Multi-Instance Mode for the Secure Firewall 3100

You can deploy the Secure Firewall 3100 as a single device (appliance mode) or as multiple container instances (multi-instance mode). This chapter describes how to deploy the device in multi-instance mode.

About Multi-Instance Mode

In multi-instance mode, you can deploy multiple container instances on a single chassis that act as completely independent devices.

Multi-Instance Mode vs. Appliance Mode

You can run the device in either multi-instance mode or appliance mode.

Appliance Mode

Appliance mode is the default. The device runs the native threat defense image and acts as a single device. The only chassis-level configuration available (on the Chassis Manager page) is for network module management (breakout ports or enabling/disabling a network module).

Multi-Instance Mode

If you change to multi-instance mode, the device runs the Secure Firewall eXtensible Operating System (FXOS) on the chassis, while each instance runs separate threat defense images. You can configure the mode using the FXOS CLI.

Because multiple instances run on the same chassis, you need to perform chassis-level management of:

  • CPU and memory resources using resource profiles.

  • Interface configuration and assignment.

  • Deployment and monitoring of instances.

For a multi-instance device, you add the chassis to the management center and configure chassis-level settings on the Chassis Manager page.

Chassis Management Interface

Chassis Management

The chassis uses the dedicated Management interface on the device. Multi-instance mode does not support using a data interface for chassis management or DHCP addressing for the Management interface.

You can only configure the chassis Management interface at the threat defense CLI (at initial setup) or FXOS CLI (after you convert to multi-instance mode). See Change Chassis Management Settings at the FXOS CLI to change Management interface settings in multi-instance mode.


Note


By default, SSH is not allowed to this interface in multi-instance mode unless you enable the SSH server and an SSH access list. This difference means that you can connect to the application-mode threat defense Management interface using SSH, but after you convert to multi-instance mode, you can no longer connect using SSH by default. See Configure SSH and SSH Access List.


Instance Management

All instances share the chassis management interface, and each instance has its own IP address on the Management network. After you add the instance and specify the IP address, you can make changes to the network settings at the threat defense CLI.

The instance Management IP address allows SSH by default.

Instance Interfaces

To provide flexible physical interface use for instances, you can create VLAN subinterfaces on the chassis and also share interfaces (VLAN or physical) between multiple instances. See Shared Interface Scalability and Configure a Subinterface.


Note


This chapter discusses chassis VLAN subinterfaces only. You can separately create subinterfaces within the threat defense instance. See Chassis Interfaces vs. Instance Interfaces for more information.


Interface Types

Physical interfaces, VLAN subinterfaces, and EtherChannel interfaces can be one of the following types:

  • Data—Use for regular data or the failover link. Data interfaces cannot be shared between instances, and instances cannot communicate over the backplane to other instances. For traffic on Data interfaces, all traffic must exit the chassis on one interface and return on another interface to reach another instance. You can add VLAN subinterfaces to a data interface to provide separate failover links per High Availability pair.

  • Data-sharing—Use for regular data. These data interfaces can be shared by one or more instances. Each instance can communicate over the backplane with all other instances that share this interface. Shared interfaces can affect the number of instances you can deploy. Shared interfaces are not supported for bridge group member interfaces (in transparent mode or routed mode), inline sets, passive interfaces, or failover links.

Chassis Interfaces vs. Instance Interfaces

At the chassis level, you manage the basic Ethernet settings of physical interfaces, VLAN subinterfaces for instances, and EtherChannel interfaces. Within the instance, you configure higher level settings. For example, you can only create EtherChannels in the chassis; but you can assign an IP address to the EtherChannel within the instance.

The following sections describe the interaction between the chassis and the instance for interfaces.

VLAN Subinterfaces

You can create VLAN subinterfaces within the instance, just as you would for any device.

You can also create VLAN subinterfaces in the chassis. The instance-defined subinterfaces are not subject to the chassis limit. Choosing in which location to create subinterfaces depends on your network deployment and personal preference. For example, to share a subinterface, you must create the subinterface on the chassis. Another scenario that favors chassis subinterfaces comprises allocating separate subinterface groups on a single interface to multiple instances. For example, you want to use Port-channel1 with VLAN 2–11 on instance A, VLAN 12–21 on instance B, and VLAN 22–31 on instance C. If you create these subinterfaces in the instance, then you would have to share the parent interface in the chassis, which may not be desirable. See the following illustration that shows the three ways you can accomplish this scenario:

Figure 1. VLANs in the Chassis vs. the Instance
VLAN subinterface scenario
Independent Interface States in the Chassis and in the Instance

You can administratively enable and disable interfaces in both the chassis and in the instance. For an interface to be operational, the interface must be enabled in both locations. Because the interface state is controlled independently, you may have a mismatch between the chassis and instance.

The default state of an interface within the instance depends on the type of interface. For example, the physical interface or EtherChannel is disabled by default within the instance, but a subinterface is enabled by default.

Shared Interface Scalability

Instances can share data-sharing type interfaces. This capability lets you conserve physical interface usage as well as support flexible networking deployments. When you share an interface, the chassis uses unique MAC addresses to forward traffic to the correct instance. However, shared interfaces can cause the forwarding table to grow large due to the need for a full mesh topology within the chassis (every instance must be able to communicate with every other instance that is sharing the same interface). Therefore, there are limits to how many interfaces you can share.

In addition to the forwarding table, the chassis maintains a VLAN group table for VLAN subinterface forwarding. You can create up to 500 VLAN subinterfaces.

See the following limits for shared interface allocation:

Shared Interface Best Practices

For optimal scalability of the forwarding table, share as few interfaces as possible. Instead, you can create up to 500 VLAN subinterfaces on one or more physical interfaces and then divide the VLANs among the container instances.

When sharing interfaces, follow these practices in the order of most scalable to least scalable:

  1. Best—Share subinterfaces under a single parent, and use the same set of subinterfaces with the same group of instances.

    For example, create a large EtherChannel to bundle all of your like-kind interfaces together, and then share subinterfaces of that EtherChannel: Port-Channel1.2, 3, and 4 instead of Port-Channel2, Port-Channel3, and Port-Channel4. When you share subinterfaces from a single parent, the VLAN group table provides better scaling of the forwarding table than when sharing physical/EtherChannel interfaces or subinterfaces across parents.

    Figure 2. Best: Shared Subinterface Group on One Parent

    If you do not share the same set of subinterfaces with a group of instances, your configuration can cause more resource usage (more VLAN groups). For example, share Port-Channel1.2, 3, and 4 with instances 1, 2, and 3 (one VLAN group) instead of sharing Port-Channel1.2 and 3 with instances 1 and 2, while sharing Port-Channel1.3 and 4 with instance 3 (two VLAN groups).

    Figure 3. Good: Sharing Multiple Subinterface Groups on One Parent
  2. Fair—Share subinterfaces across parents.

    For example, share Port-Channel1.2, Port-Channel2.3, and Port-Channel3.4 instead of Port-Channel2, Port-Channel4, and Port-Channel4. Although this usage is not as efficient as only sharing subinterfaces on the same parent, it still takes advantage of VLAN groups.

    Figure 4. Fair: Shared Subinterfaces on Separate Parents
  3. Worst—Share individual parent interfaces (physical or EtherChannel).

    This method uses the most forwarding table entries.

    Figure 5. Worst: Shared Parent Interfaces

How the Chassis Classifies Packets

Each packet that enters the chassis must be classified, so that the chassis can determine to which instance to send a packet.

  • Unique Interfaces—If only one instance is associated with the ingress interface, the chassis classifies the packet into that instance. For bridge group member interfaces (in transparent mode or routed mode), inline sets, or passive interfaces, this method is used to classify packets at all times.

