual URLs, and groups of
URLs, to achieve granular, custom control over web traffic. The main purpose of manual filtering is to
create exceptions to category-based block rules, but you can use manual rules for other purposes.
URL categories and reputations help you quickly configure URL filtering. For example, you can use access
control to block high risk URLs in the Abused Drugs category.
Using category and reputation data also simplifies policy creation and administration. Sites that represent
security threats, or that serve undesirable content, might appear and disappear faster than you can update and
deploy new policies. As Cisco updates the URL database with new sites, changed classifications, and changed
reputations, your rules automatically adjust to the new information. You do not need to edit your rules to
account for new sites.
If you enable regular URL database updates, you can ensure that the system uses up-to-date information for
URL filtering. You can also enable communications with Cisco Collective Security Intelligence (CSI) to
obtain the latest threat intelligence for URLs with unknown category and reputation. For more information,
see Configuring URL Filtering Preferences, on page 335.
Note To see URL category and reputation information in events and application details, you must create at
least one rule with a URL condition.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
151
Security Policies
Looking Up the Category and Reputation for a URL
Note URL objects will not match HTTPS traffic if the browser resumes a TLS
session because the certificate information is no longer available. Thus,
even if you carefully configure the URL object, you might get inconsistent
results for HTTPS connections.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
152
Security Policies
Filtering HTTPS Traffic
Note URL objects will not match HTTPS traffic if the browser resumes a TLS session because the certificate
information is no longer available. Thus, even if you carefully configure the URL object, you might get
inconsistent results for HTTPS connections.
To configure a rule that matches only HTTP or HTTPS traffic, but not both, either specify the TCP port in
the Destination condition or add an application condition to the rule. For example, you could allow HTTPS
access to a site while disallowing HTTP access by constructing two access control rules, each with an TCP
port or application, and URL, condition.
The first rule allows HTTPS traffic to the website:
Action: Allow
TCP port or Application: HTTPS (TCP port 443)
URL: example.com
The second rule blocks HTTP access to the same website:
Action: Block
TCP port or Application: HTTP (TCP port 80)
URL: example.com
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
153
Security Policies
Comparing URL and Application Filtering
Because combining application and URL criteria can lead to unexpected results, especially for encrypted
traffic, it is a good policy to create separate rules for URL and application criteria. If you do need to combine
application and URL criteria in a single rule, you should place these rules after straight-forward application-only
or URL-only rules, unless the application+URL rule is acting as an exception to a more general application-only
or URL-only rule. Because URL filtering block rules are more broad than application filtering, you should
place them above application-only rules.
If you do combine application and URL criteria, you might need to monitor your network more carefully to
ensure that you are not allowing access to unwanted sites and applications.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
154
Security Policies
Intrusion, File, and Malware Inspection
indicate the site was blocked due to policy. Instead, errors might indicate that there are no common
encryption algorithms. It will not be obvious from this message that you blocked the connection on
purpose.
In addition, web sites might be blocked by other access control rules that are not explicitly URL filtering rules,
or even by the default action. For example, if you block entire networks or geolocations, any web sites on
that network or in that geographic location are also blocked. Users blocked by these rules may, or may not,
get a response page as described in the limitations below.
If you implement URL filtering, consider explaining to end users what they might see when a site is intentionally
blocked, and what types of site you are blocking. Otherwise, they might spend a good deal of time
troubleshooting blocked connections.
All other traffic handling occurs before network traffic is examined for intrusions, prohibited files, and malware.
By associating an intrusion or file policy with an access control rule, you are telling the system that before it
passes traffic that matches the access control rule's conditions, you first want to inspect the traffic with an
intrusion policy, a file policy, or both.
You can configure intrusion and file policies on rules that allow traffic only. Inspection is not performed on
rules set to trust or block traffic. In addition, if the default action for the access control policy is allow, you
can configure an intrusion policy but not a file policy.
For any single connection handled by an access control rule, file inspection occurs before intrusion inspection.
That is, the system does not inspect files blocked by a file policy for intrusions. Within file inspection, simple
blocking by type takes precedence over malware inspection and blocking. Until a file is detected and blocked
in a session, packets from the session may be subject to intrusion inspection.
Note By default, the system disables intrusion and file inspection of encrypted payloads. This helps reduce
false positives and improve performance when an encrypted connection matches an access control rule
that has intrusion and file inspection configured. Inspection works with unencrypted traffic only.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
155
Security Policies
Best Practices for Access Control Rule Order
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
156
Security Policies
Guidelines and Limitations for Access Control Policies
• URL license—To create rules that use URL categories and reputations as match criteria.
• Threat license—To configure an intrusion policy on an access rule or the default action. You also need
this license to use a file policy (the Malware license is also required).
• Malware license—To configure a file policy on an access rule. The Threat is also required for file
policies.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
157
Security Policies
Configuring the Access Control Policy
categories and reputations, some devices may only store the parent URL's data. For web traffic handled
by these devices, the system may perform cloud lookups to determine category and reputation for sites
not in the local database. Lower-memory devices include the following ASA models: 5506-X, 5506H-X,
5506W-X, 5508-X, 5512-X, 5515-X, 5516-X, and 5525-X.
• GRE tunnels that violate the related RFCs will be dropped. For example, if a GRE tunnel contains
non-zero values in the reserved bits, contrary to the RFCs, it is dropped. If you need to allow non-compliant
GRE tunnels, you need to use a remote manager and configure a prefilter rule that trusts the sessions.
You cannot configure prefilter rules using the FDM.
• To move a rule, hover over the rule until you get the move icon ( ), then click, drag, and drop the rule
to the new location. You can also move a rule by editing it and selecting the new location in the Order
list. It is critical that you put the rules in the order that you want them processed. Specific rules should
be near the top, especially for rules that define exceptions to more general rules
• The right-most column contains the action buttons for a rule; mouse over the cell to see the buttons. You
can edit ( ) or delete ( ) a rule.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
158
Security Policies
Configuring Access Control Rules
Step 4 If the action is Allow, select Enable Policy > On under Intrusion Policy and select an intrusion policy.
For an explanation of the policy options, see Intrusion Policy Settings, on page 165.
Procedure
To delete a rule you no longer need, click the delete icon ( ) for the rule.
Step 3 In Order, select where you want to insert the rule in the ordered list of rules.
Rules are applied on a first-match basis, so you must ensure that rules with highly specific traffic matching
criteria appear above policies that have more general criteria that would otherwise apply to the matching
traffic.
The default is to add the rule to the end of the list. If you want to change a rule's location later, edit this option.
Step 6 Define the traffic matching criteria using any combination of the following tabs:
• Source/Destination—The security zones (interfaces) through which the traffic passes, the IP addresses
or the country or continent (geographical location) for the IP address, or the protocols and ports used in
the traffic. The default is any zone, address, geographical location, protocol, and port. See
Source/Destination Criteria, on page 160.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
159
Security Policies
Source/Destination Criteria
• Application—The application, or a filter that defines applications by type, category, tag, risk, or business
relevance. The default is any application. See Application Criteria, on page 162.
• URL—The URL or URL category of a web request. The default is any URL. See URL Criteria, on page
163.
• Users—The user or user group. Your identity policies determine whether user and group information is
available for traffic matching. You must configure identity policies to use this criteria. See User Criteria,
on page 164.
To modify a condition, you click the + button within that condition, select the desired object or element, and
click OK in the popup dialog box. If the criterion requires an object, you can click Create New Object if the
object you require does not exist. Click the x for an object or element to remove it from the policy.
When adding conditions to access control rules, consider the following tips:
• You can configure multiple conditions per rule. Traffic must match all the conditions in the rule for the
rule to apply to traffic. For example, you can use a single rule to perform URL filtering for specific hosts
or networks.
• For each condition in a rule, you can add up to 50 criteria. Traffic that matches any of a condition's criteria
satisfies the condition. For example, you can use a single rule to apply application control for up to 50
applications or application filters. Thus, there is an OR relationship among the items in a single condition,
but an AND relationship between condition types (for example, between source/destination and
application).
• Some features require that you enable the appropriate license.
Step 7 (Optional.) For policies that use the Allow action, you can configure further inspection on unencrypted traffic.
Click one of the following links:
• Intrusion Policy—Select Intrusion Policy > On and select the intrusion inspection policy to inspect
traffic for intrusions and exploits. See Intrusion Policy Settings, on page 165.
• File Policy—Select the file policy to inspect traffic for files that contain malware and for files that should
be blocked. See File Policy Settings, on page 166.
Source/Destination Criteria
The Source/Destination criteria of an access rule define the security zones (interfaces) through which the
traffic passes, the IP addresses or the country or continent (geographical location) for the IP address, or the
protocols and ports used in the traffic. The default is any zone, address, geographical location, protocol, and
port.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
160
Security Policies
Source/Destination Criteria
To modify a condition, you click the + button within that condition, select the desired object or element, and
click OK. If the criterion requires an object, you can click Create New Object if the object you require does
not exist. Click the x for an object or element to remove it from the policy.
You can use the following criteria to identify the source and destination to match in the rule.
Source Zones, Destination Zones
The security zone objects that define the interfaces through which the traffic passes. You can define one,
both, or neither criteria: any criteria not specified applies to traffic on any interface.
• To match traffic leaving the device from an interface in the zone, add that zone to the Destination
Zones.
• To match traffic entering the device from an interface in the zone, add that zone to the Source
Zones.
• If you add both source and destination zone conditions to a rule, matching traffic must originate
from one of the specified source zones and egress through one of the destination zones.
Use this criteria when the rule should apply based on where the traffic enters or exits the device. For
example, if you want to ensure that all traffic going to inside hosts gets intrusion inspection, you would
select your inside zone as the Destination Zones while leaving the source zone empty. To implement
intrusion filtering in the rule, the rule action must be Allow, and you must select an intrusion policy in
the rule.
Source Networks, Destination Networks
The network objects or geographical locations that define the network addresses or locations of the traffic.
• To match traffic from an IP address or geographical location, configure the Source Networks.
• To match traffic to an IP address or geographical location, configure the Destination Networks.
• If you add both source and destination network conditions to a rule, matching traffic must originate
from one of the specified IP addresses and be destined for one of the destination IP addresses.
When you add this criteria, you select from the following tabs:
• Network—Select the network objects or groups that define the source or destination IP addresses
for the traffic you want to control.
• Geolocation—Select the geographical location to control traffic based on its source or destination
country or continent. Selecting a continent selects all countries within the continent. Besides selecting
geographical location directly in the rule, you can also select a geolocation object that you created
to define the location. Using geographical location, you could easily restrict access to a particular
country without needing to know all of the potential IP addresses used there.
Note To ensure that you are using up-to-date geographical location data to filter
your traffic, Cisco strongly recommends that you regularly update the
geolocation database (GeoDB).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
161
Security Policies
Application Criteria
Application Criteria
The Application criteria of an access rule defines the application used in an IP connection, or a filter that
defines applications by type, category, tag, risk, or business relevance. The default is any application.
Although you can specify individual applications in the rule, application filters simplify policy creation and
administration. For example, you could create an access control rule that identifies and blocks all high risk,
low business relevance applications. If a user attempts to use one of those applications, the session is blocked.
In addition, Cisco frequently updates and adds additional application detectors via system and vulnerability
database (VDB) updates. Thus, a rule blocking high risk applications can automatically apply to new
applications without you having to update the rule manually.
You can specify applications and filters directly in the rule, or create application filter objects that define those
characteristics. The specifications are equivalent, although using objects can make it easier to stay within the
50-items-per-criteria system limit if you are creating a complex rule.
To modify the application and filters list, you click the + button within the condition, select the desired
applications or application filter objects, which are listed on separate tabs, and click OK in the popup dialog
box. On either tab, you can click Advanced Filter to select filter criteria or to help you search for specific
applications. Click the x for an application, filter, or object to remove it from the policy. Click the Save As
Filter link to save the combined criteria that is not already an object as a new application filter object.
Note If a selected application was removed by a VDB update, “(Deprecated)” appears after the application
name. You must remove these applications from the filter, or subsequent deployments and system
software upgrades will be blocked.
You can use the following Advanced Filter criteria to identify the application or filter to match in the rule.
These are the same elements used in application filter objects.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
162
Security Policies
URL Criteria
Note Multiple selections within a single filter criteria have an OR relationship. For example, Risk is High OR
Very High. The relationship between filters is AND, so Risk is High OR Very High, AND Business
Relevance is Low OR Very Low. As you select filters, the list of applications in the display updates to
show only those that meet the criteria. You can use these filters to help you find applications that you
want to add individually, or to verify that you are selecting the desired filters to add to the rule.
Risks
The likelihood that the application is used for purposes that might be against your organization's security
policy, from very low to very high.
Business Relevance
The likelihood that the application is used within the context of your organization's business operations,
as opposed to recreationally, from very low to very high.
Types
The type of application:
• Application Protocol—Application protocols such as HTTP and SSH, which represent
communications between hosts.
• Client Protocol—Clients such as web browsers and email clients, which represent software running
on the host.
• Web Application—Web applications such as MPEG video and Facebook, which represent the
content or requested URL for HTTP traffic.
Categories
A general classification for the application that describes its most essential function.
Tags
Additional information about the application, similar to category.
For encrypted traffic, the system can identify and filter traffic using only the applications tagged SSL
Protocol. Applications without this tag can only be detected in unencrypted or decrypted traffic. Also,
the system assigns the decrypted traffic tag to applications that the system can detect in decrypted traffic
only, not encrypted or unencrypted.
Applications List (bottom of the display)
This list updates as you select filters from the options above the list, so you can see the applications that
currently match the filter. Use this list to verify that your filter is targeting the desired applications when
you intend to add filter criteria to the rule. If your intention is to add specific applications, select them
from this list.
URL Criteria
The URL criteria of an access rule defines the URL used in a web request, or the category to which the
requested URL belongs. For category matches, you can also specify the relative reputation of sites to allow
or block. The default is to allow all URLs.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
163
Security Policies
User Criteria
URL categories and reputations allow you to quickly create URL conditions for access control rules. For
example, you could block all Gambling sites, or high risk Social Networking sites. If a user attempts to browse
to any URL with that category and reputation combination, the session is blocked.
Using category and reputation data also simplifies policy creation and administration. It grants you assurance
that the system will control web traffic as expected. Finally, because Cisco's threat intelligence is continually
updated with new URLs, as well as new categories and risks for existing URLs, you can ensure that the system
uses up-to-date information to filter requested URLs. Malicious sites that represent security threats such as
malware, spam, botnets, and phishing may appear and disappear faster than you can update and deploy new
policies.
To modify the URL list, you click the + button within the condition and select the desired categories or URLs
using one of the following techniques. Click the x for a category or object to remove it from the policy.
URL Tab
Click +, select URL objects or groups, and click OK. You can click Create New URL if the object you
require does not exist.
Note Before configuring URL objects to target specific sites, carefully read the information on manual
URL filtering.
Categories Tab
Click +, select the desired categories, and click OK.
The default is to apply the rule to all URLs in each selected category regardless of reputation. To limit
the rule based on reputation, click the down arrow for each category, deselect the Any checkbox, and
then use the Reputation slider to choose the reputation level. The left of the reputation slider indicates
sites that will be allowed, the right side are sites that will be blocked. How reputation is used depends
on the rule action:
• If the rule blocks or monitors web access, selecting a reputation level also selects all reputations
more severe than that level. For example, if you configure a rule to block or monitor Suspicious
sites (level 2), it also automatically blocks or monitors High risk (level 1) sites.
• If the rule allows web access, selecting a reputation level also selects all reputations less severe than
that level. For example, if you configure a rule to allow Benign sites (level 4), it also automatically
allows Well known (level 5) sites.
User Criteria
The User criteria of an access rule defines the user or user group for an IP connection. You must configure
identity policies and the associated directory server to include user or user group criteria in an access rule.
Your identity policies determine whether user identity is collected for a particular connection. If identity is
established, the IP address of the host is associated with the identified user. Thus, traffic whose source IP
address is mapped to a user is considered to be from that user. IP packets themselves do not include user
identity information, so this IP-address-to-user mapping is the best approximation available.
Because you can add a maximum of 50 users or groups to a rule, selecting groups usually makes more sense
than selecting individual users. For example, you could create a rule allowing the Engineering group access
to a development network, and create a subsequent rule that denies all other access to the network. Then, to
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
164
Security Policies
Intrusion Policy Settings
make the rule apply to new engineers, you only need to add the engineer to the Engineering group in the
directory server.
To modify the users list, you click the + button within the condition and select the desired identities using one
of the following techniques. Click the x for an identity to remove it from the policy.
• Users and Groups tab—Select the desired users or user groups. Groups are available only if you configure
groups in the directory server. If you select a group, the rule applies to any member of the group, including
subgroups. If you want to treat a sub-group differently, you need to create a separate access rule for the
sub-group and place it above the rule for the parent group in the access control policy.
• Special Entities tab—Select from the following:
• Failed Authentication—The user was prompted to authenticate, but failed to enter a valid
username/password pair within the maximum number of allowed attempts. Failure to authenticate
does not itself prevent the user from accessing the network, but you can write an access rule to limit
network access for these users.
• Guest—Guest users are like Failed Authentication users, except that your identity rule is configured
to call these users Guest. Guest users were prompted to authenticate and failed to do so within the
maximum number of attempts.
• No Authentication Required—The user was not prompted to authentication, because the user's
connections matched identity rules that specified no authentication.
• Unknown—There is no user mapping for the IP address, and there is no record of failed
authentication yet. Typically, this means that no HTTP traffic has yet been seen from that address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
165
Security Policies
File Policy Settings
• Maximum Detection—This policy is built for organizations where network infrastructure security is
given even more emphasis than is given by the Security Over Connectivity policy, with the potential for
even greater operational impact. For example, the intrusion policy enables rules in a large number of
threat categories including malware, exploit kit, old and common vulnerabilities, and known in-the-wild
exploits. If you select this policy, carefully evaluate whether too much legitimate traffic is being dropped.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
166
Security Policies
Logging Settings
Logging Settings
The logging settings for an access rule determine whether connection events are issued for traffic that matches
the rule. You must enable logging to see events related to the rule in the Event Viewer. You must also enable
logging for matching traffic to be reflected in the various dashboards you can use to monitor the system.
You should log connections according to the security and compliance needs of your organization. If your goal
is to limit the number of events you generate and improve performance, only enable logging for the connections
critical to your analysis. However, if you want a broad view of your network traffic for profiling purposes,
you can enable logging for additional connections.
Caution Logging blocked TCP connections during a Denial of Service (DoS) attack can affect system performance
and overwhelm the database with multiple similar events. Before you enable logging for a Block rule,
consider whether the rule is for an Internet-facing interface or other interface vulnerable to DoS attack.
Note When an intrusion policy invoked by an access control rule detects an intrusion and generates an
intrusion event, the system automatically logs the end of the connection where the intrusion occurred,
regardless of the logging configuration of the rule. For connections where an intrusion was blocked,
the action for the connection in the connection log is Block, with a reason of Intrusion Block,
even though to perform intrusion inspection you must use an Allow rule.
File Events
Select Log Files if you want to enable logging of prohibited files or malware events. You must select a
file policy in the rule to configure this option. The option is enabled by default if you select a file policy
for the rule. Cisco recommends you leave this option enabled.
When the system detects a prohibited file, it automatically logs one of the following types of event:
• File events, which represent detected or blocked files, including malware files.
• Malware events, which represent detected or blocked malware files only.
• Retrospective malware events, which are generated when the malware disposition for a previously
detected file changes.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
167
Security Policies
Monitoring Access Control Policies
For connections where a file was blocked, the action for the connection in the connection log is Block
even though to perform file and malware inspection you must use an Allow rule. The connection's Reason
is either File Monitor (a file type or malware was detected), or Malware Block or File Block (a file
was blocked).
Send Connection Events To
If you want to send a copy of the events to an external syslog server, select the server object that defines
the syslog server. If the required object does not already exist, click Create New Syslog Server and
create it. (To disable logging to a syslog server, select Any from the server list.)
