FTD Log
FTD Log
Prepared by:
Table of Contents
1 INTRODUCTION 6
1.1 COMMON CRITERIA (CC) EVALUATED CONFIGURATION 7
1.2 SCOPE OF EVALUATION 8
1.3 REFERENCES 9
1.4 DOCUMENTATION REFERENCES 10
2 OPERATIONAL ENVIRONMENT 12
2.1 OPERATIONAL ENVIRONMENT COMPONENTS 12
2.2 ENVIRONMENTAL ASSUMPTIONS 12
3 BEFORE INSTALLATION 15
4 INSTALLATION AND CONFIGURATION 16
4.1 FMC INSTALLATION 16
4.1.1 FMC Fundamentals 16
4.1.2 FMC Installation 16
4.2 FMC INITIAL CONFIGURATION 17
4.2.1 Configure Authentication 17
4.2.2 Configure the Pre-Login Banner 17
4.2.3 Configure the Clock 17
4.2.4 Configure SSH Public-Key Authentication 18
4.2.5 Configure SSH ReKey Configuration (optional) 18
4.2.6 Configure Inactivity Timeout Settings 19
4.2.7 Configure Logging 19
4.2.8 Configure Local Storage of Audit Log Messages 20
4.2.9 Configure Use of a Remote Logging Server 20
4.2.10 Configure Access Lists for Remote Administration 20
4.2.11 Disable the REST API 21
4.2.12 CC Mode and FIPS Mode 21
4.2.13 Configure CLI Lockdown on FMC 22
4.2.14 Logging into the Appliance 22
4.2.15 Logout 24
4.2.16 Restrict Access 24
4.2.17 Configure Syslog over TLS for FMC and FTD 26
4.3 FTD INSTALLATION 31
4.4 FTD INITIAL CONFIGURATION 32
4.4.1 Ensure FTD is Managed by FMC 32
4.4.2 Enable CC Mode and FIPS Mode 32
4.4.3 Common Criteria (CC) Mode 33
4.4.4 Configure Authentication 34
4.4.5 Configure the Pre-Login Banner 35
4.4.6 Configure the Clock 36
4.4.7 Configure Inactivity Timeout Settings 36
4.4.8 Disable the HTTP (HTTPS) Server 36
4.4.9 Configure Logging 36
4.4.10 Configure CLI Lockdown on FTD 41
4.4.11 FTD Logout 42
5 FTD ACCESS CONTROL POLICIES 43
5.1 FTD INTERFACE MODES: FIREWALL, IPS-ONLY, OR IDS-ONLY 43
1 INTRODUCTION 6
1.1 COMMON CRITERIA (CC) EVALUATED CONFIGURATION 7
1.2 SCOPE OF EVALUATION 8
1.3 REFERENCES 9
1.4 DOCUMENTATION REFERENCES 10
2 OPERATIONAL ENVIRONMENT 12
2.1 OPERATIONAL ENVIRONMENT COMPONENTS 12
1 Introduction
The Cisco Firepower Threat Defense (FTD) System is a next-generation Firewall (NGFW) that
combines both SNORT® open source and proprietary technology and firewall and VPN
functionality. The system is used to filter and monitor all incoming and outgoing network traffic for
security events and violations. All packets on the monitored network are scanned, decoded,
preprocessed and compared against a set of access control and intrusion rules to determine
whether inappropriate traffic, such as system attacks, is being passed over the network. The system
then notifies a designated administrator of these attempts and/or blocks the malicious traffic. The
system generates these alerts when deviations of the expected network behavior are detected and
when there is a match to a known attack pattern.
In addition, the system also provides real-time contextual awareness, advanced malware
protection, and security intelligence for blocking malicious URLs and IP addresses. The Cisco FTD
System is an integrated suite of network security and traffic management products, deployed either
on purpose-built platforms or as a software solution. In a typical deployment, multiple traffic-
sensing managed Devices (i.e., sensors) installed on network segments monitor traffic for analysis
and report to a managing Firepower Management Center (FMC). Deployed inline, Devices can affect
the flow of traffic.
The Firepower Management Center provides a centralized management console with web interface
that you can use to perform administrative, management, analysis, and reporting tasks. You can
also use a CLI on the Devices to perform setup, basic analysis, and configuration tasks.
This document is a supplement to the Cisco administrative guidance, which is comprised of the
installation and administration documents identified in section 1.3. This document supplements
those manuals by specifying how to install, configure and operate this product in the Common
Criteria evaluated configuration. This document is referred to as the operational user guide in the
Network Device collaborative Protection Profile (NDcPP) and meets all the required guidance
assurance activities from the CPP_ND_v2.2e, MOD_IPS_V1.0, MOD_CPP_FW_1.4E and
MOD_VPNGW_V1.1.
Accessing the shell should be limited to authorized administrators for pre-operational setup (for
example, Security Technical Implementation Guide (STIG) compliance testing), for troubleshooting,
or regular maintenance.
In addition, the Threat license must be purchased and activated to use all the IPS features to meet
the IPS requirements for Common Criteria. Optionally (beyond the scope of IPS requirements for
Common Criteria), to use the malware protection feature Malware license is required, and to use
URL filtering capability URL Filtering license is required.
Audience
This document is written for administrators configuring the Cisco FTD system running software
version 7.0.x. This document assumes you are familiar with networks and network terminology,
that you are a trusted individual, and that you are trained to use the Internet and its associated
terms and applications.
1.3 References
TOE (Target of Evaluation) References
Cisco FTD System1 running Version 7.0.x
1In the evaluated configuration, the TOE must comprise of at least one FMC and one or more Devices all running version
7.0.x.
2All virtual appliances run on ESXi 6.7 or 7.0 on the Unified Computing System (UCS) UCSC-C220-M5, UCSC-C240-M5,
UCSC-C480-M5, UCS-E160S-M3 and UCS-E180D-M3.
Cisco FTD (NGFW) 7.0 on Firepower 1000 and 2100 Series with FMC and FMCv Common Criteria
Supplemental User Guide [This Document]
Cisco Firepower Release Notes, Version 7.0, Last updated: August 10, 2022
https://www.cisco.com/c/en/us/td/docs/security/firepower/70/relnotes/firepower-release-notes-700.html
Cisco Firepower Management Center 1000, 2500, and 4500 Hardware Installation Guide [FMC-HIG1]
https://www.cisco.com/c/en/us/td/docs/security/firepower/1000_2500_4500/hw/guide/b_install_guide_10
00_2500_4500.html
Cisco Firepower Management Center 1600, 2600, and 4600 Hardware Installation Guide [FMC-HIG2]
https://www.cisco.com/c/en/us/td/docs/security/firepower/fmc-1600-2600-4600/hw/guide/install-fmc-
1600-2600-4600.html
Firepower Management Center Upgrade Guide, Last updated: March 1, 2022 [FMC-UG]
https://www.cisco.com/c/en/us/td/docs/security/firepower/upgrade/fpmc-upgrade-guide.html
Cisco Firepower Management Center 1000, 2500, and 4500 Getting Started Guide, Last updated: April 6, 2020
https://www.cisco.com/c/en/us/td/docs/security/firepower/hw/getting-started/fmc-1000-2500-4500/fmc-
1000-2500-4500.html
Cisco Secure Firepower Management Center Virtual Getting Started Guide, Last updated: August 26, 2022
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/vmware/fmcv/FMCv-quick.html
Cisco Firepower 1100 Getting Started Guide, Last updated: June 28, 2022
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp1100/firepower-1100-gsg.html
Firepower Management Center Configuration Guide, Version 7.0, Last updated: August 2, 2022 [FMC-CG]
https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-
v70.html
Cisco Firepower Threat Defense Command Reference, Last updated: June 6, 2022 [FTD-CLI]
https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firep
ower_Threat_Defense.html
Cisco Firepower Threat Defense Syslog Messages, Last updated: August 15, 2022
https://www.cisco.com/c/en/us/td/docs/security/firepower/Syslogs/b_fptd_syslog_guide.html [FTD-
SYSLOG]
2 Operational Environment
This section describes the components in the environment and assumptions made about the
environment.
3 Before Installation
Before you install your appliance, Cisco highly recommends that the users must consider the
following:
• Locate the Cisco FTD System appliance in a lockable rack within a secure location that
prevents access by unauthorized personnel.
• Allow only trained and qualified personnel to install, replace, administer, or service the
Cisco appliance.
• Always connect the management interface to a secure internal management network that is
protected from unauthorized access. This management interface is separate from the data
interface described in the section “Passive vs Inline”.
• Identify the specific management workstation IP addresses that can be allowed to access
appliances. Restrict access to the appliance to only those specific hosts using the Access
Lists feature.
• To safeguard the FMC, user must deploy the FMC on a protected internal network. Although
the FMC is configured to have only the necessary services and ports available, user must
make sure that attacks cannot reach it from outside the access control.
• Connect the management interface of managed Devices to the same protect internal
network as the FMC. This allows the administrators to securely control the Device from the
FMC and aggregate the event data generated on the managed Device’s network segment.
• By default, several ports are open to allow the system to take advantage of additional
features and functionality. The following table lists these ports. Note that DHCP on ports 67
and 68 is disabled by default.
c) (Skip) “Add Managed Devices to FMC” (Skip this section for now because these steps
will be covered later when one or more FTDs have is installed.)
d) (Partially optional) Perform these steps in “Set Up Alternate FMC Access”:
i) (Optional) Set Up Serial Access
ii) DO NOT follow the steps under “Set Up Lights Out Management”. This feature uses
the IPMI protocol for remote authentication, and the IPMI protocol is not secure
enough to be used in the CC-evaluated configuration.
e) (Optional) Preconfigure FMCs
f) (Optional) Managing the Firepower Management Center User the System Restore Utility
g) DO NOT Erase the Hard Drive unless you intent to fully reinstall the appliance, or return
it to Cisco, or dispose of it.
options {
fips_mode (1);
cc_mode (1);
proto-template(timestamp);
};
between the FMC/FMCv and the external syslog server to the ones listed in the ST and section 4.4.3
of this document –
cipher-suite("ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-
GCM-SHA384:AES256-SHA256:AES128-SHA256")
3 aes128-cbc, aes256-cbc, AEAD_AES_128_GCM, AEAD_AES_256_GCM are the approved encryption algorithms, hmac-
sha1, hmac-sha2-256, hmac-sha2-512, AEAD_AES_128_GCM, AEAD_AES_256_GCM are the approved hmac algorithms and
diffie-hellman-group14-sha1 (supported by FTD and FMC), ecdh-sha2-nistp256 (supported only by FTD), ecdh-sha2-nistp384
(supported only by FTD) and ecdh-sha2-nistp521(supported only by FTD) are the only allowed key exchange methods.
NOTE! Observe the login banner under the Cisco Firepower logo.
