Saturday, April 6, 2024

Cisco ASA Firewall SSH Key Exchange

I had an issue wherein I couldn't SSH to a Cisco ASA firewall and received a key exchange error. I've checked the configured SSH key exchange group and it was configured to use a higher DH group which is the default in newer Cisco ASA version.

 

[john@server01 ~]$ ssh admin@192.168.202.4

Unable to negotiate with 192.168.202.4 port 22: no matching key exchange method found. Their offer: diffie-hellman-group14-sha256

 

 

ciscoasa# show run ssh

ssh stricthostkeycheck

ssh timeout 30

ssh version 2

ssh key-exchange group dh-group14-sha256

ssh 10.10.0.0 255.255.0.0 management

 

 

I configured a lower DH group as an interim solution. The management server needs to be upgraded in order to support newer SSH key exchange protocols as a permanent fix.

 

ciscoasa# configure terminal

ciscoasa(config)# ssh key-exchange group ?

 

configure mode commands/options:

  curve25519-sha256   Diffie-Hellman group-31-sha256

  dh-group1-sha1      Diffie-Hellman group 2 (DEPRECATED)

  dh-group14-sha1     Diffie-Hellman group-14-sha1

  dh-group14-sha256   Diffie-Hellman group-14-sha256

  ecdh-sha2-nistp256  Diffie-Hellman group-19-sha256

ciscoasa(config)# ssh key-exchange group dh-group1-sha1

WARNING: DH group 2 is considered insecure. This option is deprecated and will be removed in a later version.

 

 

I was able to SSH and save the RSA key afterwards.

[john@server01 ~]$ ssh admin@192.168.202.4
The authenticity of host '172.16.22.4 (172.16.22.4)' can't be established.
RSA key fingerprint is 98:c0:6b:42:88:7f:48:68:ae:a1:b4:04:03:12:34:56.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.202.4' (RSA) to the list of known hosts.admin@192.168.202.4's password:<SSH PASSWORD>

ciscoasa# show version

 

Cisco Adaptive Security Appliance Software Version 9.16.x

SSP Operating System Version 2.10.x

Device Manager Version 7.18.x

 

Compiled on Wed 03-Aug-22 05:26 GMT by builders

 

ciscoasa up 23 hours 51 mins

failover cluster up 23 hours 51 mins

 

Saturday, March 9, 2024

Cisco Secure Firewall 3100 ASA Smart License

The license feature Encryption-3DES-AES was disabled by default and I needed to add the Standard Smart license (Essential license) for the Cisco Secure Firewall FPR 3110. The Cisco Smart Software Manager (CSSM) has allowed the Export-Controlled for its registration token by default. Refer to this link.

Essentials license: -L-FPR3110-BSE=. The Essentials license is a required license.

Strong Encryption (3DES/AES) license: -L-FPR3K-ENC-K9=. Only required if your account is not authorized for strong encryption. 

ciscoasa# show version

Cisco Adaptive Security Appliance Software Version 9.18(3)56
SSP Operating System Version 2.12(0.519)
Device Manager Version 7.20(1)

Compiled on Tue 12-Sep-23 19:15 GMT by builders
System image file is "disk0:/installables/switch/fxos-k8-fp3k-lfbff.2.12.0.519.SPA"
Config file at boot was "startup-config"

ciscoasa up 1 min 57 secs
Start-up time 8 secs

Hardware:   FPR-3110, 52168 MB RAM, CPU Ryzen Zen 2 2900 MHz, 1 CPU (24 cores)

Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
                             AE microcode        : CNN5x-MC-AE-MAIN-0007
                             SE SSL microcode    : CNN5x-MC-SE-SSL-0018
                             Number of accelerators: 1

 1: Int: Internal-Data0/1    : address is 0000.0041.0004, irq 152
 3: Int: Not licensed        : irq 0
 4: Ext: Management1/1       : address is c47e.e07e.1482, irq 0
 5: Int: Internal-Data1/1    : address is 0000.0100.0001, irq 0

License mode: Smart Licensing
              
Licensed features for this platform:
Maximum Physical Interfaces       : Unlimited      
Maximum VLANs                     : 1024           
Inside Hosts                      : Unlimited      
Failover                          : Active/Active  
Encryption-DES                    : Enabled        
Encryption-3DES-AES               : Disabled       
Security Contexts                 : 2              
Carrier                           : Disabled       
AnyConnect Premium Peers          : 3000           
AnyConnect Essentials             : Disabled       
Other VPN Peers                   : 3000           
Total VPN Peers                   : 3000           
AnyConnect for Mobile             : Enabled        
AnyConnect for Cisco VPN Phone    : Enabled        
Advanced Endpoint Assessment      : Enabled        
Shared License                    : Disabled       
Total TLS Proxy Sessions          : 4000           
Cluster                           : Enabled        