  • Unique MAC Addresses—The chassis automatically generates unique MAC addresses for all interfaces, including shared interfaces. If multiple instances share an interface, then the classifier uses unique MAC addresses assigned to the interface in each instance. An upstream router cannot route directly to an instance without unique MAC addresses. You can also set the MAC addresses manually when you configure each interface within the application.


Note


If the destination MAC address is a multicast or broadcast MAC address, the packet is duplicated and delivered to each instance.


Classification Examples

Packet Classification with a Shared Interface Using MAC Addresses

The following figure shows multiple instances sharing an outside interface. The classifier assigns the packet to Instance C because Instance C includes the MAC address to which the router sends the packet.

Figure 6. Packet Classification with a Shared Interface Using MAC Addresses

Incoming Traffic from Inside Networks

Note that all new incoming traffic must be classified, even from inside networks. The following figure shows a host on the Instance C inside network accessing the internet. The classifier assigns the packet to Instance C because the ingress interface is Ethernet 1/2.3, which is assigned to Instance C.

Figure 7. Incoming Traffic from Inside Networks

Transparent Firewall Instances

For transparent firewalls, you must use unique interfaces. The following figure shows a packet destined to a host on the Instance C inside network from the internet. The classifier assigns the packet to Instance C because the ingress interface is Ethernet 1/2.3, which is assigned to Instance C.

Figure 8. Transparent Firewall Instances

Inline Sets

For inline sets, you must use unique interfaces and they must be physical interfaces or EtherChannels. The following figure shows a packet destined to a host on the Instance C inside network from the internet. The classifier assigns the packet to Instance C because the ingress interface is Ethernet 1/5, which is assigned to Instance C.

Figure 9. Inline Sets

Cascading Instances

Placing an instance directly in front of another instance is called cascading instances; the outside interface of one instance is the same interface as the inside interface of another instance. You might want to cascade instances if you want to simplify the configuration of some instances by configuring shared parameters in the top instance.

The following figure shows a gateway instance with two instances behind the gateway.

Figure 10. Cascading Instances

Note


Do not use cascading instances (using a shared interface) with High Availability. After a failover occurs and the standby unit rejoins, MAC addresses can overlap temporarily and cause an outage. You should instead use unique interfaces for the gateway instance and inside instance using an external switch to pass traffic between the instances.


Typical Multi-Instance Deployment

The following example includes three container instances in routed firewall mode. They include the following interfaces:

  • Management—All instances and the chassis use the dedicated Management interface. Within each instance (and the chassis), the interface uses a unique IP address on the same management network.

  • Inside—Each instance uses a subinterface on Port-Channel1 (data type). This EtherChannel includes two 10 Gigibit Ethernet interfaces. Each subinterface is on a separate network.

  • Outside—All instances use the Port-Channel2 interface (data-sharing type). This EtherChannel includes two 10 Gigibit Ethernet interfaces. Within each application, the interface uses a unique IP address on the same outside network.

  • Failover—Each instance uses a subinterface on Port-Channel3 (data type). This EtherChannel includes two 10 Gigibit Ethernet interfaces. Each subinterface is on a separate network.

Figure 11. Typical Multi-Instance Deployment
Typical Multi-Instance Deployment

Automatic MAC Addresses for Instance Interfaces

The chassis automatically generates MAC addresses for instance interfaces, and guarantees that a shared interface in each instance uses a unique MAC address.

If you manually assign a MAC address to a shared interface within the instance, then the manually-assigned MAC address is used. If you later remove the manual MAC address, the autogenerated address is used. In the rare circumstance that the generated MAC address conflicts with another private MAC address in your network, we suggest that you manually set the MAC address for the interface within the instance.

Because autogenerated addresses start with A2, you should not start manual MAC addresses with A2 due to the risk of overlapping addresses.

The chassis generates the MAC address using the following format:

A2xx.yyzz.zzzz

Where xx.yy is a user-defined prefix or a system-defined prefix, and zz.zzzz is an internal counter generated by the chassis. The system-defined prefix matches the lower 2 bytes of the first MAC address in the burned-in MAC address pool that is programmed into the IDPROM. Use connect fxos , then show module to view the MAC address pool. For example, if the range of MAC addresses shown for module 1 is b0aa.772f.f0b0 to b0aa.772f.f0bf, then the system prefix will be f0b0.

The user-defined prefix is an integer that is converted into hexadecimal. For an example of how the user-defined prefix is used, if you set a prefix of 77, then the chassis converts 77 into the hexadecimal value 004D (yyxx). When used in the MAC address, the prefix is reversed (xxyy) to match the chassis native form:

A24D.00zz.zzzz

For a prefix of 1009 (03F1), the MAC address is:

A2F1.03zz.zzzz

Performance Scaling Factor for Multi-Instance Mode

The maximum throughput (connections, VPN sessions) for a platform is calculated for an appliance mode device's use of memory and CPU (and this value is shown in show resource usage ). If you use multiple instances, then you need to calculate the throughput based on the percentage of CPU cores that you assign to the instance. For example, if you use an instance with 50% of the cores, then you should initially calculate 50% of the throughput. Moreover, the throughput available to an instance may be less than that available to an appliance.

For detailed instructions on calculating the throughput for instances, see https://www.cisco.com/c/en/us/products/collateral/security/firewalls/white-paper-c11-744750.html.

Instances and High Availability

You can use High Availability using an instance on 2 separate chassis; for example, if you have 2 chassis, each with 10 instances, you can create 10 High Availability pairs. You can also have standalone instances on the same chassis as High Availability instances. For detailed requirements, see Requirements and Prerequisites for Instances.


Note


Clustering is not supported.


Licenses for Instances

All licenses are consumed per chassis and not per instance. See the following details:

  • Essentials licenses are assigned to the chassis as a whole, one per chassis.

  • Feature licenses are assigned to each instance, but you only consume one license per feature per chassis.

Requirements and Prerequisites for Instances

Model Support

  • Secure Firewall 3110

  • Secure Firewall 3120

  • Secure Firewall 3130

  • Secure Firewall 3140

  • Secure Firewall 4215

  • Secure Firewall 4225

  • Secure Firewall 4245


Note


The Secure Firewall 3105 is not supported.


Maximum Container Instances and Resources per Model

For each container instance, you can specify the number of CPU cores (or more specifically, threads) to assign to the instance. We use the term "core" generically to account for different hardware architecture. RAM is dynamically allocated according to the number of cores, and disk space is set to 40 GB per instance.

Table 1. Maximum Container Instances and Resources per Model

Model

Max. Container Instances

Available CPU Cores (Threads)

Secure Firewall 3110

3

22

Secure Firewall 3120

5

30

Secure Firewall 3130

7

46

Secure Firewall 3140

10

62

Secure Firewall 4215

10

62

Secure Firewall 4225

14

126

Secure Firewall 4245

34

254

Software Requirements

  • You can run different versions of threat defense software on each instance as long as they are all compatible with the version of FXOS running on the chassis.

  • You cannot deploy an instance with a patch version of the threat defense software because it is not a complete bundle. You need to first deploy the major or maintenance version, and then patch it after deployment.

High Availability Requirements

  • The two instances in a High Availability configuration must:

    • Be on separate chassis.

    • Be on the same model.

    • Have the same interfaces assigned. All interfaces must be preconfigured in the chassis identically before you enable High Availability.

    • Use the same resource profile attributes. The profile names can be different, but the definitions need to match.

Management Center Requirements

For chassis management and all instances on the chassis, you must use the same management center due to the licensing implementation.

Guidelines and Limitations for Instances

General Guidelines

  • A single management center must manage all instances on a chassis, as well as manage the chassis itself.

  • For instances, the following features are not supported:

    • TLS crypto acceleration

    • Clustering

    • Management Center UCAPL/CC mode

    • Flow offload to hardware

  • Primary management of the chassis by Security Cloud Control cloud-delivered management center and separate analytics-only management of the chassis by an on-prem management center is not supported. You can however add Security Cloud Control-managed instances to an analytics-only on-prem management center.