Because event storage on the device is limited, sending events to an external syslog server can provide
more long term storage and enhance your event analysis.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
168
Security Policies
Examples for Access Control
that connections that should be dropped do not need to be inspected (and thus consume resources
unnecessarily). This information includes hit counts.
• show snort statistics displays information about the Snort inspection engine, which is the main inspector.
Snort implements application filtering, URL filtering, intrusion protection, and file and malware filtering.
• show conn displays information about the connections currently established through the interfaces.
• show traffic displays statistics about traffic flowing through each interface.
• show ipv6 traffic displays statistics about IPv6 traffic flowing through the device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
169
Security Policies
Examples for Access Control
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
170
CHAPTER 10
Network Address Translation (NAT)
The following topics explain Network Address Translation (NAT) and how to configure it.
• Why Use NAT?, on page 171
• NAT Basics, on page 172
• Guidelines for NAT, on page 178
• Configure NAT, on page 183
• Translating IPv6 Networks, on page 208
• Monitoring NAT, on page 222
• Examples for NAT, on page 223
One of the main functions of NAT is to enable private IP networks to connect to the Internet. NAT replaces
a private IP address with a public IP address, translating the private addresses in the internal private network
into legal, routable addresses that can be used on the public Internet. In this way, NAT conserves public
addresses because it can be configured to advertise at a minimum only one public address for the entire network
to the outside world.
Other functions of NAT include:
• Security—Keeping internal IP addresses hidden discourages direct attacks.
• IP routing solutions—Overlapping IP addresses are not a problem when you use NAT.
• Flexibility—You can change internal IP addressing schemes without affecting the public addresses
available externally; for example, for a server accessible to the Internet, you can maintain a fixed IP
address for Internet use, but internally, you can change the server address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
171
Security Policies
NAT Basics
• Translating between IPv4 and IPv6 (Routed mode only) —If you want to connect an IPv6 network to
an IPv4 network, NAT lets you translate between the two types of addresses.
Note NAT is not required. If you do not configure NAT for a given set of traffic, that traffic will not be
translated, but will have all of the security policies applied as normal.
NAT Basics
The following topics explain some of the basics of NAT.
NAT Terminology
This document uses the following terminology:
• Real address/host/network/interface—The real address is the address that is defined on the host, before
it is translated. In a typical NAT scenario where you want to translate the inside network when it accesses
the outside, the inside network would be the “real” network. Note that you can translate any network
connected to the device, not just an inside network. Therefore if you configure NAT to translate outside
addresses, “real” can refer to the outside network when it accesses the inside network.
• Mapped address/host/network/interface—The mapped address is the address that the real address is
translated to. In a typical NAT scenario where you want to translate the inside network when it accesses
the outside, the outside network would be the “mapped” network.
Note During address translation, IP addresses configured for the device interfaces
are not translated.
NAT Types
You can implement NAT using the following methods:
• Dynamic NAT—A group of real IP addresses are mapped to a (usually smaller) group of mapped IP
addresses, on a first come, first served basis. Only the real host can initiate traffic. See Dynamic NAT,
on page 183.
• Dynamic Port Address Translation (PAT)—A group of real IP addresses are mapped to a single IP address
using a unique source port of that IP address. See Dynamic PAT, on page 188.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
172
Security Policies
NAT in Routed Mode
• Static NAT—A consistent mapping between a real and mapped IP address. Allows bidirectional traffic
initiation. See Static NAT, on page 192.
• Identity NAT—A real address is statically translated to itself, essentially bypassing NAT. You might
want to configure NAT this way when you want to translate a large group of addresses, but then want
to exempt a smaller subset of addresses. See Identity NAT, on page 201.
1. When the inside host at 10.1.2.27 sends a packet to a web server, the real source address of the packet,
10.1.2.27, is translated to a mapped address, 209.165.201.10.
2. When the server responds, it sends the response to the mapped address, 209.165.201.10, and the FTD
device receives the packet because the FTD device performs proxy ARP to claim the packet.
3. The FTD device then changes the translation of the mapped address, 209.165.201.10, back to the real
address, 10.1.2.27, before sending it to the host.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
173
Security Policies
Auto NAT
Auto NAT
All NAT rules that are configured as a parameter of a network object are considered to be auto NAT rules.
This is a quick and easy way to configure NAT for a network object. You cannot create these rules for a group
object, however.
Although these rules are configured as part of the object itself, you cannot see the NAT configuration in the
object definition through the object manager.
When a packet enters an interface, both the source and destination IP addresses are checked against the auto
NAT rules. The source and destination address in the packet can be translated by separate rules if separate
matches are made. These rules are not tied to each other; different combinations of rules can be used depending
on the traffic.
Because the rules are never paired, you cannot specify that sourceA/destinationA should have a different
translation than sourceA/destinationB. Use manual NAT for that kind of functionality, where you can identify
the source and destination address in a single rule.
Manual NAT
Manual NAT lets you identify both the source and destination address in a single rule. Specifying both the
source and destination addresses lets you specify that sourceA/destinationA can have a different translation
than sourceA/destinationB.
Note For static NAT, the rule is bidirectional, so be aware that “source” and “destination” are used in commands
and descriptions throughout this guide even though a given connection might originate at the “destination”
address. For example, if you configure static NAT with port address translation, and specify the source
address as a Telnet server, and you want all traffic going to that Telnet server to have the port translated
from 2323 to 23, then you must specify the source ports to be translated (real: 23, mapped: 2323). You
specify the source ports because you specified the Telnet server address as the source address.
The destination address is optional. If you specify the destination address, you can either map it to itself
(identity NAT), or you can map it to a different address. The destination mapping is always a static mapping.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
174
Security Policies
NAT Rule Order
• Manual NAT—A single rule translates both the source and destination. A packet matches one rule
only, and further rules are not checked. Even if you do not configure the optional destination address,
a matching packet still matches one manual NAT rule only. The source and destination are tied
together, so you can enforce different translations depending on the source/destination combination.
For example, sourceA/destinationA can have a different translation than sourceA/destinationB.
Section 1 Manual NAT Applied on a first match basis, in the order they appear in the
configuration. Because the first match is applied, you must ensure
that specific rules come before more general rules, or the specific
rules might not be applied as desired. By default, manual NAT
rules are added to section 1.
By "specific rules first," we mean:
• Static rules should come before dynamic rules.
• Rules that include destination translation should come before
rules with source translation only.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
175
Security Policies
NAT Rule Order
Section 2 Auto NAT If a match in section 1 is not found, section 2 rules are applied in
the following order:
1. Static rules.
2. Dynamic rules.
Section 3 Manual NAT If a match is still not found, section 3 rules are applied on a first
match basis, in the order they appear in the configuration. This
section should contain your most general rules. You must also
ensure that any specific rules in this section come before general
rules that would otherwise apply.
For section 2 rules, for example, you have the following IP addresses defined within network objects:
• 192.168.1.0/24 (static)
• 192.168.1.0/24 (dynamic)
• 10.1.1.0/24 (static)
• 192.168.1.1/32 (static)
• 172.16.1.0/24 (dynamic) (object def)
• 172.16.1.0/24 (dynamic) (object abc)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
176
Security Policies
NAT Interfaces
NAT Interfaces
Except for bridge group member interfaces, you can configure a NAT rule to apply to any interface (in other
words, all interfaces), or you can identify specific real and mapped interfaces. You can also specify any
interface for the real address, and a specific interface for the mapped address, or vice versa.
For example, you might want to specify any interface for the real address and specify the outside interface
for the mapped address if you use the same private addresses on multiple interfaces, and you want to translate
them all to the same global pool when accessing the outside.
Figure 7: Specifying Any Interface
However, the concept of “any” interface does not apply to bridge group member interfaces. When you specify
“any” interface, all bridge group member interfaces are excluded. Thus, to apply NAT to bridge group members,
you must specify the member interface. This could result in many similar rules where only one interface is
different. You cannot configure NAT for the Bridge Virtual Interface (BVI) itself, you can configure NAT
for member interfaces only.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
177
Security Policies
Addresses on a Unique Network
Interface Guidelines
NAT is supported for standard routed physical or subinterfaces.
However, configuring NAT on bridge group member interfaces (interfaces that are part of a Bridge Virtual
Interface, or BVI) has the following restrictions:
• When configuring NAT for the members of a bridge group, you specify the member interface. You
cannot configure NAT for the bridge group interface (BVI) itself.
• When doing NAT between bridge group member interfaces, you must specify the source and destination
interfaces. You cannot specify “any” as the interface.
• You cannot configure interface PAT when the destination interface is a bridge group member interface,
because there is no IP address attached to the interface.
• You cannot translate between IPv4 and IPv6 networks (NAT64/46) when the source and destination
interfaces are members of the same bridge group. Static NAT/PAT 44/66, dynamic NAT44/66, and
dynamic PAT44 are the only allowed methods; dynamic PAT66 is not supported.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
178
Security Policies
IPv6 NAT Best Practices
• You cannot translate between IPv4 and IPv6 for interfaces that are members of the same bridge group.
You can translate between two IPv6 or two IPv4 networks only. This restriction does not apply between
a bridge group member and a standard routed interface.
• You cannot use dynamic PAT for IPv6 (NAT66) when translating between interfaces in the same bridge
group. This restriction does not apply between a bridge group member and a standard routed interface.
• For static NAT, you can specify an IPv6 subnet up to /64. Larger subnets are not supported.
• When using FTP with NAT46, when an IPv4 FTP client connects to an IPv6 FTP server, the client must
use either the extended passive mode (EPSV) or extended port mode (EPRT); PASV and PORT commands
are not supported with IPv6.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
179
Security Policies
NAT Support for Inspected Protocols
The following table lists the inspected protocols that apply NAT rewrite and their NAT limitations. Keep
these limitations in mind when writing NAT rules that include these protocols. Inspected protocols not listed
here do not apply NAT rewrite. These inspections include GTP, HTTP, IMAP, POP, SMTP, SSH, and SSL.
Note NAT rewrite is supported on the listed ports only. If you use these protocols on non-standard ports, do
not use NAT on the connections.
DNS over UDP UDP/53 No NAT support is available for name resolution No
through WINS.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
180
Security Policies
Additional Guidelines for NAT
Note If you remove a dynamic NAT or PAT rule, and then add a new rule with
mapped addresses that overlap the addresses in the removed rule, then the
new rule will not be used until all connections associated with the removed
rule time out or are cleared using the clear xlate or clear conn commands.
This safeguard ensures that the same address is not assigned to multiple
hosts.
• You cannot use an object group with both IPv4 and IPv6 addresses; the object group must include only
one type of address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
181
Security Policies
Additional Guidelines for NAT
• (Manual NAT only.) When using any as the source address in a NAT rule, the definition of “any” traffic
(IPv4 vs. IPv6) depends on the rule. Before the FTD device performs NAT on a packet, the packet must
be IPv6-to-IPv6 or IPv4-to-IPv4; with this prerequisite, the FTD device can determine the value of any
in a NAT rule. For example, if you configure a rule from “any” to an IPv6 server, and that server was
mapped from an IPv4 address, then any means “any IPv6 traffic.” If you configure a rule from “any” to
“any,” and you map the source to the interface IPv4 address, then any means “any IPv4 traffic” because
the mapped interface address implies that the destination is also IPv4.
• You can use the same mapped object or group in multiple NAT rules.
• The mapped IP address pool cannot include:
• The mapped interface IP address. If you specify “any” interface for the rule, then all interface IP
addresses are disallowed. For interface PAT (routed mode only), specify the interface name instead
of the interface address.
• The failover interface IP address.
• (Dynamic NAT.) The standby interface IP address when VPN is enabled.
• Avoid using overlapping addresses in static and dynamic NAT policies. For example, with overlapping
addresses, a PPTP connection can fail to get established if the secondary connection for PPTP hits the
static instead of dynamic xlate.
• You cannot use overlapping addresses in the source address of a NAT rule and a remote access VPN
address pool.
• If you specify a destination interface in a rule, then that interface is used as the egress interface rather
than looking up the route in the routing table. However, for identity NAT, you have the option to use a
route lookup instead.
• NAT applies to through traffic only. Traffic generated by the system is not subject to NAT.
• Do not name a network object or group pat-pool, using any combination of upper- or lower-case letters.
• You cannot use NAT on the internal payload of Protocol Independent Multicast (PIM) registers.
• (Manual NAT) When writing NAT rules for a dual ISP interface setup (primary and backup interfaces
using service level agreements in the routing configuration), do not specify destination criteria in the
rule. Ensure the rule for the primary interface comes before the rule for the backup interface. This allows
the device to choose the correct NAT destination interface based on the current routing state when the
primary ISP is unavailable. If you specify destination objects, the NAT rule will always select the primary
interface for the otherwise duplicate rules.
• If you get the ASP drop reason nat-no-xlate-to-pat-pool for traffic that should not match the NAT rules
defined for the interface, configure identity NAT rules for the affected traffic so the traffic can pass
untranslated.
• If you configure NAT for GRE tunnel endpoints, you must disable keepalives on the endpoints or the
tunnel cannot be established. The endpoints send keepalives to the original addresses.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
182
Security Policies
Configure NAT
Configure NAT
Network address translation can be very complex. We recommend that you keep your rules as simple as
possible to avoid translation problems and difficult troubleshooting situations. Careful planning before you
implement NAT is critical. The following procedure provides the basic approach.
Procedure
Dynamic NAT
The following topics explain dynamic NAT and how to configure it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
183
Security Policies
Dynamic NAT Disadvantages and Advantages
Note For the duration of the translation, a remote host can initiate a connection to the translated host if an
access rule allows it. Because the address is unpredictable, a connection to the host is unlikely.
Nevertheless, in this case you can rely on the security of the access rule.
The following figure shows a typical dynamic NAT scenario. Only real hosts can create a NAT session, and
responding traffic is allowed back.
Figure 8: Dynamic NAT
The following figure shows a remote host attempting to initiate a connection to a mapped address. This address
is not currently in the translation table; therefore, the packet is dropped.
Figure 9: Remote Host Attempts to Initiate a Connection to a Mapped Address
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
184
Security Policies
Configure Dynamic Auto NAT
Use PAT or a PAT fall-back method if this event occurs often because PAT provides over 64,000
translations using ports of a single address.
• You have to use a large number of routable addresses in the mapped pool, and routable addresses may
not be available in large quantities.
The advantage of dynamic NAT is that some protocols cannot use PAT. PAT does not work with the following:
• IP protocols that do not have a port to overload, such as GRE version 0.
• Some multimedia applications that have a data stream on one port, the control path on another port, and
are not open standard.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
185
Security Policies
Configure Dynamic Manual NAT
Step 5 (Optional.) Click the Advanced Options link and select the desired options:
• Translate DNS replies that match this rule—Whether to translate the IP address in DNS replies. For
DNS replies traversing from a mapped interface to a real interface, the Address (the IPv4 A or IPv6
AAAA) record is rewritten from the mapped value to the real value. Conversely, for DNS replies traversing
from a real interface to a mapped interface, the record is rewritten from the real value to the mapped
value. This option is used in specific circumstances, and is sometimes needed for NAT64/46 translation,
where the rewrite also converts between A and AAAA records. For more information, see Rewriting
DNS Queries and Responses Using NAT, on page 242.
• Fallthrough to Interface PAT (Destination Interface)—Whether to use the IP address of the destination
interface as a backup method when the other mapped addresses are already allocated (interface PAT
fallback). This option is available only if you select a destination interface that is not a member of a
bridge group.
You can also create network objects for the Original Destination Address and Translated Destination
Address if you are configuring a static translation for those addresses in the rule.
For dynamic NAT, you can also perform port translation on the destination. In the Object Manager, ensure
that there are port objects you can use for the Original Destination Port and Translated Destination Port.
If you specify the source port, it will be ignored.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
186
Security Policies
Configure Dynamic Manual NAT
Step 5 Identify the original packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear in the
original packet.
See the following figure for an example of the original packet vs. the translated packet.
• Original Source Address—The network object or group that contains the addresses you are translating.
• Original Destination Address—(Optional.) The network object that contains the addresses of the
destinations. If you leave this blank, the source address translation applies regardless of destination. If
you do specify the destination address, you can configure a static translation for that address or just use
identity NAT for it.
You can select Interface to base the original destination on the source interface (which cannot be Any).
If you select this option, you must also select a translated destination object. To implement a static
interface NAT with port translation for the destination addresses, select this option and also select the
appropriate port objects for the destination ports.
Step 6 Identify the translated packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear on
the destination interface network. You can translate between IPv4 and IPv6 if desired.
• Translated Source Address—The network object or group that contains the mapped addresses.
• Translated Destination Address—(Optional.) The network object or group that contains the destination
addresses used in the translated packet. If you selected an object for Original Destination Address, you
can set up identity NAT (that is, no translation) by selecting the same object.
Step 7 (Optional.) Identify the destination service ports for service translation: Original Destination Port, Translated
Destination Port.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
187
Security Policies
Dynamic PAT
Dynamic NAT does not support port translation, so leave the Original Source Port and Translated Source
Port fields empty. However, because the destination translation is always static, you can perform port translation
for the destination port.
NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and mapped service
objects are identical (both TCP or both UDP). For identity NAT, you can use the same service object for both
the real and mapped ports.
Step 8 (Optional.) Click the Advanced Options link and select the desired options:
• Translate DNS replies that match this rule—Whether to translate the IP address in DNS replies. For
DNS replies traversing from a mapped interface to a real interface, the Address (the IPv4 A or IPv6
AAAA) record is rewritten from the mapped value to the real value. Conversely, for DNS replies traversing
from a real interface to a mapped interface, the record is rewritten from the real value to the mapped
value. This option is used in specific circumstances, and is sometimes needed for NAT64/46 translation,
where the rewrite also converts between A and AAAA records. For more information, see Rewriting
DNS Queries and Responses Using NAT, on page 242.
• Fallthrough to Interface PAT (Destination Interface)—Whether to use the IP address of the destination
interface as a backup method when the other mapped addresses are already allocated (interface PAT
fallback). This option is available only if you select a destination interface that is not a member of a
bridge group.
Dynamic PAT
The following topics describe dynamic PAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
188
Security Policies
Dynamic PAT Disadvantages and Advantages
For the duration of the translation, a remote host on the destination network can initiate a connection to the
translated host if an access rule allows it. Because the port address (both real and mapped) is unpredictable,
a connection to the host is unlikely. Nevertheless, in this case you can rely on the security of the access rule.
After the connection expires, the port translation also expires.
Note We recommend that you use different PAT pools for each interface. If you use the same pool for multiple
interfaces, especially if you use it for "any" interface, the pool can be quickly exhausted, with no ports
available for new translations.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
189
Security Policies
Configure Dynamic Manual PAT
• To edit an existing rule, click the edit icon ( ) for the rule.
(To delete a rule you no longer need, click the trash can icon for the rule.)
Step 5 (Optional.) Click the Advanced Options link and select the desired options:
• Fallthrough to Interface PAT (Destination Interface)—Whether to use the IP address of the destination
interface as a backup method when the other mapped addresses are already allocated (interface PAT
fallback). This option is available only if you select a destination interface that is not a member of a
bridge group. You cannot select this option if you already configured interface PAT as the translated
address. You also cannot use this option with IPv6 networks.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
190
Security Policies
Configure Dynamic Manual PAT
• Destination Interface—To use the destination interface IPv4 address, you do not need a network
object. You cannot use interface PAT for IPv6.
• Single PAT address—Create a network object containing a single host.
You can also create network objects for the Original Destination Address and Translated Destination
Address if you are configuring a static translation for those addresses in the rule.
For dynamic PAT, you can also perform port translation on the destination. In the Object Manager, ensure
that there are port objects you can use for the Original Destination Port and Translated Destination Port.
If you specify the source port, it will be ignored.
Procedure
Step 5 Identify the original packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear in the
original packet.
See the following figure for an example of the original packet vs. the translated packet.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
191
Security Policies
Static NAT
• Original Source Address—The network object or group that contains the addresses you are translating.