Serial Number: FJZ27231234
Configuration register is 0x1
Configuration has not been modified since last system restart.


ciscoasa# show license summ

Smart Licensing is ENABLED

Registration:
  Status: UNREGISTERED
  Export-Controlled Functionality: NOT ALLOWED

License Authorization:
  Status: EVAL MODE
  Evaluation Period Remaining: 82 days, 6 hours, 37 minutes, 42 seconds

License Usage:
  License                 Entitlement tag               Count Status
  -----------------------------------------------------------------------------
                          (FPR_3110_BASE_STD)               1 EVAL MODE


I configured Smart Call Home (SCH) using the management interface and used http method only.

ciscoasa(config)# dns domain-lookup management
ciscoasa(config)# call-home
ciscoasa(cfg-call-home)#  no profile CiscoTAC-1
INFO: default profile is reset to default configuration.
ciscoasa(cfg-call-home)# profile MY-LICENSE
ciscoasa(cfg-call-home-profile)#   active
ciscoasa(cfg-call-home-profile)#   destination address http http:/<CSSM IP>/Transportgateway/services/DeviceRequestHandler
ciscoasa(cfg-call-home-profile)# destination transport-method http
ciscoasa(cfg-call-home-profile)# license smart
INFO: License(s) corresponding to an entitlement will be activated only after an entitlement request has been authorized.
ciscoasa(config-smart-lic)#  feature tier standard

ciscoasa# license smart register idtoken <CSSM REGISTRATION TOKEN>

ciscoasa# show license summary                        

Smart Licensing is ENABLED

Registration:
  Status: REGISTERED
  Smart Account: MY-ACCOUNT
  Virtual Account: Default
  Export-Controlled Functionality: ALLOWED
  Last Renewal Attempt: None
  Next Renewal Attempt: Apr 29 2024 06:35:22 UTC

License Authorization:
  Status: AUTHORIZED
  Last Communication Attempt: SUCCEEDED
  Next Communication Attempt: Dec 01 2023 06:35:34 UTC

License Usage:
  License                 Entitlement tag               Count Status
  -----------------------------------------------------------------------------
  FPR3110 Base License    (FPR_3110_BASE_STD)               1 AUTHORIZED


ciscoasa# show version

Cisco Adaptive Security Appliance Software Version 9.18(3)56
SSP Operating System Version 2.12(0.519)
Device Manager Version 7.20(1)
Compiled on Tue 12-Sep-23 19:15 GMT by builders
System image file is "disk0:/installables/switch/fxos-k8-fp3k-lfbff.2.12.0.519.SPA"
Config file at boot was "startup-config"

ciscoasa up 6 mins 4 secs
Start-up time 8 secs

Hardware:   FPR-3110, 52168 MB RAM, CPU Ryzen Zen 2 2900 MHz, 1 CPU (24 cores)

Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
                             AE microcode        : CNN5x-MC-AE-MAIN-0007
                             SE SSL microcode    : CNN5x-MC-SE-SSL-0018
                             Number of accelerators: 1

 1: Int: Internal-Data0/1    : address is 0000.0041.0004, irq 43
 3: Int: Not licensed        : irq 0
 4: Ext: Management1/1       : address is c47e.e07e.1482, irq 0
 5: Int: Internal-Data1/1    : address is 0000.0100.0001, irq 0

License mode: Smart Licensing
              
Licensed features for this platform:
Maximum Physical Interfaces       : Unlimited      
Maximum VLANs                     : 1024           
Inside Hosts                      : Unlimited      
Failover                          : Active/Active  
Encryption-DES                    : Enabled        
Encryption-3DES-AES               : Enabled        
Security Contexts                 : 2              
Carrier                           : Disabled       
AnyConnect Premium Peers          : 3000           
AnyConnect Essentials             : Disabled       
Other VPN Peers                   : 3000           
Total VPN Peers                   : 3000           
AnyConnect for Mobile             : Enabled        
AnyConnect for Cisco VPN Phone    : Enabled        
Advanced Endpoint Assessment      : Enabled        
Shared License                    : Disabled       
Total TLS Proxy Sessions          : 4000           
Cluster                           : Enabled      


Saturday, February 3, 2024

Cisco Secure Firewall 3100 ASA Software Upgrade

The Cisco Secure Firewall 3100 series is the latest Next-Generation Firewall (NGFW) product from Cisco. The 3100 can be deployed to run either the classic ASA or the latest Firewall Thread Defense (FTD) software.