Management Interface

  • No support for a data interface for chassis management; only the dedicated Management interface can be used

  • No DHCP addressing for the Management interface

VLAN Subinterfaces

  • This document discusses chassis VLAN subinterfaces only. You can separately create subinterfaces within the instance.

  • If you assign a parent interface to an instance, it only passes untagged (non-VLAN) traffic. Do not assign the parent interface unless you intend to pass untagged traffic.

  • Subinterfaces are supported on Data or Data-sharing type interfaces.

  • You can create up to 500 VLAN IDs.

  • You cannot use subinterfaces for an inline set or as a passive interface.

  • If you use a subinterface for the failover link, then all subinterfaces on that parent, and the parent itself, are restricted for use as failover links. You cannot use some subinterfaces as failover links, and some as regular data interfaces.

EtherChannels

  • You can configure up to 48 EtherChannels, limited by the number of physical interfaces.

  • The EtherChannel can have up to 8 active interfaces.

  • All interfaces in the EtherChannel must be the same media type and speed capacity. The media type can be either RJ-45 or SFP; SFPs of different types (copper and fiber) can be mixed. You cannot mix interface capacities (for example 1GB and 10GB interfaces) by setting the speed to be lower on the larger-capacity interface, unless you set the speed to Detect SFP; in this case, you can use different interface capacities, and the lowest common speed is used.

  • The chassis does not support LACPDUs that are VLAN-tagged. If you enable native VLAN tagging on the neighboring switch using the Cisco IOS vlan dot1Q tag native command, then the chassis will drop the tagged LACPDUs. Be sure to disable native VLAN tagging on the neighboring switch.

  • In Cisco IOS software versions earlier than 15.1(1)S2, the chassis did not support connecting an EtherChannel to a switch stack. With default switch settings, if the chassis EtherChannel is connected cross stack, and if the primary switch is powered down, then the EtherChannel connected to the remaining switch will not come up. To improve compatibility, set the stack-mac persistent timer command to a large enough value to account for reload time; for example, 8 minutes or 0 for indefinite. Or, you can upgrade to more a more stable switch software version, such as 15.1(1)S2.

Data-sharing Interfaces

  • Maximum 14 instances per shared interface. For example, you can allocate Ethernet1/1 to Instance1 through Instance14.

    Maximum 10 shared interfaces per instance. For example, you can allocate Ethernet1/1.1 through Ethernet1/1.10 to Instance1.

  • You cannot use a data-sharing interface with a transparent firewall mode instance.

  • You cannot use a data-sharing interface with inline sets or passive interfaces.

  • You cannot use a data-sharing interface for the failover link.

Default MAC Addresses

  • MAC addresses for all interfaces are taken from a MAC address pool. For subinterfaces, if you decide to manually configure MAC addresses, make sure you use unique MAC addresses for all subinterfaces on the same parent interface to ensure proper classification. See Automatic MAC Addresses for Instance Interfaces.

Configure Instances

Before you configure instances, you need to enable multi-instance mode, add the chassis to the management center, and configure chassis interfaces. You can also customize the chassis settings.

Procedure



Onboard the Multi-Instance Chassis

You need to connect to the chassis FXOS CLI at the console port to enable multi-instance mode and perform initial setup. After you configure the chassis, you can add it to the cloud-delivered Firewall Management Center. The management center and the chassis share a separate management connection using the chassis MGMT interface.


Note


Although you can connect to SSH on the management port, we recommend using the console port to avoid multiple disconnections. If you use SSH before you switch to multi-instance mode, you connect to the threat defense CLI and need to connect to FXOS using connect fxos . This procedure covers the console port.


Use the cloud-delivered Firewall Management Center to configure all chassis settings as well as instances. The Secure Firewall chassis manager or configuration at the FXOS CLI is not supported.

Procedure


Step 1

Connect to the chassis console port.

The console port connects to the FXOS CLI.

Step 2

Log in with the username admin and the password Admin123.

The first time you log in to FXOS, you are prompted to change the password.

Note

 

If the password was already changed, and you do not know it, you must reimage the device to reset the password to the default. See the FXOS troubleshooting guide for the reimage procedure.

Example:


firepower login: admin
Password: Admin123
Successful login attempts for user 'admin' : 1

[...]

Hello admin. You must change your password.
Enter new password: ********
Confirm new password: ********
Your password was updated successfully.

[...]

firepower# 

Step 3

Check your current mode, Native or Container. If the mode is Native, you can continue with this procedure to convert to multi-instance (Container) mode.

show system detail

Example:



firepower # show system detail

Systems:
    Name: firepower
    Mode: Stand Alone
    System IP Address: 172.16.0.50
    System IPv6 Address: ::
    System Owner:
    System Site:
    Deploy Mode: Native
    Description for System:
firepower # 

Step 4

Enable multi-instance mode.

scope system

set deploymode container

You are prompted to reboot.

Example:


firepower# scope system
firepower /system # set deploymode container
All configuration and bootable images will be lost and system will reboot.
If there was out of band upgrade, it might reboot with the base version and need to re-image to get the expected running version.
Do you still want to change deploy mode? (yes/no):yes
firepower /system #

To change the mode back to appliance mode, enter set deploymode native .

Step 5

After the chassis finishes rebooting, set the Management IP address. You can use IPv4 and/or IPv6. The default address is 192.168.45.45/24 with a gateway of 192.168.45.1.

IPv4:

scope fabric-interconnect

set out-of-band static ip ip_address netmask network_mask gw gateway_ip_address

IPv6:

scope fabric-interconnect

scope ipv6-config

set out-of-band static ipv6 ipv6_address ipv6-prefix prefix_length ipv6-gw gateway_address

Example:

IPv4:


firepower-3110# scope fabric-interconnect
firepower-3110 /fabric-interconnect # set out-of-band static ip 10.5.23.8 netmask 255.255.255.0 gw 10.5.23.1

 

IPv6:


firepower-3110# scope fabric-interconnect
firepower-3110 / fabric-interconnect # scope ipv6-config
firepower-3110 / fabric-interconnect /ipv6-config # set out-of-band static ipv6 2001:DB8::34 ipv6-prefix 64 ipv6-gw 2001:DB8::1

Step 6

In the Security Cloud Control navigation pane, click Security Devices, then click the blue plus button (plus sign) to Onboard a device.

Step 7

Click the FTD Chassis tile to open the Add Chassis dialog box.

Figure 12. FTD Chassis Tile
FTD Chassis Tile
Figure 13. Add Chassis
Add Chassis

Step 8

Click Copy (copy icon) to copy the top generated command, then paste it at the FXOS CLI of your chassis.

Step 9

When prompted for the Registration Key at the FXOS CLI, click Copy (copy icon) on the Add Chassis dialog box for the generated registration key and paste it at the FXOS CLI.

You can disconnect from the FXOS CLI at this point.

Step 10

In the cloud-delivered Firewall Management Center Chassis Name field, enter a name for the chassis as you want it to display in the management center.

Step 11

(Optional) Add the chassis to a Device Group.

Step 12

Click Submit.

The chassis is added to the Device > Device Management page.

Step 13

To view and configure the chassis, click Manage in the Chassis column, or click Edit (edit icon) .

The Chassis Manager page opens for the chassis to the Summary page.

Figure 14. Chassis Summary
Chassis Summary

Configure Chassis Interfaces

At the chassis-level, you configure basic Ethernet settings of physical interfaces, VLAN subinterfaces for instances, and EtherChannel interfaces. By default, physical interfaces are disabled.


Note


To configure breakout ports and perform other network module operations, see Manage the Network Module for the Secure Firewall 3100/4200.



