Requirements and Prerequisites for the System Configuration
Model Support
FMC
Supported Domains
Global
User Roles
Admin
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter explains how to configure system configuration settings on the Firepower Management Center.
FMC
Global
Admin
The system configuration identifies basic settings for the FMC.
Step 1 |
Choose System (). |
Step 2 |
Use the navigation panel to choose configurations to change. |
You can limit access to the FMC by IP address and port. By default, the following ports are enabled for any IP address:
443 (HTTPS) for web interface access.
22 (SSH) for CLI access.
You can also add access to poll for SNMP information over port 161. Because SNMP is disabled by default, you must first enable SNMP before you can add SNMP access rules. For more information, see Configure SNMP Polling.
Caution |
By default, access is not restricted. To operate in a more secure environment, consider adding access for specific IP addresses and then deleting the default any option. |
This access list does not control external database access. See Enabling External Access to the Database.
Caution |
If you delete access for the IP address that you are currently using to connect
to the FMC, and there is no entry for “ |
By default, the access list includes rules for HTTPS and SSH. To add SNMP rules to the access list, you must first enable SNMP. For more information, see Configure SNMP Polling.
Step 1 |
Choose System (). |
Step 2 |
(Optional) Click SNMP to configure SNMP if you want to add SNMP rules to the access list. By default, SNMP is disabled; see Configure SNMP Polling. |
Step 3 |
Click Access List. |
Step 4 |
To add access for one or more IP addresses, click Add Rules. |
Step 5 |
In the IP Address field, enter an IP address or address range, or |
Step 6 |
Choose SSH, HTTPS, SNMP, or a combination of these options to specify which ports you want to enable for these IP addresses. |
Step 7 |
Click Add. |
Step 8 |
Click Save. |
You can track changes to access control rules by allowing (or requiring) users to comment when they save. This allows you to quickly assess why critical policies in a deployment were modified. By default, this feature is disabled.
The FMC records user activity in read-only audit logs. You can review audit log data in several ways:
Use the web interface: Audit and Syslog.
Audit logs are presented in a standard event view where you can view, sort, and filter audit log messages based on any item in the audit view. You can easily delete and report on audit information and you can view detailed reports of the changes that users make.
Stream audit log messages to the syslog: Stream Audit Logs to Syslog..
Stream audit log messages to an HTTP server: Stream Audit Logs to an HTTP Server.
Streaming audit log data to an external server allows you to conserve space on the FMC. Note that sending audit information to an external URL may affect system performance.
Optionally, you can secure the channel for audit log streaming, enable TLS and mutual authentication using TLS certificates ; see Audit Log Certificate.
Streaming to Multiple Syslog Servers
You can stream audit log data to a maximum of five syslog servers. However, if you have enabled TLS for secured audit log streaming, you can stream only to a single syslog server.
When this feature is enabled, audit log records appear in the syslog in the following format:
Date
Time
Host [Tag] Sender: User_Name@User_IP, Subsystem, Action
Where the local date, time, and originating hostname precede the bracketed optional tag, and the sending device name precedes the audit log message.
For example, if you specify a tag of FMC-AUDIT-LOG
for audit log messages from your management center, a sample audit log message from your FMC could appear as follows:
Mar 01 14:45:24 localhost [FMC-AUDIT-LOG] Dev-MC7000: admin@10.1.1.2, Operations > Monitoring, Page View
If you specify a severity and facility, these values do not appear in syslog messages; instead, they tell the system that receives the syslog messages how to categorize them.
Make sure the FMC can communicate with the syslog server. When you save your configuration, the system uses ICMP/ARP and TCP SYN packets to verify that the syslog server is reachable. Then, the system by default uses port 514/UDP to stream audit logs. If you secure the channel (optional, see Audit Log Certificate), you must manually configure port 1470 for TCP.
Step 1 |
Choose System (). |
||||||||||||
Step 2 |
Click Audit Log. |
||||||||||||
Step 3 |
Choose Enabled from the Send Audit Log to Syslog drop-down menu. |
||||||||||||
Step 4 |
The following fields are applicable only for audit logs sent to syslog:
|
||||||||||||
Step 5 |
(Optional) To test whether the IP address of the syslog servers is valid, click Test Syslog Server. The system sends the following packets to verify whether the syslog server is reachable:
|
||||||||||||
Step 6 |
Click Save. |
When this feature is enabled, the appliance sends audit log records to an HTTP server in the following format:
Date
Time
Host [Tag] Sender: User_Name@User_IP, Subsystem, Action
Where the local date, time, and originating hostname precede the bracketed optional tag, and the sending appliance name precedes the audit log message.
For example, if you specify a tag of FROMMC
, a sample audit log message could appear as follows:
Mar 01 14:45:24 localhost [FROMMC] Dev-MC7000: admin@10.1.1.2, Operations > Monitoring, Page View
Make sure the device can communicate with the HTTP server. Optionally, secure the channel; see Audit Log Certificate.
Step 1 |
Choose System (). |
||
Step 2 |
Click Audit Log. |
||
Step 3 |
Optionally, in the Tag field, enter the tag name that you want to appear with the message. For example, if you want all audit log records to be
preceded with |
||
Step 4 |
Choose Enabled from the Send Audit Log to HTTP Server drop-down list. |
||
Step 5 |
In the URL to Post Audit field, designate the URL where you want to send the audit information. Enter a URL that corresponds to a Listener program that expects the HTTP POST variables as listed:
|
||
Step 6 |
Click Save. |
You can use Transport Layer Security (TLS) certificates to secure communications between the FMC and a trusted audit log server.
Generate a certificate signing request (CSR), submit it to a Certificate Authority (CA) for signing, then import the signed certificate onto the FMC. Use the local system configuration: Obtain a Signed Audit Log Client Certificate for the FMC and Import an Audit Log Client Certificate into the FMC.
For additional security, we recommend you require mutual authentication between the FMC and the audit log server. To accomplish this, load one or more certificate revocation lists (CRLs). You cannot stream audit logs to servers with revoked certificates listed in those CRLs.
Firepower supports CRLs encoded in Distinguished Encoding Rules (DER) format. Note that these are the same CRLs that the system uses to validate HTTPS client certificates for the FMC web interface.
Use the local system configuration: Require Valid Audit Log Server Certificates.
If you stream the audit log to a trusted HTTP server or syslog server, you can use Transport Layer Security (TLS) certificates to secure the channel between the FMC and the server. You must generate a unique client certificate for each appliance you want to audit.
See ramifications of requiring client and server certificates at Audit Log Certificate.
Step 1 |
Obtain and install a signed client certificate on the FMC: |
Step 2 |
Configure the communication channel with the server to use Transport Layer Security (TLS) and enable mutual authentication. |
Step 3 |
Configure audit log streaming if you have not yet done so. |
Important |
The Audit Log Certificate page is not available on a standby FMC in a high availability setup. You cannot perform this task from a standby FMC. |
The system generates certificate request keys in Base-64 encoded PEM format.
Keep the following in mind:
To ensure security, use a globally recognized and trusted Certificate Authority (CA) to sign your certificate.
If you will require mutual authentication between the appliance and the audit log server, the same Certificate Authority must sign both the client certificate and the server certificate.
Step 1 |
Choose System (). |
||
Step 2 |
Click Audit Log Certificate. |
||
Step 3 |
Click Generate New CSR. |
||
Step 4 |
Enter a country code in the Country Name (two-letter code) field. |
||
Step 5 |
Enter a state or province postal abbreviation in the State or Province field. |
||
Step 6 |
Enter a Locality or City. |
||
Step 7 |
Enter an Organization name. |
||
Step 8 |
Enter an Organizational Unit (Department) name. |
||
Step 9 |
Enter the fully qualified domain name of the server for which you want to request a certificate in the Common Name field.
|
||
Step 10 |
Click Generate. |
||
Step 11 |
Open a new blank file with a text editor. |
||
Step 12 |
Copy the entire block of text in the certificate request,
including the
|
||
Step 13 |
Save the file as
|
||
Step 14 |
Click Close. |
Submit the certificate signing request to the certificate authority that you selected using the guidelines in the "Before You Begin" section of this procedure.
When you receive the signed certificate, import it to the appliance; see Import an Audit Log Client Certificate into the FMC.
In the FMC high availability setup, you must use the active peer.
Make sure you are importing the signed certificate for the correct FMC.
If the signing authority that generated the certificate requires you to trust an intermediate CA, be prepared to provide the necessary certificate chain (or certificate path). The CA that signed the client certificate must be the same CA that signed any intermediate certificates in the certificate chain.
Step 1 |
On the FMC, choose System (). |
Step 2 |
Click Audit Log Certificate. |
Step 3 |
Click Import Audit Client Certificate. |
Step 4 |
Open the client certificate in a text editor, copy the entire
block of text, including the
|
Step 5 |
To upload a private key, open the private key file and copy the
entire block of text, including the
|
Step 6 |
Open any required intermediate certificates, copy the entire block of text for each, and paste it into the Certificate Chain field. |
Step 7 |
Click Save. |
The system supports validating audit log server certificates using imported CRLs in Distinguished Encoding Rules (DER) format.
Note |
If you choose to verify certificates using CRLs, the system uses the same CRLs to validate both audit log server certificates and certificates used to secure the HTTP connection between an appliance and a web browser. |
Important |
You cannot perform this procedure on the standby FMC in a high availability pair. |
Understand the ramifications of requiring mutual authentication and of using certificate revocation lists (CRLs) to ensure that certificates are still valid. See Audit Log Certificate.
Obtain and import the client certificate following the steps in Securely Stream Audit Logs and the topics referenced in that procedure.
Step 1 |
On the FMC, choose System (). |
||||
Step 2 |
Click Audit Log Certificate. |
||||
Step 3 |
To use Transport Layer Security to securely stream the audit log to an external server, select Enable TLS. When TLS is enabled, the syslog client (FMC) verifies the certificate received from the server. The connection between the client and the server succeeds only if server certificate verification is successful. For this verification process, the following conditions must be met:
|
||||
Step 4 |
If you do not want the client to authenticate itself against the server, but accept the server certificate when the certificate is issued by the same CA (not recommended): |
||||
Step 5 |
(Optional) To enable client certificate verification by the audit log server, select Enable Mutual Authentication.