2. In the Username and Password fields, type your username and password.
Audit Record:
4.2.15 Logout
To logout of FMC GUI:
1. For web session, from the drop-down list under your username, select Log Out.
2. Close the web browser.
3. For CLI, type the command exit.
IMPORTANT! For security purpose, always logout as instructed above when you
are finished using the management interface. Do NOT rely solely on the inactivity
timeout feature.
To logout of FMC CLI, the user can use the "exit" or "logout" commands.
2. Depending on whether you are configuring audit log streaming for a Firepower
Management Center or a managed Device:
• Management Center—Choose System > Configuration.
• Managed Device—Choose Devices > Platform Settings and create or edit a
Firepower policy.
3. Click Access List.
The Access List page appears.
5. In the IP Address field, you have the following options, depending on the IP addresses you
want to add:
• An exact IP address (for example, 10.6.50.81)
• An IP address range using CIDR (for example, 192.168.0.0/16)
• Any IP address using any term
6. Select SSH or HTTPS or both of these options to specify which ports you want to enable for
these IP addresses.
WARNING! SNMP management must not be enabled in the evaluated configuration.
SNMP cannot be used for management. However, encrypted SNMPv3 traps are
allowed for alerting only.
7. Click Add.
8. Click the delete icon ( ) to remove the permissive rules.
IMPORTANT! If you delete access for the IP address that you are currently using to
connect to the appliance interface, and there is no entry for “IP=any port=443”, you
will lose access to the system when you save (for FMC) or deploy (for Device) the
setting.
9. Click Save.
10. Click Deploy if you are configuring these settings for the managed Devices. Select the
Device(s) you want to deploy the setting to and click Deploy again.
Audit Record:
Note: The Source IP field in the audit event above is cut off.
• Managed Device (FTD) —Choose Devices > Platform Settings and create or edit a
Firepower policy.
3. Select Audit Log Certificate.
Audit Record:
If you choose to use CRLs, to ensure that the list of revoked certificates stays current, you can create
a scheduled task to update the CRLs. The system displays the most recent refresh of the CRLs.
If you choose CRLs, the system uses the same CRLs to validate both audit client certificates and
HTTPS certificate to secure the HTTPS connection between the system and a web browser. When
the TOE cannot establish a connection for the validity check using CRL or the OCSP responder for
verification, the FTD IPsec connections will not accept the certificate when transmitting messages
to the syslog server, while all FTD and FMC TLS connections will accept the certificate and the
trusted channel will be established. If TLS sessions fail due to inability to contact the CRL or OCSP
server (FTD only), restore connectivity to the CRL or OCSP server before reattempting to establish
the TLS sessions.
NOTE! Mutual authentication on the FTD has not been tested as part of the evaluation.
4 Another option is rsyslog with stunnel but this configuration is not described in this document.
destination d_local {
file("/var/log/remote_messages"); # The remote syslog file location can be configured here
};
log {
source(s_network_TLS); destination(d_local);
};
NOTE! When CC mode is enabled, the TLS version and cipher suites will be limited to the
ones claimed in the Security Target. The audit server setting must include those versions
and cipher suites, or the secure audit log connection will fail.
4. Restart the syslog-ng server and make sure there is no error message.
/etc/rc.d/init.d/syslog-ng restart # Command may be different depending on the OS.
5. Use netstat to make sure the syslog-ng is listening.
netstat -an | grep 6514
6. Make sure port 6514 is opened by the firewall to allow the connection.
The administrator is responsible for maintaining the connection between the system and audit
server. If the connection is unintentionally broken, the administrator should perform the following
steps to diagnose and fix the problem:
• Check the physical network cables.
• Check that the audit server is still running.
• Reconfigure the audit log settings.
• If all else fail, reboot the system and audit server.
b) If reimaging is required, refer to the “Reimage the Firepower 1000 or 2100 Series” section
of the Cisco ASA and Firepower Threat Defense Reimage Guide.
c) Refer to the “Firepower Threat Defense Deployment with FMC” chapter of the Cisco
Firepower 1010 Getting Started Guide to connect power and cabling, complete the initial
configuration, and register the FTD with an FMC.
Firepower 1120, 1140 and 1150:
a) Refer to the Cisco Firepower 1100 Series Hardware Installation Guide to mount the
appliance, connect the console cable, and connect power.
b) If reimaging is required, refer to the “Reimage the Firepower 1000 or 2100 Series” section
of the Cisco ASA and Firepower Threat Defense Reimage Guide.
c) Refer to the “Firepower Threat Defense Deployment with FMC” chapter of the Cisco
Firepower 1100 Getting Started Guide to connect power and cabling, complete the initial
configuration, and register the FTD with an FMC.
Firepower 2100 Series (2110, 2120, 2130, and 2140):
a) Refer to the Cisco Firepower 2100 Series Hardware Installation Guide to mount the
appliance, connect the console cable, and connect power.
b) If reimaging is required, refer to the “Reimage the Firepower 1000 or 2100 Series” section
of the Cisco ASA and Firepower Threat Defense Reimage Guide.
c) Refer to the “Firepower Threat Defense Deployment with FMC” chapter of the Cisco
Firepower 2100 Getting Started Guide to connect cabling, complete the initial configuration,
and register the FTD with an FMC.
This will allow the FTD TLS client to only use the selected algorithms.
The TLS ciphersuites used between the FMC/FMCv TLS client and the remote syslog server are
limited to:
• TLS_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5246 (TLSv1.2, TLSv1.1)
• TLS_RSA_WITH_AES_256_CBC_SHA256 as defined in RFC 5246 (TLSv1.2, TLSv1.1)
• TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5289 (TLSv1.2 only)
• TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5289 (TLSv1.2 only)
• TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 as defined in RFC 5289 (TLSv1.2, TLSv1.1)
The TLS ciphersuites used between FTD and FMC are limited to:
• TLS_RSA_WITH_AES_128_CBC_SHA as defined in RFC 3268 (TLSv1.2 only)
• TLS_RSA_WITH_AES_256_CBC_SHA as defined in RFC 3268 (TLSv1.2 only)
• TLS_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5246 (TLSv1.2 only)
At minimum, to adhere to the CC-evaluated configuration, the default ‘admin’ account must be
configured according to the settings listed below. To configure FTD accounts, refer to the
commands referenced below as descried in [FTD-CLI] for the commands begin with “configure
user”, e.g. “configure user access” or “configure user aging":
1) Access Level: Any setting is acceptable (either “config” or “basic”).
a) The access level of the default ‘admin’ account cannot be changed, it’s set to ‘config’.
b) If additional accounts are created, specify the access level by using the “configure user
add” command.
2) Aging: (optional) Any setting is acceptable.
3) ForceReset: (optional) To force a user to change their password at their next login, use the
“configure user forcereset” command.
4) MaxFailedLogins: Set this limit using the “configure user maxfailedlogins” command.
a) For the default ‘admin’ account, and another custom accounts, set the value to a positive
integer (from 1-99).
b) If that limit of consecutive failed logins occurs, the account will be locked until unlocked
by another administrative account that has its access level set to ‘config’.
Note: When an account is locked due to the maximum number of failed login attempts being
exceeded, the CLI outputs a message reporting that the account is locked due to a specified
number of authentication failures. The user should be aware that there is an error/bug in
the output message which always specifies the number of failures as being 1 more than the
actual number of authentication failures. Or in other words, the actual number of
authentication failures is 1 less than the number reported by the output message.
5) MinPasswdLen: Set to eight (8) or greater using the “configure user minpasswdlen”
command. The maximum allowable value assigned to minpasswdlen is 32.
6) StrengthCheck: Set to “enable” using the “configure user strengthcheck” command. Once
this setting is enabled for a user, the strength check will be enforced the next time that user
resets their password (the strength check cannot be enforced on passwords that were set
prior to enabling StrengthCheck for that user).
7) Unlock: (as needed) To unlock an FTD account that has become locked due to exceeding the
MaxFailedLogins limit use the “configure user unlock” command. When an account is
locked due to exceeding the limit, output of the “show user” command will show “Yes”
under the “Lock” column, and will show “No” after unlocking the account, as shown in the
screenshot below.
The passwords are stored in a hashed form using Approved SHA-512 with a 32-bit salt value.
banner for FTD, in FMC navigate to Devices > Platform Settings > Banner, enter the login banner
in the pre-login banner, and click Save, then deploy the updated Platform Settings to all FTD devices
to which the Platform Settings have been assigned. For more detail, refer to the “Configure
Banners” subsection of the “Platform Settings for Firepower Threat Defense” section in [FMC-CG].
1) System event messages: These messages include system-level events including clock
changes, and authentication of administrators to the FTD CLI. These messages are sent
from the FTD OS TLS client to an external syslog server.
2) Firewall (Access Control Policy): These messages can be viewed in the local logging buffer
of FTD using the command “show logging”. These messages are sent from the FTD TLS
client to an external syslog server. In addition, these messages can optionally be configured
to also be sent over TLS from FTD to FMC where they would be viewable in FMC as they are
stored in the connection database.
3) VPN messages: These messages can be viewed in the local logging buffer of FTD using the
command “show logging”. These messages are sent from the FTD TLS client to an external
syslog server. In addition, these messages can optionally be configured to also be sent over
TLS from FTD to FMC where they would be viewable in FMC via System > Monitoring >
Syslog.
4) IPS messages: These messages are automatically transmitted over TLS by FTD to FMC for
storage, and are viewable via the “Audit Log” within FMC. IPS messages generated on FTD
are temporarily stored locally on FTD in a database prior to transmission to FMC, so if the
connection from FTD to FMC is interrupted the IPS messages will be transmitted once
connectivity is restored.
c) If desired, disable the syslog config (server details remain on FTD, and can be re-
enabled): configure syslog_server disable
d) If desired, re-enable a syslog server, if it had been disabled: configure syslog_server
enable
e) If desired, disable the syslog server config and deletes the config: configure
syslog_server delete
f) Modify the syslog-tls.conf.tt file
(/ngfw/usr/local/sf/htdocs/html_templates/stig/syslog-tls.conf.tt) to add the following
change to restrict the supported ciphers for the TLS connection between the FTD OS
TLS client and the syslog server to the ones listed in the ST and section 4.4.3 of this
document – cipher-suite("ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-GCM-
SHA256:ECDHE-RSA-AES256-GCM-SHA384:AES256-SHA256:AES128-SHA256")
messages in that class. Click OK to save the filter. The GUI will show a
summary of the Logging Destination configuration, as in this screenshot:
iii. Check the Enable Secure Syslog check box to encrypt the connection
between the Device and server using TLS over TCP.
You must select TCP as the protocol to use this option. You must also upload the
certificate required to communicate with the syslog server on the Devices >
Certificates page. Finally, upload the certificate from the FTD to the syslog server to
complete the secure relationship and allow it to decrypt the traffic.
iv. Add the zones that contain the interfaces used to communicate with the
syslog server. For interfaces not in a zone, you can type the interface name
into the field below the Selected Zones/Interface list and click Add. These
rules will be applied to a Device only if the Device includes the selected
interfaces or zones.