The 3100 front chassis has a fixed 8x RJ45 ports (Ethernet 1/1 - 1/8) and 8x fiber SFP ports (Ethernet 1/9 - 16).

The 3100 have an RJ45 and USB Console ports which are just beside the Management port (left).


The out of band Management port (Management 1/1) would need a GLC-TE copper SFP.

The 3100 has dual power supplies found in the rear and they're hot-swappable. It also has a power on/off toggle switch found on the left hand side.

 

I ran the classic ASA software and followed the upgrade path. I always choose an ASA software with a Long Term Release (LTR) which will be supported for 36 months (3 years) in terms of TAC support and software patches. LTR is designated by an even number in the second digit of its major release, i.e. FTD 6.4 and ASA 9.12. 



Aside from the ASA upgrade path, you should also follow the ASA and ASDM Compatibility Matrix (Table 2). In this case I chose ASA version 9.18 and its compatible ASDM should be 7.20(1).

You can download the 3100 ASA software and ASDM from the Cisco Software Download page. The upgrade procedure is identical with the classic ASA. Just change the boot variable to point to the new ASA version stored in flash memory (disk0).

The ASA now use Smart License which started around ASA version 9.4

First, transfer the ASA and ASDM images to flash memory then verify the MD5 hash.

cisocasa# copy ftp://ftpuser:ftp123@172.16.5.2/cisco-asa-fp3k.9.18.3.56.SPA disk0:

 

Address or name of remote host [172.16.5.2]?

 

Source username [ftpuser]?

 

Source password []? *******

 

Source filename [cisco-asa-fp3k.9.18.3.56.SPA]?

 

Destination filename [cisco-asa-fp3k.9.18.3.56.SPA]?

 

 

Accessing ftp://ftpuser:<password>@172.16.5.2/cisco-asa-fp3k.9.18.3.56.SPA...

!!!!!!!!!!

 

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Verifying file disk0:/cisco-asa-fp3k.9.18.3.56.SPA...

 

Writing file disk0:/cisco-asa-fp3k.9.18.3.56.SPA...

 

738779600 bytes copied in 4515.190 secs (163627 bytes/sec)

 

 

cisocasa# copy ftp://ftpuser:ftpuser@172.16.5.2/asdm-7201.bin disk0:

 

Address or name of remote host [172.16.5.2]?

 

Source username [ftpuser]?

 

Source password []? *******

 

Source filename [asdm-7201.bin]?

 

Destination filename [asdm-7201.bin]?

 

Accessing ftp://ftpuser:<password>@172.16.5.2/asdm-7201.bin...

!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Verifying file disk0:/asdm-7201.bin...

 

Writing file disk0:/asdm-7201.bin...

 

116798028 bytes copied in 1029.990 secs (113506 bytes/sec)

 

 

ciscoasa# dir

 

Directory of disk0:/

 

<OUTPUT TRUNCATED>

1610981055  -rwx  116798028    02:22:49 Nov 01 2023  asdm-7201.bin

1610973629  -rwx  738779600    12:51:00 Oct 31 2023  cisco-asa-fp3k.9.18.3.56.SPA

 

8 file(s) total size: 972729823 bytes

16106127360 bytes total (14880296960 bytes free/92% free)

 

 

You can compare the hash output with the hash published in the Cisco Software Download website to confirm its authenticity and it's not corrupted during the file transfer.

 

ciscoasa# verify /md5 cisco-asa-fp3k.9.18.3.56.SPA

 

!!!!!!!!!!!!!!Done!

verify /MD5 (disk0:/cisco-asa-fp3k.9.18.3.56.SPA) = f466853bcebf15c81279e956e6c37906

 

 

ciscoasa# verify /md5 asdm-7201.bin

 

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Done!

verify /MD5 (disk0:/asdm-7201.bin) = ba376c64777461ca587f8a8b5578554e

 

 

The ASA currently runs version 9.17 and ASDM 7.18.

 

ciscoasa# show version

 

Cisco Adaptive Security Appliance Software Version 9.17(1)21

SSP Operating System Version 2.11(1.191)

Device Manager Version 7.18(1)152

 

Compiled on Wed 16-Nov-22 00:04 GMT by builders

System image file is "disk0:/installables/switch/fxos-k8-fp3k-lfbff.2.11.1.191.SPA"

Config file at boot was "startup-config"

 

ciscoasa up 7 days 15 hours

Start-up time 3 secs

 

Hardware:   FPR-3110, 52169 MB RAM, CPU Ryzen Zen 2 2900 MHz, 1 CPU (24 cores)

 

Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)

                             AE microcode        : CNN5x-MC-AE-MAIN-0007

                             SE SSL microcode    : CNN5x-MC-SE-SSL-0018

                             Number of accelerators: 1

 