When mutual authentication is enabled, the syslog client (FMC) sends a client certificate to the syslog server for verification. The client uses the same CA certificate of the CA who signed the server certificate of the syslog server. The connection succeeds only if client certificate verification is successful. For this verification process, the following conditions must be met:
|
||||
Step 6 |
(Optional) To automatically recognize server certificates that are no longer valid: |
||||
Step 7 |
Verify that you have a valid server certificate generated by the same certificate authority that created the client certificate. |
||||
Step 8 |
Click Save. |
(Optional) Set the frequency of CRL updates. See Configuring Certificate Revocation List Downloads.
You can view the audit log client certificate only for the appliance that you are logged in to. In FMC high availability pairs, you can view the certificate only on the active peer.
Step 1 |
Choose System (). |
Step 2 |
Click Audit Log Certificate. |
To monitor the changes that users make and ensure that they follow your organization’s preferred standard, you can configure the system to send, via email, a detailed report of changes made over the past 24 hours. Whenever a user saves changes to the system configuration, a snapshot is taken of the changes. The change reconciliation report combines information from these snapshots to present a clear summary of recent system changes.
The following sample graphic displays a User section of an example change reconciliation report and lists both the previous value for each configuration and the value after changes. When users make multiple changes to the same configuration, the report lists summaries of each distinct change in chronological order, beginning with the most recent.
You can view changes made during the previous 24 hours.
Configure an email server to receive emailed reports of changes made to the system over a 24-hour period; see Configuring a Mail Relay Host and Notification Address for more information.
Step 1 |
Choose System (). |
||
Step 2 |
Click Change Reconciliation. |
||
Step 3 |
Check the Enable check box. |
||
Step 4 |
Choose the time of day you want the system to send out the change reconciliation report from the Time to Run drop-down lists. |
||
Step 5 |
Enter email addresses in the Email to field.
|
||
Step 6 |
If you want to include policy changes, check the Include Policy Configuration check box. |
||
Step 7 |
If you want to include all changes over the past 24 hours, check the Show Full Change History check box. |
||
Step 8 |
Click Save. |
The Include Policy Configuration option controls whether the system includes records of policy changes in the change reconciliation report. This includes changes to access control, intrusion, system, health, and network discovery policies. If you do not select this option, the report will not show changes to any policies. This option is available on FMCs only.
The Show Full Change History option controls whether the system includes records of all changes over the past 24 hours in the change reconciliation report. If you do not select this option, the report includes only a consolidated view of changes for each category.
Note |
The change reconciliation report does not include changes to FTD interfaces and routing settings. |
You can configure the system to resolve IP addresses automatically on the event view pages. You can also configure basic properties for DNS caching performed by the appliance. Configuring DNS caching allows you to identify IP addresses you previously resolved without performing additional lookups. This can reduce the amount of traffic on your network and speed the display of event pages when IP address resolution is enabled.
DNS resolution caching is a system-wide setting that allows the caching of previously resolved DNS lookups.
Step 1 |
Choose System (). |
Step 2 |
Choose DNS Cache. |
Step 3 |
From the DNS Resolution Caching drop-down list, choose one of the following:
|
Step 4 |
In the DNS Cache Timeout (in minutes) field, enter the number of minutes a DNS entry remains cached in memory before it is removed for inactivity. The default setting is 300 minutes (five hours). |
Step 5 |
Click Save. |
Dashboards provide you with at-a-glance views of current system status through the use of widgets: small, self-contained components that provide insight into different aspects of the system. The system is delivered with several predefined dashboard widgets.
You can configure the FMC so that Custom Analysis widgets are enabled on the dashboard.
Use Custom Analysis dashboard widgets to create a visual representation of events based on a flexible, user-configurable query.
Step 1 |
Choose System (). |
Step 2 |
Click Dashboard. |
Step 3 |
Check the Enable Custom Analysis Widgets check box to allow users to add Custom Analysis widgets to dashboards. |
Step 4 |
Click Save. |
To manage disk space, the FMC periodically prunes the oldest intrusion events, audit records, Security Intelligence data, and URL filtering data from the event database. For each event type, you can specify how many records the FMC retains after pruning; never rely on the event database containing more records of any type than the retention limit configured for that type. To improve performance, tailor the event limits to the number of events you regularly work with. You can optionally choose to receive email notifications when pruning occurs. For some event types, you can disable storage.
To manually delete individual events, use the event viewer. (Note that in Versions 6.6.0+, you cannot manually delete connection or security Intelligence events in this way.) You can also manually purge the database; see Data Purge and Storage.
If you want to receive email notifications when events are pruned from the FMC's database, you must configure an email server; see Configuring a Mail Relay Host and Notification Address.
Step 1 |
Choose System (). |
Step 2 |
Choose Database. |
Step 3 |
For each of the databases, enter the number of records you want to store. For information on how many records each database can maintain, see Database Event Limits. |
Step 4 |
Optionally, in the Data Pruning Notification Address field, enter the email address where you want to receive pruning notifications. |
Step 5 |
Click Save. |
The following table lists the minimum and maximum number of records for each event type that you can store per FMC.
Event Type |
Upper Limit |
Lower Limit |
||
---|---|---|---|---|
Intrusion events |
10 million (FMC Virtual) 30 million (FMC1000, FMC1600) 60 million (FMC2500, FMC2600, FMCv 300) 300 million (FMC4500, FMC4600) |
10,000 |
||
Discovery events |
10 million (FMC Virtual) 20 million (FMC2500, FMC2600, FMC4500, FMC4600, FMCv 300) |
Zero (disables storage) |
||
Connection events Security Intelligence events |
50 million (FMC Virtual) 100 million (FMC1000, FMC1600) 300 million (FMC2500, FMC2600, FMCv 300) 1 billion (FMC4500, FMC4600) Limit is shared between connection events and Security Intelligence events. The sum of the configured maximums cannot exceed this limit. |
Zero (disables storage) If you set the Maximum Connection Events value to zero, then connection events that are not associated with Security Intelligence, intrusion, file, and malware events are not stored on the FMC.
See below for the effect of this setting on Maximum Flow Rate. These settings do not affect connection summaries. |
||
Connection summaries (aggregated connection events) |
50 million (FMC Virtual) 100 million (FMC1000, FMC1600) 300 million (FMC2500, FMC2600, FMCv 300) 1 billion (FMC4500, FMC4600) |
Zero (disables storage) |
||
Correlation events and compliance allow list events |
1 million (FMC Virtual) 2 million (FMC2500, FMC2600, FMC4500, FMC4600, FMCv 300) |
One |
||
Malware events |
10 million (FMC Virtual) 20 million (FMC2500, FMC2600, FMC4500, FMC4600, FMCv 300) |
10,000 |
||
File events |
10 million (FMC Virtual) 20 million (FMC2500, FMC2600, FMC4500, FMC4600, FMCv 300) |
Zero (disables storage) |
||
Health events |
1 million |
Zero (disables storage) |
||
Audit records |
100,000 |
One |
||
Remediation status events |
10 million |
One |
||
Allow list violation history |
a 30-day history of violations |
One day’s history |
||
User activity (user events) |
10 million |
One |
||
User logins (user history) |
10 million |
One |
||
Intrusion rule update import log records |
1 million |
One |
||
VPN Troubleshooting database |
10 million |
Zero (disables storage) |
The Maximum flow rate (flows per second) value for your FMC hardware model is specified in the Platform Specifications section of the FMC datasheet at https://www.cisco.com/c/en/us/products/collateral/security/firesight-management-center/datasheet-c78-736775.html?cachemode=refresh
If you set the Maximum Connection Events value in platform settings to zero, then connection events that are not associated with Security Intelligence, intrusion, file, and malware events are not counted toward the maximum flow rate for your FMC hardware.
Any non-zero value in this field causes ALL connection events to be counted against the maximum flow rate.
Other event types on this page do not count against the maximum flow rate.
Configure a mail host if you plan to:
Email event-based reports
Email status reports for scheduled tasks
Email change reconciliation reports
Email data-pruning notifications
Use email for discovery event, impact flag, correlation event alerting, intrusion event alerting, and health event alerting.
When you configure email notification, you can select an encryption method for the communication between the system and mail relay host, and can supply authentication credentials for the mail server if needed. After configuring, you can test the connection.
Step 1 |
Choose System (). |
||
Step 2 |
Click Email Notification. |
||
Step 3 |
In the Mail Relay Host field, enter the hostname or IP address of the mail server you want to use. The mail host you enter must allow access from the appliance. |
||
Step 4 |
In the Port Number field, enter the port number to use on the email server. Typical ports include:
|
||
Step 5 |
Choose an Encryption Method:
|
||
Step 6 |
In the From Address field, enter the valid email address you want to use as the source email address for messages sent by the appliance. |
||
Step 7 |
Optionally, to supply a user name and password when connecting to the mail server, choose Use Authentication. Enter a user name in the Username field. Enter a password in the Password field. |
||
Step 8 |
To send a test email using the configured mail server, click Test Mail Server Settings. A message appears next to the button indicating the success or failure of the test. |
||
Step 9 |
Click Save. |
You can configure the FMC to allow read-only access to its database by a third-party client. This allows you to query the database using SQL using any of the following:
industry-standard reporting tools such as Actuate BIRT, JasperSoft iReport, or Crystal Reports
any other reporting application (including a custom application) that supports JDBC SSL connections
the Cisco-provided command-line Java application called RunQuery, which you can either run interactively or use to obtain comma-separated results for a single query
Use the FMC's system configuration to enable database access and create an access list that allows selected hosts to query the database. Note that this access list does not also control appliance access.