NOTE! If the syslog server is on the network attached to the physical Management interface,
you must type the name of that interface into the Interface Name field below the Selected
Security Zones list and click Add. You must also configure this name (if not already
configured), and an IP address, for the Diagnostic interface (edit the Device from the Device
Management page and select the Interfaces tab).
v. Click OK.
8. After you save the changes, click Deploy to deploy the policy to assigned Devices. The
changes are not active until you deploy them.
and logs it, e.g. by either adding a rule at the end of a policy to explicitly drop and log all traffic, or
by setting the Default Action for the policy to block all traffic, and enabling logging for the default
rule, as show in this example:
4. In the Name: field, type a unique name for the new policy. Optionally, type a description in
the Description: field.
5. Specify the default action.
WARNING! Leave the default Block all traffic in the evaluated configuration.
6. Select the Devices where you want to apply the policy. Click on the managed Device(s) you
want the policy to applied to. Then click on Add to Policy button.
7. Specify the initial Default Action:
• Block all traffic creates a policy with the Access Control: Block All Traffic default
action.
• Intrusion Prevention creates a policy with the Intrusion Prevention: Balanced
Security and Connectivity default action, associated with the default intrusion
variable set.
8. Click Save.
9. Click Deploy and select the Device(s) you want to deploy the setting to and click Deploy
again.
3. Click the edit icon ( ) next to the access control policy you want to configure.
The Policy Edit page appears.
3. Click the delete icon ( ) next to the policy you want to delete.
4. Click OK to confirm.
3. Click the edit icon ( ) next to the access control policy you want to configure.
4. Add a new rule or edit an existing rule:
• To add a new rule, click Add Rule.
• To edit an existing rule, click the edit icon ( ) next to the rule you want to edit.
Either the Add Rule or Editing Rule page appears.
3. Click the edit icon ( ) next to the access control policy you want to configure.
4. Click the delete icon ( ) next to the access control rule you want to delete.
5. Click OK to confirm.
6. Click Save.
The following example demonstrates how to block all Ping (ICMP echo request) from the external
network to internal network and log the connection attempt.
1. Login with Administrator Role.
2. Select Policies > Access Control.
3. Click the edit icon ( ) next to the access control policy you want to configure.
4. Click Add Rule.
5. Type a name for the rule.
6. Leave the Enabled checkbox selected.
10. On the Networks tab, select any as the source network and any as the destination network.
For granular control, you can enter IP address or range of IP addresses for source and destination
networks. The system also supports IPv6 addresses as well.
11. On the Ports tab, in the second Protocol fields, select ICMP(1).
6 Management Functions
6.1 Manage the FMC Audit Log and Syslog
FMCs and managed Devices log read-only auditing information for user activity. Audit logs are
presented in a standard event view that allows administrator to view, sort, and filter audit log
messages based on any item in the audit view. Administrator can delete and report on audit
information and can view detailed reports of the changes that users make. These messages can be
configured to be transmitted directly to a remote syslog server, in which case each message will be
simultaneously transmitted to the remote logging server as the message is written locally.
The appliance includes an internal log database implementation that can be used to store and
review audit records locally. When the audit log is full, the oldest audit records are overwritten by
the newest audit records. In addition, the appliance also includes a local syslog storage in
/var/log/messages. Similar to the audit log, when the syslog is full, the oldest syslog messages are
overwritten by the newest one.
For the Audit Log, the events are stored in partitioned event tables. FMC will prune (i.e., delete) the
oldest partition table whenever the oldest partition can be pruned without reducing the number of
stored events below the configured event retention level. The default retention level for the Audit
Event Database is 100,000 and is configurable from 1-100,000 (configurable via System >
Configuration > Database > Audit Event Database > Maximum Audit Events). Setting the retention
level (the “Maximum Audit Events” value) sets the amount of records that will be retained after a
periodic pruning. Records are stored across multiple partition tables that each have a minimum
size of 10,000 records, and the periodic pruning can only remove entire partition tables, not subsets
of tables. So, for example, if the retention level is set to 5000, the actual number of currently stored
audit events would need to exceed 15,000 records (10,000 in the older partition table, and 5,000+
in the newer partition table) before the older table can be deleted while retaining 5,000+ of the
most recent records.
NOTE! To change the maximum number of entries, go to System > Configuration > Database > Audit
Event Database > Maximum Audit Events
For syslog, the logs are stored in /var/log/messages and FMC uses a ‘logrotate’ implementation to
rotate logs weekly or when the log file size exceeds 25 MB. After the maximum number of backlog
files is reached, the oldest is deleted and the numbers on the other backlogs file are incremented.
NOTE! To prevent losing audit records, set up an audit server to send a copy of the audit and syslog
records to.
To prevent the losing of critical audit records, the administrators can configure the system to
transmit all the audit events (i.e., audit log and syslog) in real-time over a secure TLS connection or
an IPsec connection (FTD-only) to an external audit server in the operational environment. When
an audit event is generated, it is sent to the local storage and external audit server simultaneously.
This ensures that current audit events can be viewed locally while all events, new or old, are stored
off-line as required by the NDcPP.
Note that the protection of the audit records stored at the external audit server is the responsibility
of the operational environment. The TOE is only responsible for the secure communication channel.
It is recommended that the audit server is physically or logically separated (e.g., VLANs) from the
other networks.
The TOE can be configured to export syslog records to an administrator-specified, external syslog
server. The TOE can be configured to encrypt the communications with an external syslog server
using IPsec or TLS. FMC transmits syslog over TLS and FTD transmits syslog over TLS and IPsec.
The audit records are also stored locally and when the local storage is full, the newest data will
overwrite the oldest data. On FMC, log messages (those generated locally and those forwarded
from FTD) are stored locally on FMC in a database. Different message types are stored separately in
local databases, and each local store has a separately configurable size limit (configurable in FMC
via System > Configuration > Database). Audit events recording FMC administrator actions are
stored in the Audit Event Database, network traffic events transmitted from FTD to FMC are stored
in separate databases on FMC: firewall events (triggered by Access Control Policy rules) are stored
in Connection Database; VPN events are stored in the VPN Troubleshooting Database; and the IPS
events are stored in Intrusion Event Database.
Messages generated by FTD, including FTD system messages, firewall events, and VPN events are
stored locally on FTD and are immediately transmitted from FTD to an external syslog server. As
mentioned in the preceding paragraph, the firewall, VPN and IPS events are directly sent to FMC for
retention in the FMC databases via secure TLS channel (Note: The IPS events are not stored locally
on FTD but are transmitted to an external syslog server via the FMC. IPS events generated on FTD
are temporarily stored locally on FTD in a database prior to transmission to FMC). If the connection
between FTD and FMC is interrupted, the IPS messages are transmitted once connectivity is
restored. As the system, firewall event and VPN event messages are generated by FTD, they are
immediately transmitted from FTD to a remote syslog server and stored in a local buffer (buffer
size configurable from 4096-52428800 bytes) which overwrites old messages with new ones when
storage limits are reached. The local logs are viewable from the FTD CLI shell by using “show
logging”.
3. The System log (syslog) page provides administrator with system log information for the
appliance. The system log displays each message generated by the system. The following
items are listed in order:
• Date that the message was generated.
• Time that the message was generated.
• Host that generated the message.
• The message itself8.
4. Select System > Monitoring > Syslog.
Audit Record:
8 The message includes the user or source IP only if applicable. In most cases, the system generated the system log
not the user and most of the time, the source IP address is the IP address of the appliance (i.e., system process
resides on the system).
Example
➢ show audit-log
Audit Record:
Field Description
Time Time and date that the appliance generated the audit record.
User User name of the user that triggered the audit event.
Subsystem Menu path the user followed to generate the audit record. For example, System >
Monitoring > Audit is the menu path to view the audit log.
In a few cases where a menu path is not relevant, the Subsystem field displays
only the event type. For example, Login classifies user login attempts or
Command Line classifies a command executed.
Message Action the user performed.
For example, Page View signifies that the user simply viewed the page indicated
in the Subsystem, while Save means that the user clicked the Save button on the
page. If the Subsystem field is Command Line, the Message field will show the
command executed.
Changes made to the Cisco 3D System appear with a compare icon ( ) that you
can click to see a summary of the changes.
Source IP IP address of the host used by the user.
<date> <time> <host> SF-IMS[48689]: [48743] sftunneld:sf_ssl [WARN] Base Peer Certificate
from fcfc1b00-b171-11e9-82b8-1272d6bd24fc does not meet Cisco Common Criteria, Upgrade it
to 6.1.0.
Invalid Identifier:
<date> <time> <host> SF-IMS[10576]: [10585] sftunneld:sf_ssl [ERROR] CERT
subject_title(77777777-7777-7777-7777-777777777777) did not match connected peer
uuid(fcfc1b00-b171-11e9-82b8-1272d6bd24fc)
Invalid Purpose:
<date> <time> <host> %FTD-3-717009: Certificate validation failed. Peer certificate key usage is
invalid, serial number: 0085, subject name: e=server-no-auth-eku-
rsa@gossamersec.com,cn=tl15-16x.example.com,o=GCT,l=Catonsville,st=MD,c=US.
<date> <time> <host> syslog-ng[64120]: SSL error while writing stream; tls_error='SSL
routines:ssl3_get_server_certificate:invalid purpose'
Unknown Cipher:
<date> <time> <host> EDT: %FTD-7-725014: SSL lib error. Function: ssl3_get_server_hello
Reason: unknown cipher returned
<date> <time> <host> %FTD-7-725014: SSL lib error. Function: set_client_ciphersuite Reason:
unknown cipher returned\n
Invalid TLS version:
<date> <time> <host> EDT: %FTD-7-725014: SSL lib error. Function: ssl3_get_server_hello
Reason: wrong ssl version
<date> <time> <host> %FTD-7-725014: SSL lib error. Function: ssl_choose_client_version
Reason: unsupported protocol
Wrong Curve:
<date> <time> <host> %FTD-7-725014: SSL lib error. Function: tls_process_ske_ecdhe Reason:
wrong curve\n
Certificate Verification Failure:
<date> <time> <host> %FTD-3-717009: Certificate validation failed. No suitable trustpoints
found to validate certificate serial number: 0081, subject name: e=server-issued-by-
unacceptable-rsa@gossamersec.com,cn=tl15-16x.example.com,o=GCT,l=Catonsville,st=MD,c=US,
issuer name: cn=rootca-unacceptable-rsa,e=rootca-unacceptable-
rsa@gossamersec.com,o=GCT,l=Catonsville,st=MD,c=US
Identifier Match Failed:
<date> <time> <host> %FTD-3-725019: Server certificate for SSL session
outside:192.168.144.221/62273 to 192.168.144.46/6514 did not match reference identity:
syslogserver
<date> <time> <host> %FTD-7-725014: SSL lib error. Function: ssl3_get_server_certificate
Reason: certificate verify failed
Bad signature:
<date> <time> <host> %FTD-7-725014: SSL lib error. Function: tls_process_key_exchange
Reason: bad signature\n
<date> <time> <host> syslog-ng[2291]: SSL error while writing stream; tls_error='rsa
routines:RSA_private_encrypt:bad signature'
Bad Finished Message:
<date> <time> <host> %FTD-7-725014: SSL lib error. Function: tls_process_finished Reason:
digest check failed\n
Digest Check Failed:
<date> <time> <host> syslog-ng[6173]: SSL error while writing stream; tls_error='SSL
routines:ssl3_get_finished:digest check failed'
Decryption Failed:
<date> <time> <host> syslog-ng[7009]: SSL error while writing stream; tls_error='SSL
routines:SSL3_GET_RECORD:decryption failed or bad record mac'
FMC:
General Failure:
<date> <time> <host> SF-IMS[19567]: [24222] sftunneld:sf_ssl [ERROR] Connect:SSL handshake
failed
Invalid EKU:
<date> <time> <host> SF-IMS[2896]: [2903] sftunneld:sf_ssl [WARN] Peer Certificate from
1d492c4c-cb33-11e9-95d4-de72c62116a8 does not meet Cisco Common Criteria, Upgrade it to
6.1.0 and re-register to the manager.