• Original Destination Address—(Optional.) The network object that contains the addresses of the
destinations. If you leave this blank, the source address translation applies regardless of destination. If
you do specify the destination address, you can configure a static translation for that address or just use
identity NAT for it.
You can select Interface to base the original destination on the source interface (which cannot be Any).
If you select this option, you must also select a translated destination object. To implement a static
interface NAT with port translation for the destination addresses, select this option and also select the
appropriate port objects for the destination ports.
Step 6 Identify the translated packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear on
the destination interface network. You can translate between IPv4 and IPv6 if desired.
• Translated Source Address—One of the following:
• (Interface PAT.) To use the IPv4 address of the destination interface, select Interface. You must
also select a specific destination interface, which cannot be a bridge group member interface. You
cannot use interface PAT for IPv6.
• To use a single address other than the destination interface address, select the host network object
you created for this purpose.
• Translated Destination Address—(Optional.) The network object or group that contains the destination
addresses used in the translated packet. If you selected an object for Original Destination, you can set
up identity NAT (that is, no translation) by selecting the same object.
Step 7 (Optional.) Identify the destination service ports for service translation: Original Destination Port, Translated
Destination Port.
Dynamic NAT does not support port translation, so leave the Original Source Port and Translated Source
Port fields empty. However, because the destination translation is always static, you can perform port translation
for the destination port.
NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and mapped service
objects are identical (both TCP or both UDP). For identity NAT, you can use the same service object for both
the real and mapped ports.
Step 8 (Optional.) Click the Advanced Options link and select the desired options:
• Fallthrough to Interface PAT (Destination Interface)—Whether to use the IP address of the destination
interface as a backup method when the other mapped addresses are already allocated (interface PAT
fallback). This option is available only if you select a destination interface that is not a member of a
bridge group. You cannot select this option if you already configured interface PAT as the translated
address. You also cannot use this option with IPv6 networks.
Static NAT
The following topics explain static NAT and how to implement it.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
192
Security Policies
About Static NAT
Static NAT-with-port-translation rules limit access to the destination IP address for the specified port only.
If you try to access the destination IP address on a different port not covered by a NAT rule, then the connection
is blocked. In addition, for manual NAT, traffic that does not match the source IP address of the NAT rule
will be dropped if it matches the destination IP address, regardless of the destination port. Therefore, you
must add additional rules for all other traffic allowed to the destination IP address. For example, you can
configure a static NAT rule for the IP address, without port specification, and place it after the port translation
rule.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
193
Security Policies
One-to-Many Static NAT
Note For applications that require application inspection for secondary channels (for example, FTP and VoIP),
NAT automatically translates the secondary ports.
Following are some other uses of static NAT with port translation.
Static NAT with Identity Port Translation
You can simplify external access to internal resources. For example, if you have three separate servers
that provide services on different ports (such as FTP, HTTP, and SMTP), you can give external users a
single IP address to access those services. You can then configure static NAT with identity port translation
to map the single external IP address to the correct IP addresses of the real servers based on the port they
are trying to access. You do not need to change the port, because the servers are using the standard ones
(21, 80, and 25 respectively).
Static NAT with Port Translation for Non-Standard Ports
You can also use static NAT with port translation to translate a well-known port to a non-standard port
or vice versa. For example, if inside web servers use port 8080, you can allow outside users to connect
to port 80, and then undo translation to the original port 8080. Similarly, to provide extra security, you
can tell web users to connect to non-standard port 6785, and then undo translation to port 80.
Static Interface NAT with Port Translation
You can configure static NAT to map a real address to an interface address/port combination. For example,
if you want to redirect Telnet access for the device's outside interface to an inside host, then you can map
the inside host IP address/port 23 to the outside interface address/port 23.
For example, you have a load balancer at 10.1.2.27. Depending on the URL requested, it redirects traffic to
the correct web server.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
194
Security Policies
Other Mapping Scenarios (Not Recommended)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
195
Security Policies
Configure Static Auto NAT
For a many-to-few or many-to-one configuration, where you have more real addresses than mapped addresses,
you run out of mapped addresses before you run out of real addresses. Only the mappings between the lowest
real IP addresses and the mapped pool result in bidirectional initiation. The remaining higher real addresses
can initiate traffic, but traffic cannot be initiated to them (returning traffic for a connection is directed to the
correct real address because of the unique 5-tuple (source IP, destination IP, source port, destination port,
protocol) for the connection).
Note Many-to-few or many-to-one NAT is not PAT. If two real hosts use the same source port number and
go to the same outside server and the same TCP destination port, and both hosts are translated to the
same IP address, then both connections will be reset because of an address conflict (the 5-tuple is not
unique).
Instead of using a static rule this way, we suggest that you create a one-to-one rule for the traffic that needs
bidirectional initiation, and then create a dynamic rule for the rest of your addresses.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
196
Security Policies
Configure Static Auto NAT
• Translated Address—You have the following options to specify the translated address:
• Destination Interface—To use the destination interface IPv4 address, you do not need a network
object. This configures static interface NAT with port translation: the source address/port is translated
to the interface's address and the same port number. You cannot use interface PAT for IPv6.
• Address—Create a network object or group containing hosts or subnets. A group cannot contain
both IPv4 and IPv6 addresses; it must contain one type only. Typically, you configure the same
number of mapped addresses as real addresses for a one-to-one mapping. You can, however, have
a mismatched number of addresses.
Procedure
• (Optional.) Original Port, Translated Port—If you need to translate a TCP or UDP port, select the port
objects that define the original and translated ports. The objects must be for the same protocol. Click the
Create New Object link if the objects do not already exist. For example, you can translate TCP/80 to
TCP/8080 if necessary.
Step 5 (Optional.) Click the Advanced Options link and select the desired options:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
197
Security Policies
Configure Static Manual NAT
• Translate DNS replies that match this rule—Whether to translate the IP address in DNS replies. For
DNS replies traversing from a mapped interface to a real interface, the Address (the IPv4 A or IPv6
AAAA) record is rewritten from the mapped value to the real value. Conversely, for DNS replies traversing
from a real interface to a mapped interface, the record is rewritten from the real value to the mapped
value. This option is used in specific circumstances, and is sometimes needed for NAT64/46 translation,
where the rewrite also converts between A and AAAA records. For more information, see Rewriting
DNS Queries and Responses Using NAT, on page 242. This option is not available if you are doing port
translation.
• Do not proxy ARP on Destination Interface—Disables proxy ARP for incoming packets to the mapped
IP addresses. If you use addresses on the same network as the mapped interface, the system uses proxy
ARP to answer any ARP requests for the mapped addresses, thus intercepting traffic destined for a
mapped address. This solution simplifies routing because the device does not have to be the gateway for
any additional networks. You can disable proxy ARP if desired, in which case you need to be sure to
have proper routes on the upstream router. Normally for identity NAT, proxy ARP is not required, and
in some cases can cause connectivity issues.
You can also create network objects for the Original Destination Address and Translated Destination
Address if you are configuring a static translation for those addresses in the rule. If you want to configure
destination static interface NAT with port translation only, you can skip adding an object for the destination
mapped addresses and specify the interface in the rule.
You can also perform port translation on the source, destination, or both. In the Object Manager, ensure that
there are port objects you can use for the original and translated ports.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
198
Security Policies
Configure Static Manual NAT
Procedure
Step 5 Identify the original packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear in the
original packet.
See the following figure for an example of the original packet vs. the translated packet.
• Original Source Address—The network object or group that contains the addresses you are translating.
• Original Destination Address—(Optional.) The network object that contains the addresses of the
destinations. If you leave this blank, the source address translation applies regardless of destination. If
you do specify the destination address, you can configure a static translation for that address or just use
identity NAT for it.
You can select Interface to base the original destination on the source interface (which cannot be Any).
If you select this option, you must also select a translated destination object. To implement a static
interface NAT with port translation for the destination addresses, select this option and also select the
appropriate port objects for the destination ports.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
199
Security Policies
Configure Static Manual NAT
Step 6 Identify the translated packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear on
the destination interface network. You can translate between IPv4 and IPv6 if desired.
• Translated Source Address—One of the following:
• To use a set group of addresses, select the network object or group that contains the mapped addresses.
Typically, you configure the same number of mapped addresses as real addresses for a one-to-one
mapping. You can, however, have a mismatched number of addresses.
• (Static interface NAT with port translation.) To use the IPv4 address of the destination interface,
select Interface. You must also select a specific destination interface, which cannot be a bridge
group member interface. This configures static interface NAT with port translation: the source
address/port is translated to the interface's address and the same port number. You cannot use
interface PAT for IPv6.
• Translated Destination Address—(Optional.) The network object or group that contains the destination
addresses used in the translated packet. If you selected an object for Original Destination, you can set
up identity NAT (that is, no translation) by selecting the same object.
Step 7 (Optional.) Identify the source or destination service ports for service translation.
If you are configuring static NAT with port translation, you can translate ports for the source, destination, or
both. For example, you can translate between TCP/80 and TCP/8080.
NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and mapped service
objects are identical (both TCP or both UDP). For identity NAT, you can use the same service object for both
the real and mapped ports.
• Original Source Port, Translated Source Port—Defines a port translation for the source address.
• Original Destination Port, Translated Destination Port—Defines a port translation for the destination
address.
Step 8 (Optional.) Click the Advanced Options link and select the desired options:
• Translate DNS replies that match this rule—Whether to translate the IP address in DNS replies. For
DNS replies traversing from a mapped interface to a real interface, the Address (the IPv4 A or IPv6
AAAA) record is rewritten from the mapped value to the real value. Conversely, for DNS replies traversing
from a real interface to a mapped interface, the record is rewritten from the real value to the mapped
value. This option is used in specific circumstances, and is sometimes needed for NAT64/46 translation,
where the rewrite also converts between A and AAAA records. For more information, see Rewriting
DNS Queries and Responses Using NAT, on page 242. This option is not available if you are doing port
translation.
• Do not proxy ARP on Destination Interface—Disables proxy ARP for incoming packets to the mapped
IP addresses. If you use addresses on the same network as the mapped interface, the system uses proxy
ARP to answer any ARP requests for the mapped addresses, thus intercepting traffic destined for a
mapped address. This solution simplifies routing because the device does not have to be the gateway for
any additional networks. You can disable proxy ARP if desired, in which case you need to be sure to
have proper routes on the upstream router. Normally for identity NAT, proxy ARP is not required, and
in some cases can cause connectivity issues.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
200
Security Policies
Identity NAT
Identity NAT
You might have a NAT configuration in which you need to translate an IP address to itself. For example, if
you create a broad rule that applies NAT to every network, but want to exclude one network from NAT, you
can create a static NAT rule to translate an address to itself.
The following figure shows a typical identity NAT scenario.
Figure 17: Identity NAT
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
201
Security Policies
Configure Identity Manual NAT
• Source Interface, Destination Interface—(Required for bridge group member interfaces.) The interfaces
where this NAT rule applies. Source is the real interface, the one through which the traffic enters the
device. Destination is the mapped interface, the one through which traffic exits the device. By default,
the rule applies to all interfaces (Any) except for bridge group member interfaces.
• Original Address—The network object that contains the addresses you are translating.
• Translated Address—The same object as the original source. Optionally, you can select a different
object that has the exact same contents.
Do not configure the Original Port and Translated Port options for identity NAT.
Step 5 (Optional.) Click the Advanced Options link and select the desired options:
• Translate DNS replies that match this rule—Do not configure this option for identity NAT.
• Do not proxy ARP on Destination Interface—Disables proxy ARP for incoming packets to the mapped
IP addresses. If you use addresses on the same network as the mapped interface, the system uses proxy
ARP to answer any ARP requests for the mapped addresses, thus intercepting traffic destined for a
mapped address. This solution simplifies routing because the device does not have to be the gateway for
any additional networks. You can disable proxy ARP if desired, in which case you need to be sure to
have proper routes on the upstream router. Normally for identity NAT, proxy ARP is not required, and
in some cases can cause connectivity issues.
• Perform Route Lookup for Destination Interface— If you select source and destination interfaces
when selecting the same object for original and translated source address, you can select this option to
have the system determine the destination interface based on the routing table rather than using the
destination interface configured in the NAT rule.
You can also create network objects for the Original Destination Address and Translated Destination
Address if you are configuring a static translation for those addresses in the rule. If you want to configure
destination static interface NAT with port translation only, you can skip adding an object for the destination
mapped addresses and specify the interface in the rule.
You can also perform port translation on the source, destination, or both. In the Object Manager, ensure that
there are port objects you can use for the original and translated ports. You can use the same object for identity
NAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
202
Security Policies
Configure Identity Manual NAT
Procedure
Step 5 Identify the original packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear in the
original packet.
See the following figure for an example of the original packet vs. the translated packet where you perform
identity NAT on the inside host but translate the outside host.
• Original Source Address—The network object or group that contains the addresses you are translating.
• Original Destination Address—(Optional.) The network object that contains the addresses of the
destinations. If you leave this blank, the source address translation applies regardless of destination. If
you do specify the destination address, you can configure a static translation for that address or just use
identity NAT for it.
You can select Interface to base the original destination on the source interface (which cannot be Any).
If you select this option, you must also select a translated destination object. To implement a static
interface NAT with port translation for the destination addresses, select this option and also select the
appropriate port objects for the destination ports.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
203
Security Policies
NAT Rule Properties for FTD
Step 6 Identify the translated packet addresses, either IPv4 or IPv6; namely, the packet addresses as they appear on
the destination interface network. You can translate between IPv4 and IPv6 if desired.
• Translated Source Address—The same object as the original source. Optionally, you can select a
different object that has the exact same contents.
• Translated Destination Address—(Optional.) The network object or group that contains the destination
addresses used in the translated packet. If you selected an object for Original Destination Address, you
can set up identity NAT (that is, no translation) by selecting the same object.
Step 7 (Optional.) Identify the source or destination service ports for service translation.
If you are configuring static NAT with port translation, you can translate ports for the source, destination, or
both. For example, you can translate between TCP/80 and TCP/8080.
NAT only supports TCP or UDP. When translating a port, be sure the protocols in the real and mapped service
objects are identical (both TCP or both UDP). For identity NAT, you can use the same service object for both
the real and mapped ports.
• Original Source Port, Translated Source Port—Defines a port translation for the source address.
• Original Destination Port, Translated Destination Port—Defines a port translation for the destination
address.
Step 8 (Optional.) Click the Advanced Options link and select the desired options:
• Translate DNS replies that match this rule—Do not configure this option for identity NAT.
• Do not proxy ARP on Destination Interface—Disables proxy ARP for incoming packets to the mapped
IP addresses. If you use addresses on the same network as the mapped interface, the system uses proxy
ARP to answer any ARP requests for the mapped addresses, thus intercepting traffic destined for a
mapped address. This solution simplifies routing because the device does not have to be the gateway for
any additional networks. You can disable proxy ARP if desired, in which case you need to be sure to
have proper routes on the upstream router. Normally for identity NAT, proxy ARP is not required, and
in some cases can cause connectivity issues.
• Perform route lookup for Destination interface— If you select source and destination interfaces when
selecting the same object for original and translated source address, you can select this option to have
the system determine the destination interface based on the routing table rather than using the destination
interface configured in the NAT rule.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
204
Security Policies
Packet Translation Properties for Auto NAT
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
205
Security Policies
Packet Translation Properties for Manual NAT
• To use a set group of addresses, select the network object or group that contains the mapped
addresses. The object or group can contain hosts or subnets. Typically, you configure the same
number of mapped addresses as real addresses for a one-to-one mapping. You can, however,
have a mismatched number of addresses.
• (Static interface NAT with port translation.) To use the address of the destination interface,
select Interface. You must also select a specific destination interface, which cannot be a bridge
group member interface. This configures static interface NAT with port translation: the source
address/port is translated to the interface's address and the same port number. You cannot use
interface PAT for IPv6.
• Identity NAT—The same object as the original source. Optionally, you can select a different object
that has the exact same contents.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
206
Security Policies
Advanced NAT Properties
• To use a set group of addresses, select the network object or group that contains the mapped
addresses. The object or group can contain hosts or subnets. Typically, you configure the same
number of mapped addresses as real addresses for a one-to-one mapping. You can, however,
have a mismatched number of addresses.
• (Static interface NAT with port translation.) To use the address of the destination interface,
select Interface. You must also select a specific destination interface, which cannot be a bridge
group member interface. This configures static interface NAT with port translation: the source
address/port is translated to the interface's address and the same port number. You cannot use
interface PAT for IPv6.
• Identity NAT—The same object as the original source. Optionally, you can select a different object
that has the exact same contents.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
207
Security Policies
Translating IPv6 Networks
AAAA records. For more information, see Rewriting DNS Queries and Responses Using NAT, on page
242. This option is not available if you are doing port translation in a static NAT rule.
Fallthrough to Interface PAT (Destination Interface) (Dynamic NAT only.)
Whether to use the IP address of the destination interface as a backup method when the other mapped
addresses are already allocated (interface PAT fallback). This option is available only if you select a
destination interface that is not a member of a bridge group. You cannot select this option if you already
configured interface PAT as the translated address. You cannot use this option with IPv6 networks.
Do not proxy ARP on Destination Interface (Static NAT only.)
Disables proxy ARP for incoming packets to the mapped IP addresses. If you use addresses on the same
network as the mapped interface, the system uses proxy ARP to answer any ARP requests for the mapped
addresses, thus intercepting traffic destined for a mapped address. This solution simplifies routing because
the device does not have to be the gateway for any additional networks. You can disable proxy ARP if
desired, in which case you need to be sure to have proper routes on the upstream router. Normally for
identity NAT, proxy ARP is not required, and in some cases can cause connectivity issues.
Perform Route Lookup for Destination Interface (Static Identity NAT only. Routed mode only.)
If you select source and destination interfaces when selecting the same object for original and translated
source address, you can select this option to have the system determine the destination interface based
on the routing table rather than using the destination interface configured in the NAT rule.
• NAT66—Translates IPv6 packets to a different IPv6 address. We recommend using static NAT. Although
you can use dynamic NAT or PAT, IPv6 addresses are in such large supply, you do not have to use
dynamic NAT.
Note NAT64 and NAT 46 are possible on standard routed interfaces only. NAT66 is possible on both routed
and bridge group member interfaces.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
208
Security Policies
NAT64/46: Translating IPv6 Addresses to IPv4
You need to define two policies, one for the source IPv6 network, and one for the destination IPv4 network.
Although you can accomplish this with a single manual NAT rule, if the DNS server is on the external network,
you probably need to rewrite the DNS response. Because you cannot enable DNS rewrite on a manual NAT
rule when you specify a destination, creating two auto NAT rules is the better solution.
In this example, you translate the inside IPv6 network to IPv4 using dynamic interface PAT with the IP address
of the outside interface. Outside IPv4 traffic is statically translated to addresses on the 2001:db8::/96 network,
allowing transmission on the inside network.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
209
Security Policies
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet
Name the network object (for example, inside_v6), select Network, and enter the network address,
2001:db8::/96.
d) Click OK.
Step 2 Create the manual NAT rule to translate the IPv6 network to IPv4 and back again.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = PAT64Rule (or another name of your choosing).
• Create Rule For = Manual NAT.
• Placement = Before Auto NAT Rules
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = outside.
• Original Packet Source Address = inside_v6 network object.
• Translated Packet Source Address = Interface. This option uses the IPv4 address of the destination
interface as the PAT address.
• Original Packet Destination Address = inside_v6 network object.
• Translated Packet Destination Address = any-ipv4 network object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
210
Security Policies
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
d) Click OK.
With this rule, any traffic from the 2001:db8::/96 subnet on the inside interface going to the outside
interface gets a NAT64 PAT translation using the IPv4 address of the outside interface. Conversely, any
IPv4 address on the outside network coming to the inside interface is translated to an address on the
2001:db8::/96 network using the embedded IPv4 address method.