 1: Int: Internal-Data0/1    : address is 0000.0041.0004, irq 239

 3: Int: Not licensed        : irq 0

 4: Ext: Management1/1       : address is c47e.e07e.1482, irq 0

 5: Int: Internal-Data1/1    : address is 0000.0100.0001, irq 0

 

License mode: Smart Licensing

 

Licensed features for this platform:

Maximum Physical Interfaces       : Unlimited     

Maximum VLANs                     : 1024          

Inside Hosts                      : Unlimited     

Failover                          : Active/Active 

Encryption-DES                    : Enabled       

Encryption-3DES-AES               : Disabled      

Security Contexts                 : 2             

Carrier                           : Disabled      

AnyConnect Premium Peers          : 3000          

AnyConnect Essentials             : Disabled      

Other VPN Peers                   : 3000          

Total VPN Peers                   : 3000          

AnyConnect for Mobile             : Enabled       

AnyConnect for Cisco VPN Phone    : Enabled       

Advanced Endpoint Assessment      : Enabled       

Shared License                    : Disabled      

Total TLS Proxy Sessions          : 4000          

Cluster                           : Enabled       

 

Serial Number: FJZ27231234

Configuration register is 0x1

Configuration last modified by enable_15 at 02:47:41.036 UTC Wed Nov 1 2023

 

 

Change to the boot variable to point to the new ASA and ASDM image. Save the config and reload for the new ASA version to take effect. It's highly recommended to monitor the upgrade procedure via the console.

 

ciscoasa# show run boot

ciscoasa#

ciscoasa# show run asdm

no asdm history enable

 

ciscoasa# configure terminal

ciscoasa(config)# boot system disk0:/cisco-asa-fp3k.9.18.3.56.SPA

 

The system is currently installed with security software package 9.17.1.21, which has:

   - The platform version:  2.11.1.191

   - The CSP (asa) version: 9.17.1.21

Preparing new image for install...

!!!!!

Image download complete (Successful unpack the image).

Installation of version 9.18.3.56 will do the following:

   - upgrade to the new platform version 2.12.0.519

   - upgrade to the CSP ASA version 9.18.3.56

After installation is complete, ensure to do write memory and reload to save this config and apply the new image.

Finalizing image install process...

 

Install_status: ready.............................

Install_status: validating-images.

Install_status: upgrading-system

Install_status: upgrading-firmware

Install_status: update-software-pack-completed

 

ciscoasa(config)# asdm image disk0:/asdm-7201.bin

ciscoasai(config)# end

ciscoasa# write memory

Building configuration...

Cryptochecksum: 9db145a0 ceddd2a5 4416d104 91137070

 

14594 bytes copied in 0.260 secs

[OK]

 

 

It took around 2 mins for installing the new ASA software to finish.

 

ciscoasa# show run boot

boot system disk0:/cisco-asa-fp3k.9.18.3.56.SPA


ciscoasa# show run asdm

asdm image disk0:/asdm-7201.bin

no asdm history enable

 

 

ciscoasa# reload

Proceed with reload? [confirm]

ciscoasa#

 

 

***

*** --- START GRACEFUL SHUTDOWN ---

Shutting down Application Agent

Shutting down isakmp

Shutting down webvpn

Shutting down sw-module

Shutting down License Controller

Shutting down File system

 

 

***

*** --- SHUTDOWN NOW ---

Process shutdown finished

Rebooting... (status 0x9)

..

<13>Nov  1 04:08:42 root: FXOS shutdown log started: pid = 955 cmdline = /bin/sh/sbin/fxos_log_shutdown ####

 

Broadcast message from root@firepower-3110 (Wed Nov  1 04:08:42 2023):

 

The system is going down for reboot NOW!

2023 Nov 01 04:08:44 PMLOG: PM IPC UTILITY: Shutting down all ports

Stopping OpenBSD Secure Shell server: sshd

stopped /usr/sbin/sshd (pid 8992)

done.

Stopping Advanced Configuration and Power Interface daemon: stopped /usr/sbin/acpid (pid 1403)

acpid.

Stopping web server: apache2failed

Stopping system message bus: dbus.

Stopping DHCP server: dhcpd3no /usr/sbin/dhcpd found; none killed

.

stopping DNS forwarder and DHCP server: dnsmasq... no /usr/bin/dnsmasq found; none killed

stopping mountd: done

stopping nfsd: .done

Stopping ntpd: start-stop-daemon: warning: killing process 1441: No such process

done

Stopping internet superserver: xinetd.

stopping statd: done

Stopping random number generator daemon.

Stopping domain name service: named.