You can also download a package that contains the following:
RunQuery, the Cisco-provided database query tool
InstallCert, a tool that you can use to retrieve and accept the SSL certificate from the FMC that you want to access
the JDBC driver you must use to connect to the database
See the Firepower System Database Access Guide for information on using the tools in the package you downloaded to configure database access.
Step 1 |
Choose System (). |
||
Step 2 |
Click External Database Access. |
||
Step 3 |
Select the Allow External Database Access check box. |
||
Step 4 |
Enter an appropriate value in the Server Hostname field. Depending on your third-party application requirements, this value can be either the fully qualified domain name (FQDN), IPv4 address, or IPv6 address of the FMC.
|
||
Step 5 |
Next to
Client JDBC Driver, click
Download and follow your browser’s prompts to
download the
|
||
Step 6 |
To add database access for one or more IP addresses, click Add Hosts. An IP Address field appears in the Access List field. |
||
Step 7 |
In the
IP Address field, enter an IP address or address
range, or
|
||
Step 8 |
Click Add. |
||
Step 9 |
Click Save.
|
Secure Sockets Layer (SSL)/TLS certificates enable FMCs to establish an encrypted channel between the system and a web browser. A default certificate is included with all Firepower devices, but it is not generated by a certificate authority (CA) trusted by any globally known CA. For this reason, consider replacing it with a custom certificate signed by a globally known or internally trusted CA.
Caution |
The FMC supports 4096-bit HTTPS certificates. If the certificate used by the FMC was generated using a public server key larger than 4096 bits, you will not be able to log in to the FMC web interface. If this happens, contact Cisco TAC. |
Note |
HTTPS certificates are not supported on the firepower REST API. |
If you use the default server certificate provided with an appliance, do not configure the system to require a valid HTTPS client certificate for web interface access because the default server certificate is not signed by the CA that signs your client certificate.
The lifetime of the default server certificate depends on when the certificate was generated. To view your default server certificate expiration date, choose System () > HTTPS Certificate.
Note that some Firepower software upgrades can automatically renew the certificate. For more information, see the appropriate version of the Cisco Firepower Release Notes.
On the FMC, you can renew the default certificate on the System () > HTTPS Certificate page.
You can use the FMC web interface to generate a server certificate request based on your system information and the identification information you supply. You can use that request to sign a certificate if you have an internal certificate authority (CA) installed that is trusted by your browser. You can also send the resulting request to a certificate authority to request a server certificate. After you have a signed certificate from a certificate authority (CA), you can import it.
When you use HTTPS certificates to secure the connection between your web browser and the Firepower appliance web interface, you must use certificates that comply with the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (RFC 5280). When you import a server certificate to the appliance, the system rejects the certificate if it does not comply with version 3 (X.509 v3) of that standard.
Before importing an HTTPS server certificate, be certain it includes the following fields:
Certificate Field |
Description |
---|---|
Version |
Version of the encoded
certificate. Use version |
Serial number |
A positive integer assigned to the certificate by the issuing CA. Issuer and serial number together uniquely identify the certificate. See RFC 5280, section 4.1.2.2. |
Signature |
Identifier for the algorithm used by the CA to sign the certificate. Must match the signatureAlgorithm field. See RFC 5280, section 4.1.2.3. |
Issuer |
Identifies the entity that signed and issued the certificate. See RFC 5280, section 4.1.2.4. |
Validity |
Interval during which the CA warrants that it will maintain information about the status of the certificate. See RFC 5280, section 4.1.2.5. |
Subject |
Identifies the entity associated with the public key stored in the subject public key field; must be an X.500 distinguished name (DN). See RFC 5280, section 4.1.2.6. |
Subject Alternative Name |
Domain names and IP addresses secured by the certificate. Subject Alternative Name is defined in section RFC 5280, section 4.2.1.6. We recommend you use this field if the certificate is used for multiple domains or IP addresses. |
Subject Public Key Info |
Public key and an identifier for its algorithm. See RFC 5280, section 4.1.2.7. |
Authority Key Identifier |
Provides a means of identifying the public key corresponding to the private key used to sign a certificate. See RFC 5280, section 4.2.1.1. |
Subject Key Identifier |
Provides a means of identifying certificates that contain a particular public key. See RFC 5280, section 4.2.1.2. |
Key Usage |
Defines the purpose of the key contained in the certificates. See RFC 5280, section 4.2.1.3. |
Basic Constraints |
Identifies whether the certificate Subject is a CA, and the maximum depth of validation certification paths that include this
certificate. See RFC 5280, section 4.2.1.9. For server certificates used in Firepower appliances, use |
Extended Key Usage extension |
Indicates one or more purposes for which the certified public key may be used, in addition to or in place of the basic purposes indicated in the Key Usage extension. See RFC 5280, section 4.2.1.12. Be certain you import certificates that can be used as server certificates. |
signatureAlgorithm |
Identifier for the algorithm the CA used to sign the certificate. Must match the Signature field. See RFC 5280, section 4.1.1.2. |
signatureValue |
Digital signature. See RFC 5280, section 4.1.1.3. |
You can restrict access to the system web server using client browser certificate checking. When you enable user certificates, the web server checks that a user’s browser client has a valid user certificate selected. That user certificate must be generated by the same trusted certificate authority that is used for the server certificate. The browser cannot load the web interface under any of the following circumstances:
The user selects a certificate in the browser that is not valid.
The user selects a certificate in the browser that is not generated by the certificate authority that signed the server certificate.
The user selects a certificate in the browser that is not generated by a certificate authority in the certificate chain on the device.
To verify client browser certificates, configure the system to use the online certificate status protocol (OCSP) or load one or more certificate revocation lists (CRLs). Using the OCSP, when the web server receives a connection request it communicates with the certificate authority to confirm the client certificate's validity before establishing the connection. If you configure the server to load one or more CRLs, the web server compares the client certificate against those listed in the CRLs. If a user selects a certificate that is listed in a CRL as a revoked certificate, the browser cannot load the web interface.
Note |
If you choose to verify certificates using CRLs, the system uses the same CRLs to validate both client browser certificates and audit log server certificates. |
Step 1 |
Choose System (). |
Step 2 |
Click HTTPS Certificate. |
If you install a certificate that is not signed by a globally known or internally trusted CA, the user's browser displays a security warning when they try to connect to the web interface.
A certificate signing request (CSR) is unique to the appliance or device from which you generated it. You cannot generate a CSR for multiple devices from a single appliance. Although all fields are optional, we recommend entering values for the following: CN, Organization, Organization Unit, City/Locality, State/Province, Country/Region, and Subject Alternative Name.
The key generated for the certificate request is in Base-64 encoded PEM format.
Step 1 |
Choose System (). |
||
Step 2 |
Click HTTPS Certificate. |
||
Step 3 |
Click Generate New CSR. The following figure shows an example. |
||
Step 4 |
Enter a country code in the Country Name (two-letter code) field. |
||
Step 5 |
Enter a state or province postal abbreviation in the State or Province field. |
||
Step 6 |
Enter a Locality or City. |
||
Step 7 |
Enter an Organization name. |
||
Step 8 |
Enter an Organizational Unit (Department) name. |
||
Step 9 |
Enter the fully qualified domain name of the server for which you want to request a certificate in the Common Name field.
|
||
Step 10 |
To request a certificate that secures multiple domain names or IP addresses, enter the following information in the Subject Alternative Name section:
|
||
Step 11 |
Click Generate. |
||
Step 12 |
Open a text editor. |
||
Step 13 |
Copy the entire block of text in the certificate request,
including the
|
||
Step 14 |
Save the file as
|
||
Step 15 |
Click Close. |
Submit the certificate request to the certificate authority.
When you receive the signed certificate, import it to the FMC; see Importing HTTPS Server Certificates.
If the signing authority that generated the certificate requires you to trust an intermediate CA, you must also supply a certificate chain (or certificate path).
If you require client certificates, accessing an appliance via the web interface will fail when the server certificate does not meet either of the following criteria:
The certificate is signed by the same CA that signed the client certificate.
The certificate is signed by a CA that has signed an intermediate certificate in the certificate chain.
Caution |
The FMC supports 4096-bit HTTPS certificates. If the certificate used by the FMC was generated using a public server key larger than 4096 bits, you will not be able to log in to the Firepower Management Center web interface. For more information about updating HTTPS Certificates to Version 6.0.0, see "Update Management Center HTTPS Certificates to Version 6.0" in Firepower System Release Notes, Version 6.0. If you generate or import an HTTPS Certificate and cannot log in to the FMC web interface, contact Support. |
Generate a certificate signing request; see Generating an HTTPS Server Certificate Signing Request.
Upload the CSR file to the certificate authority where you want to request a certificate or use the CSR to create a self-signed certificate.
Confirm that the certificate meets the requirements described in HTTPS Server Certificate Requirements.
Step 1 |
Choose System (). |
||
Step 2 |
Click HTTPS Certificate. |
||
Step 3 |
Click Import HTTPS Server Certificate.
|
||
Step 4 |
Open the server certificate in a text editor, copy the entire block of text, including the |
||
Step 5 |
Whether you must supply a Private Key depends on how you generated the Certificate Signing Request:
|
||
Step 6 |
Open any required intermediate certificates, copy the
entire block of text for each, and paste it into the Certificate Chain field. If you received a
root certificate, paste it here. If you received an intermediate certificate,
paste it below the root certificate. In both cases, copy the entire block of
text, including the |
||
Step 7 |
Click Save. |
Use this procedure to require users connecting to the FMC web interface to supply a user certificate. The system supports validating HTTPS client certificates using either OCSP or imported CRLs in Privacy-enhanced Electronic Mail (PEM) format.
If you choose to use CRLs, to ensure that the list of revoked certificates stays current, you can create a scheduled task to update the CRLs. The system displays the most recent refresh of the CRLs.
Note |
To access the web interface after enabling client certificates, you must have a valid client certificate present in your browser (or a CAC inserted in your reader). |
Import a server certificate signed by the same certificate authority that signed the client certificate to be used for the connection; see Importing HTTPS Server Certificates.