Note


For information about the Sync Device button, see Sync Interface Changes with the Management Center.


Configure a Physical Interface

You can physically enable and disable interfaces, as well as set the interface speed and duplex and other hardware settings. To use an interface, it must be physically enabled for the chassis and logically enabled in the instance. By default, physical interfaces are disabled. For VLAN subinterfaces, the admin state is inherited from the parent interface.

Procedure

Step 1

From Devices > Device Management, click Manage in the Chassis column or click Edit (edit icon).

Figure 15. Manage Chassis
Manage Chassis

The Chassis Manager page opens for the chassis to the Summary page.

Step 2

Click Interfaces.

Figure 16. Interfaces
Interfaces

Step 3

Click Edit (edit icon) for the interface you want to edit.

Figure 17. Edit Physical Interface
Edit Physical Interface

Step 4

Enable the interface by checking the Enabled check box.

Step 5

For the Port Type, choose Data or Data Sharing.

Figure 18. Port Type
Port Type

Step 6

Set the Admin Duplex.

Speeds of 1Gbps and higher only support Full duplex. SFP interfaces only support Full duplex.

Step 7

Set the Admin Speed.

For SFPs, Choose Detect SFP to detect the speed of the installed SFP module and use the appropriate speed. Duplex is always Full, and auto-negotiation is always enabled. This option is useful if you later change the network module to a different model, and want the speed to update automatically.

Step 8

(Optional) Check LLDP Transmit and/or LLDP Receive to enable Link Layer Discovery Protocol (LLDP) packets.

Step 9

(Optional) Check Flow Control Send to enable pause (XOFF) frames for flow control.

Flow control enables connected Ethernet ports to control traffic rates during congestion by allowing congested nodes to pause link operation at the other end. If the threat defense port experiences congestion (exhaustion of queuing resources on the internal switch) and cannot receive any more traffic, it notifies the other port by sending a pause frame to stop sending until the condition clears. Upon receipt of a pause frame, the sending device stops sending any data packets, which prevents any loss of data packets during the congestion period.

Note

 

The threat defense supports transmitting pause frames so that the remote peer can rate-control the traffic.

However, receiving of pause frames is not supported.

The internal switch has a global pool of 8000 buffers of 250 bytes each, and the switch allocates buffers dynamically to each port. A pause frame is sent out every interface with flow control enabled when the buffer usage exceeds the global high-water mark (2 MB (8000 buffers)); and a pause frame is sent out of a particular interface when its buffer exceeds the port high-water mark (.3125 MB (1250 buffers)). After a pause is sent, an XON frame can be sent when the buffer usage is reduced below the low-water mark (1.25 MB globally (5000 buffers); .25 MB per port (1000 buffers)). The link partner can resume traffic after receiving an XON frame.

Only flow control frames defined in 802.3x are supported. Priority-based flow control is not supported.

Step 10

(Optional) Check Auto Negotiation to set the interface to negotiate the speed, link status, and flow control. You cannot edit this setting for speeds lower than 1Gbps. For SFP interfaces, you can only disable auto-negotiation when the speed is set to 1Gbps.

Step 11

Click Save and then Save in the top right of the Interfaces page.

You can now Deploy the policy to the chassis. The changes are not active until you deploy them.


Configure an EtherChannel

An EtherChannel (also known as a port channel) can include up to 8 member interfaces of the same media type and capacity, and must be set to the same speed and duplex. The media type can be either RJ-45 or SFP; SFPs of different types (copper and fiber) can be mixed. You cannot mix interface capacities (for example 1GB and 10GB interfaces) by setting the speed to be lower on the larger-capacity interface, unless you set the speed to Detect SFP; in this case, you can use different interface capacities, and the lowest common speed is used.

The Link Aggregation Control Protocol (LACP) aggregates interfaces by exchanging the Link Aggregation Control Protocol Data Units (LACPDUs) between two network devices. LACP coordinates the automatic addition and deletion of links to the EtherChannel without user intervention. It also handles misconfigurations and checks that both ends of member interfaces are connected to the correct channel group. “On” mode cannot use standby interfaces in the channel group when an interface goes down, and the connectivity and configurations are not checked.

When the chassis creates an EtherChannel, the EtherChannel stays in a Suspended state for Active LACP mode or a Down state for On LACP mode until you assign it to a logical device, even if the physical link is up. The EtherChannel will be brought out of this Suspended state when it is added to an instance.

Before you begin

Enable physical interfaces and set hardware parameters. See Configure a Physical Interface.

Procedure

Step 1

From Devices > Device Management, click Manage in the Chassis column or click Edit (edit icon).

Figure 19. Manage Chassis
Manage Chassis

The Chassis Manager page opens for the chassis to the Summary page.

Step 2

Click Interfaces.

Figure 20. Interfaces
Interfaces

Step 3

Click Add > EtherChannel Interface.

Figure 21. Add EtherChannel
Add EtherChannel

Step 4

Set the following Interfaces parameters.

Figure 22. Interfaces Settings
Interfaces Settings
  1. For the EtherChannel ID, specify an ID between 1 and 48.

  2. Check Enabled.

  3. For the Port Type, choose Data or Data Shared.

    For information about the port type, see Interface Types.

  4. To add a physical interface to the EtherChannel, select click Add (add icon) in the Available Interfaces list to move it to the Selected Interfaces list.

    To add or remove all interfaces, click the double arrow button.

    Note

     

    You cannot add an interface that is already assigned to an instance.

Step 5

(Optional) Set the following Configuration parameters.

Many of these settings (excluding the LACP settings) set the requirements for interfaces to be included in the EtherChannel; they do not override the settings of member interfaces. So if you check LLDP Transmit, for example, you should only add interfaces that have that setting. If you set the Admin Speed to 1Gbps, then only 1Gbps interfaces can be included.

Figure 23. Configuration Settings
Configuration Settings
  1. Choose the required Admin Duplex for the member interfaces, Full Duplex or Half Duplex.

    If you add a member interface that is configured with the specified duplex, it will not successfully join the port channel.

  2. Choose the required Admin Speed for the member interfaces from the drop-down list.

    If you add a member interface that is not at the specified speed, it will not successfully join the port channel.

  3. Choose the LACP Mode, Active or On.

    • Active—Sends and receives LACP updates. An active EtherChannel can establish connectivity with either an active or a passive EtherChannel. You should use the active mode unless you need to minimize the amount of LACP traffic.

    • On—The EtherChannel is always on, and LACP is not used. An “on” EtherChannel can only establish a connection with another “on” EtherChannel.

    Note

     

    It may take up to three minutes for an EtherChannel to come up to an operational state if you change its mode from On to Active or from Active to On.

  4. Choose the LACP Rate, Default, Fast, or Normal.

    The default is Fast.

  5. Choose the required Link Layer Discovery Protocol (LLDP) settings for member interfaces by checking LLDP Transmit and/or LLDP Receive.

  6. Check the required Flow Control Send setting for member interfaces.

Step 6

Click Save and then Save in the top right of the Interfaces page.

You can now Deploy the policy to the chassis. The changes are not active until you deploy them.


Configure a Subinterface

You can add up to 500 subinterfaces to your chassis.

VLAN IDs per interface must be unique, and within an instance, VLAN IDs must be unique across all assigned interfaces. You can reuse VLAN IDs on separate interfaces as long as they are assigned to different instances. However, each subinterface still counts towards the limit even though it uses the same ID.

This section discusses FXOS VLAN subinterfaces only. You can separately create subinterfaces within the instance. See Chassis Interfaces vs. Instance Interfaces.

Procedure

Step 1

From Devices > Device Management, click Manage in the Chassis column or click Edit (edit icon).

Figure 24. Manage Chassis
Manage Chassis

The Chassis Manager page opens for the chassis to the Summary page.

Step 2

Click Interfaces.