Invalid Identifier:
<date> <time> <host> SF-IMS[22517]: [22781] sftunneld:sf_ssl [ERROR] CERT
subject_title(77777777-7777-7777-7777-777777777777) did not match connected peer
uuid(1d492c4c-cb33-11e9-95d4-de72c62116a8)
With Mutual authentication supported:
Bad Cipher and General Failure:
<date> <time> <host> syslog-ng[6506]: SSL error while writing stream; tls_error='SSL
routines:ssl3_read_bytes:sslv3 alert handshake failure', location='/etc/syslog-ng.d/syslog-
tls.conf:17:9'
Invalid Purpose:
<date> <time> <host> syslog-ng[6506]: X509 Certificate Validation; depth='0', ok='0',
errnum='26', error='unsupported certificate purpose'
Unknown/Wrong Cipher:
<date> <time> <host> syslog-ng[6506]: SSL error while writing stream; tls_error='SSL
routines:set_client_ciphersuite:unknown cipher returned', location='/etc/syslog-ng.d/syslog-
tls.conf:17:9'
Invalid TLS version:
<date> <time> <host> syslog-ng[23039]: SSL error while writing stream; tls_error='SSL
routines:ssl_choose_client_version:unsupported protocol', location='/etc/syslog-ng.d/syslog-
tls.conf:17:9'
Wrong Curve:
<date> <time> <host> syslog-ng[6506]: SSL error while writing stream; tls_error='SSL
routines:tls_process_ske_ecdhe:wrong curve', location='/etc/syslog-ng.d/syslog-tls.conf:17:9'
FMC:
No Shared Cipher/Invalid Key Exchange:
<date> <time> <host> [ssl:info] [pid 20165] SSL Library Error: error:1408A0C1:SSL
routines:ssl3_get_client_hello:no shared cipher -- Too restrictive SSLCipherSuite or using DSA
server certificate?
Digest Check Failed:
<date> <time> <host> [ssl:info] [pid 15536:tid 22427868288768] SSL Library Error:
error:1416C095:SSL routines:tls_process_finished:digest check failed
Wrong Version:
<date> <time> <host> [ssl:info] [pid 15536:tid 22427857782528] SSL Library Error:
error:142090FC:SSL routines:tls_early_post_process_client_hello:unknown protocol
General Failure:
<date> <time> <host> [ssl:info] [pid 17833:tid 22427853580032] [client 172.16.16.91:50570]
AH02008: SSL library error 1 in handshake (server 172.16.16.116:443)
ITT:
<date> <time> <host> SF-IMS[19567]: [11420] sftunneld:sf_ssl [ERROR] Accept:SSL handshake
failed
FIA_AFL.1 Unsuccessful login FMC, and FTD FTD:
attempts limit is met SSH:
or exceeded. <date> <time> <host> sshd[24776]: error: maximum authentication attempts exceeded for
testuser from 10.6.16.46 port 45216 ssh2 [preauth]
FMC:
TLS:
<date> <time> fmc1600 mojo_server.pl: fmc1600: testuser@127.0.0.1, Login, Login Failed
<date> <time> mc1600 mojo_server.pl: fmc1600: Invalid User@127.0.0.1, Login, Login Failed
FIA_UIA_EXT.1 All use of the FMC, and FTD FTD:
identification and Console Success:
authentication <date> <time> <host> login[21794]: pam_unix(login:session): session opened for user admin by
mechanism. LOGIN(uid=0)
Console Failure:
<date> <time> <host> login[23764]: pam_unix(login:auth): authentication failure;
logname=LOGIN uid=0 euid=0 tty=/dev/ttyS0 ruser= rhost= user=admin
<date> <time> <host> login[23764]: FAILED LOGIN (1) on '/dev/ttyS0' FOR 'admin',
Authentication failure
FMC:
Console Login Success:
<date> <time> <host> login[7684]: pam_unix(login:session): session opened for user admin by
LOGIN(uid=0)
Console Login Failure:
<date> <time> <host> login[7684]: pam_unix(login:auth): authentication failure;
logname=LOGIN uid=0 euid=0 tty=/dev/ttyS0 ruser= rhost= user=admin
<date> <time> <host> sshd[6548]: Accepted publickey for admin from 10.6.16.46 port 47699
ssh2
<date> <time> <host>login[7684]: FAILED LOGIN (1) on '/dev/ttyS0' FOR 'admin',
Authentication failure
SSH Login Success:
<date> <time> <host> sshd[6518]: Accepted keyboard-interactive/pam for admin from
10.6.16.46 port 47680 ssh2
<date> <time> <host> sshd[6518]: pam_unix(sshd:session): session opened for user admin by
(uid=0)
SSH Login Failure:
<date> <time> <host> sshd[6354]: pam_unix(sshd:auth): authentication failure; logname= uid=0
euid=0 tty=ssh ruser= rhost=10.6.16.46 user=admin
<date> <time> <host> sshd[6351]: error: PAM: Authentication failure for admin from 10.6.16.46
SSH Public Key Success:
<date> <time> <host> sshd[23895]: Accepted publickey for admin from 10.6.16.46 port 52474
ssh2: RSA SHA256:f0h+AIMnU4GtMnLhx4+l1TsjNL78E1XSdTZVGl6AdFU
<date> <time> <host> sshd[23895]: pam_unix(sshd:session): session opened for user admin by
(uid=0)
SSH Public Key Failure:
<date> <time> <host> sshd[24147]: Operating in CiscoSSL FIPS mode\n
<date> <time> <host> sshd[24147]: Postponed keyboard-interactive for admin from 10.6.16.46
port 52476 ssh2 [preauth]
WebUI Success:
<date> <time> <host> login.cgi: <host>: <user>@10.6.16.45, Login, Login Success
WebUI Failure:
<date> <time> <host> login.cgi: <host>: <user>@10.6.16.45, Login, Login Failed
anchors in the TOE's <date> <time> <host> %FTD-5-111008: User 'enable_1' executed the 'crypto ca authenticate
trust store rootca-rsa-no-revocation nointeractive' command.
<date> <time> <host> %FTD-5-111010: User 'enable_1', running 'N/A' from IP 0.0.0.0, executed
Reason for failure of 'crypto ca authenticate rootca-rsa-no-revocation nointeractive'
certificate validation <date> <time> <host> %FTD-5-111008: User 'enable_1' executed the 'crypto ca enroll rootca-
rsa-no-revocation noconfirm' command.
Trust Anchor Deletion:
Identification of
<date> <time> <host> %FTD-5-111008: User 'enable_1' executed the 'no crypto ca trustpoint
certificates added,
rootca-rsa-no-revocation noconfirm' command.
replaced or removed <date> <time> <host> %FTD-5-111010: User 'enable_1', running 'N/A' from IP 0.0.0.0, executed
as trust anchor in the 'no crypto ca trustpoint rootca-rsa-no-revocation noconfirm'
TOE's trust store Expired cert:
<date> <time> <host> %FTD-3-717027: Certificate chain failed validation. Certificate chain date
is out-of-range.
<date> <time> <host> syslog-ng[20892]: Certificate validation failed;
subject='emailAddress=server-expired-rsa@gossamersec.com, CN=tl2116x.example.com, O=GSS,
L=Catonsville, ST=MD, C=US', issuer='emailAddress=subsubca-rsa@gossamersec.com,
CN=subsubca-rsa, O=GSS, L=Catonsville, ST=MD, C=US', error='certificate has expired', depth='0'
Corrupt ASN.1:
<date> <time> <host>: %FTD-7-725014: SSL lib error. Function: ssl3_get_server_certificate
Reason: ASN1 lib
<date> <time> <host> syslog-ng[22091]: SSL error while writing stream; tls_error='asn1
encoding routines:asn1_check_tlen:wrong tag', location='/ngfw/etc/syslog-ng.d/syslog-
tls.conf:17:9'
Invalid Ca or Signature:
<date> <time> <host> %FTD-3-717027: Certificate chain failed validation. Certificate chain is
either invalid or not authorized.
<date> <time> <host> syslog-ng[22893]: Certificate validation failed;
subject='emailAddress=subsubca-no-basic-constraints-rsa@gossamersec.com, CN=subsubca-no-
basic-constraints-rsa, O=GSS, L=Catonsville, ST=MD, C=US', issuer='emailAddress=subca-
rsa@gossamersec.com, CN=subca-rsa, O=GSS, L=Catonsville, ST=MD, C=US', error='invalid CA
certificate', depth='1'
<date> <time> <host> syslog-ng[17732]: SSL error while writing stream; tls_error='SSL
routines:tls_process_server_certificate:certificate verify failed', location='/ngfw/etc/syslog-
ng.d/syslog-tls.conf:17:9'
Revoked cert using CRL:
<date> <time> <host> %FTD-3-717027: Certificate chain failed validation. Certificate is revoked.
<date> <time> <host> syslog-ng[23018]: Certificate validation failed;
subject='emailAddress=server-revoked-rsa@gossamersec.com, CN=tl2116x.example.com,
Invalid CA:
<date> <time> <host> %FTD-3-717009: Certificate validation failed. No suitable trustpoints
found to validate certificate serial number: 7A, subject name: e=server-issued-by-no-basic-
constraints-ecdsa@gossamersec.com,cn=tl15-
16x.example.com,o=GCT,l=Catonsville,st=MD,c=US, issuer name: e=subsubca-no-basic-
constraints-ecdsa@gossamersec.com,cn=subsubca-no-basic-constraints-
ecdsa,o=GCT,l=Catonsville,st=MD,c=US .