Import the server certificate chain if needed; see Importing HTTPS Server Certificates.
Step 1 |
Choose System (). |
||
Step 2 |
Click HTTPS Certificate. |
||
Step 3 |
Choose Enable Client Certificates. If prompted, select the appropriate certificate from the drop-down list. |
||
Step 4 |
You have three options:
|
||
Step 5 |
Enter a valid URL to an existing CRL file and click Add CRL. Repeat to add up to 25 CRLs. |
||
Step 6 |
Click Refresh CRL to load the current CRL or CRLs from the specified URL or URLs.
|
||
Step 7 |
Verify that the client certificate is signed by the certificate authority loaded onto the appliance and the server certificate is signed by a certificate authority loaded in the browser certificate store. (These should be the same certificate authority.)
|
||
Step 8 |
Click Save. |
You can only view server certificates for the appliance you are logged in to.
Step 1 |
Choose System (). |
Step 2 |
Click HTTPS Certificate. The button appears only if your system is configured to use the default HTTPS server certificate. |
Step 3 |
Click Renew HTTPS Certificate. (This option appears on the display below the certificate information only if your system is configured to use the default HTTPS server certificate.) |
Step 4 |
(Optional) In the Renew HTTPS Certificate dialog box, select Generate New Key to generate a new key for the certificate. |
Step 5 |
In the Renew HTTPS Certificate dialog box, click Save. |
You can confirm that the certificate has been renewed by checking that that certificate validity dates displayed on the HTTPS Certificate page have updated.
The System > Configuration page of the web interface includes the information listed in the table below. Unless otherwise noted, all fields are read-only.
Note |
See also the Help > About page, which includes similar but slightly different information. |
Field |
Description |
---|---|
Name |
A descriptive name you assign to the FMC appliance. Although you can use the host name as the name of the appliance, entering a different name in this field does not change the host name. This name is used in certain integrations. For example, it appears in the Devices list for integrations with SecureX and Cisco Threat Response. If you change the name, all registered devices are marked out of date and deployment is required to push the new name to the devices. |
Product Model |
The model name of the appliance. |
Serial Number |
The serial number of the appliance. |
Software Version |
The version of the software currently installed on the appliance. |
Operating System |
The operating system currently running on the appliance. |
Operating System Version |
The version of the operating system currently running on the appliance. |
IPv4 Address |
The IPv4 address of the default ( |
IPv6 Address |
The IPv6 address of the default ( |
Current Policies |
The system-level policies currently deployed. If a policy has been updated since it was last deployed, the name of the policy appears in italics. |
Model Number |
The appliance-specific model number stored on the internal flash drive. This number may be important for troubleshooting. |
Configure various intrusion policy preferences to monitor and track changes to the critical policies in your deployment.
Configure the intrusion policy preferences.
Step 1 |
Choose System (). |
Step 2 |
Click Intrusion Policy Preferences. |
Step 3 |
You have the following options:
|
You can use the Language page to specify a different language for the web interface.
The language you specify here is used for the web interface for every user. You can choose from:
English
Chinese (simplified)
Chinese (traditional)
Japanese
Korean
Step 1 |
Choose System (). |
Step 2 |
Click Language. |
Step 3 |
Choose the language you want to use. |
Step 4 |
Click Save. |
You can use the Login Banner page to specify session, login, or custom message banners for a security appliance or shared policy.
You can use ASCII characters and carriage returns to create a custom login banner. The system does not preserve tab spacing. If your login banner is too large or causes errors, Telnet or SSH sessions can fail when the system attempts to display the banner.
Step 1 |
Choose System (). |
Step 2 |
Choose Login Banner. |
Step 3 |
In the Custom Login Banner field, enter the login banner text you want to use. |
Step 4 |
Click Save. |
After setup, you can change the management network settings, including adding more management interfaces, hostname, search domains, DNS servers, and HTTP proxy on the FMC.
By default, the FMC manages all devices on a single management interface. You can also perform initial setup on the management interface and log into the FMC on this interface as an administrator. The management interface is also used to communicate with the Smart Licensing server, to download updates, and to perform other management functions.
For information about device management interfaces, see About Device Management Interfaces in the Firepower Management Center Device Configuration Guide.
When the FMC manages a device, it sets up a two-way, SSL-encrypted communication channel between itself and the device. The FMC uses this channel to send information to the device about how you want to analyze and manage your network traffic to the device. As the device evaluates the traffic, it generates events and sends them to the FMC using the same channel.
By using the FMC to manage devices, you can:
configure policies for all your devices from a single location, making it easier to change configurations
install various types of software updates on devices
push health policies to your managed devices and monitor their health status from the FMC
The FMC aggregates and correlates intrusion events, network discovery information, and device performance data, allowing you to monitor the information that your devices are reporting in relation to one another, and to assess the overall activity occurring on your network.
You can use the FMC to manage nearly every aspect of a device’s behavior.
Note |
Although the FMC can manage devices running certain previous releases as specified in the compatibility matrix available at http://www.cisco.com/c/en/us/support/security/defense-center/products-device-support-tables-list.html, new features that require the latest version of FTD software are not available to these previous-release devices. Some FMC features may be available for earlier versions. |
After you configure the device with the FMC information and after you add the device to the FMC, either the device or the FMC can establish the management connection. Depending on initial setup:
Either the device or the FMC can initiate.
Only the device can initiate.
Only the FMC can initiate.
Initiation always originates with eth0 on the FMC or with the lowest-numbered management interface on the device. Additional management interfaces are tried if the connection is not established. Multiple management interfaces on the FMC let you connect to discrete networks or to segregate management and event traffic. However, the initiator does not choose the best interface based on the routing table.
Make sure the management connection is stable, without excessive packet loss, with at least 5Mbps throughput.
Note |
The management connection is a secure, TLS-1.3-encrypted communication channel between itself and the device. You do not need to run this traffic over an additional encrypted tunnel such as Site-to-Site VPN for security purposes. If the VPN goes down, for example, you will lose your management connection, so we recommend a simple management path. |
The FMC uses the eth0 interface for initial setup, HTTP access for administrators, management of devices, as well as other management functions such as licensing and updates.
You can also configure additional management interfaces. When the FMC manages large numbers of devices on different networks, adding more management interfaces can improve throughput and performance. You can also use these interfaces for all other management functions. You might want to use each management interface for particular functions; for example, you might want to use one interface for HTTP administrator access and another for device management.
For device management, the management interface carries two separate traffic channels: the management traffic channel carries all internal traffic (such as inter-device traffic specific to managing the device), and the event traffic channel carries all event traffic (such as web events). You can optionally configure a separate event-only interface on the FMC to handle event traffic; you can configure only one event interface. You must also always have a management interface for the management traffic channel. Event traffic can use a large amount of bandwidth, so separating event traffic from management traffic can improve the performance of the FMC. For example, you can assign a 10 GigabitEthernet interface to be the event interface, if available, while using 1 GigabitEthernet interfaces for management. You might want to configure an event-only interface on a completely secure, private network while using the regular management interface on a network that includes Internet access, for example. Though you may use both management and event interfaces on the same network, we recommend that placing each interface on a separate network to avoid potential routing problems, including routing problems from other devices to the management center. Managed devices will send management traffic to the FMC's management interface and event traffic to the FMC's event-only interface. If the managed device cannot reach the event-only interface, then it will fall back to sending events to the management interface. However, the management connections cannot be made through the event-only interface.
Management connection initiation from the FMC is always attempted first from eth0 and then other interfaces are tried in order; the routing table is not used to determine the best interface.
Note |
All management interfaces support HTTP administrator access as controlled by your Access List configuration (Configure an Access List). Conversely, you cannot restrict an interface to only HTTP access; management interfaces always support device management (management traffic, event traffic, or both). |
Note |
Only the eth0 interface supports DHCP IP addressing. Other management interfaces only support static IP addresses. |
See the hardware installation guide for your model for the management interface locations.
See the following table for supported management interfaces on each FMC model.
Model |
Management Interfaces |
---|---|
MC1000 |
eth0 (Default) eth1 |
MC2500, MC4500 |
eth0 (Default) eth1 eth2 eth3 |
MC1600, MC2600, MC4600 |
eth0 (Default) eth1 eth2 eth3 CIMC (Supported for Lights-Out Management only.) |
FMCv |
eth0 (Default) |
Management interfaces (including event-only interfaces) support only static routes to reach remote networks. When you set up your FMC, the setup process creates a default route to the gateway IP address that you specify. You cannot delete this route; you can only modify the gateway address.
You can configure multiple management interfaces on some platforms. The default route does not include an egress interface, so the interface chosen depends on the gateway address you specify, and which interface's network the gateway belongs to. In the case of multiple interfaces on the default network, the device uses the lower-numbered interface as the egress interface.
At least one static route is recommended per management interface to access remote networks. We recommend placing each interface on a separate network to avoid potential routing problems, including routing problems from other devices to the FMC.
Note |
The interface used for management connections is not determined by the routing table. Connections are always tried using eth0 first, and then subsequent interfaces are tried in order until the managed device is reached. |
Network address translation (NAT) is a method of transmitting and receiving network traffic through a router that involves reassigning the source or destination IP address. The most common use for NAT is to allow private networks to communicate with the internet. Static NAT performs a 1:1 translation, which does not pose a problem for FMC communication with devices, but port address translation (PAT) is more common. PAT lets you use a single public IP address and unique ports to access the public network; these ports are dynamically assigned as needed, so you cannot initiate a connection to a device behind a PAT router.
Normally, you need both IP addresses (along with a registration key) for both routing purposes and for authentication: the FMC specifies the device IP address when you add a device, and the device specifies the FMC IP address. However, if you only know one of the IP addresses, which is the minimum requirement for routing purposes, then you must also specify a unique NAT ID on both sides of the connection to establish trust for the initial communication and to look up the correct registration key. The FMC and device use the registration key and NAT ID (instead of IP addresses) to authenticate and authorize for initial registration.