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
Following is a typical example where you have an inside IPv6-only network, but there are some IPv4-only
services on the outside Internet that internal users need.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
211
Security Policies
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
In this example, you translate the inside IPv6 network to IPv4 using dynamic interface PAT with the IP address
of the outside interface. Outside IPv4 traffic is statically translated to addresses on the 2001:db8::/96 network,
allowing transmission on the inside network. You enable DNS rewrite on the NAT46 rule, so that replies from
the external DNS server can be converted from A (IPv4) to AAAA (IPv6) records, and the addresses converted
from IPv4 to IPv6.
Following is a typical sequence for a web request where a client at 2001:DB8::100 on the internal IPv6 network
tries to open www.example.com.
1. The client’s computer sends a DNS request to the DNS server at 2001:DB8::D1A5:CA81. The NAT rules
make the following translations to the source and destination in the DNS request:
• 2001:DB8::100 to a unique port on 209.165.201.1 (The NAT64 interface PAT rule.)
• 2001:DB8::D1A5:CA81 to 209.165.202.129 (The NAT46 rule. D1A5:CA81 is the IPv6 equivalent
of 209.165.202.129.)
2. The DNS server responds with an A record indicating that www.example.com is at 209.165.200.225. The
NAT46 rule, with DNS rewrite enabled, converts the A record to the IPv6-equivalent AAAA record, and
translates 209.165.200.225 to 2001:db8:D1A5:C8E1in the AAAA record. In addition, the source and
destination addresses in the DNS response are untranslated:
• 209.165.202.129 to 2001:DB8::D1A5:CA81
• 209.165.201.1 to 2001:db8::100
3. The IPv6 client now has the IP address of the web server, and makes an HTTP request to www.example.com
at 2001:db8:D1A5:C8E1. (D1A5:C8E1 is the IPv6 equivalent of 209.165.200.225.) The source and
destination of the HTTP request are translated:
• 2001:DB8::100 to a unique port on 209.156.101.54 (The NAT64 interface PAT rule.)
• 2001:db8:D1A5:C8E1 to 209.165.200.225 (The NAT46 rule.)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
212
Security Policies
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
Procedure
Step 1 Create the network objects that define the inside IPv6 and outside IPv4 networks.
a) Choose Objects.
b) Select Network from the table of contents and click +.
c) Define the inside IPv6 network.
Name the network object (for example, inside_v6), select Network, and enter the network address,
2001:db8::/96.
d) Click OK.
e) Click + and define the outside IPv4 network.
Name the network object (for example, outside_v4_any), select Network, and enter the network address
0.0.0.0/0.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
213
Security Policies
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
Step 2 Configure the NAT64 dynamic PAT rule for the inside IPv6 network.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = PAT64Rule (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = inside_v6 network object.
• Translated Address = Interface. This option uses the IPv4 address of the destination interface as
the PAT address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
214
Security Policies
NAT64/46 Example: Inside IPv6 Network with Outside IPv4 Internet and DNS Translation
d) Click OK.
With this rule, any traffic from the 2001:db8::/96 subnet on the inside interface going to the outside
interface gets a NAT64 PAT translation using the IPv4 address of the outside interface.
Step 3 Configure the static NAT46 rule for the outside IPv4 network.
a) Click the + button.
b) Configure the following properties:
• Title = NAT46Rule (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Static.
• Source Interface = outside.
• Destination Interface = inside.
• Original Address = outside_v4_any network object.
• Translated Address = inside_v6 network object.
• On the Advanced Options tab, select Translate DNS replies that match this rule.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
215
Security Policies
NAT66: Translating IPv6 Addresses to Different IPv6 Addresses
c) Click OK.
With this rule, any IPv4 address on the outside network coming to the inside interface is translated to an
address on the 2001:db8::/96 network using the embedded IPv4 address method. In addition, DNS responses
are converted from A (IPv4) to AAAA (IPv6) records, and the addresses converted from IPv4 to IPv6.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
216
Security Policies
NAT66 Example, Static Translation between Networks
Note This example assumes that the inside interface is not a bridge group interface (BVI) but a standard routed
interface. If the inside interface is a BVI, you need to duplicate the rules for each member interface.
Procedure
Step 1 Create the network objects that define the inside IPv6 and outside IPv6 NAT networks.
a) Choose Objects.
b) Select Network from the table of contents and click +.
c) Define the inside IPv6 network.
Name the network object (for example, inside_v6), select Network, and enter the network address,
2001:db8:122:2091::/96.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
217
Security Policies
NAT66 Example, Static Translation between Networks
d) Click OK.
e) Click + and define the outside IPv6 NAT network.
Name the network object (for example, outside_nat_v6), select Network, and enter the network address
2001:db8:122:2999::/96.
Step 2 Configure the static NAT rule for the inside IPv6 network.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = NAT66Rule (or another name of your choosing).
• Create Rule For = Auto NAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
218
Security Policies
NAT66 Example, Simple IPv6 Interface PAT
• Type = Static.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = inside_v6 network object.
• Translated Address = outside_nat_v6 network object.
d) Click OK.
With this rule, any traffic from the 2001:db8:122:2091::/96 subnet on the inside interface going to the
outside interface gets a static NAT66 translation to an address on the 2001:db8:122:2999::/96 network.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
219
Security Policies
NAT66 Example, Simple IPv6 Interface PAT
Note This example assumes that the inside interface is not a bridge group interface (BVI) but a standard routed
interface. If the inside interface is a BVI, you need to duplicate the rules for each member interface.
Procedure
Step 1 Create the network objects that define the inside IPv6 network and the IPv6 PAT address.
a) Choose Objects.
b) Select Network from the table of contents and click +.
c) Define the inside IPv6 network.
Name the network object (for example, inside_v6), select Network, and enter the network address,
2001:db8:122:2091::/96.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
220
Security Policies
NAT66 Example, Simple IPv6 Interface PAT
d) Click OK.
e) Click + and define the outside IPv6 PAT address.
Name the network object (for example, ipv6_pat), select Host, and enter the host address
2001:db8:122:201b::2.
Step 2 Configure the dynamic PAT rule for the inside IPv6 network.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = PAT66Rule (or another name of your choosing).
• Create Rule For = Auto NAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
221
Security Policies
Monitoring NAT
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = inside_v6 network object.
• Translated Address = ipv6_pat network object.
d) Click OK.
With this rule, any traffic from the 2001:db8:122:2091::/96 subnet on the inside interface going to the
outside interface gets a dynamic PAT66 translation to a port on 2001:db8:122:201b::2.
Monitoring NAT
To monitor and troubleshoot NAT connections, log into the device CLI and use the following commands.
• show nat displays the NAT rules and per-rule hit counts. There are additional keywords to show other
aspects of NAT.
• show xlate displays the actual NAT translations that are currently active.
• clear xlate lets you remove an active NAT translation. You might need to remove active translations if
you alter NAT rules, because existing connections continue to use the old translation slot until the
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
222
Security Policies
Examples for NAT
connection ends. Clearing a translation allows the system to build a new translation for a client on the
client's next connection attempt based on your new rules.
Note This example assumes that the inside interface is not a bridge group interface (BVI) but a standard routed
interface. If the inside interface is a BVI, select the specific bridge group member interface to which the
web server is attached, for example, inside1_3.
Procedure
Step 1 Create the network objects that define the server’s private and public host addresses.
a) Choose Objects.
b) Select Network from the table of contents and click +.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
223
Security Policies
Providing Access to an Inside Web Server (Static Auto NAT)
d) Click OK.
e) Click + and define the public address.
Name the network object (for example, WebServerPublic), select Host, and enter the host address
209.165.201.10.
f) Click OK.
Step 2 Configure static NAT for the object.
a) Select Policies > NAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
224
Security Policies
Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation)
d) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
225
Security Policies
Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation)
Note This example assumes that the inside interface is a standard routed interface attached to a switch, with
the servers attached to the switch. If your inside interface is a bridge group interface (BVI), and the
servers are attached to separate bridge group member interfaces, select the specific member interface
to which each server is attached for the corresponding rule. For example, the rules might have inside1_2,
inside1_3, and inside1_4 for the source interface rather than inside.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
226
Security Policies
Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation)
d) Click OK.
Step 2 Create a network object for the HTTP server.
a) Click +.
b) Name the network object (for example, HTTPserver), select Host, and enter the host address 10.1.2.28.
c) Click OK.
Step 3 Create a network object for the SMTP server.
a) Click +.
b) Name the network object (for example, SMTPserver), select Host, and enter the host address 10.1.2.29.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
227
Security Policies
Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation)
c) Click OK.
Step 4 Create a network object for the public IP address used for the three servers.
a) Click +.
b) Name the network object (for example, ServerPublicIP), select Host, and enter the host address
209.165.201.3.
c) Click OK.
Step 5 Configure static NAT with port translation for the FTP server, mapping the FTP port to itself.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
228
Security Policies
Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation)
d) Click OK.
Step 6 Configure static NAT with port translation for the HTTP server, mapping the HTTP port to itself.
a) Click the + button.
b) Configure the following properties:
• Title = HTTPServer (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Static.
• Source Interface = inside.
• Destination Interface = outside.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
229
Security Policies
Single Address for FTP, HTTP, and SMTP (Static Auto NAT-with-Port-Translation)
c) Click OK.
Step 7 Configure static NAT with port translation for the SMTP server, mapping the SMTP port to itself.
a) Click the + button.
b) Configure the following properties:
• Title = SMTPServer (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Static.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = SMTPserver network object.
• Translated Address = ServerPublicIP network object.
• Original Port = SMTP port object.
• Translated Port = SMTP port object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
230
Security Policies
Different Translation Depending on the Destination (Dynamic Manual PAT)
c) Click OK.
Note This example assumes that the inside interface is a standard routed interface attached to a switch, with
the servers attached to the switch. If your inside interface is a bridge group interface (BVI), and the
servers are attached to separate bridge group member interfaces, select the specific member interface
to which each server is attached for the corresponding rule. For example, the rules might have inside1_2
and inside1_3 for the source interface rather than inside.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
231
Security Policies
Different Translation Depending on the Destination (Dynamic Manual PAT)
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
232
Security Policies
Different Translation Depending on the Destination (Dynamic Manual PAT)
d) Click OK.
Step 2 Create a network object for the DMZ network 1.
a) Click +.
b) Name the network object (for example, DMZnetwork1), select Network, and enter the network address
209.165.201.0/27 (subnet mask of 255.255.255.224).
c) Click OK.
Step 3 Create a network object for the PAT address for DMZ network 1.
a) Click +.
b) Name the network object (for example, PATaddress1), select Host, and enter the host address
209.165.202.129.
c) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
233
Security Policies
Different Translation Depending on the Destination (Dynamic Manual PAT)
c) Click OK.
Step 5 Create a network object for the PAT address for DMZ network 2.
a) Click +.
b) Name the network object (for example, PATaddress2), select Host, and enter the host address
209.165.202.130.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
234
Security Policies
Different Translation Depending on the Destination (Dynamic Manual PAT)
c) Click OK.
Step 6 Configure dynamic manual PAT for DMZ network 1.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = DMZNetwork1 (or another name of your choosing).
• Create Rule For = Manual NAT.
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = dmz.
• Original Source Address = myInsideNetwork network object.
• Translated Source Address = PATaddress1 network object.
• Original Destination Address = DMZnetwork1 network object.
• Translated Destination Address = DMZnetwork1 network object.
Note Because you do not want to translate the destination address, you need to configure identity
NAT for it by specifying the same address for the original and translated destination
addresses. Leave all of the port fields blank.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
235
Security Policies
Different Translation Depending on the Destination (Dynamic Manual PAT)
d) Click OK.
Step 7 Configure dynamic manual PAT for DMZ network 2.
a) Click the + button.
b) Configure the following properties:
• Title = DMZNetwork2 (or another name of your choosing).
• Create Rule For = Manual NAT.
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = dmz.
• Original Source Address = myInsideNetwork network object.
• Translated Source Address = PATaddress2 network object.
• Original Destination Address = DMZnetwork2 network object.
• Translated Destination Address = DMZnetwork2 network object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
236
Security Policies
Different Translation Depending on the Destination Address and Port (Dynamic Manual PAT)
c) Click OK.
Note This example assumes that the inside interface is a standard routed interface attached to a switch, with
the server attached to the switch. If your inside interface is a bridge group interface (BVI), and the server
is attached to a bridge group member interface, select the specific member interface to which the server
is attached. For example, the rule might have inside1_2 for the source interface rather than inside.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
237
Security Policies
Different Translation Depending on the Destination Address and Port (Dynamic Manual PAT)
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
238
Security Policies
Different Translation Depending on the Destination Address and Port (Dynamic Manual PAT)
d) Click OK.
Step 2 Create a network object for the Telnet/Web server.
a) Click +.
b) Name the network object (for example, TelnetWebServer), select Host, and enter the host address
209.165.201.11.
c) Click OK.
Step 3 Create a network object for the PAT address when using Telnet.
a) Click +.
b) Name the network object (for example, PATaddress1), select Host, and enter the host address
209.165.202.129.
c) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
239
Security Policies
Different Translation Depending on the Destination Address and Port (Dynamic Manual PAT)
Step 4 Create a network object for the PAT address when using HTTP.
a) Click +.
b) Name the network object (for example, PATaddress2), select Host, and enter the host address
209.165.202.130.
c) Click OK.
Step 5 Configure dynamic manual PAT for Telnet access.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = TelnetServer (or another name of your choosing).
• Create Rule For = Manual NAT.
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = dmz.
• Original Source Address = myInsideNetwork network object.
• Translated Source Address= PATaddress1 network object.
• Original Destination Address = TelnetWebServer network object.
• Translated Destination Address = TelnetWebServer network object.
• Original Destination Port = TELNET port object.
• Translated Destination Port = TELNET port object.
Note Because you do not want to translate the destination address or port, you need to configure
identity NAT for them by specifying the same address for the original and translated
destination addresses, and the same port for the original and translated port.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
240
Security Policies
Different Translation Depending on the Destination Address and Port (Dynamic Manual PAT)
d) Click OK.
Step 6 Configure dynamic manual PAT for web access.
a) Click the + button.
b) Configure the following properties:
• Title = WebServer (or another name of your choosing).
• Create Rule For = Manual NAT.
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = dmz.
• Original Source Address = myInsideNetwork network object.
• Translated Source Address = PATaddress2 network object.
• Original Destination Address = TelnetWebServer network object.
• Translated Destination Address = TelnetWebServer network object.
• Original Destination Port = HTTP port object.
• Translated Destination Port = HTTP port object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
241
Security Policies
Rewriting DNS Queries and Responses Using NAT
c) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
242
Security Policies
DNS 64 Reply Modification
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
243
Security Policies
DNS 64 Reply Modification
Note This example assumes that the inside interface is not a bridge group interface (BVI) but a standard routed
interface. If the inside interface is a BVI, you need to duplicate the rules for each member interface.
Procedure
Step 1 Create the network objects for the FTP server, DNS server, inside network, and PAT pool.
a) Choose Objects.
b) Select Network from the table of contents and click +.
c) Define the real FTP server address.
Name the network object (for example, ftp_server), select Host, and enter the real host IP address,
209.165.200.225.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
244
Security Policies
DNS 64 Reply Modification
d) Click OK.
e) Click + and define the DNS server's real address.
Name the network object (for example, dns_server), select Host, and enter the host address 209.165.201.15.
f) Click OK.
g) Click + and define the inside IPv6 network.
Name the network object (for example, inside_v6), select Network, and enter the network address,
2001:DB8::/96.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
245
Security Policies
DNS 64 Reply Modification
h) Click OK.
i) Click + and define the IPv4 PAT address for the inside IPv6 network.
Name the network object (for example, ipv4_pat), select Host, and enter the host address, 209.165.200.230.
j) Click OK.
Step 2 Configure the static NAT rule with DNS modification for the FTP server.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = FTPServer (or another name of your choosing).
• Create Rule For = Auto NAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
246
Security Policies
DNS 64 Reply Modification
• Type = Static.
• Source Interface = outside.
• Destination Interface = inside.
• Original Address = ftp_server network object.
• Translated Address = inside_v6 network object. Because the IPv4 embedded address method is
used when converting IPv4 to IPv6 addresses, 209.165.200.225 is converted to the IPv6 equivalent
D1A5:C8E1 and the network prefix is added to get the full address, 2001:DB8::D1A5:C8E1.
• On the Advanced Options tab, select Translate DNS replies that match this rule.
d) Click OK.
Step 3 Configure the static NAT rule for the DNS server.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = DNSServer (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Static.
• Source Interface = outside.
• Destination Interface = inside.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
247
Security Policies
DNS 64 Reply Modification
d) Click OK.
Step 4 Configure the dynamic PAT rule for the inside IPv6 network.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = PAT64Rule (or another name of your choosing).
• Create Rule For = Auto NAT.
• Type = Dynamic.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = inside_v6 network object.
• Translated Address = ipv4_pat network object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
248
Security Policies
DNS Reply Modification, DNS Server on Outside
d) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
249
Security Policies
DNS Reply Modification, DNS Server on Outside
Note This example assumes that the inside interface is not a bridge group interface (BVI) but a standard routed
interface. If the inside interface is a BVI, you need to duplicate the rules for each member interface.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
250
Security Policies
DNS Reply Modification, DNS Server on Outside
d) Click OK.
e) Click + and define the FTP server's translated address.
Name the network object (for example, ftp_server_outside), select Host, and enter the host address
209.165.201.10.
Step 2 Configure the static NAT rule with DNS modification for the FTP server.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = FTPServer (or another name of your choosing).
• Create Rule For = Auto NAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
251
Security Policies
DNS Reply Modification, DNS Server on Host Network
• Type = Static.
• Source Interface = inside.
• Destination Interface = outside.
• Original Address = ftp_server network object.
• Translated Address = ftp_server_outside network object.
• On the Advanced Options tab, select Translate DNS replies that match this rule.
d) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
252
Security Policies
DNS Reply Modification, DNS Server on Host Network
Note This example assumes that the inside interface is not a bridge group interface (BVI) but a standard routed
interface. If the inside interface is a BVI, you need to duplicate the rules for each member interface.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
253
Security Policies
DNS Reply Modification, DNS Server on Host Network
d) Click OK.
e) Click + and define the FTP server's translated address.
Name the network object (for example, ftp_server_translated), select Host, and enter the host address
10.1.2.56.
Step 2 Configure the static NAT rule with DNS modification for the FTP server.
a) Select Policies > NAT.
b) Click the + button.
c) Configure the following properties:
• Title = FTPServer (or another name of your choosing).
• Create Rule For = Auto NAT.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
254
Security Policies
DNS Reply Modification, DNS Server on Host Network
• Type = Static.
• Source Interface = outside.
• Destination Interface = inside.
• Original Address = ftp_server network object.
• Translated Address = ftp_server_translated network object.
• On the Advanced Options tab, select Translate DNS replies that match this rule.
d) Click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
255
Security Policies
DNS Reply Modification, DNS Server on Host Network
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
256
PA R T III
Virtual Private Networks (VPN)
• Site-to-Site VPN, on page 259
• Remote Access VPN, on page 289
CHAPTER 11
Site-to-Site VPN
A virtual private network (VPN) is a network connection that establishes a secure tunnel between remote
peers using a public source, such as the Internet or other network. VPNs use tunnels to encapsulate data packets
within normal IP packets for forwarding over IP-based networks. They use encryption to ensure privacy and
authentication to ensure the integrity of data.
• VPN Basics, on page 259
• Managing Site-to-Site VPNs, on page 263
• Monitoring Site-to-Site VPN, on page 276
• Examples for Site-to-Site VPN, on page 276
VPN Basics
Tunneling makes it possible to use a public TCP/IP network, such as the Internet, to create secure connections
between remote users and private corporate networks. Each secure connection is called a tunnel.
IPsec-based VPN technologies use the Internet Security Association and Key Management Protocol (ISAKMP,
or IKE) and IPsec tunneling standards to build and manage tunnels. ISAKMP and IPsec accomplish the
following:
• Negotiate tunnel parameters.
• Establish tunnels.
• Authenticate users and data.
• Manage security keys.
• Encrypt and decrypt data.
• Manage data transfer across the tunnel.