CRL Revoked cert:
<date> <time> <host> %FTD-3-717009: Certificate validation failed. Certificate is revoked, serial
number: 00B0, subject name: e=server-revoked-ecdsa@gossamersec.com,cn=tl15-
16x.example.com,o=GCT,l=Catonsville,st=MD,c=US.
OCSP Revoked cert:
<date> <time> <host> %FTD-3-717027: Certificate chain failed validation. Generic error
occurred, serial number: 1D, subject name: e=subca-revoked-
ecdsa@gossamersec.com,cn=subca-revoked-ecdsa,o=GCT,l=Catonsville,st=MD,c=US.
No OCSP/CRL signing purpose:
<date> <time> <host> %FTD-3-717032: OCSP status check failed. Reason: Failed to verify OCSP
response.
<date> <time> <host> %FTD-7-711001: Certificate verification error: key usage does not include
CRL signing
Invalid Chain:
<date> <time> <host> %FTD-3-717027: Certificate chain failed validation. No suitable trustpoint
was found to validate chain.
Explicit EC Certificate:
<date> <time> <host> %FTD-3-717027: Certificate chain failed validation. Certificate chain is
either invalid or not authorized.
<date> <time> <host> %FTD-3-751006: Local:192.168.144.221:500
Remote:192.168.144.46:500 Username:192.168.144.46 IKEv2 Certificate authentication failed.
Error: Certificate authentication failed
FMC:
TLS:
Trust Anchor Addition:
<date> <time> <host> SF-IMS[14865]: HTTPSCert:InstallCertificate [INFO] Cert Added:
F5_client-TOE-00-rsa_rootca-rsa
Trust Anchor Deletion:
<date> <time> <host> SF-IMS[13985]: HTTPSCert:DeleteCertificate [INFO] Cert Deleted:
F1_client-TOE-00-rsa_rootca-rsa
Expired cert:
FMC:
Trust Anchor Addition:
<date> <time> <host> SF-IMS[14865]: HTTPSCert:InstallCertificate [INFO] Cert Added:
F5_client-TOE-00-rsa_rootca-rsa
Trust Anchor Deletion:
<date> <time> <host> SF-IMS[13985]: HTTPSCert:DeleteCertificate [INFO] Cert Deleted:
F1_client-TOE-00-rsa_rootca-rsa
Expired cert:
<date> <time> <host> SF-IMS[28844]: [25530] sftunneld:sf_ssl [ERROR] err 10:certificate has
expired
Corrupt ASN.1:
<date> <time> <host> SF-IMS[28844]: [25959] sftunneld:sf_ssl [ERROR] SSL_renegotiate error:
1: error:00000001:lib(0):func(0):reason(1)
Invalid Signature:
<date> <time> <host> SF-IMS[28844]: [25984] sftunneld:sf_ssl [ERROR] err 7:certificate
signature failure
Invalid CA:
<date> <time> <host> SF-IMS[28844]: [26310] sftunneld:sf_ssl [ERROR] err 24:invalid CA
certificate
Invalid Chain:
<date> <time> <host> SF-IMS[1278]: [1285] sftunneld:sf_ssl [ERROR] err 20:unable to get local
issuer certificate
FMT_MOF.1/ Any attempt to FTD and FMC FTD:
ManualUpdate initiate a manual See FPT_TUD_EXT.1
update
FMC:
<date> <time> <host> SF-IMS[27507]: [27507] Cisco_Firepower_Mgmt_Center_Patch-6.4.0.1-
17:000_start/100_start_messages.sh [INFO] Upgrade starting
FMT_SMF.1 All management FTD and FMC FTD:
activities of TSF data. <date> <time> <host> sfdccsm: fmcv-new2: <user>@10.6.16.47, Devices > Platform Settings >
Platform Settings Editor, Modified: Banner#000x0a#000x00
<date> <time> <host> sfdccsm: fmcv-new2: <user>@10.6.16.47, Devices > Platform Settings >
Platform Settings Editor, Modified: Timeouts#000x0a#000x00
Ability to verify updates:
<date> <time> <host> sudo: www : TTY=unknown ; PWD=/usr/local/sf/htdocs/admin ;
USER=root ; COMMAND=/usr/local/sf/bin/verify_signed_image.sh -m -s
/var/tmp/sigstatus_uFHnPAWr -I /var/sf/updates/Cisco_FTD_SSP_Patch-6.4.0.1-17.sh.REL.tar
<date> <time> <host> sudo: admin : TTY=pts/0 ; PWD=/home/admin ; USER=root ;
COMMAND=/usr/local/sf/bin/cli_usrmgr maxf testuser 5
<date> <time> <host> sfdccsm: <host>: <user@172.16.16.90, Devices > Platform Settings >
Platform Settings Editor, Page View#000x0a#000x00
<date> <time> <host> sfdccsm: <host>: <user@172.16.16.90, Devices > Platform Settings >
Platform Settings Editor, Save Policy Syslog w/o TLS#000x0a#000x00
IKE SA lifetime:
<date> <time> <host> sfdccsm: fmcv-new2: <user>@10.6.16.47, Objects > Object Management >
IKEv2_Policy, save gct-aes-sha
ESP SA lifetime:
<date> <time> <host> sfdccsm: fmcv-new2: <user>@10.6.16.47, Device > VPN > FTD S2S, Update
VPN Topology Entry gctvpn
<date> <time> <host> sfdccsm: <host>: <user>@10.6.16.47, Device > Certificates, Add new
Certificate–- rootca-ecdsa-no-revocation on device fp4140ftd
<date> <time> <host> sfdccsm: <host>: <user>@10.6.16.47, Device > Certificates, Display
Certificate List
<date> <time> <host> sudo: admin : TTY=pts/0 ; PWD=/home/admin ; USER=root;
COMMAND=/usr/local/sf/bin/cli_usrmgr unlock tester
<date> <time> <host> %FTD-6-199018: FPRM: <<%FPRM-6-AUDIT>>
[admin][clish][modification][clish][68760][sys/user-ext/user-testuser][clearLockStatus(Old:no,
This management New:yes)][] User testuser modified#012
event (ability to <date> <time> <host> cmd_log.pl: Default NGFWPolicy: admin@172.16.16.91, Command Line,
manage the trusted Executed expert- command
public keys
database) is intended
to be performed
during initial setup
by entering the
underlying linux
using the expert
command. After
initial setup the
underlying linux is
locked down as
described in Section
4.4.10
FMC:
<date> <time> <host> platformSettingEdit.cgi: <host>: <user>@172.16.16.90, System > Local >
User Management > Users, Enable user – testuser
Jan 6 16:31:38 fmc1600 mojo_server.pl: fmc1600: testuser@127.0.0.1, Login, Login Success
<date> <time> <host> platformSettingEdit.cgi: <host>: <user>@10.6.16.45, Devices > Platform
Settings > Login Banner > Modified: Custom Login Banner This is a GCT banner to test
FTA_TAB.1. > This is a GCT banner to test FTA_TAB.1
<date> <time> <host> platformSettingEdit.cgi: <host>: <user>@10.6.16.45, Shell Timeout,
Browser/Shell timeout changed
Ability to verify updates:
<date> <time> <host> sudo: www : TTY=unknown ; PWD=/usr/local/sf/htdocs/admin ;
USER=root ; COMMAND=/usr/local/sf/bin/verify_signed_image.sh -m -s
/var/tmp/sigstatus_ujPyp8Pv -i /var/sf/updates/Cisco_Firepower_Mgmt_Center_Hotfix_BG-
6.4.0.10-2.sh.REL.tar
<date> <time> <host> user.cgi: <host>: <user>@10.6.16.45, System > Local > User Management
> Users, Edited user – testuser
<date> <time> <host> sfdccsm: <host>: <user>@10.6.16.47, Devices > Platform Settings >
Platform Settings Editor, Modified: SSL
IKE SA lifetime:
<date> <time> <host> sfdccsm: <host>: <user>@172.16.16.81, Objects > Object Management >
Ike2, edit test_policy
ESP SA lifetime:
<date> <time> <host> sfdccsm: <host>: <user>@10.6.16.47, Device > VPN > FTD S2S, Update
VPN Topology Entry gct-vpn
<date> <time> <host> SF-IMS[2124]: HTTPSCert:InstallCertificate [INFO] Certificate Chain added
This management
<date> <time> <host> SF-IMS[2124]: HTTPSCert:InstallCertificate [INFO] Cert Added:
event (ability to
010D_client-TOE-00-rsa_rootca-rsa
manage the trusted <date> <time> <host> sudo:
public keys
database) is intended <date> <time> <host> platformSettingEdit.cgi: <host>: <user>@172.16.16.91, Command Line,
to be performed Executed expert- command
during initial setup
by entering the
underlying linux
using the expert
command. After
initial setup the
underlying linux is
locked down as
described in Section
4.2.13
FMC:
Initiation:
<date> <time> <host> SF-IMS[27507]: [27507] Cisco_Firepower_Mgmt_Center_Patch-6.4.0.1-
17:000_start/100_start_messages.sh [INFO] Upgrade starting
Success:
<date> <time> <host> SF-IMS[32329]: [32329] Cisco_Firepower_Mgmt_Center_Patch-6.4.0.1-
17:999_finish/999_z_complete_upgrade_message.sh [INFO] Upgrade complete
Failure:
<date> <time> <host> SF-IMS[27569]: update.cgi:ProcessUpdateUpload [ERROR] update failed
signature verification: file = Cisco_Firepower_Mgmt_Center_Patch-6.4.0.10-95.sh.REL-
modified.tar
<date> <time> <host> SF-IMS[15473]: update.cgi:ProcessUpdateUpload [ERROR] update is not a
signed package: file = Cisco_Firepower_Threat_Defense_Virtual-7.0.5-72.tar.gz
the session locking <date> <time> <host> sshd[29904]: Received disconnect from 10.6.16.46 port 51368:11:
mechanism. disconnected by user
<date> <time> <host> sshd[29904]: Disconnected from user admin 10.6.16.46 port 51368
FMC:
WebUI Session Lock:
<date> <time> <host> expire-session.pl: <host>: <user>@Default User IP, Session Expiration,
Session expired due to inactivity (admin)
SSH Session Lock:
<date> <time> <host> expire-session.pl: <host>: <user>@10.6.16.46, Session Expiration, Session
terminated on pts/0 due to inactivity (admin)
<date> <time> <host> -clish: CLI terminal closed. Sending SIGINT to process group 32731: sudo
/bin/kill -s 2 -32731
FTA_SSL.4 The termination of FTD, and FMC FTD:
an interactive Console logout:
session. <date> <time> <host> login[5660]: pam_unix(login:session): session closed for user admin
SSH Logout:
<date> <time> <host> sshd[51899]: Received disconnect from 10.6.16.46 port 42314:11:
disconnected by user
<date> <time> <host> sshd[51899]: Disconnected from user admin 10.6.16.46 port 42314
FMC:
WebUI Logout:
<date> <time> <host> login.cgi: <host>: <user>@10.6.16.45, Logout, Logout Success
Console Logout:
<date> <time> <host> login[5660]: pam_unix(login:session): session closed for user admin
SSH Logout:
<date> <time> <host> sshd[7843]: Received disconnect from 10.6.16.46 port 47538:11:
disconnected by user
<date> <time> <host> sshd[20745]: Disconnected from user admin 172.16.16.91 port 59290
FTP_ITC.1 Initiation of the FMC, and FTD All of the failure audits are covered in FCS_TLSC_EXT and FCS_TLSS_EXT.
trusted channel.