Stopping crond: OK

Stopping rpcbind daemon...

done.

Stopping fan control daemon: fancontrol... no process in pidfile '/var/run/fancontrol.pid' found; none killed

done.

Stopping sensors logging daemon: sensord... stopped /usr/sbin/sensord (pid 2433)

done.

 * Stopping virtualization library daemon: libvirtd                      [fail]

Deconfiguring network interfaces... done.

Stopping FreeRADIUS daemon radiusd Failed

Wed Nov  1 04:08:45 UTC 2023

SSP-Security-Module is shutting down ...

Wed Nov  1 04:08:45 UTC 2023 SHUTDOWN WARNING: Beginning System Shutdown request for CSP Apps

Wed Nov  1 04:08:45 UTC 2023 SHUTDOWN WARNING: Upgrade process ready for reboot

Wed Nov  1 04:08:45 UTC 2023 SHUTDOWN WARNING: Continue System Shutdown request for CSP Apps

DEBUG-CSPM: Checkpoint: autorun exist

Nov  1 04:08:45 firepower-3110 NVRAM: Confreg value: confreg = 0x1

DEBUG-CSPM: Checkpoint: autorun exist

omit_pids_opt: -o 680,683

Wed Nov  1 04:08:49 UTC 2023

Sending ALL processes the TERM signal ...

Note: SIGKILL_ALL will be triggered after after 1 + 2 secs ...

Wed Nov  1 04:08:51 UTC 2023

Sending ALL processes the KILL signal ...

Wed Nov  1 04:08:52 UTC 2023

Deactivating swap...

Unmounting local filesystems...

Stop Soft RAID

2023 Nov 01 04:08:53:

Soft-RAID configuration started

2023 Nov 01 04:08:53: found 1 devices

2023 Nov 01 04:08:53: enter FSM state PROBE

2023 Nov 01 04:08:53: probe /dev/nvme0n1

2023 Nov 01 04:08:53: superblock meta entries 6

2023 Nov 01 04:08:53: sysfs_probe_md: version=1.0, level=raid1, state=active

2023 Nov 01 04:08:53: enter FSM state DESTROY

2023 Nov 01 04:08:53: /sbin/mdadm --stop /dev/md0: 0

2023 Nov 01 04:08:54: enter FSM state PROBE

2023 Nov 01 04:08:54: probe /dev/nvme0n1

2023 Nov 01 04:08:54: superblock meta entries 6

2023 Nov 01 04:08:54: Soft-RAID configuration exit

2023 Nov 01 04:08:55: retrieving device list ...

2023 Nov 01 04:08:55: /usr/sbin/nvme subsystem-reset /dev/nvme0: 0

Reset TAM device ...

Rebooting... [661655.890391] reboot: Restarting system

 

 

<OUTPUT TRUNCATED>

 

                                                                              

                       Please do not remove the AC power!                     

                                                                              

 

          Insyde H2OFFT (Flash Firmware Tool) Version (SEG) 200.00.00.10

         Copyright (C) 2020 Insyde Software Corp. All Rights Reserved.

 

 

                           Current BIOS Model Name: FPR-3100

                           New     BIOS Model Name: FPR-3100

                           Current System BIOS Version: 1.2.04

                           New     BIOS  Image Version: 1.2.05

 

 

                        Updating Block at FFFF0000h       

          0%          25%         50%          75%         100%

           ****+++*******************************************     100%

                           Update Progress: Completed 

 

 

Checking media [Fail]

Checking media [Fail]

 

To launch ROMMON.

 

Time: 11/01/2023 04:26:47 (LOCAL)

 

 

*******************************************************************************

Cisco System ROMMON, Version 1.2.04, RELEASE SOFTWARE

Copyright (c) 1994-2022  by Cisco Systems, Inc.

Compiled Tue 10/18/2022 19:08:38.69 by Administrator

*******************************************************************************

 

Current image running: Boot ROM1

Last reset cause: ResetRequest (0x00001000)

DIMMs installed: P0 CHANNEL C P0 CHANNEL D

 

Platform FPR-3110 with 65536 MBytes of main memory

switch: bar0=0xd0800000 bar2=0xcc000000 bar4=0xd0000000 cmd=0x6

Switch Microinit: allocated buffer 5b758018, aligned buffer 5c000000

Mgmt port in SGMII mode

INFO: Firmware upgrade state: ROMMON_UPG_START (1)

firmware_upgrade: ROMMON_UPG_START

INFO: Reset code: 0x00001000

firmware_upgrade: ROMMON_UPG_START default

Active ROMMON: Preferred 1, selected 1, booted 1

 

Preparing to launch the new ROMMON upgrade image.

The new ROMMON upgrade image has been detected.