• Manage data transfer inbound and outbound as a tunnel endpoint or router.
A device in a VPN functions as a bidirectional tunnel endpoint. It can receive plain packets from the private
network, encapsulate them, create a tunnel, and send them to the other end of the tunnel where they are
unencapsulated and sent to their final destination. It can also receive encapsulated packets from the public
network, unencapsulate them, and send them to their final destination on the private network.
After the site-to-site VPN connection is established, the hosts behind the local gateway can connect to the
hosts behind the remote gateway through the secure VPN tunnel. A connection consists of the IP addresses
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
259
Virtual Private Networks (VPN)
Internet Key Exchange (IKE)
and hostnames of the two gateways, the subnets behind them, and the method the two gateways use to
authenticate to each other.
When IKE negotiation begins, the peer that starts the negotiation sends all of its enabled policies to the remote
peer, and the remote peer searches for a match with its own policies, in priority order. A match between IKE
policies exists if they have the same encryption, hash (integrity and PRF for IKEv2), authentication, and
Diffie-Hellman values, and an SA lifetime less than or equal to the lifetime in the policy sent. If the lifetimes
are not identical, the shorter lifetime, obtained from the remote peer, applies. By default, a simple IKE policy
that uses DES is the only enabled policy. You can enable other IKE policies at higher priorities to negotiate
stronger encryption standards, but the DES policy should ensure a successful negotiation.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
260
Virtual Private Networks (VPN)
Deciding Which Encryption Algorithm to Use
If your device license allows you to apply strong encryption, there is a wide range of encryption and hash
algorithms, and Diffie-Hellman groups, from which to choose. However, as a general rule, the stronger the
encryption that you apply to the tunnel, the worse the system performance. Find a balance between security
and performance that provides sufficient protection without compromising efficiency.
We cannot provide specific guidance on which options to choose. If you operate within a larger corporation
or other organization, there might already be defined standards that you need to meet. If not, take the time to
research the options.
The following topics explain the available options.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
261
Virtual Private Networks (VPN)
Deciding Which Hash Algorithms to Use
• MD5 (Message Digest 5)—Produces a 128-bit digest. MD5 uses less processing time for an overall faster
performance than SHA, but it is considered to be weaker than SHA.
• Null or None (NULL, ESP-NONE)—(IPsec Proposals only.) A null Hash Algorithm; this is typically
used for testing purposes only. However, you should choose the null integrity algorithm if you select
one of the AES-GCM/GMAC options as the encryption algorithm. Even if you choose a non-null option,
the integrity hash is ignored for these encryption standards.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
262
Virtual Private Networks (VPN)
VPN Topologies
• 5—Diffie-Hellman Group 5: 1536-bit MODP group. Formerly considered good protection for 128-bit
keys, this option is no longer considered good protection.
• 14—Diffie-Hellman Group 14: 2048-bit modular exponential (MODP) group. Considered good protection
for 192-bit keys.
• 19—Diffie-Hellman Group 19: National Institute of Standards and Technology (NIST) 256-bit elliptic
curve modulo a prime (ECP) group.
• 20—Diffie-Hellman Group 20: NIST 384-bit ECP group.
• 21—Diffie-Hellman Group 21: NIST 521-bit ECP group.
• 24—Diffie-Hellman Group 24: 2048-bit MODP group with 256-bit prime order subgroup. This option
is no longer recommended.
VPN Topologies
You can configure only point-to-point VPN connections using FDM. Although all connections are
point-to-point, you can link into larger hub-and-spoke or meshed VPNs by defining each of the tunnels in
which your device participates.
The following diagram displays a typical point-to-point VPN topology. In a point-to-point VPN topology,
two endpoints communicate directly with each other. You configure the two endpoints as peer devices, and
either device can start the secured connection.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
263
Virtual Private Networks (VPN)
Configuring a Site-to-Site VPN Connection
License Manager. If you are using the evaluation license, or you did not enable export-controlled
functionality, you cannot use strong encryption.
• You can create at most 20 unique IPsec profiles. Uniqueness is determined by the combination of IKEv1/v2
proposals and certificates, connection type, DH group and SA lifetime. You can reuse existing profiles.
Thus, if you use the same settings for all your site-to-site VPN connections, you have one unique IPsec
profile. Once you reach the limit of 20 unique IPsec profiles, you cannot create new site-to-site VPN
connections unless you use the same combination of attributes that you used for an existing connection
profile.
Procedure
Step 1 Click Device, then click View Configuration in the Site-to-Site VPN group.
This opens the Site-to-Site VPN page, which lists all of the connections that you have configured.
• To edit an existing connection, click the edit icon ( ) for the connection. See Configuring a Site-to-Site
VPN Connection, on page 264.
• To copy a summary of the connection configuration to the clipboard, click the copy icon ( ) for the
connection. You can paste this information in a document and send it to the administrator for the remote
device to help configure that end of the connection.
• To delete a connection that you no longer need, click the delete icon ( ) for the connection.
Note You can create a single VPN connection per local network/remote network combination. However, you
can create multiple connections for a local network if the remote network is unique in each connection
profile.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
264
Virtual Private Networks (VPN)
Configuring a Site-to-Site VPN Connection
Procedure
Step 1 Click Device, then click View Configuration in the Site-to-Site VPN group.
Step 2 Do any of the following:
• To create a new Site-to-Site VPN connection, click the + button.
If there are no connections yet, you can also click the Create Site-to-Site Connection button.
• To edit an existing connection, click the edit icon ( ) for the connection.
To delete a connection that you no longer need, click the delete icon ( ) for the connection.
Note You can use IPv4 or IPv6 addresses for these networks, but you must have a matching address
type on each side of the connection. For example, the VPN connection for a local IPv4 network
must have at least one remote IPv4 network. You can combine IPv4 and IPv6 on both sides
of a singe connection. The protected networks for the endpoints cannot overlap.
• IKE Version 2, IKE Version 1—Choose the IKE versions to use during Internet Key Exchange (IKE)
negotiations. Select either or both options as appropriate. When the device attempts to negotiate a
connection with the other peer, it uses whichever versions you allow and that the other peer accepts. If
you allow both versions, the device automatically falls back to the other version if negotiations are
unsuccessful with the initially chosen version. IKEv2 is always tried first if it is configured. Both peers
must support IKEv2 to use it in a negotiation.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
265
Virtual Private Networks (VPN)
Configuring the Global IKE Policy
• IKE Policy—Internet Key Exchange (IKE) is a key management protocol that is used to authenticate
IPsec peers, negotiate and distribute IPsec encryption keys, and automatically establish IPsec security
associations (SAs). This is a global policy: the objects you enable are applied to all VPNs. Click Edit to
examine the current globally-enabled policies per IKE version, and to enable and create new policies.
For more information, see Configuring the Global IKE Policy, on page 266.
• IPsec Proposal—The IPsec proposal defines the combination of security protocols and algorithms that
secure traffic in an IPsec tunnel. Click Edit and select the proposals for each IKE version. Select all
proposals that you want to allow. Click Set Default to simply select the system defaults, which differ
based on your export compliance. The system negotiates with the peer, starting from the strongest to the
weakest proposal, until a match is agreed upon. For more information, see Configuring IPsec Proposals,
on page 271.
• (IKEv2) Local Preshared Key, Remote Peer Preshared Key—The keys defined on this device and
on the remote device for the VPN connection. These keys can be different in IKEv2. The key can be
1-127 alphanumeric characters.
• (IKEv1) Preshared Key—The key that is defined on both the local and remote device. The key can be
1-127 alphanumeric characters.
• NAT Exempt—Whether to exempt the VPN traffic from NAT policies on the local VPN access interface.
If you do not want NAT rules to apply to the local network, select the interface that hosts the local
network. This option works only if the local network resides behind a single routed interface (not a bridge
group member). If the local network is behind more than one routed interface, or one or more bridge
group members, you must manually create the NAT exempt rules. For information on manually creating
the required rules, see Exempting Site-to-Site VPN Traffic from NAT, on page 276.
• Diffie-Helman Group for Perfect Forward Secrecy—Whether to use Perfect Forward Secrecy (PFS)
to generate and use a unique session key for each encrypted exchange. The unique session key protects
the exchange from subsequent decryption, even if the entire exchange was recorded and the attacker has
obtained the preshared or private keys used by the endpoint devices. To enable Perfect Forward Secrecy,
select the Diffie-Hellman key derivation algorithm to use when generating the PFS session key in the
Modulus Group list. If you enable both IKEv1 and IKEv2, the options are limited to those supported by
IKEv1. For an explanation of the options, see Deciding Which Diffie-Hellman Modulus Group to Use,
on page 262.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
266
Virtual Private Networks (VPN)
Configuring the Global IKE Policy
SAs for other applications, such as IPsec. Both phases use proposals when they negotiate a connection. An
IKE proposal is a set of algorithms that two peers use to secure the negotiation between them. IKE negotiation
begins by each peer agreeing on a common (shared) IKE policy. This policy states which security parameters
are used to protect subsequent IKE negotiations.
IKE policy objects define the IKE proposals for these negotiations. The objects that you enable are the ones
used when the peers negotiate a VPN connection: you cannot specify different IKE policies per connection.
The relative priority of each object determines which of these policies are tried first, with the lower number
being higher priority. The connection is not established if the negotiation fails to find a policy that both peers
can support.
To define the global IKE policy, you select which objects to enable for each IKE version. If the pre-defined
objects do not satisfy your requirements, create new policies to enforce your security policy.
The following procedure explains how to configure the global policy through the Objects page. You can also
enable, disable, and create policies when editing a VPN connection by clicking Edit for the IKE Policy settings.
Procedure
Step 1 Select Objects, then select IKE Policies from the table of contents.
Policies for IKEv1 and IKEv2 are shown in separate lists.
Step 2 Enable the IKE policies you want to allow for each IKE version.
a) Select IKEv1 or IKEv2 above the object table to show the policies for that version.
b) Click the State toggle to enable the appropriate objects and to disable objects that do not meet your
requirements.
If some of your security requirements are not reflected in the existing objects, define new ones to implement
your requirements. For details, see the following topics:
• Configuring IKEv1 Policies, on page 268
• Configuring IKEv2 Policies, on page 269
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
267
Virtual Private Networks (VPN)
Configuring IKEv1 Policies
Procedure
Step 1 Select Objects, then select IKE Policies from the table of contents.
Step 2 Select IKEv1 above the object table to show IKEv1 policies.
Step 3 If any of the system-defined policies meet your requirements, click the State toggle to enable them.
Also use the State toggle to disable unwanted policies. The relative priority determines which of these policies
are tried first, with the lower number being higher priority.
To delete an unreferenced object, click the trash can icon ( ) for the object.
• Encryption—The encryption algorithm used to establish the Phase 1 security association (SA) for
protecting Phase 2 negotiations. For an explanation of the options, see Deciding Which Encryption
Algorithm to Use, on page 261.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
268
Virtual Private Networks (VPN)
Configuring IKEv2 Policies
• Diffie-Hellman Group—The Diffie-Hellman group to use for deriving a shared secret between the two
IPsec peers without transmitting it to each other. A larger modulus provides higher security but requires
more processing time. The two peers must have a matching modulus group. For an explanation of the
options, see Deciding Which Diffie-Hellman Modulus Group to Use, on page 262.
• Hash—The hash algorithm for creating a message digest, which is used to ensure message integrity. For
an explanation of the options, see Deciding Which Hash Algorithms to Use, on page 262.
• Lifetime—The lifetime of the security association (SA), in seconds, from 120 to 2147483647 or blank.
When the lifetime is exceeded, the SA expires and must be renegotiated between the two peers. As a
general rule, the shorter the lifetime (up to a point), the more secure your IKE negotiations will be.
However, with longer lifetimes, future IPsec security associations can be set up more quickly than with
shorter lifetimes. The default is 86400. To specify an unlimited lifetime, enter no value (leave the field
blank).
Procedure
Step 1 Select Objects, then select IKE Policies from the table of contents.
Step 2 Select IKEv2 above the object table to show IKEv2 policies.
Step 3 If any of the system-defined policies meet your requirements, click the State toggle to enable them.
Also use the State toggle to disable unwanted policies. The relative priority determines which of these policies
are tried first, with the lower number being higher priority.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
269
Virtual Private Networks (VPN)
Configuring IKEv2 Policies
• Priority—The relative priority of the IKE policy, from 1 to 65,535. The priority determines the order
of the IKE policy compared by the two negotiating peers when attempting to find a common security
association (SA). If the remote IPsec peer does not support the parameters selected in your highest priority
policy, it tries to use the parameters defined in the next lowest priority. The lower the number, the higher
the priority.
• Name—The name of the object, up to 128 characters.
• State—Whether the IKE policy is enabled or disabled. Click the toggle to change the state. Only enabled
policies are used during IKE negotiations.
• Encryption—The encryption algorithm used to establish the Phase 1 security association (SA) for
protecting Phase 2 negotiations. Select all algorithms that you want to allow, although you cannot include
both mixed-mode (AES-GCM) and normal mode options in the same policy. (Normal mode requires
that you select an integrity hash, whereas mixed mode prohibits a separate integrity hash selection.) The
system negotiates with the peer, starting from the strongest to the weakest algorithm, until a match is
agreed upon. For an explanation of the options, see Deciding Which Encryption Algorithm to Use, on
page 261.
• Diffie-Hellman Group—The Diffie-Hellman group to use for deriving a shared secret between the two
IPsec peers without transmitting it to each other. A larger modulus provides higher security but requires
more processing time. The two peers must have a matching modulus group. Select all algorithms that
you want to allow. The system negotiates with the peer, starting from the strongest to the weakest group,
until a match is agreed upon. For an explanation of the options, see Deciding Which Diffie-Hellman
Modulus Group to Use, on page 262.
• Integrity Hash—The integrity portion of the hash algorithm for creating a message digest, which is used
to ensure message integrity. Select all algorithms that you want to allow. The system negotiates with the
peer, starting from the strongest to the weakest algorithm, until a match is agreed upon. The integrity
hash is not used with the AES-GCM encryption options. For an explanation of the options, see Deciding
Which Hash Algorithms to Use, on page 262.
• Pseudo Random Function (PRF) Hash—The pseudo-random function (PRF) portion of the hash
algorithm, which is used as the algorithm to derive keying material and hashing operations required for
the IKEv2 tunnel encryption. In IKEv1, the Integrity and PRF algorithms are not separated, but in IKEv2,
you can specify different algorithms for these elements. Select all algorithms that you want to allow. The
system negotiates with the peer, starting from the strongest to the weakest algorithm, until a match is
agreed upon. For an explanation of the options, see Deciding Which Hash Algorithms to Use, on page
262.
• Lifetime—The lifetime of the security association (SA), in seconds, from 120 to 2147483647 or blank.
When the lifetime is exceeded, the SA expires and must be renegotiated between the two peers. As a
general rule, the shorter the lifetime (up to a point), the more secure your IKE negotiations will be.
However, with longer lifetimes, future IPsec security associations can be set up more quickly than with
shorter lifetimes. The default is 86400. To specify an unlimited lifetime, enter no value (leave the field
blank).
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
270
Virtual Private Networks (VPN)
Configuring IPsec Proposals
The Encapsulating Security Protocol (ESP) is used for both IKEv1 and IKEv2 IPsec proposals. It provides
authentication, encryption, and antireplay services. ESP is IP protocol type 50.
The following topics explain how to configure IPsec proposals for each IKE version.
Procedure
Step 1 Select Objects, then select IPsec Proposals from the table of contents.
Step 2 Select IKEv1 above the object table to show IKEv1 IPsec proposals.
Step 3 Do one of the following:
• To create an object, click the + button.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
271
Virtual Private Networks (VPN)
Configuring IPsec Proposals for IKEv2
To delete an unreferenced object, click the trash can icon ( ) for the object.
• ESP Encryption—The Encapsulating Security Protocol (ESP) encryption algorithm for this proposal.
For an explanation of the options, see Deciding Which Encryption Algorithm to Use, on page 261.
• ESP Hash—The hash or integrity algorithm to use for authentication. For an explanation of the options,
see Deciding Which Hash Algorithms to Use, on page 262.
Procedure
Step 1 Select Objects, then select IPsec Proposals from the table of contents.
Step 2 Select IKEv2 above the object table to show IKEv2 IPsec proposals.
Step 3 Do one of the following:
• To create an object, click the + button.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
272
Virtual Private Networks (VPN)
Verifying Site-to-Site VPN Connections
To delete an unreferenced object, click the trash can icon ( ) for the object.
Procedure
Step 1 Log into the device CLI as explained in Logging Into the Command Line Interface (CLI), on page 6.
Step 2 Use the show ipsec sa command to verify that the IPsec security association is established.
You should see that the VPN connection is established between your device (the local addr) and the remote
peer (current_peer). The packets (pkts) counts should increase as you send traffic through the connection.
The access list should show the local and remote networks for the connection.
For example, the following output shows an IKEv2 connection.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
273
Virtual Private Networks (VPN)
Verifying Site-to-Site VPN Connections
access-list |s2sAcl|0730e31c-1e5f-11e7-899f-27f6e1030344
extended permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
local ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (192.168.3.0/255.255.255.0/0/0)
current_peer: 192.168.4.6
access-list |s2sAcl|0730e31c-1e5f-11e7-899f-27f6e1030344
extended permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
local ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (192.168.3.0/255.255.255.0/0/0)
current_peer: 192.168.4.6
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
274
Virtual Private Networks (VPN)
Verifying Site-to-Site VPN Connections
Step 3 Use the show isakmp sa command to verify the IKE security associations.
You can use the command without the sa keyword (or use the stats keyword instead) to view IKE statistics.
For example, the following output shows an IKEv2 security association.
IKEv2 SAs:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
275
Virtual Private Networks (VPN)
Monitoring Site-to-Site VPN
IKEv1 SAs:
Active SA: 1
Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
276
Virtual Private Networks (VPN)
Exempting Site-to-Site VPN Traffic from NAT
• If you are including both IPv4 and IPv6 networks in the VPN, create separate identity NAT rules for
each.
Consider the following example, which shows a site-to-site tunnel connecting the Boulder and San Jose offices.
For traffic that you want to go to the Internet (for example from 10.1.1.6 in Boulder to www.example.com),
you need a public IP address provided by NAT to access the Internet. The below example uses interface PAT
rules. However, for traffic that you want to go over the VPN tunnel (for example from 10.1.1.6 in Boulder to
10.2.2.78 in San Jose), you do not want to perform NAT; you need to exempt that traffic by creating an identity
NAT rule. Identity NAT simply translates an address to the same address.
Figure 22: Interface PAT and Identity NAT for Site-to-Site VPN
The following example explains the configuration for Firewall1 (Boulder). The example assumes that the
inside interface is a bridge group, so you need to write the rules for each member interface. The process is
the same if you have a single or multiple routed inside interfaces.
Note This example assumes IPv4 only. If the VPN also includes IPv6 networks, create parallel rules for IPv6.
Note that you cannot implement IPv6 interface PAT, so you need to create a host object with a unique
IPv6 address to use for PAT.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
277
Virtual Private Networks (VPN)
Exempting Site-to-Site VPN Traffic from NAT
Name the network object (for example, boulder-network), select Network, and enter the network address,
10.1.1.0/24.
d) Click OK.
e) Click + and define the inside San Jose network.
Name the network object (for example, sanjose-network), select Network, and enter the network address
10.2.2.0/24.
f) Click OK.
Step 2 Configure manual identity NAT for the Boulder network when going over the VPN to San Jose on Firewall1
(Boulder).
a) Select Policies > NAT.
b) Click the + button.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
278
Virtual Private Networks (VPN)
Exempting Site-to-Site VPN Traffic from NAT
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
279
Virtual Private Networks (VPN)
Exempting Site-to-Site VPN Traffic from NAT
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
280
Virtual Private Networks (VPN)
Exempting Site-to-Site VPN Traffic from NAT
• Type = Dynamic.
• Source Interface = inside1_2.
• Destination Interface = outside.
• Original Source Address = boulder-network network object.