FTD:
Termination of the Initiation of Syslog over TLS (Lina) sessions:
trusted channel. <date> <time> <host> %FTD-6-725001: Starting SSL handshake with server
diagnostic:172.16.16.192/48829 to 172.16.16.91/6514 for TLS session
Termination of Syslog over TLS (Lina) sessions:
Failure of the trusted <date> <time> <host> EDT: %FTD-6-725007: SSL session with server
channel functions. outside:192.168.144.221/65429 to 192.168.144.46/6514 terminated
Initiation of Syslog over TLS (FTDOS) sessions:
Identification of the <date> <time> <host> %FTD-6-725007: SSL session with server
initiator and target of diagnostic:172.16.16.192/28049 to 172.16.16.91/6514 terminated
failed trusted Termination of Syslog over TLS (FTDOS) sessions:
<date> <time> <host> syslog-ng[59256]: syslog-ng shutting down; version='3.6.2'
channels
Initiation of IPSec sessions:
establishment
<date> <time> <host> EDT: %FTD-7-302015: Built inbound UDP connection 547 for
attempt outside:192.168.144.46/4500 (192.168.144.46/4500) to identity:192.168.144.221/4500
(192.168.144.221/4500)
Termination of IPSec sessions:
<date> <time> <host> EDT: %FTD-7-302016: Teardown UDP connection 547 for
outside:192.168.144.46/4500 to identity:192.168.144.221/4500 duration 0:00:05 bytes 3020
FMC:
Initiation/Establishment of Syslog over TLS sessions:
<date> <time> <host> syslog-ng[4946]: Syslog connection established; fd='17',
server='AF_INET(10.6.16.46:6514)', local='AF_INET(0.0.0.0:0)'
Termination of Syslog over TLS sessions:
<date> <time> <host> syslog-ng[4946]: Syslog connection broken; fd='17',
server='AF_INET(10.6.16.46:6514)', time_reopen='60'
FTP_TRP.1/Admin Initiation of the FTD, FMC FTD:
trusted path. Covered in FCS_SSHS_EXT.1, FIA_UIA_EXT.1, FTA_SSL.4
Failures of the
trusted path
functions.
FAU_GEN.1/IPS[IPS] See entries for FMC, FTD See entries for FMT_SMF.1/IPS[IPS], IPS_ABD_EXT.1[IPS],
FMT_SMF.1/IPS[IPS], IPS_IPB_EXT.1[IPS], IPS_NTA_EXT.1[IPS] and IPS_SBD_EXT.1[IPS]
IPS_ABD_EXT.1[IPS],
IPS_IPB_EXT.1[IPS],
IPS_NTA_EXT.1[IPS]
and
IPS_SBD_EXT.1[IPS]
FMT_SMF[IPS] Modification of an FMC <date> <time> <host> ActionQueueScrape.pl: <host>: <user>@<ip>, Intrusion Policy > <policy>>
IPS policy element. rule_configs, Changed BO_SERVER_TRAFFIC_DETECT (105:3) to "Generate events" (from "Drop
and generate events")
IPS_ABD_EXT.1[IPS] Inspected traffic FTD <date> <time> <host> SFIMS : %FTD-5-430001: Protocol: <proto>, SrcIP: <ip>, DstIP: <ip>,
matches an anomaly- SrcPort: <port>, DstPort: <port>, Priority: <pri>, GID: <gid>, SID: <sid>, Revision: <rev>,
based IPS policy. Message: \"<message>\", Classification: <class>, User: <user>, ACPolicy: <access-control-policy>,
NAPPolicy: <network-analysis-policy>, InlineResult: <allowed|blocked>
IPS_IPB_EXT.1[IPS] Inspected traffic FTD <date> <time> <host> %FTD-7-430002: DeviceUUID: 1d492c4c-cb33-11e9-95d4-
matches a list of de72c62116a8, AccessControlRuleAction: Block, AccessControlRuleReason: IP Block, SrcIP:
known-good or 50.50.50.1, DstIP: 104.237.139.111, SrcPort: 1425, DstPort: 80, Protocol: tcp, IngressInterface:
known-bad outside, EgressInterface: inside, ACPolicy: IPB Configuration, Prefilter Policy: Default Prefilter
addresses applied to Policy_1, InitiatorPackets: 1, ResponderPackets: 0, InitiatorBytes: 54, ResponderBytes: 0,
an IPS policy. NAPPolicy: No Rules Active, SecIntMatchingIP: Source, IPReputationSICategory: BAD_SRC
IPS_NTA_EXT.1[IPS] Modification of FMC Modification of which policies are active on TOE interface:
which IPS policies <date> <time> <host> sfdccsm: FMCv-7.0.5-65: admin@172.16.16.81, Policies > Access Control >
are active on a TOE Access Control > Policy Editor, Save Policy ABD.1 Anomaly Detection - THROUGHPUT ;Assigned
interface. to device(s) - ftd4140,fp1140ftd,ftdv-encs ;UnAssigned from device(s) - ftdv-encs is unassigned
from policy Allow_All;ftd4140 is unassigned from policy Allow_All;fp1140ftd is unassigned from
Enabling/disabling a policy Allow_All;#000x0a#000x00
TOE interface with
Enabling/Disabling TOE interface with policy applied // Modification of active mode:
IPS policies applied.
<date> <time> <host> sfdccsm: FMCv-7.0.5-65: admin@172.16.16.81, Devices > Device
Management > NGFW Interfaces, Page View#000x0a#000x00
Modification of <date> <time> <host> sfdccsm: FMCv-7.0.5-65: admin@172.16.16.81, Devices > Device
which mode(s) Management > NGFW Interfaces, Save Policy fp1140#000x0a#000x00
is/are active on a
TOE interface.
IPS_SBD_EXT.1[IPS] Inspected traffic FTD <date> <time> <host> SFIMS : %FTD-5-430001: Protocol: <proto>, SrcIP: <ip>, DstIP: <ip>,
matches a signature- SrcPort: <port>, DstPort: <port>, Priority: <pri>, GID: <gid>, SID: <sid>, Revision: <rev>,
based IPS rule with Message: \"<message>\", Classification: <class>, User: <user>, ACPolicy: <access-control-policy>,
logging enabled. NAPPolicy: <network-analysis-policy>, InlineResult: <allowed|blocked>
FFW_RUL_EXT.1[FW] Application of rules FTD <date> <time> <host> %FTD-7-430002: AccessControlRuleAction: Block, SrcIP:
configured with the 2001:192:168:144::16, DstIP: 2001:10:1:1::1, ICMPType: Unknown, ICMPCode:
‘log’ operation Unknown, Protocol: ipv6-icmp, IngressInterface: outside, EgressInterface: inside,
EgressZone: SYSLOG, ACPolicy: FFW_RUL_EXT.1.1, AccessControlRuleName: 3,
Source and Prefilter Policy: Default Prefilter Policy_3, User: No Authentication Required,
destination InitiatorPackets: 0, ResponderPackets: 0, InitiatorBytes: 0, ResponderBytes: 0,
NAPPolicy: No Rules Active
addresses
Source and
<date> <time> <host> %FTD-7-430002: AccessControlRuleAction: Allow, SrcIP:
destination ports 2001:192:168:144::16, DstIP: 2001:10:1:2::1, ICMPType: Echo Request, ICMPCode: No
Transport Layer Code, Protocol: ipv6-icmp, IngressInterface: outside, EgressInterface: inside,
Protocol EgressZone: SYSLOG, ACPolicy: FFW_RUL_EXT.1.1, AccessControlRuleName: 4,
TOE Interface Prefilter Policy: Default Prefilter Policy_3, User: No Authentication Required, Client:
ICMP for IPv6 client, ApplicationProtocol: ICMP for IPv6, InitiatorPackets: 1,
ResponderPackets: 0, InitiatorBytes: 78, ResponderBytes: 0, NAPPolicy: Balanced
Security and Connectivity
FFW_RUL_EXT.2[FW] Dynamical definition FTD <date> <time> <host> %FTD-7-430002: AccessControlRuleAction: Allow, SrcIP: 192.168.144.16,
of rule DstIP: 10.6.8.15, SrcPort: 47328, DstPort: 21, Protocol: tcp, IngressInterface: outside,
EgressInterface: inside, EgressZone: SYSLOG, ACPolicy: FFW_RUL_EXT.2 (Testlab5 Target),
Establishment of a AccessControlRuleName: 1, Prefilter Policy: Default Prefilter Policy_2, User: No Authentication
session Required, InitiatorPackets: 2, ResponderPackets: 1, InitiatorBytes: 140, ResponderBytes: 74,
NAPPolicy: Balanced Security and Connectivity
FMT_SMF.1/FFW[FW] All management FMC <date> <time> <host>: <date> sfdccsm: <host>: admin19@10.6.16.90, Policies > Access Control
activities of TSF data > Access Control > Firewall Policy Editor, Save Policy FFW_RUL_EXT.1.6/1.7/1.10
(including creation,
modification and
deletion of firewall
rules).
Reproduced from the mod_vpngw_v1.1
FPF_RUL_EXT.1[VPN] Application of rules FTD <date> <time> <host> %FTD-7-430002: AccessControlRuleAction: Allow, SrcIP: 192.168.144.7,
configured with the DstIP: 10.10.7.1, SrcPort: 0, DstPort: 0, Protocol: pup, IngressInterface: outside, EgressInterface:
‘log’ operation inside, EgressZone: SYSLOG, ACPolicy: FPF_RUL_EXT.1.7, AccessControlRuleName: 1, Prefilter
Policy: Block_IP-in-IP, User: No Authentication Required, InitiatorPackets: 1, ResponderPackets:
0, InitiatorBytes: 34, ResponderBytes: 0, NAPPolicy: custom Allow All
FTD logging of firewall (Access Control Policy) events is disabled by default and can be configured
via FMC (Devices > Platform Settings) to do any of: log to the local buffer (check “Enable Logging”
on the “Logging Setup” tab, and add a logging destination of “Internal Buffer” on the “Logging
Destination” tab); transmit messages to a syslog server (add a server on the “Syslog Servers” tab,
and add a logging destination of “Syslog Servers” on the “Logging Destination” tab). Once the
logging setup as been configured as described above more configuration is required to generate
audit messages for traffic filtering events; to configure logging for Access Control Policy rules refer
to section 5.2.2 Access Control Rules of this guide. To send a copy of traffic filter events to FMC
(viewable via the Audit Log event viewer), enable “Event Viewer” in the “Logging” tab of the Access
Control Policy rule.