Figure 25. Interfaces
Interfaces

Step 3

Click Add > Subinterface.

Figure 26. Add Subinterface
Change an Interface

Step 4

Set the following parameters.

Figure 27. Subinterface Settings
Subinterface Settings

Step 5

Click Save and then Save in the top right of the Interfaces page.

You can now Deploy the policy to the chassis. The changes are not active until you deploy them.


Add an Instance

You can add one or more instances to a chassis in multi-instance mode. The number of supported instances depends on your model; see Requirements and Prerequisites for Instances.

Before you begin

Onboard the Multi-Instance Chassis.

Procedure


Step 1

From Devices > Device Management, click Manage in the Chassis column or click Edit (edit icon).

Figure 28. Manage Chassis
Manage Chassis

The Chassis Manager page opens for the chassis to the Summary page.

Step 2

Click Instances, and click Add Instance.

Figure 29. Instances
Instances

Step 3

On Agreement, check I understand and accept the agreement, then click Next.

Figure 30. Agreement
Agreement

Step 4

On Instance Configuration, set the instance parameters, then click Next.

Figure 31. Instance Configuration
Instance Configuration
  • Display Name

  • Device Version—Versions listed are packages currently downloaded to the chassis. Patch versions are not listed and cannot be used because they don't contain the entire bundle. To upgrade to a new package, see Devices > Chassis Upgrade. When you upgrade, both the old threat defense version and the new threat defense version will be listed in the menu. To download an older package, you need to use the FXOS CLI. Note: Both FXOS and threat defense images are included in the same package. See the troubleshooting guide for more information.

    For example:

    
    firepower-3110# scope firmware
    firepower-3110# download image https://10.10.7.89/Cisco_FTD_SSP_FP3K_Upgrade-7.4.1-1.sh.DEV.tar
    Please use the command 'show download-task' or 'show download-task detail' to check download progress.
    % Download-task Cisco_FTD_SSP_FP3K_Upgrade-7.4.1-1.sh.DEV.tar : completed successfully.
    
  • IPv4, IPv6, or Both—Set a Management IP address on the same network as the chassis Management interface. Set the Network Mask and gateway (likely the same gateway as the chassis). The chassis Management interface is shared with each instance, and each instance has its own IP address on the network. You can SSH to this IP address by default to reach the threat defense CLI.

  • (Optional) FQDN

  • Firewall ModeRouted or Transparent. For more information about the firewall mode, see Transparent or Routed Firewall Mode.

  • DNS Servers—Enter a comma-separated list of DNS servers for management traffic only.

  • (Optional) Permit Expert Mode for CLI—Expert Mode provides threat defense shell access for advanced troubleshooting.

    If you enable this option, then users who access the instance directly from an SSH session can enter Expert Mode. If you disable this option, then only users who access the instance from the FXOS CLI can enter Expert Mode. We recommend disabling this option to increase isolation between instances.

    Use Expert Mode only if a documented procedure tells you it is required, or if the Cisco Technical Assistance Center asks you to use it. To enter this mode, use the expert command in the threat defense CLI.

  • Resource Profile—The resource profile sets the number of CPU cores; RAM is dynamically allocated according to the number of cores, and disk space is set to 40 GB per instance. The chassis includes the following default resource profiles: Default-Small, Default-Medium, and Default-Large. You can add additional profiles for this chassis by clicking Add (add icon). You cannot later edit the resource profile.

    Figure 32. Add Resource Profile
    Add Resource Profile
    • The minimum number of cores is 6.

      Note

       

      Instances with a smaller number of cores might experience relatively higher CPU utilization than those with larger numbers of cores. Instances with a smaller number of cores are more sensitive to traffic load changes. If you experience traffic drops, try assigning more cores.

    • You can assign cores as an even number (6, 8, 10, 12, 14 etc.) up to the maximum.

    • The maximum number of cores available depends on the model; see Requirements and Prerequisites for Instances.

    If you later assign a different resource profile, then the instance will reload, which can take approximately 5 minutes. Note that for an established High Availability pair, if you assign a different-sized resource profile, be sure to make all members the same size as soon as possible.

  • Device SSH Password—Set the threat defense admin user password for CLI access, either SSH or console. Repeat the password in the Confirm Password field.

Step 5

On Interface Assignment, assign the chassis interfaces to the instance, then click Next.

Figure 33. Interface Assignment
Interface Assignment

Shared interfaces show the sharing icon ().

Step 6

On Device Management, set the device-specific settings, then click Next.

Figure 34. Device Management
Device Management
  • Device Group

  • Access Control Policy—Choose an existing access control policy, or create a new policy.

  • Platform Settings—Choose an existing platform setting policy, or create a new policy.

  • Smart Licensing

Step 7

On Summary, confirm your settings, then click Save.

Figure 35. Summary
Summary

You can edit any settings on this screen before saving the instance. After you save, the instance is added to the Instances screen.

Step 8

On the Instances screen, click Save.

Step 9

Deploy the chassis configuration.

Step 10

Manually add the instance to Security Cloud Control as an FTD.

  1. Add the instance Using a CLI Registration Key. See Onboard a Device with a CLI Registration Key.

    For the Device Name, you can use the instance name that you specified or any other name.

  2. Access the chassis CLI and connect to the instance CLI. See Log Into the Command-Line Interface on the Device.

    connect ftd name

  3. Delete the current manager; this manager needs to be deleted and reconfigured.

    configure manager delete

  4. Paste the generated configure manager add command from Security Cloud Control.


Customize the System Configuration

You can configure chassis-level settings such as SNMP. You can also import or export the chassis FXOS configuration.

Configure SNMP

You can access chassis-level MIBs through the data interface of one of the instances, which you specify in the chassis system configuration. You can only use this instance for chassis SNMP information. You cannot access SNMP through the chassis Management interface.

Before you begin

Configure SNMP for one of the instances. See SNMP.

Procedure

Step 1

From Devices > Device Management, click Manage in the Chassis column or click Edit (edit icon).

Figure 36. Manage Chassis
Manage Chassis

The Chassis Manager page opens for the chassis to the Summary page.

Step 2

Click System Configuration.

Step 3

Click SNMP, and choose the instance from the drop-down list.

Figure 37. SNMP
SNMP

SNMP on the chassis will be accessible from the selected instance.

Step 4

Click Save.

Step 5

Deploy the chassis configuration.


Import or Export the Chassis Configuration

You can use the configuration export feature to export an XML file containing chassis configuration settings to your local computer. You can later import that configuration file to quickly apply the configuration settings to your chassis to return to a known good configuration or to recover from a system failure. You can also import the chassis configuration to a new chassis, for example for an RMA, as long as the prerequisites are met.

When exporting, only chassis configurations are exported; instance configuration settings are not exported. Instances need to be backed up separately using the device backup/restore feature.

When importing, all existing configurations on the chassis will be replaced by the configuration in the import file.

Before you begin

For the chassis where you want to import a configuration, the following characteristics must match:

  • Same chassis software version

  • Same threat defense instance images

  • Same network modules

Procedure

Step 1

From Devices > Device Management, click Manage in the Chassis column or click Edit (edit icon).

Figure 38. Manage Chassis
Manage Chassis

The Chassis Manager page opens for the chassis to the Summary page.

Step 2

Click System Configuration.

Step 3

Click Import/Export.

Step 4

To export the configuration, follow these steps.

  1. In the Export area, click Click here to export.

    Figure 39. Create Export File
    Create Export File
  2. Monitor the notifications for the Export file created successfully message.

    Figure 40. Export File Created Successfully
    Export File Created Successfully
  3. Download the export file by clicking the notification message (Download Export Package) or by clicking Download.

    Figure 41. Download
    Download

    The file is saved with the .sfo extension.

Step 5

To import a configuration, drag the .sfo file on the Import > Drop File here area.