• Translated Source Address = Interface. This option configures interface PAT using the destination
interface.
• Original Destination Address = any.
• Translated Destination Address = any.
c) Click OK.
d) Repeat the process to create equivalent rules for each of the other inside interfaces.
Step 4 Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
281
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
Wait for deployment to finish. The deployment summary should indicate that you have successfully
deployed your changes, and the task status for the job should be Deployed.
Step 5 If you are also managing Firewall2 (San Jose), you can configure similar rules for that device.
• The manual identity NAT rule would be for sanjose-network when the destination is boulder-network.
Create new interface objects for the Firewall2 inside and outside networks.
• The manual dynamic interface PAT rule would be for sanjose-network when the destination is "any."
The following procedure explains how to configure this service. You must configure both endpoints of the
VPN tunnel.
Procedure
Step 1 (Site A, main site.) Configure the site-to-site VPN connection to remote Site B.
a) Click Device, then click View Configuration in the Site-to-Site VPN group.
b) Click + to add a new connection.
c) Define the endpoints as follows, and then click Next:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
282
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
• Connection Profile Name—Give the connection a meaningful name, for example, Site-A-to-Site-B.
• Local VPN Access Interface—Select the outside interface.
• Local Network—Keep the default, Any.
• Remote IP Address—Enter the IP address of the remote peer’s outside interface. In this example,
203.0.113.1.
• Remote Network—Click +, then select the network object that defines the remote peer’s protected
network. In this example, 192.168.2.0/24. You can click Create New Network to create the object
now.
The following graphic shows how the first step should look.
• Diffie Helman Group for Perfect Forward Secrecy—This setting has no impact on hair pinning.
Configure it as you see fit.
e) Click Finish.
The connection summary is copied to the clipboard. You can paste it into a text file or other document to
help you configure the remote peer.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
283
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
Step 2 (Site A, main site.) Configure the NAT rule to translate all connections going out the outside interface to ports
on the outside IP address (interface PAT).
When you complete the initial device configuration, the system creates a NAT rule named
InsideOutsideNatRule. This rule applies interface PAT to IPv4 traffic from any interface that exits the device
through the outside interface. Because the outside interface is included in “Any” source interface, the rule
you need already exists, unless you edited it or deleted it.
The following procedure explains how to create the rule you need.
a) Click Policies > NAT.
b) Do one of the following:
• To edit the InsideOutsideNatRule, mouse over the Action column and click the edit icon ( ).
• To create a new rule, click +.
The following graphic shows the simple case where you select Any for the source address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
284
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
d) Click OK.
Step 3 (Site A, main site.) Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
Step 4 (Site B, remote site.) Log into the remote site’s device, and configure the site-to-site VPN connection to Site
A.
Use the connection summary obtained from the Site A device configuration to help you configure the Site B
side of the connection.
a) Click Device, then click View Configuration in the Site-to-Site VPN group.
b) Click + to add a new connection.
c) Define the endpoints as follows, and then click Next:
• Connection Profile Name—Give the connection a meaningful name, for example, Site-B-to-Site-A.
• Local VPN Access Interface—Select the outside interface.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
285
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
• Local Network—Click +, then select the network object that defines the local protected network.
In this example, 192.168.2.0/24. You can click Create New Network to create the object now.
• Remote IP Address—Enter the IP address of the main site’s outside interface. In this example,
198.51.100.1.
• Remote Network—Keep the default, Any. Ignore the warning; it is not relevant for this use case.
The following graphic shows how the first step should look.
• Diffie Helman Group for Perfect Forward Secrecy—This setting has no impact on hair pinning.
Match the setting used on Site A’s end of the VPN connection.
e) Click Finish.
Step 5 (Site B, remote site.) Delete all NAT rules for the protected network so that all traffic leaving the site must
go through the VPN tunnel.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
286
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
Performing NAT on this device is unnecessary because the Site A device will do the address translation. But
please examine your specific situation. If you have multiple internal networks and not all of them are
participating in this VPN connection, do not delete NAT rules that you need for those networks.
a) Click Policies > NAT.
b) Do one of the following:
• To delete rules, mouse over the Action column and click the delete icon ( ).
• To edit rules so they no longer apply to the protected network, mouse over the Action column and
click the edit icon ( ).
b) Click the Deploy Now button and wait for deployment to finish.
Wait for deployment to finish. The deployment summary should indicate that you have successfully
deployed your changes, and the task status for the job should be Deployed.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
287
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for External Site-to-Site VPN Users (Hair Pinning)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
288
CHAPTER 12
Remote Access VPN
Remote Access virtual private network (VPN) allows individual users to connect to your network from a
remote location using a computer or other supported iOS or Android device connected to the Internet. This
allows mobile workers to connect from their home networks or a public Wi-Fi network, for example.
The following topics explain how to configure remote access VPN for your network.
• Remote Access VPN Overview, on page 289
• Licensing Requirements for Remote Access VPN, on page 291
• Guidelines and Limitations for Remote Access VPN, on page 291
• Configuring Remote Access VPN, on page 292
• Monitoring Remote Access VPN, on page 298
• Troubleshooting Remote Access VPNs, on page 298
• Examples for Remote Access VPN, on page 301
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
289
Virtual Private Networks (VPN)
Downloading the AnyConnect Client Software
Note You can upload one AnyConnect Client package per operating system: Windows, Mac, and Linux. You
cannot upload multiple versions for a given OS type.
Obtain the AnyConnect Client software packages from software.cisco.com. You need to download the “Full
Installation Package” versions of the clients.
Note Android and iOS users should download the AnyConnect Client from the appropriate App Store.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
290
Virtual Private Networks (VPN)
Licensing Requirements for Remote Access VPN
Procedure
Step 1 Using a web browser, open https://ravpn-address, where ravpn-address is the IP address or hostname of the
outside interface on which you are allowing VPN connections.
You identify this interface when you configure the remote access VPN. The system prompts the user to log
in.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
291
Virtual Private Networks (VPN)
Configuring Remote Access VPN
• You cannot use overlapping addresses in the source address of a NAT rule and a remote access VPN
address pool.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
292
Virtual Private Networks (VPN)
Configure and Upload Client Profiles
If you configure a fully-qualified hostname (FQDN) for the outside interface when configuring the remote
access VPN connection, the system creates a client profile for you. This profile enables the default settings.
You need to create and upload client profiles only if you want non-default behavior. Note that client profiles
are optional: if you do not upload one, AnyConnect Client will use default settings for all profile-controlled
options.
Note You must include the FTD device’s outside interface in the VPN profile’s server list in order for the
AnyConnect Client to display all user controllable settings on the first connection. If you do not add the
address or FQDN as a host entry in the profile, then filters do not apply for the session. For example, if
you create a certificate match and the certificate properly matches the criteria, but you do not add the
device as a host entry in that profile, the certificate match is ignored.
The following procedure explains how you can create and edit objects directly through the Objects page. You
can also create AnyConnect Client profile objects while editing a profile property by clicking the Create New
AnyConnect Client Profile link shown in the object list.
Procedure
Step 1 Select Objects, then select AnyConnect Client Profiles from the table of contents.
Step 2 Do one of the following:
• To create an object, click the + button.
• To download the profile associated with an object, click the download icon ( ) for the object.
To delete an unreferenced object, click the trash can icon ( ) for the object.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
293
Virtual Private Networks (VPN)
Configure a Remote Access VPN Connection
Procedure
Step 1 Click Device, then click Setup Connection Profile in the Remote Access VPN group.
You can configure one remote access VPN. If you have already configured it, clicking View Configuration
opens your existing VPN; click the Edit button to make changes..
If you want to delete the configuration, click Clear Configuration.
• AD Realm/Directory Server for User Authentication—The directory realm that defines the directory
server to use for client authentication. End users must be defined in this directory server to complete a
VPN connection.
• Fallback Local Identity Source—If the primary source is an external server, you can select the
LocalIdentitySource as a fallback in case the primary server is unavailable. If you use the local database
as a fallback source, ensure that you define the same local usernames/passwords as the ones defined in
the external server.
• AnyConnect Packages—The AnyConnect full installation software images that you will support on
this VPN connection. For each package, the filename, including extensions, can be no more than 60
characters. You can upload separate packages for Windows, Mac, and Linux endpoints.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
294
Virtual Private Networks (VPN)
Configure a Remote Access VPN Connection
Download the packages from software.cisco.com. If the endpoint does not already have the right package
installed, the system prompts the user to download and install the package after the user authenticates.
• IPv4, IPv6 Address Pools—These options define the address pools for the remote endpoints. Clients
are assigned an address from these pools based on the IP version they use to make the VPN connection.
Select a network object that defines a subnet for each IP type you want to support. Select None (or leave
blank) if you do not want to support that IP version. For example, you could define an IPv4 pool as
10.100.10.0/24. The address pool cannot be on the same subnet as the IP address for the outside interface.
• Primary, Secondary DNS Servers—The DNS servers clients should use for domain name resolution
when connected to the VPN. Click the OpenDNS button to load these fields with the OpenDNS public
DNS servers. Otherwise, enter the IP addresses of your DNS servers.
• Domain Search Name—Enter the domain name for your network, e.g. example.com. This domain is
added to hostnames that are not fully-qualified, for example, serverA instead of serverA.example.com.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
295
Virtual Private Networks (VPN)
Configure a Remote Access VPN Connection
• Disable browser proxy—Do not use the proxy defined for the browser, if any. No browser
connections will go through the proxy.
• Auto detect settings—Enables the use of automatic proxy server detection in the browser.
• Use custom settings—Configures a proxy for the client browser. Enter the IP address and optionally,
port, for the HTTP proxy server (the host and port combined cannot exceed 100 characters). You
can also click Add Proxy Exception if you want to exempt requests to specific web servers from
going through the proxy (specifying the port in the exception list is optional). The entire proxy
exception list, combining all addresses and ports, cannot be longer than 255 characters.
• Split Tunneling—Enable split-tunneling to allow users access to their local networks or the Internet
directly at the same time they are using a secure VPN tunnel. Keep split-tunneling disabled for a more
secure VPN connection. If you enable split tunneling, you must also select the network objects that
represent internal networks remote users will be accessing in the Inside Networks list. The networks
list must contain the same IP types as the address pools you are supporting. For any networks outside
the ones specified, the user's ISP gateway is used for transmitting traffic.
• NAT Exempt—Enable NAT Exempt to exempt traffic to and from the remote access VPN endpoints
from NAT translation. If you do not exempt VPN traffic from NAT, ensure that the existing NAT rules
for the outside and inside interfaces do not apply to the RA VPN pool of addresses. NAT exempt rules
are manual static identity NAT rules for a given source/destination interface and network combination,
but they are not reflected in the NAT policy, they are hidden. If you enable NAT Exempt, you must also
configure the following.
• Inside Interfaces—Select the interfaces for the internal networks remote users will be accessing.
NAT rules are created for these interfaces.
• Inside Networks—Select the network objects that represent internal networks remote users will be
accessing. The networks list must contain the same IP types as the address pools you are supporting.
• AnyConnect Client Profiles—(Optional.) If you configure a fully-qualified domain name for the outside
interface, a default profile will be created for you. Alternatively, you can upload your own client profile.
Create these profiles using the standalone AnyConnect Profile Editor, which you can download and
install from software.cisco.com. If you do not select a client profile, the AnyConnect client uses default
values for all options. The items in this list are AnyConnect Client Profile objects rather than the profiles
themselves. You can create (and upload) new profiles by clicking Create New AnyConnect Client
Profile in the drop-down list.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
296
Virtual Private Networks (VPN)
Verify the Remote Access VPN Configuration
Procedure
Step 1 From an external network, establish a VPN connection using the AnyConnect Client.
Using a web browser, open https://ravpn-address, where ravpn-address is the IP address or hostname of the
outside interface on which you are allowing VPN connections. If necessary, install the client software and
complete the connection. See How Users Can Install the AnyConnect Client Software, on page 290.
Step 2 Log into the device CLI as explained in Logging Into the Command Line Interface (CLI), on page 6.
Step 3 Use the show vpn-sessiondb command to view summary information about current VPN sessions.
The statistics should show your active AnyConnect Client session, and information on cumulative sessions,
the peak concurrent number of sessions, and inactive sessions. Following is sample output from the command.
---------------------------------------------------------------------------
Tunnels Summary
---------------------------------------------------------------------------
Active : Cumulative : Peak Concurrent
----------------------------------------------
Clientless : 0 : 1 : 1
AnyConnect-Parent : 1 : 49 : 3
SSL-Tunnel : 1 : 46 : 3
DTLS-Tunnel : 1 : 46 : 3
---------------------------------------------------------------------------
Totals : 3 : 142
---------------------------------------------------------------------------
---------------------------------------------------------------------------
IPv6 Usage Summary
---------------------------------------------------------------------------
Active : Cumulative : Peak Concurrent
----------------------------------------------
AnyConnect SSL/TLS/DTLS : : :
Tunneled IPv6 : 1 : 20 : 2
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
297
Virtual Private Networks (VPN)
Monitoring Remote Access VPN
---------------------------------------------------------------------------
Step 4 Use the show vpn-sessiondb anyconnect command to view detailed information about current VPN sessions.
Detailed information includes encryption used, bytes transmitted and received, and other statistics. If you use
your VPN connection, you should see the bytes transmitted/received numbers change as you re-issue this
command.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
298
Virtual Private Networks (VPN)
Troubleshooting SSL Connection Problems
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
299
Virtual Private Networks (VPN)
Troubleshooting RA VPN Traffic Flow Problems
• If you configured a fully-qualified domain name (FQDN) for the outside interface in the remote access
(RA) VPN connection profile, verify that you can ping the FQDN from the client device. If you can ping
the IP address but not the FQDN, then you need to update the DNS servers used by the client and RA
VPN connection profile to add the FQDN-to-IP-address mapping. If you are using the default AnyConnect
Client profile that is generated when you specify an FQDN for the outside interface, the user will need
to edit the server address to use the IP address until DNS is updated.
• Verify that the user is accepting the certificate presented by the outside interface. The user should accept
it permanently.
• If the user’s AnyConnect Client includes multiple connection profiles, that they are selecting the right
one.
• If everything seems right on the client end, make an SSH connection to the FTD device, and enter the
debug webvpn command. Examine the messages issued during a connection attempt.
3. Make an SSH connection to the FTD device and verify that traffic is being sent and received for the remote
access VPN. Use the following commands.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
300
Virtual Private Networks (VPN)
Examples for Remote Access VPN
How to Provide Internet Access on the Outside Interface for Remote Access
VPN Users (Hair Pinning)
In remote access VPN, you might want users on the remote networks to access the Internet through your
device. However, because the remote users are entering your device on the same interface that faces the
Internet (the outside interface), you need to bounce Internet traffic right back out of the outside interface. This
technique is sometimes called hair pinning.
The following graphic shows an example. There is a remote access VPN configured on the outside interface,
198.51.100.1. You want to split the remote user’s VPN tunnel, so that Internet-bound traffic goes back out
the outside interface, while traffic to your internal networks continue through the device. Thus, when a remote
user wants to go to a server on the Internet, such as www.example.com, the connection first goes through the
VPN, then gets routed back out to the Internet from the 198.51.100.1 interface.
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
301
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for Remote Access VPN Users (Hair Pinning)
The device identity section of the page might look like the following:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
302
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for Remote Access VPN Users (Hair Pinning)
d) Continue down the page and configure the IPv4 Address Pool and optionally, the IPv6 Address Pool.
Select an object that identifies a network. Remote access VPN users are assigned an address from this
pool. For example, a network object that specifies 10.1.10.0/24. If the object does not already exist, click
Create New Network at the bottom of the list. Also configure a pool for IPv6 if you support those addresses.
e) Scroll down the page and configure the DNS settings for remote connections.
Enter the IP addresses of the DNS servers you use, and your local domain name, for example, example.com.
You can click OpenDNS to use the Open DNS servers.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
303
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for Remote Access VPN Users (Hair Pinning)
f) Click Next, scroll down, and configure the Corporate Resource options.
(You can also configure the banner, connection time and timeout, and proxy settings, but these are not
directly related to hair pinning.)
The following settings are critical to making hair pinning possible in the remote access VPN.
• Split Tunneling—Disable this feature. You want all traffic to go to the VPN gateway, whereas split
tunneling is a way to allow remote clients to directly access local or Internet sites outside of the VPN.
• NAT Exempt—Enable this feature. Select the inside interface, then select a network object that
defines the internal networks. In this example, the object should specify 192.168.1.0/24. RA VPN
traffic going to the internal network will not get address translation. However, because hair-pinned
traffic is going out the outside interface, it will still be NAT’ed because the NAT exemption applies
to the inside interface only.
• To edit the InsideOutsideNatRule, mouse over the Action column and click the edit icon ( ).
• To create a new rule, click +.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
304
Virtual Private Networks (VPN)
How to Provide Internet Access on the Outside Interface for Remote Access VPN Users (Hair Pinning)
The following graphic shows the simple case where you select Any for the source address.
d) Click OK.
Step 3 Commit your changes.
a) Click the Deploy Changes icon in the upper right of the web page.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
305
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
Wait for deployment to finish. The deployment summary should indicate that you have successfully
deployed your changes, and the task status for the job should be Deployed.
Note If you use the data interfaces as a gateway for the virtual management interface, this configuration also
enables usage of the directory for identity policies. If you do not use data-interfaces as the management
gateway, ensure that there is a route from the management network to the inside network that participates
in the site-to-site VPN connection.
1 Remote access host that makes a VPN connection to 192.168.4.6. Clients will get an
address in the 172.18.1.0/24 address pool.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
306
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
3 The site-to-site VPN tunnel between the outside interfaces of the Site A and Site B the
FTD devices.
Procedure
Step 1 Configure the site-to-site VPN connection on Site B, which hosts the directory server.
a) Click Device, then click View Configuration in the Site-to-Site VPN group.
b) Click the + button.
c) Configure the following options for Endpoint Settings.
• Connection Profile Name—Enter a name, for example, SiteA (to indicate that the connection is to
Site A).
• Local Site—These options define the local endpoint.
• Local VPN Access Interface—Select the outside interface (the one with the 192.168.2.1 address
in the diagram).
• Local Network—Click + and select the network object that identifies the local network that
should participate in the VPN connection. Because the directory server is on this network, it
can participate in the site-to-site VPN. Assuming that the object does not already exist, click
Create New Network and configure an object for the 192.168.1.0/24 network. After saving
the object, select it in the drop-down list and click OK.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
307
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
308
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
2. SiteAInterface, Host, 192.168.4.6. This is key: you must include the remote access VPN
connection point address as part of the remote network for the site-to-site VPN
connection so that the RA VPN hosted on that interface can use the directory server.
When you are finished, the endpoint settings should look like the following:
d) Click Next.
e) Define the privacy configuration for the VPN.
For this use case, we assume you qualify for export controlled features, which allows the use of strong
encryption. Adjust these example settings to meet your needs and your license compliance.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
309
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
• IKE Version 2, IKE Version 1—Keep the defaults, IKE Version 2 enabled, IKE Version 1 disabled.
• IKE Policy—Click Edit and enable AES-GCM-NULL-SHA and AES-SHA-SHA, and disable
DES-SHA-SHA.
• IPsec Proposal—Click Edit. In the Select IPSec Proposals dialog box, click +, then click Set Default
to choose the default AES-GCM proposals.
• Local Preshared Key, Remote Peer Preshared Key—Enter the keys defined on this device and
on the remote device for the VPN connection. These keys can be different in IKEv2. The key can
be 1-127 alphanumeric characters. Remember these keys, because you must configure the same
strings when creating the site-to-site VPN connection on the Site A device.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
310
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
• Diffie-Helman Group for Perfect Forward Secrecy—Select Group 19. This option determines
whether to use Perfect Forward Secrecy (PFS) to generate and use a unique session key for each
encrypted exchange. The unique session key protects the exchange from subsequent decryption, even
if the entire exchange was recorded and the attacker has obtained the preshared or private keys used
by the endpoint devices. For an explanation of the options, see Deciding Which Diffie-Hellman
Modulus Group to Use, on page 262.
g) Click Next.
h) Review the summary and click Finish.