For example, you add a device to the FMC, and you do not know the device IP address (for example, the device is behind a PAT router), so you specify only the NAT ID and the registration key on the FMC; leave the IP address blank. On the device, you specify the FMC IP address, the same NAT ID, and the same registration key. The device registers to the FMC's IP address. At this point, the FMC uses the NAT ID instead of IP address to authenticate the device.
Although the use of a NAT ID is most common for NAT environments, you might choose to use the NAT ID to simplify adding many devices to the FMC. On the FMC, specify a unique NAT ID for each device you want to add while leaving the IP address blank, and then on each device, specify both the FMC IP address and the NAT ID. Note: The NAT ID must be unique per device.
The following example shows three devices behind a PAT IP address. In this case, specify a unique NAT ID per device on both the FMC and the devices, and specify the FMC IP address on the devices.
The following example shows the FMC behind a PAT IP address. In this case, specify a unique NAT ID per device on both the FMC and the devices, and specify the device IP addresses on the FMC.
Note |
If you use a data interface for management on a FTD, you cannot use separate management and event interfaces for that device. |
The following example shows the FMC and managed devices using only the default management interfaces.
The following example shows the FMC using separate management interfaces for devices; and each managed device using 1 management interface.
The following example shows the FMC and managed devices using a separate event interface.
The following example shows a mix of multiple management interfaces and a separate event interface on the FMC and a mix of managed devices using a separate event interface, or using a single management interface.
Modify the management interface settings on the FMC. You can optionally enable additional management interfaces or configure an event-only interface.
Caution |
Be careful when making changes to the management interface to which you are connected; if you cannot re-connect because of a configuration error, you need to access the FMC console port to re-configure the network settings in the Linux shell. You must contact Cisco TAC to guide you in this operation. |
If you change the FMC IP address, then see Edit the FMC IP Address or Hostname on the Device in the Firepower Management Center Device Configuration Guide. If you change the FMC IP address or hostname, you should also change the value at the device CLI so the configurations match. Although in most cases, the management connection will be reestablished without changing the FMC IP address or hostname on the device, in at least one case, you must perform this task for the connection to be reestablished: when you added the device to the FMC and you specified the NAT ID only. Even in other cases, we recommend keeping the FMC IP address or hostname up to date for extra network resiliency.
In a high availability configuration, when you modify the management IP address of a registered device from the device CLI or from the FMC, the secondary FMC does not reflect the changes even after an HA synchronization. To ensure that the secondary FMC is also updated, switch roles between the two FMCs, making the secondary FMC as the active unit. Modify the management IP address of the registered device on the Device Management page of the now active FMC.
For information about how device management works, see About Device Management Interfaces in the Firepower Management Center Device Configuration Guide.
If you use a proxy:
Proxies that use NT LAN Manager (NTLM) authentication are not supported.
If you use or will use Smart Licensing, the proxy FQDN cannot have more than 64 characters.
Step 1 |
Choose System (), and then choose Management Interfaces. |
||||
Step 2 |
In the Interfaces area, click Edit next to the interface that you want to configure. All available interfaces are listed in this section. You cannot add more interfaces. You can configure the following options on each management interface:
|
||||
Step 3 |
In the Routes area, edit a static route by clicking Edit (), or add a route by clicking Add (). View the route table by clicking . You need a static route for each additional interface to reach remote networks. For more information about when new routes are needed, see Network Routes on FMC Management Interfaces.
You can configure the following settings for a static route:
|
||||
Step 4 |
In the Shared Settings area, set network parameters shared by all interfaces.
You can configure the following shared settings:
|
||||
Step 5 |
In the ICMPv6 area, configure ICMPv6 settings.
|
||||
Step 6 |
In the Proxy area, configure HTTP proxy settings. The FMC is configured to directly-connect to the internet on ports TCP/443 (HTTPS) and TCP/80 (HTTP). You can use a proxy server, to which you can authenticate via HTTP Digest. See proxy requirements in the prerequisites to this topic. |
||||
Step 7 |
Click Save. |
||||
Step 8 |
If you change the FMC IP address, then see If you change the FMC IP address, then see Edit the FMC IP Address or Hostname on the Device in the Firepower Management Center Device Configuration Guide. If you change the FMC IP address or hostname, you should also change the value at the device CLI so the configurations match. Although in most cases, the management connection will be reestablished without changing the FMC IP address or hostname on the device, in at least one case, you must perform this task for the connection to be reestablished: when you added the device to the FMC and you specified the NAT ID only. Even in other cases, we recommend keeping the FMC IP address or hostname up to date for extra network resiliency. |
You can configure the system to track policy-related changes using the comment functionality when users modify network analysis policies. With policy change comments enabled, administrators can quickly assess why critical policies in a deployment were modified.
If you enable comments on policy changes, you can make the comment optional or mandatory. The system prompts the user for a comment when each new change to a policy is saved.
Optionally, you can have changes to network analysis policies written to the audit log.
Use the web interface to control the shut down and restart of processes on the FMC. You can:
Shut down: Initiate a graceful shutdown of the appliance.
Caution |
Do not shut off Firepower appliances using the power button; it may cause a loss of data. Using the web interface (or CLI) prepares the system to be safely powered off and restarted without losing configuration data. |
Reboot: Shut down and restart gracefully.
Restart the console: Restart the communications, database, and HTTP server processes. This is typically used during troubleshooting.
Tip |
For virtual devices, refer to the documentation for your virtual platform. For VMware in particular, custom power options are part of VMware Tools. |
Step 1 |
Choose System (). |
||||||||||
Step 2 |
Choose Process. |
||||||||||
Step 3 |
Do one of the following:
|
The firepower REST API provides a lightweight interface for third-party applications to view and manage device configuration using a REST client and standard HTTP methods. For more information on the firepower REST API, see the Secure Firewall Management Center REST API Quick Start Guide.
Note |
HTTPS certificates are not supported on the firepower REST API. |
By default, the FMC allows requests from applications using the REST API. You can configure the FMC to block this access.
Note |
In deployments using the FMC high availability, this feature is available only in the active FMC. |
Step 1 |
Choose the Cog () in the upper right corner to open the system menu. |
Step 2 |
Click REST API Preferences. |
Step 3 |
To enable or disable REST API access to the FMC, check or uncheck the Enable REST API check box. |
Step 4 |
Click Save. |
Step 5 |
Access the REST API Explorer at:
|
You can use a Linux system console for remote access on supported systems via either the VGA port (which is the default) or the serial port on the physical appliance. Use the Console Configuration page to choose the option most suitable to the physical layout of your organization’s Firepower deployment.
On supported physical-hardware-based systems, you can use Lights-Out Management (LOM) on a Serial Over LAN (SOL) connection to remotely monitor or manage the system without logging into the management interface of the system. You can perform limited tasks, such as viewing the chassis serial number or monitoring such conditions as fan speed and temperature, using a command line interface on an out-of-band management connection. The cable connection to support LOM varies by FMC model:
For FMC models MC1600, MC2600, and MC4600, use a connection with the CIMC port to support LOM. See the Cisco Firepower Management Center 1600, 2600, and 4600 Getting Started Guide for more information.
For all other FMC hardware models, use a connection with the default (eth0) management port to support LOM. See the Cisco Firepower Management Center Getting Started Guide for your hardware model.
You must enable LOM for both the system and the user you want to manage the system. After you enable the system and the user, you use a third-party Intelligent Platform Management Interface (IPMI) utility to access and manage your system.
You must be an Admin user to perform this procedure.
Disable Spanning Tree Protocol (STP) on any third-party switching equipment connected to the device’s management interface.
If you plan to enable Lights-Out Management see the Getting Started Guide for your appliance for information about installing and using an Intelligent Platform Management Interface (IPMI) utility.
Step 1 |
Choose System (). |
||
Step 2 |
Click Console Configuration. |
||
Step 3 |
Choose a remote console access option:
|
||
Step 4 |
To configure LOM via SOL:
|
||
Step 5 |
Click Save. |
||
Step 6 |
The system displays the following warning: "You will have to reboot your system for these changes to take effect." Click OK to reboot now or Cancel to reboot later. |
If you configured serial access, be sure the rear-panel serial port is connected to a local computer, terminal server, or other device that can support remote serial access over ethernet as described in the Getting Started Guide for your FMC model.
If you configured Lights-Out Management, enable a Lights-Out Management user; see Lights-Out Management User Access Configuration.
You must explicitly grant Lights-Out Management permissions to users who use the feature. LOM users also have the following restrictions:
You must assign the Administrator role to the user.
The username may have up to 16 alphanumeric characters. Hyphens and longer usernames are not supported for LOM users.
A user’s LOM password is the same as that user’s system password. The password must comply with the requirements described in User Passwords. Cisco recommends that you use a complex, non-dictionary-based password of the maximum supported length for your appliance and change it every three months.
Physical FMCs can have up to 13 LOM users.
Note that if you deactivate and then reactivate a user with LOM while that user is logged in, that user may need to log back
into the web interface to regain access to ipmitool
commands.
Note |
High Availability synchronization is not applicable for LOM users and hence they are not replicated on high availability FMCs. You must create different admin users with LOM enabled on the active FMC. In a high-availability configuration, when you create a local user or reset the password for a local user with LOM privilege enabled, from the UCS-based active FMC, the changes get synced to both the active and standby FMCs and the active FMC CIMC. The new password is not synced with the standby FMC for CIMC login. To ensure that the standby FMC is also updated, reset the CIMC login password for the local user on the standby FMC. |
You must be an Admin user to perform this procedure.
Use this task to grant LOM access to an existing user. To grant LOM access to a new user, see Add or Edit an Internal User.
Step 1 |
Choose System (). |
Step 2 |
To grant LOM user access to an existing user, click Edit () next to a user name in the list. |
Step 3 |
Under User Configuration, enable the Administrator role. |
Step 4 |
Check the Allow Lights-Out Management Access check box. |
Step 5 |
Click Save. |
You use a third-party IPMI utility on your computer to create a Serial Over LAN connection to the appliance. If your computer uses a Linux-like or Mac environment, use IPMItool; for Windows environments, you can use IPMIutil or IPMItool, depending on your Windows version.