Figure 42. Import
Import

Configure Chassis Platform Settings

Chassis platform settings configure a range of features for managing the chassis. You can share the policy among multiple chassis. If you want different settings per chassis, you must create multiple policies.

Create a Chassis Platform Settings Policy

Use the Platform Settings page (Devices > Platform Settings) to manage platform settings policies. This page indicates the type of device for each policy. The Status column shows the device targets for the policy.

Procedure

Step 1

Choose Devices > Platform Settings.

Step 2

For an existing policy, you can Copy (copy icon), Edit (edit icon), or Delete (delete icon) the policy.

Caution

 

You should not delete a policy that is the last-deployed policy on any of its target devices, even if it is out of date. Before you delete the policy completely, it is good practice to deploy a different policy to those targets.

Step 3

To create a new policy, click New Policy.

  1. Choose Chassis Platform Settings from the drop-down list.

  2. Enter a Name for the new policy and optionally, a Description.

  3. Optionally, choose the Available Chassis where you want to apply the policy and click Add (or drag and drop) to add the selected chassis. You can enter a search string in the Search field to narrow the list of chassis.

  4. Click Save.

    The system creates the policy and opens it for editing.

Step 4

To change the target chassis for a policy, click Edit (edit icon) next to the platform settings policy that you want to edit.

  1. Click Policy Assignment.

  2. To assign a chassis to the policy, select it in the Available Chassis list and click Add. You can also drag and drop.

  3. To remove a chassis assignment, click Delete (delete icon) next to a chassis in the Selected Chassis list.

  4. Click OK.


Configure DNS

You need to specify a DNS server if the chassis requires resolution of hostnames to IP addresses. These chassis DNS settings are separate from the DNS settings per instance, which are configured in the device platform settings.

When you configure multiple DNS servers, the chassis uses servers in a random order. You can configure up to four servers across four DNS server groups. For example, you can configure a single server group with four servers, or you can configure four server groups with one server each.

Procedure

Step 1

Choose Devices > Platform Settings and create or edit the chassis policy.

Step 2

Choose DNS.

Figure 43. DNS
DNS

Step 3

Enable the Enable DNS name resolution by device slider.

Step 4

Click Add to add a DNS server group.

Figure 44. Add DNS Server Group
Add DNS Server Group

Step 5

Either select an existing DNS server group (see Creating DNS Server Group Objects), or click (add icon) New Group.

If you add a new group, you see the following dialog box. Provide a name and up to four DNS server IP addresses as comma-separated values, and click Add.

Figure 45. New DNS Server Group Object
New DNS Server Group Object

Step 6

Click Save to add the DNS server to the list.

Step 7

Repeat these steps to add additional server groups.

Make sure you only identify a maximum of four DNS servers in all groups combined.

Step 8

Click Save to save all policy changes.


Configure SSH and SSH Access List

To allow SSH sessions from the admin user to the chassis on the Management interface, enable the SSH server and configure the allowed networks.

Procedure

Step 1

Choose Devices > Platform Settings and create or edit the chassis policy.

Step 2

Choose SSH.

Step 3

To enable SSH access to the chassis, enable the Enable SSH Server slider.

Figure 46. SSH
SSH

Step 4

To set the allowed Algorithms, click Edit (edit icon).

Figure 47. Add Algorithms
Add Algorithms
  1. Select the Encryption algorithms.

  2. Select the Key Exchange algorithms.

    The key exchange provides a shared secret that cannot be determined by either party alone. The key exchange is combined with a signature and the host key to provide host authentication. This key-exchange method provides explicit server authentication.

  3. Select the Mac integrity algorithms.

Step 5

For Host Key, enter the modulus size for the RSA key pairs.

The modulus value (in bits) is in multiples of 8 from 1024 to 2048. The larger the key modulus size you specify, the longer it takes to generate an RSA key pair. We recommend a value of 2048.

Step 6

For the server Volume Rekey Limit, set the amount of traffic in KB allowed over the connection before FXOS disconnects from the session.

Step 7

For the server Time Rekey Limit, set the minutes for how long an SSH session can be idle before FXOS disconnects the session.

Step 8

For the SSH Client, configure the following settings.

Figure 48. SSH
SSH
  • Strict Host Keycheck—Choose enable, disable, or prompt to control SSH host key checking.

    • enable—The connection is rejected if the host key is not already in the FXOS known hosts file. You must manually add hosts at the FXOS CLI using the enter ssh-host command in the system/services scope.

    • prompt—You are prompted to accept or reject the host key if it is not already stored on the chassis.

    • disable—(The default) The chassis accepts the host key automatically if it was not stored before.

  • Algorithms—Click Edit (edit icon). and select the Encryption, Key Exchange, and Mac algorithms.

  • Volume Rekey Limit—Set the amount of traffic in KB allowed over the connection before FXOS disconnects from the session.

  • Time Rekey Limit—Set the minutes for how long an SSH session can be idle before FXOS disconnects the session.

Step 9

Choose SSH Access List. You need to allow access to IP addresses or networks before you can use SSH.

Figure 49. SSH Access List
SSH Access List

Step 10

Click Edit (edit icon) to add network objects and click Save. You can also manually enter IP addresses.

Figure 50. Network Objects
Network Objects

Step 11

Click Save to save all policy changes.


Configure Syslog

You can enable syslogs from the chassis. These syslogs come from the chassis' FXOS operating system.

Procedure

Step 1

Choose Devices > Platform Settings and create or edit the chassis policy.

Step 2

Choose Syslog.

Step 3

Click the Local Destinations tab, and complete the following fields.

Figure 51. Syslog Local Destinations
Syslog Local Destinations
Name Description

Console Section

Admin State field

Whether the chassis displays syslog messages on the console.

Check the Enable check box if you want to have syslog messages displayed on the console as well as added to the log. If the Enable check box is unchecked, syslog messages are added to the log but are not displayed on the console.

Level field

If you checked the Enable check box for Console - Admin State, select the lowest message level that you want displayed on the console. The chassis displays that level and above on the console. This can be one of the following:

  • Emergencies

  • Alerts

  • Critical

Monitor Section

Admin State field

Whether the chassis displays syslog messages on the monitor.

Check the Enable check box if you want to have syslog messages displayed on the monitor as well as added to the log. If the Enable check box is unchecked, syslog messages are added to the log but are not displayed on the monitor.

Level drop-down list

If you checked the Enable check box for Monitor - Admin State, select the lowest message level that you want displayed on the monitor. The system displays that level and above on the monitor. This can be one of the following:

  • Emergencies

  • Alerts

  • Critical

  • Errors

  • Warnings

  • Notifications

  • Information

  • Debugging

Step 4

On the Remote Destinations tab, complete the following fields for up to three external logs that can store messages generated by the chassis:

Figure 52. Syslog Remote Destinations
Syslog Remote Destinations

By sending syslog messages to a remote destination, you can archive messages according to the available disk space on the external syslog server, and manipulate logging data after it is saved. For example, you could specify actions to be executed when certain types of syslog messages are logged, extract data from the log and save the records to another file for reporting, or track statistics using a site-specific script.

Name Description

Admin State field

Check the Enable check box if you want to have syslog messages stored in a remote log file.

Level drop-down list

Select the lowest message level that you want the system to store. The system stores that level and above in the remote file. This can be one of the following:

  • Emergencies

  • Alerts

  • Critical

  • Errors

  • Warnings

  • Notifications

  • Information

  • Debugging

Hostname/IP Address field

The hostname or IP address on which the remote log file resides.

Note

 

You must configure a DNS server if you use a hostname rather than an IP address.

Facility drop-down list

Choose a system log facility for syslog servers to use as a basis to file messages. This can be one of the following:

  • Local0

  • Local1

  • Local2

  • Local3

  • Local4

  • Local5

  • Local6

  • Local7

Step 5

Click the Local Sources tab, and complete the following fields.