This will be launch attempt (1 of 4) to start the upgraded ROMMON image.

Power cyling the system to start the upgraded ROMMON image...

 

Toggling power on system board...

 

 

Checking media [Fail]

Checking media [Fail]

 

To launch ROMMON.

 

Time: 11/01/2023 04:29:20 (LOCAL)

 

 

*******************************************************************************

Cisco System ROMMON, Version 1.2.05, RELEASE SOFTWARE

Copyright (c) 1994-2022  by Cisco Systems, Inc.

Compiled Thu 12/08/2022 11:19:32.18 by builder

*******************************************************************************

 

Current image running: *Upgrade in progress* Boot ROM0

Last reset cause: BootRomUpgrade (0x00000010)

DIMMs installed: P0 CHANNEL C P0 CHANNEL D

 

Platform FPR-3110 with 65536 MBytes of main memory

switch: bar0=0xd0800000 bar2=0xcc000000 bar4=0xd0000000 cmd=0x6

Switch Microinit: allocated buffer 5bcad018, aligned buffer 5c000000

Mgmt port in SGMII mode

INFO: Firmware upgrade state: ROMMON_UPG_START (1)

firmware_upgrade: ROMMON_UPG_START

INFO: Reset code: 0x00000010

firmware_upgrade: ROMMON_UPG_START PLD_RST_REASON_FLASH

The upgraded ROMMON image has successfully started.

The boot watchdog timer is being stopped.

Active ROMMON: Preferred 1, selected 1, booted 0

INFO: File 'FS0:installables/switch/fxos-k8-fp3k-firmware.1.2.20.SPA' has 231330384 bytes.

fs_fopen_readonly: FileHandle 5d4fd020

Golden FPGA Version     : 0.21.0

New Golden FPGA version : 0.21.0

Golden FPGA image is up-to-date.

INFO: Set the ROMMON upgrade state: ROMMON_UPG_NONE

 

+-----------------------------------------------------------------+

+---------------  ROMMON FIRMWARE UPGRADE SUCCESS  ---------------+

+-----------------------------------------------------------------+

|                                                                 |

| Start the security application to complete the ROMMON upgrade.  |

|                                                                 |

| Rebooting this unit without starting the security application   |

| will cause the ROMMON to default back to the previously running |

| ROMMON version.                                                 |

|                                                                 |

+-----------------------------------------------------------------+

 

MAC Address: c4:7e:e0:7e:12:34

 

Use BREAK or ESC to interrupt boot.

Use SPACE to begin boot immediately.

Boot in 10 seconds.

 

<OUTPUT TRUNCATED>

 

INFO: Configure management0 interface ...

INFO: Configure system files ...

INFO: System Name is: firepower-3110

Create 16 QDMA VFs from PF: 0000:41:00.0

Starting sensors logging daemon: sensord... done.

INFO: fp1000 asa copy appliance mode

INFO: console : ttyS0, speed : 9600

INFO: manager_startup: setting up fxmgr apache ...

INFO: manager_startup: Start manager httpd setup...

INFO: manager_startup: using HTTPD_INFO persistent cache

/bin/rm: cannot remove '/tmp/openssl.conf': No such file or directory

 httpdRegister INFO: [httpd.2689 -s -4 0.0.0.0 -n localhost]

 httpdRegister INFO: SKIP httpd syntax check

 httpdRegister INFO: Starting httpd setup/registration...

 httpdRegister INFO: Completed httpd setup/registration!

 INFO: httpdRegister [httpd.2689 script exit]

INFO: manager_startup: Completed manager httpd setup!

Starting crond: OK

1:/opt/cisco/csp/cores

2:/opt/cisco/csp/packet-capture

/opt/cisco/csp/cores 62914560

/opt/cisco/csp/packet-capture 41943040

System Mode Check: NATIVE mode assigned

System Mode Check: NATIVE mode assigned

System Mode Check: NATIVE mode assigned

 

Cisco ASA: CMD=-bootup, CSP-ID=cisco-asa.9.17.1.21__asa_001_FJC27261SLF3EN1234, FLAG=''

Cisco ASA booting up ...

INFO: starting config regster monitor

 

 

System Mode Check: NATIVE mode assigned

firepower-3110 login: admin (automatic login)

 

Last login: Tue Oct 24 12:22:18 UTC 2023 on ttyS0

Successful login attempts for user 'admin' : 1

INFO: System Disk /dev/md0 present. Status: Operable.

System Mode Check: NATIVE mode assigned

System Mode Check: NATIVE mode assigned

 

Waiting for Application infrastructure to be ready...

Verifying the signature of the Application image...

