Sunday, August 5, 2018

Cisco FirePower 'system support firewall-engine-debug'

You can use the system support firewall-engine-debug command in a Cisco FirePower device in order to debug the traffic that hits your FMC policy rules. This is the equivalent of packet-tracer command in a Cisco ASA Firewall. You can also narrow down the debug using the client (source) and server (destination) protocol, ports and IP address.

> system

access-control          Change to Access-Control Mode
disable-http-user-cert  Disable HTTP User Cert
file                    Change to File Mode
generate-troubleshoot   Run troubleshoot
ldapsearch              Test LDAP configuration
lockdown-sensor         Remove access to bash shell
reboot                  Reboot the sensor
stig-compliance         STIG Compliance setting
support                 Change to System Support Mode - Only do thiif directed by Support.

> system support

application-identification-debug         Generate application identification debug messages
bootloader                               Display bootloader information
capture-traffic                          Display traffic or save to specified file
debug-DAQ                                Debug for DAQ functionality
debug-DAQ-reset                          Reset DAQ debug configuration file
dump-table                               Dump specified database tables to common file repository
eotool                                   Change to Enterprise Object Tool Mode
file-malware-debug                       Generate file malware debug messages
firewall-engine-debug                    Generate firell debug messages
firewall-engine-dump-user-identity-data  Generate a file containing the current state of user identity within the firewall
fstab                                    Display the file systems table
iptables                                 Display IP packet filter res
network-options                          Display network options
nslookup                                 Look up an IP address or host name with the DNS servers
ntp                                      Show NTP configuration
partitions                               Display partition information
pigtail                                  Tail log files for debugging (pigtail)
ping                                     Ping a host to check reachability
platform                                 Display platform information
pmtool                                 Change to PMTool Mode
repair-table                             Repair specified database tables
rpms                                     Display RPM information
run-rule-profiling                       Run Rule Profiling
scsi                                     Show SI device information
set-arc-mode                             Set the Automatic Resource Configuration optimization mode
sftunnel-status                          Show sftunnel status
show-arc-mode                            Show the Automatic Resource Configuration optimization mode value
silo-drain                               Assists with Disk Management
ssl-debug                                Debugging for SSL functionality
ssl-debug-reset                          Reset SSL Debug configuration file
ssl-tuning                               Tune pects of SSL functionality
ssl-tuning-reset                         Reset SSL Tuning configuration file
swap                                     Display swap information
tail-logs                                Tails the logs selected by the user
traceroute                             Find route to remote network
utilization                              Display current system utilization
view-files                               View files in the system

> system support firewall-engine-debug

Please specify an IP protocol: tcp
Please specify a client IP address: 172.16.37.2
Please specify a client port:
Please specify a server IP address:
Please specify a server port:
Monitoring firewall engine debug messages

172.16.37.2-64016 > 76.13.28.196-443 6 AS 0 I 0 New session
172.16.37.2-64016 > 76.13.28.196-443 6 AS 0 I 0 Starting with minimum 0, id 0 and SrcZone first with zones -1 -> -1, geo 0 -> 0, vlan 0, svc 0, payload 0, client 0, misc 0, user 1843, url 
172.16.37.2-64016 > 76.13.28.196-443 6 AS 0 I 0 match rule order 1, 'TEST', action stpath
172.16.37.2-64016 > 76.13.28.196-443 6 AS 0 I 0 allow action
172.16.37.2-64016 > 76.13.28.196-443 6 AS 0 I 0 Starting with minimum 0, id 0 and SrcZone first with zones -1 -> -1, geo 0 -> 0, vlan 0, svc -1, payload -1, client -1, misc -1, user 2547, url


Hit Ctrl+C to stop the debug in FirePower.

Caught interrupt signal
Exiting.

>

No comments:

Post a Comment