Examples of events for access control rules (viewable via System > Monitoring > Audit > Edit Search
> Connection Events, which is equivalent/redirects to Analysis > Connections > Events):
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
The list below describes the intrusion event information that can be viewed, searched, filtered, and
sorted by the system. In addition, basic contents such as date, time, and type can also be used to
filter and sort. Note only Administrators and Intrusion Admins have access to the intrusion events.
NOTE! Some fields in the table view of intrusion events are disabled by default. To enable a field for
the duration of your session, expand the search constraints, then click the column name under
Disabled Columns.
Samples of Intrusion Event (split into 3 parts)
The User ID for any known user logged in to the destination host.
Device
The managed Sensor where the access control policy was deployed.
Domain
The domain of the Sensor that detected the intrusion. This field is only present if you have
ever configured the Firepower Management Center for multitenancy.
Egress Interface
The egress interface of the packet that triggered the event. This interface column is not
populated for a passive interface.
Egress Security Zone
The egress security zone of the packet that triggered the event. This security zone field is
not populated in a passive deployment.
Email Attachments
The MIME attachment filename that was extracted from the MIME Content-Disposition
header. To display attachment file names, you must enable the SMTP preprocessor Log
MIME Attachment Names option. Multiple attachment filenames are supported.
Email Headers (search only)
The data that was extracted from the email header. To associate email headers with
intrusion events for SMTP traffic, you must enable the SMTP preprocessor Log Headers
option.
Generator
The component that generated the event.
HTTP Hostname
The hostname, if present, that was extracted from the HTTP request Host header. Note that
request packets do not always include the hostname.
To associate hostnames with intrusion events for HTTP client traffic, you must enable the
HTTP Inspect preprocessor Log Hostname option.
In table views, this column displays the first fifty characters of the extracted host name. You
can hover your pointer over the displayed portion of an abbreviated host name to display
the complete name, up to 256 bytes. You can also display the complete host name, up to 256
bytes, in the packet view.
HTTP Response Code
The HTTP status code sent in response to a client's HTTP request over the connection that
triggered the event.
HTTP URI
The raw URI, if present, associated with the HTTP request packet that triggered the
intrusion event. Note that request packets do not always include a URI.
To associate URIs with intrusion events for HTTP traffic, you must enable the HTTP Inspect
preprocessor Log URI option.
To see the associated HTTP URI in intrusion events triggered by HTTPresponses, you
should configure HTTP server ports in the Perform Stream Reassembly on Both Ports
option; note, however, that this increases resource demands for traffic reassembly.
This column displays the first fifty characters of the extracted URI. You can hover your
pointer over the displayed portion of an abbreviated URI to display the complete URI, up to
2048bytes. You can also display the complete URI, up to 2048 bytes, in the packet view.
Ingress Interface
The ingress interface of the packet that triggered the event. Only this interface column is
populated for a passive interface.
Ingress Security Zone
The ingress security zone of the packet that triggered the event. Only this security zone field
is populated in a passive deployment.
Inline Result
Actions
Intrusion Policy
The intrusion policy where the intrusion, preprocessor, or decoder rule that generated the
event was enabled.
Message
The explanatory text for the event. For rule-based intrusion events, the event message is
pulled from the rule.
Priority
The event priority as determined by the Cisco Talos Security Intelligence and Research
Group (Talos). The priority corresponds to either the value of the priority keyword or the
value for the classtype keyword.
For other intrusion events, the priority is determined by the decoder or preprocessor. Valid
values are high, medium, and low.
Protocol (search only)
The name or number of the transport protocol used in the connection.
Snort ID (search only)
Specify the Snort ID (SID) of the rule that generated the event or, optionally, specify the
combination Generator ID (GID) and SID of the rule, where the GID and SID are separated
with a colon (:) in the format GID:SID.
Source Country
The country of the sending host involved in the intrusion event.
Source IP
The IP address used by the sending host involved in the intrusion event.
Source Port / ICMP Type
The port number on the sending host. For ICMP traffic, where there is no port number, this
field displays the ICMP type.
Source User
The User ID for any known user logged in to the source host.
The intrusion events cannot be modified but they can be deleted by the Administrators or
Intrusion Admins who have restricted access. When the intrusion events storage is full, the
newest data will overwrite the oldest data.
The intrusion event database stores a maximum of 100,000 entries. When the number of
intrusion event entries greatly exceeds 100,000, the appliance overwrites the oldest records
from the database to reduce the number to 100,000.
NOTE! To change the maximum number of entries, go to System > Configuration > Database >
Intrusion Event Database > Maximum Intrusion Events
4. Enter the value you want to search for then click Search.
8. Set the Sort Priority and Field for each column. There are five columns to configure.
9. Click Save.
10. Go back to intrusion events via Analysis > Intrusions > Events.
Click on the switch workflow link and choose the workflow you created.
The communication between the FMC and FTD is protected by TLSv1.2. TLS provides
authentication, key exchange, encryption and integrity protection of all data transmitted between
the TOE components. TLS session resumption is not supported in case the TLS connection between
the TOE components is unintentionally broken. If connectivity is lost between FMC and FTD after
device registration each endpoint will automatically attempt to re-initiate connection to the other
until connectivity is restored, no administrative action is required other than resolving any
connectivity issues in the networks between the FMC and FTD. The current status of each device
can be viewed on the Device Management page (Devices > Device Management) where an icon
indicates the current status (error, critical, warning, normal/recovered, or disabled). Detailed
health conditions can be viewed on the Health Monitor page (System > Health > Monitor). The date
and time each FTD was last seen by FMC can be viewed for each device individually by checking the
Last Contacted timestamp under the status icon (Devices > Device Management > edit any device >
view the Device tab > view the Management section).
The same ciphersuites are used by the TLS client and TLS server during device registration as are
used during subsequent inter-device communications. The following ciphersuites are supported on
the client side of the TLS implementation –
• TLS_RSA_WITH_AES_128_CBC_SHA as defined in RFC 3268
• TLS_RSA_WITH_AES_256_CBC_SHA as defined in RFC 3268
• TLS_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5246
• TLS_RSA_WITH_AES_256_CBC_SHA256 as defined in RFC 5246
• TLS_RSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5288
• TLS_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5288
• TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA as defined in RFC 4492
• TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA as defined in RFC 4492
• TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5289
• TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5289
• TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5289
• TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 as defined in RFC 5289
• TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA as defined in RFC 4492
• TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA as defined in RFC 4492
• TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5289
• TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 as defined in RFC 5289
• TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5289
• TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5289
And the following ciphersuites on the server side –
• TLS_RSA_WITH_AES_128_CBC_SHA as defined in RFC 3268 (TLSv1.2 only)
• TLS_RSA_WITH_AES_256_CBC_SHA as defined in RFC 3268 (TLSv1.2 only)
• TLS_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5246 (TLSv1.2 only)
• TLS_RSA_WITH_AES_256_CBC_SHA256 as defined in RFC 5246 (TLSv1.2 only)
• TLS_RSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5288 (TLSv1.2 only)
• TLS_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5288 (TLSv1.2 only)
• TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA as defined in RFC 4492 (TLSv1.2 only)
• TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA as defined in RFC 4492 (TLSv1.2 only)
• TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5289 (TLSv1.2 only)
• TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5289 (TLSv1.2 only)
6. If you want to upload a private key, open the private key file and copy the entire block of
text, including the BEGIN RSA PRIVATE KEY and END RSA PRIVATE KEY lines. Paste this
text into the Private Key field.
7. Open any required intermediate certificates, copy the entire block of text for each, and
paste it into the Certificate Chain field.
8. Click Save.
Audit Record:
will have. On the FTD, use the command “configure user add <username> [basic | configure]”. To get
more CLI options, use the command “configure user ?”.
1. Login with Administrator Role.
2. Select System > Users.
3. Click Create User.
4. In the User Name field, type a name for the new user.
New user names must contain alphanumeric or hyphen characters with no spaces, and must be no
more than 32 characters.
5. Do NOT check the Use External Authentication Method checkbox.
6. In the Password and Confirm Password fields, type a password (up to 32 alphanumeric
characters). The following alphanumeric characters can be a part of the password - [“!”,
“@”, “#”, “$”, “%”, “^”, “&”, “*”, “(“, “)”, “ ” ‘ ` (double or single quote/apostrophe), + (plus), -
(minus), = (equal), , (comma), . (period), / (forward-slash), \ (back-slash), | (vertical-bar or
pipe), : (colon), ; (semi-colon), < > (less-than, greater-than inequality signs), [ ] (square-
brackets), { } (braces or curly-brackets ),^ (caret), _ (underscore), and ~ (tilde).
Note: Entering a password of more than 32 characters will result in the password
automatically being truncated to 32 characters.
Strong Password Composition:
The password must be at least eight alphanumeric characters of mixed case and must include at
least one numeric character and one special character. It cannot be a word that appears in a
dictionary or include consecutive repeating characters.
7. Set the Maximum Number of Failed Logins to 1 to 99 (recommended). The default
setting is 5.
Note: The account is locked if the maximum number of failed login attempts is exceeded,
however, lockout does not occur unless the operator attempting to log in performs one
more failed authentication over the configured maximum failed number of logins
8. Configure the user account password options. For example, set the Minimum Password
Length to 15. The default setting is 8 and the maximum allowable is 32.
9. If you are creating a local user through the web interface of a Device, you can assign the
level of Command-Line Interface Access for the user:
• Select None to disable access to the command line for the user.
• Select Basic to allow the user to log into the shell and to access a specific subset of
commands.
• Select Configuration to allow the user to log into the shell and use any command
line option, including expert mode if that is allowed on the appliance.
10. Check the Check Password Strength checkbox. By default, this is not selected.
WARNING! This is a recommended evaluated configuration setting.
11. Do NOT click on the Exempt from GUI Session Timeout checkbox.
12. Select the access roles to grant the user.
• “IPS Administrator” (or Administrator): Have all privileges and access.
• “IPS Analyst” (or Intrusion Admin): Have all access to intrusion policies and network
analysis privileges but cannot deploy policies
• Access Admin: Have all access to access control policies but cannot deploy policies
• Discovery Admin: Have all access to network discovery, application detection, and
correlation features but cannot deploy policies
• Security Analyst: Have all access to security event analysis feature
13. Click Save.
Audit Record:
action_source_ip : 10.128.120.150
action_destination_ip : Default Target IP
3. Click the edit icon ( ) next to the user you want to modify.
4. Modify the settings you choose and click Save.
5. To delete a user account, click the delete icon ( ) next to the user you want to delete.
6. Click OK to confirm.
7. The user account is deleted.
Audit Record:
Audit Record:
9 Only user with Administrator Role can change another user’s password.
Note that time settings are displayed on most pages on the FMC in local time using the time zone
you set on the Time Zone page (America/New York by default), but are stored on the appliance
itself using UTC time. In addition, the current time appears in UTC at the top of the Time
Synchronization page (local time is displayed in the Manual clock setting option, if enabled).