System Mode Check: NATIVE mode assigned

Creating FXOS swap file ...

Please wait for Cisco ASA to come online...1...

Please wait for Cisco ASA to come online...2...

Please wait for Cisco ASA to come online...3...

Please wait for Cisco ASA to come online...4...

Please wait for Cisco ASA to come online...5...

Please wait for Cisco ASA to come online...6...

Please wait for Cisco ASA to come online...7...

 

Cisco ASA: CMD=-upgrade, CSP-ID=cisco-asa.9.18.3.56__asa_001_FJC27261SLF3EN1234, FLAG='cisco-asa.9.17.1.21__asa_001_FJC27261SLF3EN1234'

Cisco ASA begins upgrade ...

Please wait for Cisco ASA to come online...8...

Verifying signature for cisco-asa.9.18.3.56 ...

Verifying signature for cisco-asa.9.18.3.56 ... success

Please wait for Cisco ASA to come online...9...

 

Cisco ASA: CMD=-start, CSP-ID=cisco-asa.9.18.3.56__asa_001_FJC27261SLF3EN1234, FLAG=''

Cisco ASA starting ...

ASA start done pre

ASA Clear status

Memory allocated to application in kbytes: 54914048

CPU cores allocated to application: 1,13,2,14,3,15,4,16,5,17,6,18,7,19,8,20,9,21,10,22,11,23

Deleting previous CGroup Configuration ...

Registering to process manager ...

Cisco ASA started successfully.

lina_init_env: memif is not enabled.

System Cores 24 Nodes 1 Max Cores 128

IO Memory Nodes: 1

IO Memory Per Node: 2147483648 bytes num_pages = 524288 page_size = 4096

 

Global Reserve Memory Per Node: 2147483648 bytes Nodes=1

 

LCMB: got DMA 2147483648 bytes on numa-id=0, phys=0x0000000180000000, virt=0x00007fa040000000

LCMB: HEAP-CACHE POOL got 2147483648 bytes on numa-id=0, virt=0x00007f9f80000000

 

total_reserved_mem = 2147483648

 

total_heapcache_mem = 2147483648

ERROR: fail to open /var/run/lina/meminfo_new

ERROR: fail to open /var/run/lina/meminfo_old

total mem 54702424064 system 67387310080 kernel 134217728 image 112999912

new 54702424064 old 2260483560 reserve 4294967296 priv new 50541674496 priv old 0

Processor memory:  54702424064

M_MMAP_THRESHOLD 65536, M_MMAP_MAX 834692

POST started...

POST finished, result is 0 (hint: 1 means it failed)

 

Cisco Adaptive Security Appliance Software Version 9.18(3)56

 

Compiled on Tue 12-Sep-23 19:15 GMT by builders

FPR-3110 platformNic assigned 0

 

Total NICs found: 5

cpss_poll_devmain success!!

en_vtun rev00 Backplane Ext-Mgmt Interface     @ index 03 MAC: c47e.e07e.1234

en_vtun rev00 Backplane Tap Interface     @ index 04 MAC: 0000.0100.0001

livecore intialized

Counter ID 'TLS13_DOWNSTREAM_CLIENT_CERTIFICATE_VERIFY' is too long must be 40 characters or less

WARNING: Attribute already exists in the dictionary.

ILK enabled for instance 0 with lane mask 0xF speed 6250 MHz

Init ILK - NPS_CORE_GBL_VFCFG 0X00000000

Configure the GSER registers

ILK configured on QLM 0 with ref_clk 156250000 Hz, baud 6250 MHz, instance 0

QLM0: Lane 0: TX_SWING=16, TX_PRE=0, TX_POST=4, TX_GAIN=-1, TX_VBOOST=-1

QLM0: Lane 1: TX_SWING=16, TX_PRE=0, TX_POST=4, TX_GAIN=-1, TX_VBOOST=-1

QLM0: Lane 2: TX_SWING=16, TX_PRE=0, TX_POST=4, TX_GAIN=-1, TX_VBOOST=-1

QLM0: Lane 3: TX_SWING=16, TX_PRE=0, TX_POST=4, TX_GAIN=-1, TX_VBOOST=-1

ILK configured on QLM 1 with ref_clk 156250000 Hz, baud 6250 MHz, instance 0

Clear TX/TX calendars

Configure the SERDES for all possible lanes

Configure TX / RX Calendars

Enable per lane RX error counts

Bring up the TX side

Configure the RX lanes

RX equalization for speeds > 5G

QLM0: Lane 0 RX equalization complete

QLM0: Lane 1 RX equalization complete

QLM0: Lane 2 RX equalization complete

QLM0: Lane 3 RX equalization complete

Bring up RX link

ILK0: Lane alignment complete

Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)

                             AE microcode        : CNN5x-MC-AE-MAIN-0007

                             SE SSL microcode    : CNN5x-MC-SE-SSL-0018

The 3DES/AES algorithms require a Encryption-3DES-AES entitlement.