Note |
Cisco recommends using IPMItool version 1.8.12 or greater. |
IPMItool is standard with many distributions and is ready to use.
You must install IPMItool on a Mac. First, confirm that your Mac has Apple's XCode Developer tools installed, making sure that the optional components for command line development are installed (UNIX Development and System Tools in newer versions, or Command Line Support in older versions). Then you can install macports and the IPMItool. Use your favorite search engine for more information or try these sites:
https://developer.apple.com/technologies/tools/
http://www.macports.org/
http://github.com/ipmitool/ipmitool/
For Windows Versions 10 and greater with Windows Subsystem for Linux (WSL) enabled, as well as some older versions of Windows Server, you can use IPMItool. Otherwise, you must compile IPMIutil on your Windows system; you can use IPMIutil itself to compile. Use your favorite search engine for more information or try this site:
http://ipmiutil.sourceforge.net/man.html#ipmiutil
Commands used for IPMI utilities are composed of segments as in the following example for IPMItool on Mac:
ipmitool -I lanplus -H
IP_address
-U
user_name
command
where:
ipmitool
invokes the utility.
-I lanplus
specifies to use an
encrypted IPMI v2.0 RMCP+ LAN Interface for the session.
-H
IP_address
indicates the IP address you have
configured for Lights-Out Management on the appliance you want to
access.
-U
user_name
is the name of an authorized remote
session user.
command
is the name of the command you want to
use.
Note |
Cisco recommends using IPMItool version 1.8.12 or greater. |
The same command for IPMIutil on Windows looks like this:
ipmiutil
command -V 4 -J 3 -N
IP_address
-U
user_name
This command connects you to the command line on the appliance where you can log in as if you are physically present near the appliance. You may be prompted to enter a password.
You must be an Admin user with LOM access to perform this procedure.
Using IPMItool, enter the following command, and a password if prompted:
|
You must be an Admin user with LOM access to perform this procedure.
Using IPMIutil, enter the following command, and a password if prompted:
|
Lights-Out Management (LOM) provides the ability to perform a limited set of actions over an SOL connection on the default
(eth0
) management interface without the need to log into the system. You use the command to create a SOL connection followed by
one of the LOM commands. After the command is completed, the connection ends.
Caution |
In rare cases, if your computer is on a different subnet than the system's management interface and the system is configured for DHCP, attempting to access LOM features can fail. If this occurs, you can either disable and then re-enable LOM on the system, or use a computer on the same subnet as the system to ping its management interface. You should then be able to use LOM. |
Caution |
Cisco is aware of a vulnerability inherent in the Intelligent Platform Management Interface (IPMI) standard (CVE-2013-4786). Enabling Lights-Out Management (LOM) on a system exposes this vulnerability. To mitigate this vulnerability, deploy your systems on a secure management network accessible only to trusted users and use a complex, non-dictionary-based password of the maximum supported length for your system and change it every three months. To prevent exposure to this vulnerability, do not enable LOM. |
If all attempts to access your system have failed, you can use LOM to restart your system remotely. Note that if a system is restarted while the SOL connection is active, the LOM session may disconnect or time out.
Caution |
Do not restart your system unless it does not respond to any other attempts to restart. Remotely restarting does not gracefully reboot the system and you may lose data. |
IPMItool |
IPMIutil |
Description |
---|---|---|
(not applicable) |
|
Enables admin privileges for the IPMI session |
|
|
Enables encryption for the IPMI session |
|
|
Indicates the LOM IP address or hostname for the FMC |
|
|
Indicates the username of an authorized LOM account |
|
|
Starts the SOL session |
|
|
Ends the SOL session |
|
|
Restarts the appliance |
|
|
Powers up the appliance |
|
|
Powers down the appliance |
|
|
Displays appliance information, such as fan speeds and temperatures |
For example, to display a list of appliance information, the IPMItool command is:
ipmitool -I lanplus -H
IP_address -U
user_name sdr
Note |
Cisco recommends using IPMItool version 1.8.12 or greater. |
The same command with the IPMIutil utility is:
ipmiutil sensor -V 4 -J 3 -N
IP_address -U
user_name
You must be an Admin user with LOM access to perform this procedure.
Enter the following command for IPMItool and a password if prompted:
|
You must be an Admin user with LOM access to perform this procedure.
Enter the following command for IPMIutil and a password if prompted:
|
On FMCs, you can use the following for local or remote storage for backups and reports:
Network File System (NFS)
Server Message Block (SMB)/Common Internet File System (CIFS)
Secure Shell (SSH)
You cannot send backups to one remote system and reports to another, but you can choose to send either to a remote system and store the other on the FMC.
Tip |
After configuring and selecting remote storage, you can switch back to local storage only if you have not increased the connection database limit. |
Management Center Version |
NFS Version |
SSH Version |
SMB Version |
---|---|---|---|
6.4 |
V3/V4 |
openssh 7.3p1 |
V2/V3 |
6.5 |
V3/V4 |
ciscossh 1.6.20 |
V2/V3 |
6.6 |
V3/V4 |
ciscossh 1.6.20 |
V2/V3 |
6.7 |
V3/V4 |
ciscossh 1.6.20 |
V2/V3 |
Run the following commands as a root user to enable the protocol version:
NFS—/bin/mount -t nfs '10.10.4.225':'/home/manual-check' '/mnt/remote-storage' -o 'rw,vers=4.0'
SMB—/usr/bin/mount.cifs //10.10.0.100/pyallapp-share/testing-smb /mnt/remote-storage -o username=administrator,password=******,vers=3.0
Step 1 |
Choose System (). |
Step 2 |
Choose Remote Storage Device. |
Step 3 |
Choose Local (No Remote Storage) from the Storage Type drop-down list. |
Step 4 |
Click Save. |
Ensure that your external remote storage system is functional and accessible from your FMC.
Step 1 |
Choose System (). |
Step 2 |
Click Remote Storage Device. |
Step 3 |
Choose NFS from the Storage Type drop-down list. |
Step 4 |
Add the connection information:
|
Step 5 |
Optionally, check the Use Advanced Options check box and enter any required command line options; see Remote Storage Management Advanced Options. |
Step 6 |
Under System Usage:
|
Step 7 |
To test the settings, click Test. |
Step 8 |
Click Save. |
Troubleshooting
When there is a random latency in the NFS connection with the firewall device, perform the following activities, and then contact Cisco TAC for troubleshooting:
Collect troubleshooting file before or after the issue from the device. You can generate the troubleshoot file from the web interface or using CLI commands. For information on how to generate the troubleshoot file, see Troubleshoot Firepower File Generation Procedures.
Collect the incoming and exiting traffic PCAP records. For information on the procedure, see Packet Capture Overview.
Collect system-support trace data while NFS application fails using the following command in the device (CLISH mode):
> system support trace
Collect snort counters twice during the failure using the show snort counters command to view the statistics for the Snort preprocessor connections. For information on this command, see show snort counters.
Ensure that your external remote storage system is functional and accessible from your FMC:
The system recognizes top-level SMB shares, not full file paths. You must use Windows to share the exact directory you want to use.
Make sure the Windows user you will use to access the SMB share from the FMC has ownership of and read/change access to the share location.
To ensure security, you should install SMB 2.0 or greater.
Step 1 |
Choose System (). |
Step 2 |
Click Remote Storage Device. |
Step 3 |
Choose SMB from the Storage Type drop-down list. |
Step 4 |
Add the connection information:
|
Step 5 |
Optionally, check the Use Advanced Options check box and enter any required command line options; see Remote Storage Management Advanced Options. |
Step 6 |
Under System Usage:
|
Step 7 |
To test the settings, click Test. |
Step 8 |
Click Save. |
Ensure that your external remote storage system is functional and accessible from your FMC.
Step 1 |
Choose System (). |
Step 2 |
Click Remote Storage Device. |
Step 3 |
Choose SSH from the Storage Type drop-down list. |
Step 4 |
Add the connection information:
|
Step 5 |
Optionally, check the Use Advanced Options check box and enter any required command line options; see Remote Storage Management Advanced Options. |
Step 6 |
Under System Usage:
|
Step 7 |
If you want to test the settings, you must click Test. |
Step 8 |
Click Save. |
If you select the Network File System (NFS) protocol, Server Message Block (SMB) protocol, or SSH
to use secure file transfer protocol (SFTP) to store your reports and backups, you can select the Use Advanced Options check box to use one of the mount binary options as documented in an NFS, SMB, or SSH mount main page.
If you select SMB or NFS storage type, you can specify the version number of the remote storage in the Command Line Option field using the following format:
vers=version
where version
is the version number of SMB or NFS remote storage you want to use. For example, to select NFSv4, enter vers=4.0
.
vers=3.0
where you select encrypted SMBv3 to copy or save backup files from the FMC to the encrypted SMB file server.
You can enable Simple Network Management Protocol (SNMP) polling. This feature supports use of versions 1, 2, and 3 of the SNMP protocol. This feature allows access to the standard management information base (MIB), which includes system details such as contact, administrative, location, service information, IP addressing and routing information, and transmission protocol usage statistics.
Note |
When selecting SNMP versions for the SNMP protocol, note that SNMPv2 only supports read-only communities and SNMPv3 only supports read-only users. SNMPv3 also supports encryption with AES128. |
Enabling SNMP polling does not cause the system to send SNMP traps; it only makes the information in the MIBs available for polling by your network management system.
Add SNMP access for each computer you plan to use to poll the system. See Configure an Access List.