Audit Record:
2. Depending on whether you are configuring audit log streaming for a Firepower
Management Center or a managed Device:
• Management Center—Choose System > Configuration.
• Managed Device—Choose Devices > Platform Settings and create or edit a
Firepower or FTD policy.
3. Click Login Banner (FP) or Banner (FTD).
4. In the Custom Login Banner field, enter the login banner you want to use with this system
policy.
5. Click Save.
6. Click Deploy if you are configuring these settings for the managed Devices. Select the
Device(s) you want to deploy the setting to and click Deploy again.
Audit Record:
4. In the Browser Session Timeout (Minutes) and Shell Timeout (Minutes) fields, enter a
value from 1 – 1440 (24 hours) max. The timeout value is 1 minute plus the configured
value. The value of 0 will disable this feature.
WARNING! This is a required evaluated configuration setting and must NOT be disabled.
6. Click Save.
7. Click Deploy if you are configuring these settings for the managed Devices. Select the
Device(s) you want to deploy the setting to and click Deploy again.
Audit Record:
indicates a lack of storage space, remove unneeded update files and repeat the upload. If any other
reason for failure is indicated in the Upload Failed error message, re-download the update file from
software.cisco.com, and re-attempt the upload. If the upload (including image integrity
verification) is successful, the uploaded file will be listed on the Product Updates page. If uploads
continue to fail, contact Cisco TAC for assistance.
When stored update files are installed their integrity is verified again using RSA digital signature
verification; the FMC will re-verify integrity of FMC updates, and the FTD will verify integrity of FTD
updates.
The Product Updates page (System > Updates) shows the version of each update, as well as the
date and time it was generated. It also indicates whether a reboot is required as part of the update.
The currently running version of FMC is shown at the top of the Product Updates page. To see the
currently running version of each managed FTD, view the list of managed devices (Devices > Device
Management).
When administrator install or uninstall updates from a managed Device, the following capabilities
may be affected:
• Traffic inspection and connection logging
• Traffic flow including switching, routing, and related functionality
• Link state
WARNING! To ensure absolutely no packets pass through the appliance without inspection, please
disconnect the managed Devices from the network during the upgrade process. Once the process
has been completed and upgrade version has been verified, reconnect the managed Devices to the
network.
Therefore, upgrading and regular maintenance should be performed during off-peak hours only.
© 2023 Cisco Systems, Inc. All rights reserved. Page 100 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
• Administrator can use the FMC to obtain the update directly from the Cisco Support Site, if
your FMC has constant access to the Internet. This option is not supported for major
updates and is not allowed in the evaluated configuration.
• Administrator can manually download the update from the Cisco Support Site and then
upload it to the FMC. Choose this option if your FMC does not have access to the Internet or
if you are performing a major update.
1. Login with Administrator Role.
2. Upload the update to the FMC. You have two options, depending on the type of update and
whether your FMC has access to the Internet:
• For all except major updates, and if your FMC has access to the Internet, select
System > Updates, then click Download Updates to check for the latest updates on
the Cisco Support Site (https://software.cisco.com/).
• For major updates, or if your FMC does not have access to the Internet, you must
first manually download the update from the Cisco Support Site. Select System >
Updates, then click Upload Update. Browse to the update and click Upload.
The update is uploaded to the FMC.
WARNING! Make sure you have a valid Support account. The Cisco Support Site requires
authentication and is protected using HTTPS.
3. Make sure that the appliances in your deployment are successfully communicating and that
there are no issues being reported by the health monitor.
4. Select System > Updates.
5. Click the install icon ( ) next to the update you uploaded.
6. Select the FMC and click Install. If prompted, confirm that you want to install the update
and reboot the FMC.
7. After the update finishes, if necessary, log into the FMC.
8. Clear your browser cache and force a reload of the browser. Otherwise, the user interface
may exhibit unexpected behavior.
9. Select Help > About and confirm that the software version is listed correctly.
10. Re-deploy the access control policies.
© 2023 Cisco Systems, Inc. All rights reserved. Page 101 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
The update is uploaded to the FMC. The Product Updates tab shows the type of update you just
uploaded, its version number, and the date and time when it was generated. The page also indicates
whether a reboot is required as part of the update.
© 2023 Cisco Systems, Inc. All rights reserved. Page 102 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
7 Self-Tests
Cisco products perform a suite of FIPS 140-2 self-tests during power-up and re-boot. If any of the
self-test fails, the product will not enter operational state, and an error message indicating a self-
test failure will be displayed via the serial console CLI. If this occurs, please re-boot the appliance. If
the product still does not enter operational state, please contact Cisco Support (go to
https://www.cisco.com/go/offices and click Technical Support).
The self-testing includes cryptographic algorithm tests (known-answer tests) that feed pre-defined
data to cryptographic modules and confirm the resulting output from the modules match expected
values, and firmware integrity tests that verify the digital signature of the code image using RSA-
2048 with SHA-512.
The following possible errors that can occur during this self-test are:
• Known Answer Test (KAT) failures
• Zeroization Test failure
• Software integrity failure
The actual output of FIPS 140-2 self-tests can only be accessed using the shell access10 with root
permission. The status output is located in /var/log/openssl-selftest.log and is displayed below:
FIPS-mode test application
AES-NI Enabled: No
CiscoSSL FOM 7.3sp
10 Accessing the shell access with root access takes the products out of the evaluated configuration.
© 2023 Cisco Systems, Inc. All rights reserved. Page 103 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
© 2023 Cisco Systems, Inc. All rights reserved. Page 104 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
73f21b6209a7a3fb9527bf4df4f316f1ed170dd1e002b6c5cbe5a7bf9f3242d45dfbb5c97deb5f1a85a77a1e05c0d066b16c
83f466e11d42274006832ecff54b4a20c05f8ecc9b403c48c13ea097bdc2adf1279e49d784eada8df81758d63364aa7a8db
b1e8aaaa8d7747bc906131ca309434a54a02e82e97576fbead26e117fefb3fa5247af7585a83292865dca4e1eeb466bb748
c6f61a24697002c39139ddad8b1b60206e5ade282887273c96a27bc9523fe3c8cb4db3a8132e176816c17999c9d827dc5f
4a792c440261c8e77c0700dc4a4414ebc09f2c8cda728f39b18e291f3e235b295217a97e0718ff07c59cc49361ec09fa3a53
1cef7c45ce570d566bd0b8bbaf2fb464659f709a483cde64a29c61305ad2c3112dc539096357596dcde08567b750b48e57
bc40a567fc464149161281e3708c6e0aeb10a71a4030b6fd275d1d368ddc29b939c9eea4e8c87a3119c132ab43e5ce28da
41cde6d12aba66bc43a489134f7d23078b28dceef72cfe9e4ab941481d9c3fc22d95387b6b char buffer key before
overwriting:
4850f0a33aedd3af6e477f8302b10968
char buffer key after overwriting:
3ebe286315eedc05f99bc412b19ba1da
10. Zero-ization...
successful as expected
11. Complete DRBG health check...
DRBG AES-128-CTR DF test started
DRBG AES-128-CTR DF test OK
DRBG AES-192-CTR DF test started
DRBG AES-192-CTR DF test OK
DRBG AES-256-CTR DF test started
DRBG AES-256-CTR DF test OK
DRBG AES-128-CTR test started
DRBG AES-128-CTR test OK
DRBG AES-192-CTR test started
DRBG AES-192-CTR test OK
DRBG AES-256-CTR test started
DRBG AES-256-CTR test OK
DRBG SHA1 test started
DRBG SHA1 test OK
DRBG SHA224 test started
DRBG SHA224 test OK
DRBG SHA256 test started
DRBG SHA256 test OK
DRBG SHA384 test started
DRBG SHA384 test OK
DRBG SHA512 test started
DRBG SHA512 test OK
DRBG HMAC-SHA1 test started
DRBG HMAC-SHA1 test OK
DRBG HMAC-SHA224 test started
DRBG HMAC-SHA224 test OK
DRBG HMAC-SHA256 test started
DRBG HMAC-SHA256 test OK
DRBG HMAC-SHA384 test started
DRBG HMAC-SHA384 test OK
DRBG HMAC-SHA512 test started
DRBG HMAC-SHA512 test OK
successful as expected
© 2023 Cisco Systems, Inc. All rights reserved. Page 105 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
© 2023 Cisco Systems, Inc. All rights reserved. Page 106 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
© 2023 Cisco Systems, Inc. All rights reserved. Page 107 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
© 2023 Cisco Systems, Inc. All rights reserved. Page 108 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
© 2023 Cisco Systems, Inc. All rights reserved. Page 109 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
© 2023 Cisco Systems, Inc. All rights reserved. Page 110 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
© 2023 Cisco Systems, Inc. All rights reserved. Page 111 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
© 2023 Cisco Systems, Inc. All rights reserved. Page 112 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
POST started
KDF-SSH test failure induced
KDF-SSH test failed as expected
POST Failed
Testing induced failure of KDF_SNMP test
POST started
KDF-SNMP test failure induced
KDF-SNMP test failed as expected
POST Failed
Testing induced failure of KDF_SRTP test
POST started
KDF-SRTP test failure induced
KDF-SRTP test failed as expected
POST Failed
Testing induced failure of KDF_TLS test
POST started
KDF-TLS test failure induced
KDF-TLS test failed as expected
POST Failed
Testing induced failure of KDF_TLS13 test
POST started
KDF-TLS13 test failure induced
KDF-TLS13 test failed as expected
POST Failed
Testing induced failure of KDF_IKEV2 test
POST started
KDF-IKEV2 test failure induced
KDF-IKEV2 test failed as expected
POST Failed
Testing induced failure of PBKDF test
POST started
PBKDF test failure induced
PBKDF test failed as expected
POST Failed
Testing induced failure of TWO-STEP HKDF test
POST started
TWO-STEP HKDF test failure induced
TWO-STEP HKDF test failed as expected
POST Failed
Testing induced failure of ONE-STEP HKDF test
POST started
ONE-STEP HKDF test failure induced
ONE-STEP HKDF test failed as expected
POST Failed
Testing induced failure of KTS-IFC test
POST started
© 2023 Cisco Systems, Inc. All rights reserved. Page 113 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
© 2023 Cisco Systems, Inc. All rights reserved. Page 114 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
© 2023 Cisco Systems, Inc. All rights reserved. Page 115 of 116
Cisco FTD 7.0 Preparative Procedures & Operational User Guide for Common Criteria
© 2023 Cisco Systems, Inc. All rights reserved. Page 116 of 116