The 3DES/AES algorithms require a Encryption-3DES-AES entitlement.

 

Cisco Adaptive Security Appliance Software Version 9.18(3)56

 

  ****************************** Warning *******************************

  This product contains cryptographic features and is

  subject to United States and local country laws

  governing, import, export, transfer, and use.

  Delivery of Cisco cryptographic products does not

  imply third-party authority to import, export,

  distribute, or use encryption. Importers, exporters,

  distributors and users are responsible for compliance

  with U.S. and local country laws. By using this

  product you agree to comply with applicable laws and

  regulations. If you are unable to comply with U.S.

  and local laws, return the enclosed items immediately.

 

  A summary of U.S. laws governing Cisco cryptographic

  products may be found at:

  http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

 

  If you require further assistance please contact us by

  sending email to export@cisco.com.

  ******************************* Warning *******************************

Cisco Adaptive Security Appliance Software, version 9.18

Copyright (c) 1996-2023 by Cisco Systems, Inc.

For licenses and notices for open source software used in this product, please visit

http://www.cisco.com/go/asa-opensource

 

                Restricted Rights Legend

Use, duplication, or disclosure by the Government is

subject to restrictions as set forth in subparagraph

(c) of the Commercial Computer Software - Restricted

Rights clause at FAR sec. 52.227-19 and subparagraph

(c) (1) (ii) of the Rights in Technical Data and Computer

Software clause at DFARS sec. 252.227-7013.

 

                Cisco Systems, Inc.

                170 West Tasman Drive

                San Jose, California 95134-1706

 

Reading from flash...

!!!.......

Cryptochecksum (unchanged): 9db145a0 ceddd2a5 4416d104 91137070

INFO: File /mnt/disk0/.private/dynamic-config.json not opened; errno 2

INFO: Network Service reload not performed.

 

INFO: Power-On Self-Test in process.

........................

INFO: Power-On Self-Test complete.

 

INFO: Starting HW-DRBG health test...

INFO: HW-DRBG health test passed.

 

INFO: Starting SW-DRBG health test...

INFO: SW-DRBG health test passed.

User enable_1 logged in to ciscoasa

Logins over the last 1 days: 1. 

Failed logins since the last login: 0. 

Type ' for a list of available commands.

 

 

ciscoasa> show version

 

Cisco Adaptive Security Appliance Software Version 9.18(3)56

SSP Operating System Version 2.12(0.519)

Device Manager Version 7.20(1)

 

Compiled on Tue 12-Sep-23 19:15 GMT by builders

System image file is "disk0:/installables/switch/fxos-k8-fp3k-lfbff.2.12.0.519.SPA"

Config file at boot was "startup-config"

 

ciscoasa up 1 min 57 secs

Start-up time 8 secs

 

Hardware:   FPR-3110, 52168 MB RAM, CPU Ryzen Zen 2 2900 MHz, 1 CPU (24 cores)

 

Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)

                             AE microcode        : CNN5x-MC-AE-MAIN-0007

                             SE SSL microcode    : CNN5x-MC-SE-SSL-0018

                             Number of accelerators: 1

 

 1: Int: Internal-Data0/1    : address is 0000.0041.0004, irq 152

 3: Int: Not licensed        : irq 0

 4: Ext: Management1/1       : address is c47e.e07e.1482, irq 0

 5: Int: Internal-Data1/1    : address is 0000.0100.0001, irq 0

 

License mode: Smart Licensing

             

Licensed features for this platform:

Maximum Physical Interfaces       : Unlimited     

Maximum VLANs                     : 1024          

Inside Hosts                      : Unlimited     

Failover                          : Active/Active 

Encryption-DES                    : Enabled       

Encryption-3DES-AES               : Disabled      

Security Contexts                 : 2             

Carrier                           : Disabled      

AnyConnect Premium Peers          : 3000          

AnyConnect Essentials             : Disabled      

Other VPN Peers                   : 3000          

Total VPN Peers                   : 3000          

AnyConnect for Mobile             : Enabled       

AnyConnect for Cisco VPN Phone    : Enabled       

Advanced Endpoint Assessment      : Enabled       

Shared License                    : Disabled      

Total TLS Proxy Sessions          : 4000          

Cluster                           : Enabled       

 

Serial Number: FJZ27231234

Configuration register is 0x1

Configuration has not been modified since last system restart.

 

 

It took around 30 mins for the ASA software upgrade to finish.