Figure 53. Syslog Local Sources
Syslog Local Sources
Name Description

Faults > Enable Admin State

Enable system fault logging.

Audits > Enable Admin State

Enable audit logging.

Events > Enable Admin State

Enable system event logging.

Step 6

Click Save to save all policy changes.


Configure Time Synchronization

NTP is used to implement a hierarchical system of servers that provide a precisely synchronized time among network systems. This kind of accuracy is required for time-sensitive operations, such as validating CRLs, which include a precise time stamp. You can configure up to four NTP servers.


Note


  • FXOS uses NTP version 3.

  • If the stratum value of an external NTP server is 13 or greater, the application instance cannot sync to the NTP server on the FXOS chassis. Each time a NTP client syncs to a NTP server, the stratum value increases by one.

    If you have set up your own NTP server, you can find its stratum value in the /etc/ntp.conf file on the server. If the NTP server has stratum value of 13 or greater you can either change the stratum value in the ntp.conf file and restart the server, or use a different NTP server (for example: pool.ntp.org).


Before you begin

If you use a hostname for the NTP server, you must configure a DNS server. See Configure DNS.

Procedure

Step 1

Choose Devices > Platform Settings and create or edit the chassis policy.

Step 2

Choose Time Synchronization.

Figure 54. Time Synchronization
Time Synchronization

Step 3

If you want to obtain the time from the management center, click Via NTP from Management Center.

This option ensures both the chassis and the management center have the same time.

Step 4

To use an external NTP server, click Use Custom NTP Server.

  1. Click Add to add a server.

    Figure 55. Add NTP Server
    Add NTP Server
  2. Choose any already-defined servers from the drop-down menu and click Add, or click add icon New Server to add a new server.

    Figure 56. Add New NTP Server
    Add New NTP Server
  3. For a new server, enter the following fields, and click Add.

    • NTP Server Name—A name to identify this server.

    • IP/FQDN—The IP address or hostname of the server.

    • Authentication Key and Authentication Value—Obtain the key ID and value from the NTP server. For example, to generate the SHA1 key on NTP server Version 4.2.8p8 or later with OpenSSL installed, enter the ntp-keygen -M command, and then view the key ID and value in the ntp.keys file. The key is used to tell both the client and server which value to use when computing the message digest.

      Only SHA1 is supported for NTP server authentication.

Step 5

Click Save to save all policy changes.


Configure Time Zones

Set the time zone for the chassis.

Procedure

Step 1

Choose Devices > Platform Settings and create or edit the chassis policy.

Step 2

Choose Time Zones.

Figure 57. Time Zones
Time Zones

Step 3

Choose your Time Zone from the drop-down menu.

Step 4

Click Save to save all policy changes.


Manage Multi-Instance Mode

This section describes less common tasks, including changing settings at the FXOS CLI or changing interfaces assigned to the chassis.

Change Interfaces Assigned to an Instance

You can allocate or unallocate an interface on the instance. Adding a new interface, or deleting an unused interface, has minimal impact on the instance configuration. You can also edit the membership of an allocated EtherChannel without affecting the instance. However, deleting an interface that is used in your security policy will impact the configuration.

Interfaces can be referenced directly in many places in the instance configuration, including access rules, NAT, SSL, identity rules, VPN, DHCP server, and so on. Deleting an interface will delete any configuration associated with that interface.

Policies that refer to security zones are not affected.


Note


For high availability, you need to make the same interface changes for the other unit. Otherwise, high availability might not operate correctly.


Before you begin
  • Configure your interfaces according to Configure Instances.

  • If you want to add an already-allocated interface to an EtherChannel, you need to unallocate the interface from the instance first, then add the interface to the EtherChannel. For a new EtherChannel, you can then allocate the EtherChannel to the instance.

Procedure

Step 1

From Devices > Device Management, click Manage in the Chassis column or click Edit (edit icon).

Figure 58. Manage Chassis
Manage Chassis

The Chassis Manager page opens for the chassis to the Summary page.

Step 2

Click Instances, and click Edit (edit icon) next to the instance for which you want to change interfaces.

Figure 59. Instances
Instances

Step 3

Click Next until you get to the Interface Assignment screen.

Figure 60. Interface Assignment
Interface Assignment

Shared interfaces show the sharing icon ().

Step 4

Make your interface changes, and then click Next.

Step 5

Click Save on the Summary screen.

Step 6

For high availability, you need to make the same interface changes for the other unit. Otherwise, high availability might not operate correctly.


Change Chassis Management Settings at the FXOS CLI

If you want to change the chassis management interface IP address and gateway, change the management center to a new manager, change the admin password, or disable multi-instance mode, you can do so from the FXOS CLI.

Procedure

Step 1

Connect to the chassis console port.

The console port connects to the FXOS CLI.

Note

 

We recommend using the console port. You can also connect using SSH to the management interface, if configured in the chassis platform settings in the management center; however, if you change the management IP address, you will be disconnected.

Step 2

Log in with the username admin and the password you set during initial setup.

Step 3

Change the Management IP address. You can use a static IPv4 and/or IPv6 address.

IPv4:

scope fabric-interconnect

set out-of-band static ip ip_address netmask network_mask gw gateway_ip_address

IPv6:

scope fabric-interconnect

scope ipv6-config

set out-of-band static ipv6 ipv6_address ipv6-prefix prefix_length ipv6-gw gateway_address

Example:

IPv4:


firepower-3110# scope fabric-interconnect
firepower-3110 /fabric-interconnect # set out-of-band static ip 10.5.23.8 netmask 255.255.255.0
gw 10.5.23.1

 

IPv6:


firepower-3110# scope fabric-interconnect
firepower-3110 / fabric-interconnect # scope ipv6-config
firepower-3110 / fabric-interconnect /ipv6-config # set out-of-band static ipv6 2001:DB8::34
ipv6-prefix 64 ipv6-gw 2001:DB8::1

Step 4

Change the management center.

You should first unregister the chassis from the current management center.

enter device-manager manager_name [hostname {hostname | ipv4_address | ipv6_address}] [nat-id nat_id]

You are prompted for the registration key.

You can enter this command from any scope.

  • hostname {hostname | ipv4_address | ipv6_address} —Specifies either the FQDN or IP address of the management center. At least one of the devices, either the management center or the chassis, must have a reachable IP address to establish the two-way, TLS-1.3-encrypted communication channel between the two devices. If you do not specify a hostname , then the chassis must have a reachable IP address or hostname and you must specify the nat-id.

  • nat-id nat_id —Specifies a unique, one-time string of your choice that you will also specify on the management center when you register the chassis when one side does not specify a reachable IP address or hostname. It is required if you do not specify a hostname , however we recommend that you always set the NAT ID even when you specify a hostname or IP address. The NAT ID must not exceed 37 characters. Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-). This ID cannot be used for any other devices registering to the management center.

  • Registration Key: reg_key —You will be prompted for a one-time registration key of your choice that you will also specify on the management center when you register the chassis. The registration key must not exceed 37 characters. Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-).

Example:

firepower-3110# enter device-manager boulder_fmc hostname 10.89.5.35 nat-id 93002
(Valid registration key characters: [a-z],[A-Z],[0-9],[-]. Length: [2-36])
Registration Key: Impala67

Step 5

Change the admin password.

scope security

set password

Enter a password: password

Confirm the password: password

Example:

firepower-3110# scope security
firepower-3110 /security # set password
Enter new password: Sw@nsong67
Confirm new password: Sw@nsong67
firepower-3110 /security # 
 

Step 6

Disable multi-instance mode and set the system back to appliance mode.

scope system

set deploymode native

You are prompted to reboot.