The summary information is copied to the clipboard. You can paste the information in a document and
use it to help you configure the remote peer, or to send it to the party responsible for configuring the peer.
i) Click the Deploy Changes icon in the upper right of the web page.
j) Click the Deploy Now button and wait for deployment to complete successfully.
Now the Site B device is ready to host one end of the site-to-site VPN connection.
Step 2 Log out of the Site B device and log into the Site A device.
Step 3 Configure the site-to-site VPN connection on Site A, which will host the remote access VPN.
a) Click Device, then click View Configuration in the Site-to-Site VPN group.
b) Click the + button.
c) Configure the following options for Endpoint Settings.
• Connection Profile Name—Enter a name, for example, SiteB (to indicate that the connection is to
Site B).
• Local Site—These options define the local endpoint.
• Local VPN Access Interface—Select the outside interface (the one with the 192.168.4.6 address
in the diagram).
• Local Network—Click + and select the network objects that identify the local networks that
should participate in the VPN connection. Click Create New Network, configure the following
objects, then select them in the list. Note that you created the same objects in the Site B
device, but you have to create them again in the Site A device.
1. SiteAInside, Network, 192.168.3.0/24.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
311
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
2. SiteAInterface, Host, 192.168.4.6. This is key: you must include the remote access VPN
connection point address as part of the inside network for the site-to-site VPN
connection so that the RA VPN hosted on that interface can use the directory server
on the remote network.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
312
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
• Remote Network—Click + and select the network object that identifies the remote network
that should participate in the VPN connection, the one that includes the directory server. Click
Create New Network and configure an object for the 192.168.1.0/24 network. After saving
the object, select it in the drop-down list and click OK. Note that you created the same object
in the Site B device, but you have to create it again in the Site A device.
When you are finished, the endpoint settings should look like the following. Notice that the local/remote
networks are flipped compared to the Site B settings. This is how the two ends of a point-to-point connection
should always look.
d) Click Next.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
313
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
314
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
g) Click Next.
h) Review the summary and click Finish.
i) Click the Deploy Changes icon in the upper right of the web page.
j) Click the Deploy Now button and wait for deployment to complete successfully.
Now the Site A device is ready to host the other end of the site-to-site VPN connection. Because Site B
is already configured with compatible settings, the two devices should negotiate a VPN connection.
You can confirm the connection by logging into the device CLI and pinging the directory server. You can
also use the show ipsec sa command to view the session information.
Step 4 Configure the directory server on Site A. Click Test to verify that there is a connection.
a) Select Objects, then select Identity Realm from the table of contents.
b) Click the + button.
c) Configure the basic realm properties.
• Name—A name for the directory realm. For example, AD.
• Type—The type of directory server. Active Directory is the only supported type, and you cannot
change this field.
• Directory Username, Directory Password—The distinguished username and password for a user
with appropriate rights to the user information you want to retrieve. For Active Directory, the user
does not need elevated privileges. You can specify any user in the domain. The username must be
fully qualified; for example, Administrator@example.com (not simply Administrator).
Note The system generates ldap-login-dn and ldap-login-password from this information. For
example, Administrator@example.com is translated as
cn=adminisntrator,cn=users,dc=example,dc=com. Note that cn=users is always part of this
translation, so you must configure the user you specify here under the common name
“users” folder.
• Base DN—The directory tree for searching or querying user and group information, that is, the
common parent for users and groups. For example, cn=users,dc=example,dc=com. For information
on finding the base DN, see Determining the Directory Base DN, on page 101.
• AD Primary Domain— The fully qualified Active Directory domain name that the device should
join. For example, example.com.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
315
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
e) Click the Test button to verify the system can contact the server.
The system uses separate processes to access the server, so you might get errors indicating that the
connection works for one type of use but not another, for example, available for Identity policies but not
for remote access VPN. If the server cannot be reached, verify that you have the right IP address and host
name, that the DNS server has an entry for the hostname, and so forth. Also, verify that the site-to-site
VPN connection is working and that you included Site A's outside interface address in the VPN, and that
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
316
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
NAT is not translating traffic for the directory server. You might also need to configure a static route for
the server.
f) Click OK.
Step 5 Click Device > Smart License > View Configuration, and enable the RA VPN license.
When enabling the RA VPN license, select the type of license you purchased: Plus, Apex (or both), or VPN
Only. For more information, see Licensing Requirements for Remote Access VPN, on page 291.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
317
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
c) Click Next.
d) Define the device identity and client addressing configuration.
• Certificate of Device Identity—Select DefaultInternalCertificate. This is the internal certificate
used to establish the identity of the device. Clients must accept this certificate to complete a secure
VPN connection. If you have a different certificate that you want use, click Create New Internal
Certificate in the drop-down list and upload it.
• Outside Interface—Select outside, the one with the 192.168.4.6 IP address. This is the interface to
which users connect when making the remote access VPN connection.
• Fully-qualified Domain Name for the Outside Interface—The name of the interface, for example,
ravpn.example.com. If you specify a name, the system can create a client profile for you. For this
example, we will leave it blank.
Note You are responsible for ensuring that the DNS servers used in the VPN and by clients can
resolve this name to the outside interface's IP address. Add the FQDN to the relevant DNS
servers.
• IPv4, IPv6 Address Pools—These options define the address pools for the remote endpoints. For
this example, select Create New Network in the IPv4 address pool and create an object for the
172.18.1.0/24 network, then select the object. Clients are assigned an address from this pool. Leave
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
318
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
the IPv6 pool blank. The address pool cannot be on the same subnet as the IP address for the outside
interface.
The object should look like the following:
• Primary, Secondary DNS Servers—For this example, click the OpenDNS button to load these
fields with the OpenDNS public DNS servers. RA VPN clients use these DNS servers clients for
domain name resolution when connected to the VPN. Optionally, enter the IP addresses of your DNS
servers.
• Domain Search Name—Enter the domain name for your network, e.g. example.com. This domain
is added to hostnames that are not fully-qualified, for example, serverA instead of
serverA.example.com.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
319
Virtual Private Networks (VPN)
How to Use a Directory Server on an Outside Network with Remote Access VPN
e) Click Next.
f) Define the connection settings to customize AnyConnect client behavior.
Keep the default settings for all options, as they are appropriate for most networks.
Because NAT Exempt is selected, you need to configure the following options:
• Inside Interfaces—Select the inside interface. These are the interfaces for the internal networks
remote users will be accessing. NAT rules are created for these interfaces.
• Inside Networks—Select the SiteAInside network object. These are the network objects that represent
internal networks remote users will be accessing.
g) Click Next.
h) Review the summary.
First, verify that the summary is correct.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
320
Virtual Private Networks (VPN)
How to Customize the AnyConnect Client Icon and Logo
Then, click Instructions to see what end users need to do to initially install the AnyConnect software and
test that they can complete a VPN connection. Click Copy to copy these instructions to the clipboard, and
paste them in a text file or email.
i) Click Finish.
Step 7 Click the Deploy Changes icon in the upper right of the web page.
Step 8 Click the Deploy Now button and wait for deployment to complete successfully.
Now the Site A device is ready to accept RA VPN connections. Have an external user install the AnyConnect
Client client and complete a VPN connection.
You can confirm the connection by logging into the device CLI and using the show vpn-sessiondb anyconnect
command to view the session information.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
321
Virtual Private Networks (VPN)
How to Customize the AnyConnect Client Icon and Logo
To upload these files, you must place them on a server that the FTD device can access. You can use a TFTP,
FTP, HTTP, HTTPS, or SCP server. The URLs to get images from these files can include paths and
uesrname/password, as required by your server setup. This example will use TFTP.
Procedure
Step 1 Upload the image files to each FTD device that is acting as an RA VPN headend that should use the customized
icons and logos.
a) Log into the device CLI using an SSH client.
b) In the CLI, enter the system support diagnostic-cli command to enter diagnostic CLI mode.
ftdv1>
Note Read the message! You must press Ctrl+a, then d, to get out of the diagnostic CLI and back
into the normal FTD CLI mode.
c) Note the command prompt. The normal CLI uses > only, whereas the diagnostic CLI’s user EXEC mode
uses the hostname plus >. In this example, ftdv1>. You need to get into privileged EXEC mode, which
uses # as the ending character, for example, ftdv1#. If your prompt already has #, skip this step. Otherwise,
enter the enable command, and simply press Enter at the password prompt without entering a password.
ftdv1> enable
Password:
ftdv1#
d) Use the copy command to copy each file from the hosting server to the FTD device’s disk0. You can
place them in a subdirectory, such as disk0:/anyconnect-images/. You can create a new folder using the
mkdir command.
For example, if the TFTP server’s IP address is 10.7.0.80, and you want to create a new directory, the
commands would be similar to the following. Note that responses to the copy command are omitted after
the first example.
Accessing tftp://10.7.0.80/app_logo.png...!!!!!!
Writing file disk0:/anyconnect-images/app_logo.png...
!!!!!!
12288 bytes copied in 1.000 secs (12288 bytes/sec)
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
322
Virtual Private Networks (VPN)
How to Customize the AnyConnect Client Icon and Logo
Step 2 Use the import webvpn command in the diagnostic CLI to instruct the AnyConnect Client to download these
images when installing itself on client machines.
import webvpn AnyConnect-customization type resource platform win name filename
disk0:/directoryname/filename
This command is for Windows. For Linux, replace the win keyword with linux or linux-64, as appropriate
for your clients.
For example, to import the files uploaded in the previous step, and assuming we are still in the diagnostic
CLI:
What to do next
If you want to return to the default images, use the revert webvpn command (in the diagnostic CLI privileged
EXEC mode) for each image you customized. The command is:
revert webvpn AnyConnect-customization type resource platform win name filename
As with import webvpn, replace win with linux or linux-64 if you customized those client platforms, and
issue the command separately for each image filename you imported. For example:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
323
Virtual Private Networks (VPN)
How to Customize the AnyConnect Client Icon and Logo
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
324
PA R T IV
System Administration
• System Settings, on page 327
• System Management, on page 337
CHAPTER 13
System Settings
The following topics explain how to configure the various system settings that are grouped together on the
System Settings page. The settings cover overall system function.
• Configuring the Management Access List, on page 327
• Configuring Diagnostic Logging, on page 329
• Configuring the DHCP Server, on page 330
• Configuring DNS, on page 332
• Configuring the Management Interface, on page 332
• Configuring the Device Hostname, on page 334
• Configuring Network Time Protocol (NTP), on page 334
• Configuring URL Filtering Preferences, on page 335
• Configuring Cloud Management (Cisco Defense Orchestrator), on page 336
Caution If you constrain access to specific addresses, you can easily lock yourself out of the system. If you delete
access for the IP address that you are currently using, and there is no entry for “any” address, you will
lose access to the system when you deploy the policy. Be very careful if you decide to configure the
access list.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
327
System Administration
Configuring the Management Access List
Procedure
Step 1 Click Device, then click the System Settings > Management Access List link.
If you are already on the System Settings page, simply click Management Access List in the table of contents.
c) Click OK.
Step 3 To create rules for data interfaces:
a) Select the Data Interfaces tab.
The list of rules defines which addresses are allowed access to the indicated port on the interface: 443 for
the FDM (the HTTPS web interface), 22 for the SSH CLI.
The rules are not an ordered list. If an IP address matches any rule for the requested port, the user is
allowed to attempt logging into the device.
Note
To delete a rule, click the trash can icon ( ) for the rule. If you delete all of the rules for a
protocol, no one can access the device on that interface using the protocol.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
328
System Administration
Configuring Diagnostic Logging
• Allowed Networks—Select the network objects that define the IPv4 or IPv6 network or host that
should be able to access the system. To specify "any" address, select any-ipv4 (0.0.0.0/0) and any-ipv6
(::/0).
c) Click OK.
Procedure
Step 1 Click Device, then click the System Settings > Logging Settings link.
If you are already on the System Settings page, simply click Logging Settings in the table of contents
Step 3 Turn the slider to On for each of the locations where you want to see diagnostic log messages, and select a
minimum severity level.
You can log messages to the following locations:
• Console—These messages appear when you log into the CLI on the Console port. You can also see these
logs in an SSH session to other interfaces (including the management address) by using the show
console-output command. In addition, you can see these messages in real time in the diagnostic CLI,
enter system support diagnostic-cli from the main CLI.
• Syslog—These messages are sent to the external syslog servers that you specify. Click +, select the syslog
server objects, and click OK in the popup dialog box. If the object for a server does not already exist,
click Add Syslog Server to create it.
Severity Levels
The following table lists the syslog message severity levels.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
329
System Administration
Configuring the DHCP Server
Note ASA and FTD do not generate syslog messages with a severity level of zero (emergencies).
Note Do not configure a DHCP server on a network that already has a DHCP server operating on it. The two
servers will conflict and results will be unpredictable.
Procedure
Step 1 Click Device, then click the System Settings > DHCP Server link.
If you are already on the System Settings page, simply click DHCP Server in the table of contents.
The page has two tabs. Initially, the Configuration tab shows the global parameters.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
330
System Administration
Configuring the DHCP Server
The DHCP Servers tab shows the interfaces on which you have configured DHCP server, whether the server
is enabled, and the address pool for the server.
c) Click Save.
Step 3 Click the DHCP Servers tab and configure the servers.
a) Do one of the following:
• To configure DHCP server for an interface that is not already listed, click +.
• To edit an existing DHCP server, click the edit icon ( ) for the server.
To delete a server, click the trash can icon ( ) for the server.
b) Configure the server properties:
• Enable DHCP Server—Whether to enable the server. You can configure a server but keep it disabled
until you are ready to use it.
• Interface—Select the interface on which you will provide DHCP addresses to clients. The interface
must have a static IP address; you cannot be using DHCP to obtain the interface address if you want
to run a DHCP server on the interface. For bridge groups, you configure the DHCP server on the
Bridge Virtual Interface (BVI), not the member interfaces, and the server operates on all member
interfaces.
You cannot configure DHCP server on the Diagnostic interface; configure it on the Management
interface instead, on the Device > System Settings > Management Interface page.
• Address Pool—The range of IP addresses from lowest to highest that the server is allowed to provide
to clients that request an address. Specify the start and end address for the pool, separated by a hyphen.
For example, 10.100.10.12-10.100.10.250.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
331
System Administration
Configuring DNS
The range of IP addresses must be on the same subnet as the selected interface and cannot include:
the IP address of the interface itself, the broadcast address, or the subnet network address.
The size of the address pool is limited to 256 addresses per pool on the FTD device. If the address
pool range is larger than 253 addresses, the netmask of the FTD interface cannot be a Class C address
(for example, 255.255.255.0) and needs to be something larger, for example, 255.255.254.0.
c) Click OK.
Configuring DNS
The Domain Name System (DNS) servers are used to resolve hostnames to IP addresses. These servers are
used by the management interface. You configure DNS servers during initial system setup, but you can change
them using the following procedure.
You can also change the DNS configuration in the CLI using the configure network dns servers and configure
network dns searchdomains commands.
If you have problems with DNS resolution, see Troubleshooting DNS for the Management Interface, on page
351.
Procedure
Step 1 Click Device, then click the System Settings > DNS Server link.
If you are already on the System Settings page, simply click DNS Server in the table of contents.
Step 2 In Primary, Secondary, Tertiary DNS IP address, enter the IP addresses of up to three DNS servers in
order of preference.
The primary DNS server is used unless it cannot be contacted, in which case the secondary is tried, and finally
the tertiary.
Click Use OpenDNS if you want to configure the OpenDNS public DNS servers. Clicking the button loads
the appropriate IP addresses into the fields.
Step 3 In Domain Search Name, enter the domain name for your network, e.g. example.com.
This domain is added to hostnames that are not fully-qualified, for example, serverA instead of
serverA.example.com.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
332
System Administration
Configuring the Management Interface
page with other physical interfaces. See Management/Diagnostic Interface, on page 112 for more information
about the Diagnostic interface.
The management interface has two uses:
• You can open web and SSH connections to the IP address and configure the device through the interface.
• The system obtains smart licensing and database updates through this IP address.
If you use the CLI setup wizard, you configure the management address and gateway for the device during
initial system configuration. If you use the FDM setup wizard, the management address and gateway remain
the defaults.
If necessary, you can change these addresses through the FDM. You can also change the management address
and gateway in the CLI using the configure network ipv4 manual and configure network ipv6 manual
commands.
You can define static addresses, or obtain an address through DHCP if another device on the management
network is acting as a DHCP server. By default, the management address is static, and a DHCP server runs
on the port. Thus, you can plug a device directly into the management port and get a DHCP address for your
workstation. This makes it easy to connect to and configure the device.
Caution If you change the address to which you are currently connected, you will lose access to the FDM (or
the CLI) when you save the changes, as they are applied immediately. You will need to reconnect to
the device. Ensure that the new address is valid and available on the management network.
Procedure
Step 1 Click Device, then click the System Settings > Management Interface link.
If you are already on the System Settings page, click Management Interface in the table of contents
Step 3 Configure the management address, subnet mask or IPv6 prefix, and gateway (if necessary) for IPv4, IPv6,
or both.
You must configure at least one set of properties. Leave one set blank to disable that addressing method.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
333
System Administration
Configuring the Device Hostname
Select Type > DHCP to obtain the address and gateway through DHCP or IPv6 auto configuration. However,
you cannot use DHCP if you are using the data interfaces as the gateway. In this case, you must use a static
address.
Step 4 (Optional.) If you configure a static IPv4 address, configure a DHCP server on the interface.
If you configure a DHCP server on the management interface, clients on the management network can obtain
their address from the DHCP pool.
a) Click Enable DHCP Server > On.
b) Enter the Address Pool for the server.
The address pool is the range of IP addresses from lowest to highest that the server is allowed to provide
to clients that request an address. The range of IP addresses must be on the same subnet as the management
address and cannot include: the IP address of the interface itself, the broadcast address, or the subnet
network address. Specify the start and end address for the pool, separated by a hyphen. For example,
192.168.45.46-192.168.45.254.
Caution If you change the hostname when connected to the system using the hostname, you will lose access to
the FDM when you save the changes, as they are applied immediately. You will need to reconnect to
the device.
Procedure
Step 1 Click Device, then click the System Settings > Hostname link.
If you are already on the System Settings page, simply click Hostname in the table of contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
334
System Administration
Configuring URL Filtering Preferences
Procedure
Step 1 Click Device, then click the System Settings > NTP link.
If you are already on the System Settings page, simply click NTP in the table of contents
Step 2 In NTP Time Server, select whether you want to use your own or Cisco's time servers.
• Default NTP Time Server—If you select this option, the server list shows the server names that are
used for NTP.
• Manually Input—If you select this option, enter the fully qualified domain name or IPv4 or IPv6 address
of the NTP server you want to use. For example, ntp1.example.com or 10.100.10.10. You can add up to
3 NTP servers.
Procedure
Step 1 Click Device, then click the System Settings > URL Filtering Preferences link.
If you are already on the System Settings page, simply click URL Filtering Preferences in the table of
contents
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
335
System Administration
Configuring Cloud Management (Cisco Defense Orchestrator)
Note After configuring the device using FDM, if you decide you want to instead
manage the device through the cloud, ensure that you duplicate your local
changes in the cloud-based configuration.
• Remote configuration management through the cloud—In this approach, you use CDO to create and
update the device configuration. When using this approach, do not make local changes to the configuration,
because on each cloud deployment, the configuration defined in the cloud replaces the local configuration
on the device. If you make a local change, be sure to repeat the configuration in the cloud-based
configuration if you want to preserve the change.
For more information about how cloud management works, refer to the CDO portal (http://www.cisco.com/
go/cdo) or ask the reseller or partner with whom you are working.
Procedure
Step 1 Click Device, then click the System Settings > Cloud Management link.
If you are already on the System Settings page, simply click Cloud Management in the table of contents.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
336
CHAPTER 14
System Management
The following topics explain how to perform system management tasks such as updating system databases
and backing up and restoring the system.
