Friday, November 3, 2017

Configure and Add a FirePower Sensor in FirePower Management Center (FMC)

You'll need to upgrade and configure the FirePower sensor (ASA FP module in this scenario) before adding to FirePower Management Center (FMC). I had a separate post regarding the upgrade procedure for FirePower. It's also recommended to upgrade the sensor with the same (or lower) image version used by FMC otherwise it won't establish communication if the sensor has a higher version compared to FMC.

To check FMC version go under Help > About.


To check the ASA FirePower module version, use the show module sfr details command.

ciscoasa# show m?

  mdm-proxy    memory    mfib      mgcp
  mmp          mode      module    monitor-interface
  mrib         mroute 

ciscoasa# show module ?

Available module ID(s):
  0     Module ID
  all   show all module information for all slots
  cxsc  Module ID
  ips   Module ID
  sfr   Module ID
  |     Output modifiers
  <cr>

ciscoasa# show module sfr ?

  details  show detailed hardware module information
  log      show logs for this module
  recover  show recover configuration for this module
  |        Output modifiers
  <cr>

ciscoasa# show module sfr details
Getting details from the Service Module, please wait...

Card Type:          FirePOWER Services Software Module
Model:              ASA5525
Hardware version:   N/A
Serial Number:      FCH1834JABC
Firmware version:   N/A
Software version:   6.0.0-1005
MAC Address Range:  fc5b.39aa.5162 to fc5b.39aa.1234
App. name:          ASA FirePOWER
App. Status:        Up
App. Status Desc:   Normal Operation
App. version:       6.0.0-1005
Data Plane Status:  Up
Console session:    Ready
Status:             Up
DC addr:            No DC Configured     // Defense Center/FireSight/FirePower                                       
Mgmt IP addr:       192.168.45.45       // DEFAULT IP ADDRESS                                        
Mgmt Network mask:  255.255.255.0   
                                        
Mgmt Gateway:       0.0.0.0                                          
Mgmt web ports:     443                                                       
Mgmt TLS enabled:   true

ciscoasa# session sfr
Opening command session with module sfr.
Connected to module sfr. Escape character sequence is 'CTRL-^X'.

firepower login: admin
Password: Admin123      // DEFAULT admin/password
Last login: Fri Aug 18 02:31:18 UTC 2017 on pts/0

Copyright 2004-2015, Cisco and/or its affiliates. All rights reserved.
Cisco is a registered trademark of Cisco Systems, Inc.
All other trademarks are property of their respective owners.

Cisco Fire Linux OS v6.0.0 (build 258)
Cisco ASA5525 v6.0.0 (build 1005)


To configure the FirePower and FMC IP address (and key) use the command configure network and configure manager respectively.

> configure

kdump                  Enable or disable kernel crash dump data collection
log-events-to-ramdisk  Configure Logging of Events to disk
log-ips-connection     Configure Logging of Connection Events
manager                Change to Manager Configuration Mode
network                Change to Network Configuration Mode
password               Change password
user                   Change to User Configuration Mode
vmware-tools           Configure state of VMware Tools

> configure network

dns                   Configure DNS
hostname              Set the hostname
http-proxy            Configure HTTP Proxy settings
http-proxy-disable    Disable HTTP Proxy settings
ipv4                  Configure IPv4 networking
ipv6                  Configure IPv6 networking
management-interface  Change to Management Port Configuration Mode
management-port       Change TCP port for management
static-routes         Change to Static Route Configuration Mode

> configure network ipv4

delete  Disable IPv4 networking
dhcp    Configure IPv4 via DHCP
manual  Configure IPv4 manually

> configure network ipv4 manual

configure network ipv4 manual <ipaddr> <netmask> [gw] [interface]
 Configure IPv4 manually

  ipaddr      IPv4 address
  netmask     IPv4 netmask
  gw          IPv4 gateway []
  interface   management interface (optional - default if omitted) []

> configure network ipv4 manual 172.20.3.8

configure network ipv4 manual <ipaddr> <netmask> [gw] [interface]
 Configure IPv4 manually

  ipaddr      IPv4 address
  netmask     IPv4 netmask
  gw          IPv4 gateway []
  interface   management interface (optional - default if omitted) []

> configure network ipv4 manual 172.20.3.8 255.255.255.240

configure network ipv4 manual <ipaddr> <netmask> [gw] [interface]
 Configure IPv4 manually

  ipaddr      IPv4 address
  netmask     IPv4 netmask
  gw          IPv4 gateway []
  interface   management interface (optional - default if omitted) []

> configure network ipv4 manual 172.20.3.8 255.255.255.240 172.20.3.1 

> show ifconfig
cplane    Link encap:Ethernet  HWaddr 00:00:00:04:00:01 
          inet addr:127.0.4.1  Bcast:127.0.255.255  Mask:255.255.0.0
          inet6 addr: fe80::200:ff:fe04:1/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:62022 errors:0 dropped:0 overruns:0 frame:0
          TX packets:10669 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:3721890 (3.5 Mb)  TX bytes:959900 (937.4 Kb)

eth0      Link encap:Ethernet  HWaddr FC:5B:39:AA:51:62 
          inet addr:172.20.3.8  Bcast:172.20.2.15  Mask:255.255.255.240

          inet6 addr: fe80::fe5b:39ff:feaa:5162/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:376991 errors:0 dropped:0 overruns:0 frame:0
          TX packets:296182 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:336895980 (321.2 Mb)  TX bytes:212304568 (202.4 Mb)

lo        Link encap:Local Loopback 
          inet addr:127.0.0.1  Mask:255.255.255.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:342 errors:0 dropped:0 overruns:0 frame:0
          TX packets:342 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:25960 (25.3 Kb)  TX bytes:25960 (25.3 Kb)

tun1      Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 
          inet addr:169.254.0.1  P-t-P:169.254.0.1  Mask:255.255.0.0
          inet6 addr: fdcc::bd:0:ffff:a9fe:1/64 Scope:Global
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:500
          RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)


> show managers
No managers configured.