Note |
The SNMP MIB contains information that could be used to attack your deployment. We recommend that you restrict your access list for SNMP access to the specific hosts that will be used to poll for the MIB. We also recommend you use SNMPv3 and use strong passwords for network management access. |
Step 1 |
Choose System (). |
||
Step 2 |
Click SNMP. |
||
Step 3 |
From the SNMP Version drop-down list, choose the SNMP version you want to use:
|
||
Step 4 |
Enter a Username. |
||
Step 5 |
Choose the protocol you want to use for authentication from the Authentication Protocol drop-down list. |
||
Step 6 |
Enter the password required for authentication with the SNMP server in the Authentication Password field. |
||
Step 7 |
Re-enter the authentication password in the Verify Password field. |
||
Step 8 |
Choose the privacy protocol you want to use from the Privacy Protocol list, or choose None to not use a privacy protocol. |
||
Step 9 |
Enter the SNMP privacy key required by the SNMP server in the Privacy Password field. |
||
Step 10 |
Re-enter the privacy password in the Verify Password field. |
||
Step 11 |
Click Add. |
||
Step 12 |
Click Save. |
Unattended login sessions may be security risks. You can configure the amount of idle time before a user’s login session times out due to inactivity.
Note that you can exempt specific web interface users from timeout, for scenarios where you plan to passively, securely monitor the system for long periods of time. Users with the Administrator role, whose complete access to menu options poses an extra risk if compromised, cannot be made exempt from session timeouts.
Step 1 |
Choose System (). |
Step 2 |
Click CLI Timeout. |
Step 3 |
Configure session timeouts:
|
Step 4 |
Click Save. |
Time settings are displayed on most pages in local time using the time zone you set on the Time Zone page in User Preferences (the default is America/New York), but are stored on the appliance using UTC time.
Restriction |
The Time Zone function (in User Preferences) assumes that the default system clock is set to UTC time. DO NOT ATTEMPT TO CHANGE THE SYSTEM TIME. Be advised that changing the system time from UTC is NOT supported, and doing so will require you to reimage the device to recover from an unsupported state. |
Step 1 |
Choose System (). |
Step 2 |
Click Time. The current time is displayed using the time zone specified for your account in User Preferences. If your appliance uses an NTP server: For information about the table entries, see NTP Server Status. |
If you are synchronizing time from an NTP server, you can view connection status on the Time page (choose System > Configuration).
Column |
Description |
---|---|
NTP Server |
The IP address or name of the configured NTP server. |
Status |
The status of the NTP server time synchronization:
|
Authentication |
The authentication status for communication between the FMC and the NTP server:
If authentication has been configured, the system displays the key number and key type (SHA-1, MD5, or AES-128 CMAC) following the status value. For example: bad, key 2, MD5. |
Offset |
The number of milliseconds of difference between the time on the appliance and the configured NTP server. Negative values indicate that the appliance is behind the NTP server, and positive values indicate that it is ahead. |
Last Update |
The number of seconds that have elapsed since the time was last synchronized with the NTP server. The NTP daemon automatically adjusts the synchronization times based on a number of conditions. For example, if you see larger update times such as 300 seconds, that indicates that the time is relatively stable and the NTP daemon has determined that it does not need to use a lower update increment. |
Synchronizing the system time on your Firepower Management Center (FMC) and its managed devices is essential to successful operation of your system. We recommend that you specify NTP servers during FMC initial configuration, but you can use the information in this section to establish or change time sychronization settings after initial configuration is complete.
Use a Network Time Protocol (NTP) server to synchronize system time on the FMC and all devices. The FMC supports secure communications with NTP servers using MD5, SHA-1, or AES-128 CMAC symmetric key authentication; for system security, we recommend using this feature.
The FMC can also be configured to connect solely with authenticated NTP servers; using this option improves security in a mixed-authentication environment, or when you migrate your system to different NTP servers. It is redundant to use this setting in an environment where all reachable NTP servers are authenticated.
Note |
If you specified an NTP server for the FMC during initial configuration, the connection with that NTP server is not secured. You must edit the configuration for that connection to specify MD5, SHA-1, or AES-128 CMAC keys. |
Caution |
Unintended consequences can occur when time is not synchronized between the FMC and managed devices. |
To synchronize time on FMC and managed devices, see:
Recommended: Synchronize Time on the FMC with an NTP Server
This topic provides instructions for configuring your FMC to synchronize with an NTP server or servers and includes links to instructions on configuring managed devices to synchronize with the same NTP server or servers.
Otherwise: Synchronize Time Without Access to a Network NTP Server
This topic provides instructions for setting the time on your FMC, configuring your FMC to serve as an NTP server, and links to instructions on configuring managed devices to synchronize with the FMC NTP server.
Time synchronization among all of the components of your system is critically important.
The best way to ensure proper time synchronization between FMC and all managed devices is to use an NTP server on your network.
The FMC supports NTPv4.
You must have Admin or Network Admin privileges to do this procedure.
Note the following:
If your FMC and managed devices cannot access a network NTP server, do not use this procedure. Instead, see Synchronize Time Without Access to a Network NTP Server.
Do not specify an untrusted NTP server.
If you plan to establish a secure connection with an NTP server (recommended for system security), obtain an SHA-1, MD5, or AES-128 CMAC key number and value configured on that NTP server.
Connections to NTP servers do not use configured proxy settings.
Firepower 4100 Series devices and Firepower 9300 devices cannot use this procedure to set the system time. Instead, configure those devices to use the same NTP server(s) that you configure using this procedure. For instructions, see the documentation for your hardware model.
Caution |
If the FMC is rebooted and your DHCP server sets an NTP server record different than the one you specify here, the DHCP-provided NTP server will be used instead. To avoid this situation, configure your DHCP server to use the same NTP server. |
Step 1 |
Choose System (). |
Step 2 |
Click Time Synchronization. |
Step 3 |
If Serve Time via NTP is Enabled, choose Disabled to disable the FMC as an NTP server. |
Step 4 |
For the Set My Clock option, choose Via NTP. |
Step 5 |
Click Add. |
Step 6 |
In the Add NTP Server dialog box, enter the host name or IPv4 or IPv6 address of an NTP server. |
Step 7 |
(Optional) To secure communication between your FMC and the NTP server:
|
Step 8 |
Click Add. |
Step 9 |
When only two NTP servers are configured, the offset difference between them becomes high. This results in the FMC using the Local Time. Hence, we recommend that you configure atleast three NTP servers. To add more NTP servers, repeat Steps 5 through 8. |
Step 10 |
(Optional) To force the FMC to use only an NTP server that successfully authenticates, check the Use the authenticated NTP server only check box. |
Step 11 |
Click Save. |
Set managed devices to synchronize with the same NTP server or servers:
Configure device platform settings: Configure NTP Time Synchronization for Threat Defense in the Firepower Management Center Device Configuration Guide.
Note that even if you force the FMC to make a secure connection with an NTP server (Use the authenticated NTP server only), device connections to that server do not use authentication.
Deploy configuration changes; see the Firepower Management Center Device Configuration Guide.
If your devices cannot directly reach the network NTP server, or your organization does not have a network NTP server, a physical-hardware FMC can serve as an NTP server.
Important |
|
To change the time manually after configuring the FMC as an NTP server, you must disable the NTP option, change the time manually, and then re-enable the NTP option.
Step 1 |
Manually set the system time on the FMC: |
Step 2 |
Set the FMC to serve as an NTP server:
|
Step 3 |
Set managed devices to synchronize with the FMC NTP server:
For instructions: For FTD devices, see Configure NTP Time Synchronization for Threat Defense in the Firepower Management Center Device Configuration Guide. |
Your FMC and its managed devices are heavily dependent on accurate time. The system clock is a system facility that maintains the time of the system. The system clock is set to Universal Coordinated Time (UTC), which is the primary time standard by which the world regulates clocks and time.
DO NOT ATTEMPT TO CHANGE THE SYSTEM TIME. Changing the system time zone from UTC is NOT supported, and doing so will require you to reimage the device to recover from an unsupported state.
If you configure the FMC to serve time using NTP, and then later disable it, the NTP service on managed devices still attempts to synchronize time with the FMC. You must update and redeploy any applicable platform settings policies to establish a new time source.
To change the time manually after configuring the FMC as an NTP server, you must disable the NTP option, change the time manually, and then re-enable the NTP option.
Your organization might be required to use only equipment and software complying with security standards established by the U.S. Department of Defense and global certification organizations. For more information about this setting, see Security Certifications Compliance Modes.
Global User Configuration settings affect all users on the FMC. Configure these settings on the User Configuration page (System ()):
Password Reuse Limit: The number of passwords in a user’s most recent history that cannot be reused. This limit applies to web interface access
for all users. For the admin
user, this applies to CLI access as well; the system maintains separate password lists for each form of access. Setting the
limit to zero (the default) places no restrictions on password reuse. See Set Password Reuse Limit.
Track Successful Logins: The number of days that the system tracks successful logins to the FMC, per user, per access method (web interface or CLI). When users log in, the system displays their successful login count for the interface being used. When Track Successful Logins is set to zero (the default), the system does not track or report successful login activity. See Track Successful Logins.
Max Number of Login Failures: The number of times in a row that users can enter incorrect web interface login credentials before the system temporarily blocks the account from access for a configurable time period. If a user continues login attempts while the temporary lockout is in force:
The system refuses access for that account (even with a valid password) without informing the user that a temporary lockout is in force.
The system continues to increment the failed login count for that account with each login attempt.
If the user exceeds the Maximum Number of Failed Logins configured for that account on the individual User Configuration page, the account is locked out until an admin user reactivates it.
Set Time in Minutes to Temporarily Lockout Users: The duration in minutes for a temporary web interface user lockout if Max Number of Failed Logins is non-zero.
Max Concurrent Sessions Allowed: The number of sessions of a particular type (read-only or read/write) that can be open at the same time. The type of session is determined by the roles assigned to a user. If a user is assigned only read-only roles, that user's session is counted toward the (Read Only) session limit. If a user has any roles with write privileges, the session is counted toward the Read/Write session limit. For example, if a user is assigned the Admin role and the Maximum sessions for users with Read/Write privileges/CLI users is set to 5, the user will not be allowed to log in if there are already five other users logged in that have read/write privileges.