Example:

firepower-3110# scope system
firepower-3110 /system # set deploymode native
All configuration and bootable images will be lost and system will reboot.
If there was out of band upgrade, it might reboot with the base version and
need to re-image to get the expected running version.
Do you still want to change deploy mode? (yes/no):yes
firepower-3110 /system #

To change the mode back to multi-instance mode, enter set deploymode container . You can check the current mode using the show system detail command.


Monitoring Multi-Instance Mode

This section helps you troubleshoot and diagnose your multi-instance mode chassis and instances.

Monitoring Multi-Instance Setup

show system detail

This FXOS command shows the current mode, Native or Container. If the mode is Native (also known as appliance mode), you can convert to multi-instance (Container) mode. Note that the prompt/name in multi-instance mode is generic "firepower-<model>" while the prompt in appliance mode is the hostname you set for the threat defense (by default "firepower")



firepower # show system detail

Systems:
    Name: firepower
    Mode: Stand Alone
    System IP Address: 172.16.0.50
    System IPv6 Address: ::
    System Owner:
    System Site:
    Deploy Mode: Native
    Description for System:
firepower # 

scope system > show

This FXOS command shows the current mode in a table format. Note that the prompt/name in multi-instance mode is generic "firepower-<model>" while the prompt in appliance mode is the hostname you set for the threat defense.


firepower-3110# scope system
firepower-3110 /system # show

Systems:
    Name       Mode        Deploy Mode System IP Address System IPv6 Address
    ---------- ----------- ----------- ----------------- -------------------
    firepower-3110
               Stand Alone Container   10.89.5.42        ::

3110-1# scope system
3110-1 /system # show

Systems:
    Name       Mode        Deploy Mode System IP Address System IPv6 Address
    ---------- ----------- ----------- ----------------- -------------------
    3110-1     Stand Alone Native      10.89.5.41        ::
3110-1 /system #                                                                    

Monitoring Instance Interfaces

show portmanager switch forward-rules hardware mac-filter

This command shows the internal switch-forwarding rule for two instances with a dedicated physical interface assigned to each instance. Ethernet 1/2 is assigned to ftd1 and Ethernet 1/1 is assigned to ftd2.

ECMP group 1540 is assigned to ftd1 and ECMP group 1541 is assigned to ftd2.



secfw-3140(local-mgmt)# show portmanager switch forward-rules hardware mac-filter 
     	VLAN   SRC_PORT   PC_ID   SRC_ID   DST_PORT     PKT_CNT      DMAC 
1        0         17       0       17        19        29164  0:0:0:0:0:0
2        0         19       0       19        17        67588  0:0:0:0:0:0
3        0          1       0      101      1541            0  a2:5b:83:0:0:15
4        0          1       0      101      1541         8181  ff:ff:ff:ff:ff:ff
5        0          2       0      102      1540            0  a2:5b:83:0:0:18
6        0          2       0      102      1540          431  ff:ff:ff:ff:ff:ff
7        0         17       0        0         0        11133  0:0:0:0:0:0
8        0         17       0        0         0            0  0:0:0:0:0:0

This command shows the internal switch-forwarding rule for two instances with shared physical interfaces assigned to two instances. Ethernet 1/1 is shared between ftd1 and ftd2.

ECMP group 1540 is assigned to ftd1 and ECMP group 1541 is assigned to ftd2.

MCAST group 4096 is used for replicating broadcast traffic between ftd1 and ftd2.


firepower-3140(local-mgmt)# show portmanager switch forward-rules hardware mac-filter 
      VLAN   SRC_PORT   PC_ID   SRC_ID   DST_PORT     PKT_CNT      DMAC 
1        0         17       0       17        19         2268  0:0:0:0:0:0
2        0         19       0       19        17         4844  0:0:0:0:0:0
3        0          1       0      101      1541            0  a2:5b:83:0:0:9
4        0          1       0      101      4096          546  ff:ff:ff:ff:ff:ff
5        0          1       0      101      1540            0  a2:5b:83:0:0:c
6        0         17       0        0         0         1263  0:0:0:0:0:0
7        0         17       0        0         0            0  0:0:0:0:0:0

This command shows the internal switch-forwarding rule for two instances with shared subinterfaces assigned to both instances. Ethernet 1/1.2452 is shared between ftd1 and ftd2.

ECMP group 1540 is assigned to ftd1 and ECMP group 1541 is assigned to ftd2.

MCAST group 4097 is used for replicating broadcast traffic between ftd1 and ftd2.


firepower-3140(local-mgmt)# show portmanager switch forward-rules hardware mac-filter 
      VLAN   SRC_PORT   PC_ID   SRC_ID   DST_PORT     PKT_CNT      DMAC 
1        0         17       0       17        19        21305  0:0:0:0:0:0
2        0         19       0       19        17        50976  0:0:0:0:0:0
3     2452          1       0      101      1541          430  a2:5b:83:0:0:f
4     2452          1       0      101      4097            0  ff:ff:ff:ff:ff:ff
5     2452          1       0      101      1540            0  a2:5b:83:0:0:12
6        0         17       0        0         0        11038  0:0:0:0:0:0
7        0         17       0        0         0            0  0:0:0:0:0:0

show portmanager switch ecmp-groups detail

Use this command to list each Instance Ecmp-Vport-Physical port mapping detail.


Note


Physical-Port 18 is the backplane uplink interface between the internal switch and the instance.


firepower-3140(local-mgmt)# show portmanager switch ecmp-groups detail 
       ECMP-GROUP  VPORT      PHYSICAL-PORT   
1      1536        256        18 
2      1537        257        18 
3      1538        258        18 
4      1539        259        18 
5      1540        260        18 
6      1541        261        18 
7      1542        262        18 
8      1543        263        18 
9      1544        264        18 
10     1545        265        18 

show portmanager switch mcast-groups detail

Use this command to list MCAST group membership details.


firepower-3140(local-mgmt)# show portmanager switch mcast-groups detail 
       MCAST-GROUP
1      4096
       Member-ports
       Ethernet 1/1
       ECMP-ID 1541
       ECMP-ID 1540

show portmanager counters mcast-group

Use this command to check the MCAST group packet counter.

firepower-3140(local-mgmt)# show portmanager counters mcast-group 4096
PKT_CNT: 8106

show portmanager counters ecmp

Use this command to check the ECMP group packet counter.


firepower-3140(local-mgmt)# show portmanager counters ecmp 1541
PKT_CNT: 430

History for Multi-Instance Mode

Table 2.

Feature

Minimum Management Center

Minimum Threat Defense

Details

Multi-instance mode conversion in the management center

7.6.0

You can now register an application-mode device to the management center and then convert it to multi-instance mode without having to use the CLI.

New/modified screens:

  • Devices > Device Management> More (more icon)> Convert to Multi-Instance

  • Devices > Device Management > Select Bulk Action > Convert to Multi-Instance

Multi-instance mode for the Secure Firewall 4200

7.6.0

Multi-instance mode is now supported for the Secure Firewall 4200.

Multi-instance mode for the Secure Firewall 3100.

20240203

7.4.1

You can deploy the Secure Firewall 3100 as a single device (appliance mode) or as multiple container instances (multi-instance mode). In multi-instance mode, you can deploy multiple container instances on a single chassis that act as completely independent devices. Note that in multi-instance mode, you upgrade the operating system and the firmware (chassis upgrade) separately from the container instances (threat defense upgrade).

New/modified screens:

  • Inventory > FTD Chassis

  • Devices > Device Management > Device > Chassis Manager

  • Devices > Platform Settings > New Policy > Chassis Platform Settings

  • Devices > Chassis Upgrade

New/modified threat defense CLI commands: configure multi-instance network ipv4 , configure multi-instance network ipv6

New/modified FXOS CLI commands: create device-manager , set deploymode

Platform restrictions: Not supported on the Secure Firewall 3105.