> configure manager                                                  

add     Configure managing Defense Center
delete  Remove managing Defense Center

> configure manager add

configure manager add <host> <key> [nat-id]
 Configure managing Defense Center

  host     hostname | ipv4 address | ipv6 address | DONTRESOLVE
  key      registration key
  nat-id   optional nat-id (required if host set to DONTRESOLVE) []

> configure manager add 172.20.7.3

configure manager add <host> <key> [nat-id]
 Configure managing Defense Center

  host     hostname | ipv4 address | ipv6 address | DONTRESOLVE
  key      registration key
  nat-id   optional nat-id (required if host set to DONTRESOLVE) []

> configure manager add 172.20.7.3 cisco123

Manager successfully configured.
Please make note of reg_key as this will be required while adding Device in FMC.

> show managers
Host                      : 172.20.7.3
Registration Key          : ****
Registration              : pending
RPC Status                :


The Registration status will change to Completed once the sensor is successfully added in FMC.

> show managers
Type                      : Manager
Host                      : 172.20.7.3
Registration              : Completed


You can perform troubleshooting in FirePower CLI using the system support command.

> system

access-control          Change to Access-Control Mode
disable-http-user-cert  Disable HTTP User Cert
file                    Change to File Mode
generate-troubleshoot   Run troubleshoot
ldapsearch              Test LDAP configuration
lockdown-sensor         Remove access to bash shell
reboot                  Reboot the sensor
stig-compliance         STIG Compliance setting
support                 Change to System Support Mode - Only do this if directed by Support.

> system support    

application-identification-debug         Generate application identification debug messages
bootloader                               Display bootloader information
capture-traffic                          Display traffic or save to specified file
debug-DAQ                                Debug for DAQ functionality
debug-DAQ-reset                          Reset DAQ debug configuration file
dump-table                               Dump specified database tables to common file repository
eotool                                   Change to Enterprise Object Tool Mode
file-malware-debug                       Generate file malware debug messages
firewall-engine-debug                    Generate firewall debug messages
firewall-engine-dump-user-identity-data  Generate a file containing the current state of user identity within the firewall
fstab                                    Display the file systems table
iptables                                 Display IP packet filter rules
network-options                          Display network options
nslookup                                 Look up an IP address or host name with the DNS servers
ntp                                      Show NTP configuration
partitions                               Display partition information
pigtail                                  Tail log files for debugging (pigtail)
ping                                     Ping a host to check reachability
platform                                 Display platform information
pmtool                                   Change to PMTool Mode
repair-table                             Repair specified database tables
rpms                                     Display RPM information
run-rule-profiling                       Run Rule Profiling
scsi                                     Show SCSI device information
set-arc-mode                             Set the Automatic Resource Configuration optimization mode
sftunnel-status                          Show sftunnel status
show-arc-mode                            Show the Automatic Resource Configuration optimization mode value
silo-drain                               Assists with Disk Management
ssl-debug                                Debugging for SSL functionality
ssl-debug-reset                          Reset SSL Debug configuration file
ssl-tuning                               Tune aspects of SSL functionality
ssl-tuning-reset                         Reset SSL Tuning configuration file
swap                                     Display swap information
tail-logs                                Tails the logs selected by the user
traceroute                               Find route to remote network
utilization                              Display current system utilization
view-files                               View files in the system

> system support ping

system support ping <hostname>
 Ping a host to check reachability

  hostname   host

> system support ping 172.20.7.3
PING 172.20.7.3 (172.20.7.3) 56(84) bytes of data.
64 bytes from 172.20.7.3: icmp_req=1 ttl=61 time=227 ms
64 bytes from 172.20.7.3: icmp_req=2 ttl=61 time=227 ms
64 bytes from 172.20.7.3: icmp_req=3 ttl=61 time=227 ms
64 bytes from 172.20.7.3: icmp_req=4 ttl=61 time=227 ms
64 bytes from 172.20.7.3: icmp_req=5 ttl=61 time=227 ms
^C
--- 172.20.7.3 ping statistics ---
5 packets transmitted, 5 received, 0% packet loss, time 4005ms
rtt min/avg/max/mdev = 227.770/227.809/227.880/0.304 ms


To add a sensor in FMC, go to Devices > Device Management > Add > Add Device.


Type the Host IP address, optionally change the Display Name, type the Registration Key (same key used on the sensor), skip Group, choose Access Control (required) > click Register.


It took a couple of minutes for the sensor to be added in FMC.


The newly added sensor will be automatically put under Ungrouped.


Click Add > Add Group > type a group Name > choose a sensor under Available Devices column (from Ungrouped) > click Add to move under Devices column.



To apply licenses on the new sensor, go to Devices > Device Management > click a specific sensor > click Device tab > click License (pencil icon).


I wasn't able to initially tick all four License Capabilities (Protection, Control, Malware, URL Filtering). This was due to unavailable Protection and Control License in FMC which were used up by the other sensors.


FMC can't apply any Access Policy and will report a validation error due to the said Protection and Control license issue.


You can request the Protection and Control license for FREE from Cisco's Licensing team. I have a separate post about licensing in FMC.



The Protection+Control and URL Filtering+Malware license count are now equal.


I'm was able to apply (tick) the four license after the Protection and Control license was applied (and enough URL Filtering and Malware license available).