Note |
Predefined user roles and custom user roles that the system considers read-only for the purposes of concurrent session limits, are labeled with (Read Only) in the role name on the System () and the System (). If a user role does not contain (Read Only) in the role name, the system considers the role to be read/write. The system automatically applies (Read Only) to roles that meet the required criteria. You cannot make a role read-only by adding that text string manually to the role name. |
For each type of session, you can set a maximum limit ranging from 1 to 1024. When Max Concurrent Sessions Allowed is set to zero (the default), the number of concurrent sessions is unlimited.
If you change the concurrent session limit to a value more restrictive, the system will not close any currently open sessions; it will, however, prevent new sessions beyond the number specified from being opened.
If you enable the Password Reuse Limit, the system keeps encrypted password histories for FMC users. Users cannot reuse passwords in their histories. You can specify the number of stored passwords for each user, per access method (web interface or CLI). A user's current password counts towards this number. If you lower the limit, the system deletes older passwords from the history. Increasing the limit does not restore deleted passwords.
Step 1 |
Choose System (). |
Step 2 |
Click User Configuration. |
Step 3 |
Set the Password Reuse Limit to the number of passwords you want to maintain in the history (maximum 256). To disable password reuse checking, enter 0. |
Step 4 |
Click Save. |
Use this procedure to enable tracking successful logins for each user for a specified number of days. When this tracking is enabled, the system displays the successful login count when users log into the web interface or the CLI.
Note |
If you lower the number of days, the system deletes records of older logins. If you then increase the limit, the system does not restore the count from those days. In that case, the reported number of successful logins may be temporarily lower than the actual number. |
Step 1 |
Choose System (). |
Step 2 |
Click User Configuration. |
Step 3 |
Set Track Successful Login Days to the number of days to track successful logins (maximum 365). To disable login tracking, enter 0. |
Step 4 |
Click Save. |
Enable the temporary timed lockout feature by specifying the number of failed login attempts in a row that the system allows before the lockout goes into effect.
Step 1 |
Choose System (). |
Step 2 |
Click User Configuration. |
Step 3 |
Set the Max Number of Login Failures to the maximum number of consecutive failed login attempts before the user is temporarily locked out. To disable the temporary lockout, enter zero. |
Step 4 |
Set the Time in Minutes to Temporarily Lockout Users to the number of minutes to lock out users who have triggered a temporary lockout. When this value is zero, users do not have to wait to retry to log in, even if the Max Number of Login Failures is non-zero. |
Step 5 |
Click Save. |
You can specify the maximum number of sessions of a particular type (read-only or read/write) that can be open at the same time. The type of session is determined by the roles assigned to a user. If a user is assigned only read-only roles, that user's session is counted toward the Read Only session limit. If a user has any roles with write privileges, the session is counted toward the Read/Write session limit.
Step 1 |
Choose System (). |
||
Step 2 |
Click User Configuration. |
||
Step 3 |
For each type of session (Read Only and Read/Write), set the Max Concurrent Sessions Allowed to the maximum number of sessions of that type that can be open at the same time. To apply no limits on concurrent users by session type, enter zero.
|
||
Step 4 |
Click Save. |
VMware Tools is a suite of performance-enhancing utilities intended for virtual machines. These utilities allow you to make full use of the convenient features of VMware products. Firepower virtual appliances running on VMware support the following plugins:
guestInfo
powerOps
timeSync
vmbackup
You can also enable VMware Tools on all supported versions of ESXi. For information on the full functionality of VMware Tools, see the VMware website (http://www.vmware.com/).
Step 1 |
Choose System (). |
Step 2 |
Click VMware Tools. |
Step 3 |
Click Enable VMware Tools. |
Step 4 |
Click Save. |
The system automatically maps vulnerabilities to a host IP address for any application protocol traffic received or sent from that address, when the server has an application ID in the discovery event database and the packet header for the traffic includes a vendor and version.
For any servers which do not include vendor or version information in their packets, you can configure whether the system associates vulnerabilities with server traffic for these vendor and versionless servers.
For example, a host serves SMTP traffic that does not have a vendor or version in the header. If you enable the SMTP server on the Vulnerability Mapping page of a system configuration, then save that configuration to the FMC managing the device that detects the traffic, all vulnerabilities associated with SMTP servers are added to the host profile for the host.
Although detectors collect server information and add it to host profiles, the application protocol detectors will not be used for vulnerability mapping, because you cannot specify a vendor or version for a custom application protocol detector and cannot select the server for vulnerability mapping.
This procedure requires any Smart License or the Protection classic license.
Step 1 |
Choose System (). |
||
Step 2 |
Choose Vulnerability Mapping. |
||
Step 3 |
You have the following choices:
|
||
Step 4 |
Click Save. |
By default, in order to improve Firepower products, Cisco collects non-personally-identifiable usage data, including but not limited to page interactions, browser versions, product versions, user location, and management IP addresses or hostnames of your FMC appliances.
Data collection begins after you accept the End User License Agreement. If you do not want Cisco to continue to collect this data, you can opt out using the following procedure.
Step 1 |
Choose System > Configuration. |
Step 2 |
Click Web Analytics. |
Step 3 |
Make your choice and click Save. |
(Optional) Determine whether to share data via the Configure Cisco Success Network Enrollment.
Feature |
Minimum FMC |
Minimum FTD |
Details |
||
---|---|---|---|---|---|
Exempt most connection events from event rate limits. |
7.0 |
Any |
Setting the Maximum Connection Events value for the Connection Database to zero now exempts low priority connection events from counting towards the flow rate limit for your FMC hardware. Previously, setting this value to zero applied only to event storage, and did not affect the flow rate limit. New/modified screens: System () Supported platforms: Hardware FMCs. |
||
Support for AES-128 CMAC authentication for NTP servers. |
7.0 |
Any |
Connections between the FMC and NTP servers can be secured with AES-128 CMAC keys as well as previously-supported MD5 and SHA-1 keys. New/modified screens: System () |
||
Subject Alternative Name (SAN). |
6.6 |
Any |
When creating an HTTPS certificate for the FMC, you can specify SAN fields. We recommend you use SAN if the certificate secures multiple domain names or IP addresses. For more information about SAN, see RFC 5280, section 4.2.1.6. New/modified screens: System () |
||
HTTPS certificates. |
6.6 |
Any |
The default HTTPS server certificate provided with the system now expires in 800 days. If your appliance uses a default certificate that was generated before you upgraded to Version 6.6, the certificate lifetime varies depending on the Firepower version being used when the certificate was generated. See Default HTTPS Server Certificates for more information. Supported platforms: Hardware FMCs. |
||
Secure NTP. |
6.5 |
Any |
The FMC supports secure communications with NTP servers using SHA1 or MD5 symmetric key authentication. New/modified screens: System () |
||
Web analytics. |
6.5 |
Any |
Web analytics data collection begins after you accept the EULA. As before, you can opt not to continue to share data. See Web Analytics. |
||
Automatic CLI access for the FMC. |
6.5 |
Any |
When you use SSH to log into the FMC, you automatically access the CLI. Although strongly discouraged, you can then use the
CLI expert command to access the Linux shell.
|
||
Configurable session limits for read-only and read/write access. |
6.5 |
Any |
Added the Max Concurrent Sessions Allowed setting. This setting allows the administrator to specify the maximum number of sessions of a particular type (read-only or read/write) that can be open at the same time.
New/modified screens:
|
||
Ability to disable Duplicate Address Detection (DAD) on management interfaces. |
6.4 |
Any |
When you enable IPv6, you can disable DAD. You might want to disable DAD because the use of DAD opens up the possibility of denial of service attacks. If you disable this setting, you need check manually that this interface is not using an already-assigned address. New/modified screens: System () Supported platforms: FMC |
||
Ability to disable ICMPv6 Echo Reply and Destination Unreachable messages on management interfaces. |
6.4 |
Any |
When you enable IPv6, you can now disable ICMPv6 Echo Reply and Destination Unreachable messages. You might want to disable these packets to guard against potential denial of service attacks. Disabling Echo Reply packets means you cannot use IPv6 ping to the device management interfaces for testing purposes. New/modified screens: System () New/modified commands: configure network ipv6 destination-unreachable , configure network ipv6 echo-reply Supported platforms: FMC (web interface only), FTD (CLI only) |
||
Global User Configuration Settings. |
6.3 |
Any |
Added the Track Successful Logins setting. The system can track the number of successful logins each FMC account has performed within a selected number of days. When this feature is enabled, on log in users see a message reporting how many times they have successfully logged in to the system in the past configured number of days. (Applies to web interface as well as shell/CLI access.) Added the Password Reuse Limit setting. The system can track the password history for each account for a configurable number of previous passwords. The system prevents all users from re-using passwords that appear in that history. (Applies to web interface as well as shell/CLI access.) Added the Max Number of Login Failures and Set Time in Minutes to Temporarily Lockout Users settings. These allow the administrator to limit the number of times in a row a user can enter incorrect web interface login credentials before the system temporarily blocks the account for a configurable period of time. New/modified screens: System () Supported platforms: FMC |
||
HTTPS Certificates. |
6.3 |
Any |
The default HTTPS server certificate provided with the system now expires in three years. If your appliance uses a default server certificate that was generated before you upgraded to Version 6.3, the server certificate will expire 20 years from when it was first generated. If you are using the default HTTPS server certificate the system now provides the ability to renew it. New/modified screens: System () Supported platforms: FMC |
||
Ability to enable and disable CLI access for the FMC. |
6.3 |
Any |
There is a new check box available to administrators in FMC web interface: Enable CLI Access on the System () .
Previous to Version 6.3, there was only one setting on the Console Configuration page, and it applied to physical devices only. So the Console Configuration page was not available on virtual FMCs. With the addition of this new option, the Console Configuration page now appears on virtual FMCs as well as physical. However, for virtual FMCs, this check box is the only thing that appears on the page. Supported platforms: FMC |