• Installing Software Updates, on page 337
• Backing Up and Restoring the System, on page 341
• Rebooting the System, on page 345
• Troubleshooting the System, on page 346
• Uncommon Management Tasks, on page 356
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
337
System Administration
Updating System Databases
Note In May 2022 we split the GeoDB into two packages: a country code package that maps IP addresses to
countries/continents, and an IP package that contains additional contextual data associated with routable
IP addresses. The FDM does not and has never used the information in the IP package. This split saves
significant disk space in locally managed FTD deployments. If you are getting the GeoDB from Cisco
yourself, make sure you get the country code package, which has the same file name as the old all-in-one
package: Cisco_GEODB_Update-date-build.
You can also set up a regular schedule to retrieve and apply database updates. Because these updates can be
large, schedule them for times of low network activity.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
338
System Administration
Upgrading FTD Software
Note While a database update is in progress, you might find that the user interface is sluggish to respond to
your actions.
Procedure
Step 1 Click Device, then click View Configuration in the Updates summary.
This opens the Updates page. Information on the page shows the current version for each database and the
last date and time each database was updated.
Step 2 To manually update a database, click Update Now in the section for that database.
After downloading and applying the update, the system automatically re-deploys policies to the device so that
the system can use the updated information.
c) Click Save.
Note If you want to remove a recurring schedule, click the Edit link to open the scheduling dialog box,
then click the Remove button.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
339
System Administration
Upgrading FTD Software
Upgrades can be major (A.x), maintenance release (A.x.y), or patch (A.x.y.z). We also may provide hotfixes,
which are minor updates that address particular, urgent issues. A hotfix might not require a reboot, while the
other upgrade types do require a reboot. The system automatically reboots after installation if a reboot is
required. Installing any update can disrupt traffic, so do the installation in off hours.
If you also need to upgrade the FXOS software on the chassis, install the FXOS upgrade before following
this procedure.
You cannot reimage a device, or migrate from ASA software to FTD software, using this procedure.
Note Before installing an update, make sure that you deploy any pending changes. You should also run a
backup and download the backup copy. Note that all upgrades except hot fixes will delete all backup
files retained on the system.
Procedure
Step 1 Select Device, then click View Configuration in the Updates summary.
The System Upgrade section shows the currently running software version and any update that you have
already uploaded.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
340
System Administration
Reimaging the Device
For information on how to reimage a device, see Reimage the Cisco ASA or Threat Defense Device or the
Threat Defense Quick Start guide for your device model. These guides are available at
http://www.cisco.com/c/en/us/support/security/firepower-ngfw/products-installation-guides-list.html.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
341
System Administration
Backing Up the System Immediately
Note The backup does not include the management IP address configuration. Thus, when you recover a backup
file, the management address is not replaced from the backup copy. This ensures that any changes you
made to the address are preserved, and also makes it possible to restore the configuration on a different
device on a different network segment.
Backups include the configuration only, and not the system software. If you need to completely reimage the
device, you need to reinstall the software, then you can upload a backup and recover the configuration.
The configuration database is locked during backup. You cannot make configuration changes during a backup,
although you can view policies, dashboards, and so forth. During a restore, the system is completely unavailable.
The table on the Backup and Restore page lists all existing backup copies that are available on the system,
including the file name of the backup, the date and time it was created, and the file size. The type of backup
(manual, scheduled, or recurring) is based on how you directed the system to create that backup copy.
Tip Backup copies are created on the system itself. You must manually download backup copies and store
them on secure servers to ensure that you have the backup copies you need for disaster recovery. The
system maintains up to 3 backup copies on the device. New backups replace the oldest backup.
The following topics explain how to manage backup and restore operations.
Procedure
Step 1 Click Device, then click View Configuration in the Backup and Restore summary.
This opens the Backup and Restore page. The table lists all existing backup copies that are available on the
system.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
342
System Administration
Backing Up the System at a Scheduled Time
In addition, the system will acquire locks on the configuration database during parts or all of the backup,
which can prevent you from making changes for the duration of the backup process.
Note If you want to delete the schedule for a future backup, edit the schedule and click Remove.
Procedure
Step 1 Click Device, then click View Configuration in the Backup and Restore summary.
Step 2 Click Scheduled Backup > Schedule a Backup.
If you already have a scheduled backup, click Scheduled Backup > Edit .
Note If you want to delete a recurring schedule, edit the schedule and click Remove.
Procedure
Step 1 Click Device, then click View Configuration in the Backup and Restore summary.
Step 2 Click Recurring Backup > Configure.
If you already have a recurring backup configured, click Recurring Backup > Edit.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
343
System Administration
Restoring a Backup
Restoring a Backup
You can restore backups as needed so long as the device is running the same software version (including build
number) as it was running when you took the backup. You can restore a backup onto a replacement device
only if the two devices are the same model and are running the same version of the software (including build
number).
If the backup copy you want to restore is not already on the device, you must upload the backup first before
restoring it.
During a restore, the system is completely unavailable.
Note The backup does not include the management IP address configuration. Thus, when you recover a backup
file, the management address is not replaced from the backup copy. This ensures that any changes you
made to the address are preserved, and also makes it possible to restore the configuration on a different
device on a different network segment.
Procedure
Step 1 Click Device, then click View Configuration in the Backup and Restore summary.
This opens the Backup and Restore page. The table lists all existing backup copies that are available on the
system.
Step 2 If the backup copy that you want to restore is not in the list of available backups, click Upload > Browse and
upload the backup copy.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
344
System Administration
Managing Backup Files
Note Uploaded files may be renamed to match the original filename. Also, if
there are more than 10 backup copies already on the system, the oldest one
will be deleted to make room for the uploaded file. You cannot upload files
that were created by an older software version.
• Restore a backup—To restore a backup copy, click the restore icon ( ) for the file. The system is
unavailable during restore, and will reboot after restore completes. You should deploy the configuration
after the system is up and running.
• Delete a backup file—If you no longer want a particular backup, click the delete icon ( ) for the file.
You are asked to confirm the deletion. Once deleted, you cannot recover the backup file.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
345
System Administration
Troubleshooting the System
Procedure
Step 1 Use an SSH client to open a connection to the management IP address and log into the device CLI with a
username that has configuration CLI access. For example, the admin username.
Step 2 Enter the reboot command.
Example:
> reboot
Note Because the system has multiple interfaces, you can control the interface used for pinging an address.
You must ensure that you are using the right command, so that you are testing the connectivity that
matters. For example, the system must be able to reach the Cisco license server through the virtual
Management interface, so you must use the ping system command to test the connection. If you use
ping, you are testing whether an address can be reached through the data interfaces, which might not
give you the same result.
The normal ping uses ICMP packets to test the connection. If your network prohibits ICMP, you can use a
TCP ping instead (for data interface pings only).
Following are the main options for pinging network addresses.
Pinging an address through the virtual Management interface
Use the ping system command.
ping system host
The host can be an IP address or fully-qualified domain name (FQDN), such as www.example.com.
Unlike pings through the data interfaces, there is no default count for system pings. The ping continues
until you stop it using Ctrl+c. For example:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
346
System Administration
Pinging Addresses to Test Connectivity
Note You can specify the timeout, repeat count, packet size, and even the data pattern to send. Use the
help indicator, ?, in the CLI to see the available options.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
347
System Administration
Tracing Routes to Hosts
A TCP ping sends SYN packets and considers the ping successful if the destination sends a SYN-ACK
packet. For example:
Note You can also specify the timeout, repeat count, and the source address for the TCP ping. Use the
help indicator, ?, in the CLI to see the available options.
Note There are separate commands for tracing a route through a data interface (traceroute) or through the
virtual management interface (traceroute system). Ensure that you use the right command.
The following table describes the possible result per packet as displayed in the output.
* No response was received for the probe within the timeout period.
nn msec For each node, the round-trip time (in milliseconds) for the specified number of
probes.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
348
System Administration
Troubleshooting NTP
The host can be an IPv4/IPv6 address or fully-qualified domain name (FQDN), such as www.example.com.
For example:
Note You can specify the timeout, time to live, number of packets per node, and even the IP address or
interface to use as the source of the traceroute. Use the help indicator, ?, in the CLI to see the
available options.
Troubleshooting NTP
The system relies on accurate and consistent time to function correctly and to ensure that events and other
data points are handled accurately. You must configure at least one, but ideally three, Network Time Protocol
(NTP) servers to ensure the system always has reliable time information.
The device summary connection diagram (click Device in the main menu) shows the status of the connection
to the NTP server. If the status is yellow or orange, then there is an issue with the connection to the configured
servers. If the connection problem persists (it is not just a momentary issue), try the following.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
349
System Administration
Troubleshooting NTP
• First, ensure that you have at least three NTP servers configured on Device > System Settings > NTP.
Although this is not a requirement, reliability is greatly enhanced if you have at least three NTP servers.
• Ensure that there is a network path between the management interface IP address (defined on Device >
System Settings > Management Interface) and the NTP servers.
• If the management interface gateway is the data interfaces, you can configure static routes to the
NTP servers on Device > Routing if the default route is not adequate.
• If you set an explicit management interface gateway, log into the device CLI and use the ping system
command to test whether there is a network path to each NTP server.
• Log into the device CLI and check the status of the NTP servers with the following commands.
• show ntp—This command shows basic information about the NTP servers and their availability.
However, the connectivity status in the FDM uses additional information to indicate the status, so
there can be inconsistency in what this command shows and what the connectivity status diagram
shows.
• system support ntp—This command includes the output of show ntp plus the output of the standard
NTP command ntpq, which is documented with the NTP protocol. Use this command if you need
to confirm NTP synchronization.
Look for the section “Results of ‘ntpq -pn.’ For example, you might see something like the following:
In this example, the + before the NTP server address indicates that it is a potential candidate. An
asterisk here, *, indicates the current time source peer.
The NTP daemon (NTPD) uses a sliding window of eight samples from each one of the peers and
picks out one sample, then the clock selection determines the true chimers and the false tickers.
NTPD then determines the round-trip distance (the offset of a candidate must not be over one-half
the round trip delay). If connection delays, packet loss, or server issues cause one or all the candidates
to be rejected, you would see long delays in the synchronization. The adjustment also occurs over
a very long period of time: the clock offset and oscillator errors must be resolved by the clock
discipline algorithm and this can take hours.
Note If the refid is .LOCL., this indicates the peer is an undisciplined local clock,
that is, it is using its local clock only to set the time. The FDM always marks
the NTP connection yellow (not synchronized) if the selected peer is .LOCL.
Normally, NTP does not select a .LOCL. candidate if a better one is
available, which is why you should configure at least three servers.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
350
System Administration
Troubleshooting DNS for the Management Interface
Procedure
Note It is critical that you include the system keyword in the ping command. The system keyword
sends the ping through the management IP address, which is the only interface that uses the
management DNS server. Pinging www.cisco.com is also a good option, because you need a
route to that server for smart licensing and updates.
b) Click Device > System Settings > DNS Server and verify that the right DNS servers are configured.
If you are deploying the device on your network edge, your service provider might have specific
requirements about the DNS server you can use.
c) If you are using the data interfaces as the gateway, verify that you have the required routes.
You need a default route for 0.0.0.0. You might need additional routes if the DNS server is not available
through the gateway for the default route. There are two basic situations:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
351
System Administration
Troubleshooting DNS for the Management Interface
• If you are using DHCP to obtain an address for the outside interface, and you selected the Obtain
Default Route using DHCP option, the default route is not visible in the FDM. From SSH, enter
show route and verify that there is a route for 0.0.0.0. Because this is the default configuration for
the outside interface, this is a likely situation that you might encounter. (Go to Device > Interfaces
to view the configuration of the outside interface.)
• If you are using a static IP address on the outside interface, or you are not obtaining the default route
from DHCP, then open Device > Routing. Verify that the correct gateway is being used for the
default route.
If the DNS server cannot be reached through the default route, you must define a static route to it on the
Routing page. Note that you should not add routes for directly connected networks, that is, networks that
are connected directly to any of the system’s data interfaces, as the system can route to those networks
automatically.
Also verify that there are no static routes that are misdirecting traffic to the server out the wrong interface.
d) If the deployment button indicates that there are undeployed changes, deploy them now and wait for
deployment to complete.
e) Retest ping system www.cisco.com. If you still have problems, continue with the next step.
Step 3 In the SSH session, enter nslookup www.cisco.com.
• If nslookup indicates that it got a response from the DNS server, but the server could not find the name,
it means that DNS is configured correctly, but the DNS server you are using does not have an address
for the FQDN. The response would look similar to the following:
Resolution: In this case, you need to configure a different DNS server, or get the one you have updated
so it can resolve the FQDNs you need resolved. Work with your network administrator or ISP to get the
IP address of a DNS server that will work for your network.
• If you get a “connection timed out” message, then the system cannot reach your DNS servers, or all of
the DNS servers are currently down and not responding (which is less likely). Continue with the next
step.
Step 4 Use the traceroute system DNS_server_ip_address command to trace the route to the DNS server.
For example, if the DNS server is 10.100.10.1, enter:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
352
System Administration
Analyzing CPU and Memory Usage
Resolution: In this case, the routing problem is within your system. Try doing a ping system for the
gateway IP address. Re-verify the configuration of the management interface as mentioned in earlier
steps, and ensure that you have the required gateways and routes configured.
• The traceroute makes it through a few nodes before it can no longer resolve the route, which would look
like the following:
Resolution: In this case, routing breaks down at the last node. You might need to work with the system
administrator to get correct routes installed in that node. However, if there is intentionally no route to
the DNS server through the node, you need to change your gateway, or create your own static route, to
point to a router that can route traffic to the DNS server.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
353
System Administration
Viewing Logs
Following are some highlights of what you can examine. You can find more detailed information about these
commands in Cisco Firepower Threat Defense Command Reference at http://www.cisco.com/c/en/us/td/docs/
security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense.html.
• show cpu displays data plane CPU utilization.
• show cpu core displays usage for each CPU core separately.
• show cpu detailed displays additional per-core and overall data plane CPU usage.
• show memory displays data plane memory usage.
Note Some of the keywords (not mentioned above) require that you first set up profiling or other features
using the cpu or memory commands. Use these features at the direction of TAC only.
Viewing Logs
The system logs information for a wide variety of actions. You can use the system support view-files command
to open a system log. Use this command while working with the Cisco Technical Assistance Center (TAC)
so that they can help you interpret the output and to select the appropriate log to view.
The command presents a menu for selecting a log. Use the following commands to navigate the wizard:
• To change to a sub-directory, type in the name of the directory and press Enter.
• To select a file to view, enter s at the prompt. You are then prompted for a file name. You must type the
complete name, and capitalization matters. The file list shows you the size of the log, which you might
consider before opening very large logs.
• Press the space bar when you see --More-- to see the next page of log entries; press Enter to see just the
next log entry. When you reach the end of the log, you are taken to the main menu. The --More-- line
shows you the size of the log and how much of it you have viewed. Use Ctrl+C to close the log and
exit the command if you do not want to page through the entire log.
• Type b to go up one level in the structure to the menu.
If you want to leave the log open so you can see new messages as they are added, use the tail-logs command
instead of system support view-files.
The following example shows how view the cisco/audit.log file, which tracks attempts to log into the system.
The file listing starts with directories at the top, then a list of files in the current directory.
===View Logs===
============================
Directory: /ngfw/var/log
----------sub-dirs----------
cisco
mojo
removed_packages
setup
connector
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
354
System Administration
Creating a Troubleshooting File
sf
scripts
packages
removed_scripts
httpd
-----------files------------
2016-10-14 18:12:04.514783 | 5371 | SMART_STATUS_sda.log
2016-10-14 18:12:04.524783 | 353 | SMART_STATUS_sdb.log
2016-10-11 21:32:23.848733 | 326517 | action_queue.log
2016-10-06 16:00:56.620019 | 1018 | br1.down.log
<list abbreviated>
============================
Directory: /ngfw/var/log/cisco
-----------files------------
2017-02-13 22:44:42.394907 | 472 | audit.log
2017-02-13 23:40:30.858198 | 903615 | ev_stats.log.0
2017-02-09 18:14:26.870361 | 0 | ev_stats.log.0.lck
2017-02-13 05:24:00.682601 | 1024338 | ev_stats.log.1
2017-02-12 08:41:00.478103 | 1024338 | ev_stats.log.2
2017-02-11 11:58:00.260805 | 1024218 | ev_stats.log.3
2017-02-09 18:12:13.828607 | 95848 | firstboot.ngfw-onbox.log
2017-02-13 23:40:00.240359 | 6523160 | ngfw-onbox.log
Type the name of the file to view ([b] to go back, [Ctrl+C] to exit)
> audit.log
2017-02-09 18:59:26 - SubSystem:LOGIN, User:admin, IP:10.24.42.205, Message:Login successful,
Procedure
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
355
System Administration
Uncommon Management Tasks
Step 2 Under Troubleshooting, click Request File to be Created or Re-Request File to be Created (if you have
created one before).
The system starts generating the diagnostic file. You can go to other pages and return here to check status.
When the file is ready, the date and time of the file creation is shown along with a download button.
Caution Switching managers erases the device configuration and returns the system to the default configuration.
However, management IP address and hostname are preserved.
Procedure
Step 1 Use an SSH client to open a connection to the management IP address and log into the device CLI with a
username that has configuration CLI access. For example, the admin username.
It is important that you follow this process while connected to the management IP address. When using the
FDM, you have the option to manage the device through the IP address on a data interface. However, you
must use the Management physical port and management IP address to manage the device remotely.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
356
System Administration
Switching Between Local and Remote Management
For example, to use the manager at 192.168.0.123 with the registration key secret, enter the following:
Note While registration is still pending, you can use configure manager delete to cancel the
registration and then configure manager local to return to local management.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
357
System Administration
Changing the Firewall Mode
>
> show managers
No managers configured.
You can now use a web browser to open the local manager at https://management-IP-address.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
358
System Administration
Changing the Firewall Mode
Caution Changing firewall mode erases the device configuration and returns the system to the default configuration.
However, management IP address and hostname are preserved.
Procedure
Step 1 Use an SSH client to open a connection to the management IP address and log into the device CLI with a
username that has configuration CLI access. For example, the admin username.
It is important that you follow this process while connected to the management IP address. When using the
FDM, you have the option to manage the device through the IP address on a data interface. However, you
must use the Management physical port and management IP address to manage the device remotely.
If you cannot connect to the management IP address, address the following:
• Ensure that the Management physical port is wired to a functioning network.
• Ensure that the management IP address and gateway are configured for the management network. From
the FDM, configure the address and gateway on Device > System Settings > Management Interface.
(In the CLI, use the configure network ipv4/ipv6 manual command.)
Note Ensure that you are using an external gateway for the management IP address. You cannot use
the data interfaces as a gateway when using a remote manager.
Step 2 To change the mode from routed to transparent and use remote management:
a) Disable local management and enter no manager mode.
You cannot change the firewall mode while there is an active manager. Use the configure manager delete
command to remove the manager.
>
> show managers
No managers configured.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
359
System Administration
Changing the Firewall Mode
For example, to use the manager at 192.168.0.123 with the registration key secret, enter the following:
Step 3 To change the mode from transparent to routed and convert to local management:
a) Deregister the device from the FMC.
b) Access the FTD device CLI, preferably from the console port.
Because changing the mode erases your configuration, the management IP address will revert to the
default, so you might lose an SSH connection to the management IP address after changing modes.
c) Change the firewall mode to routed.
configure firewall routed
Example:
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
360
System Administration
Resetting the Configuration
You can now use a web browser to open the local manager at https://management-IP-address.
Procedure
Step 1 Use an SSH client to open a connection to the management IP address and log into the device CLI with a
username that has configuration CLI access. For example, the admin username.
Step 2 Use the configure manager delete command to remove the manager.
>
> show managers
No managers configured.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
361
System Administration
Resetting the Configuration
For example:
You can now use a web browser to open the local manager at https://management-IP-address. By clearing
the configuration, you will be prompted to complete the device setup wizard.
Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1
362