Management Center Admin 74
Management Center Admin 74
Management Center Admin 74
4
First Published: 2023-09-07
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2023 Cisco Systems, Inc. All rights reserved.
CONTENTS
IP Address Conventions 26
Additional Resources 26
User Accounts 27
System User Interfaces 29
Web Interface Considerations 30
Session Timeout 30
Logging Into the Secure Firewall Management Center Web Interface 31
Logging Into the Management Center Web Interface Using SSO 32
Logging Into the Secure Firewall Management Center with CAC Credentials 33
Logging Into the Management Center Command Line Interface 33
View Your Last Login 34
Logging Out of the Management Center Web Interface 35
History for Logging into the Management Center 35
Database 53
Configuring Database Event Limits 54
Database Event Limits 54
Email Notification 56
Configuring a Mail Relay Host and Notification Address 57
External Database Access 57
Enabling External Access to the Database 58
HTTPS Certificates 59
Default HTTPS Server Certificates 59
Custom HTTPS Server Certificates 59
HTTPS Server Certificate Requirements 59
HTTPS Client Certificates 61
Viewing the Current HTTPS Server Certificate 61
Generating an HTTPS Server Certificate Signing Request 62
Importing HTTPS Server Certificates 63
Requiring Valid HTTPS Client Certificates 64
Renewing the Default HTTPS Server Certificate 65
Information 66
Intrusion Policy Preferences 67
Language 67
Set the Language for the Web Interface 67
Login Banner 68
Customize the Login Banner 68
Management Interfaces 68
About Management Center Management Interfaces 68
About Device Management 68
The Management Connection 69
Management Interfaces on the Management Center 70
Time Synchronization 94
Synchronize Time on the Management Center with an NTP Server 94
Synchronize Time Without Access to a Network NTP Server 96
About Changing Time Synchronization Settings 97
UCAPL/CC Compliance 97
User Configuration 97
Set Password Reuse Limit 98
Track Successful Logins 99
Enabling Temporary Lockouts 99
Set Maximum Number of Concurrent Sessions 100
VMware Tools 100
Enabling VMware Tools on the Secure Firewall Management Center for VMware 101
Vulnerability Mapping 101
Mapping Vulnerabilities for Servers 101
Web Analytics 102
History for System Configuration 102
Configure the Management Center Service Provider Application for Okta 137
Configure the Management Center for Okta SSO 139
Configure User Role Mapping for Okta at the Management Center 140
Configure User Role Mapping at the Okta IdP 141
Okta User Role Mapping Examples 143
Configure Single Sign-On with OneLogin 148
Review the OneLogin Subdomain 149
Configure the Management Center Service Provider Application for OneLogin 149
Configure the Management Center for OneLogin SSO 151
Configure User Role Mapping for OneLogin at the Management Center 152
Configure User Role Mapping at the OneLogin IdP 153
OneLogin User Role Mapping Examples 156
Configure Single Sign-On with Azure AD 160
Review the Azure Tenant 161
Configure the Management Center Service Provider Application for Azure 161
Configure the Management Center for Azure SSO 163
Configure User Role Mapping for Azure at the Management Center 164
Configure User Role Mapping at the Azure IdP 165
Azure User Role Mapping Examples 168
Configure Single Sign-On with PingID 173
Review the PingID PingOne for Customers Environment 174
Configure the Management Center Service Provider Application for PingID PingOne for
Customers 174
Configure the Management Center for SSO with PingID PingOne for Customers 176
Configure Single Sign-On with Any SAML 2.0-Compliant SSO Provider 177
Familiarize Yourself with the SSO Identity Provider and the SSO Federation 178
Configure Management Center Service Provider Application for Any SAML 2.0-Compliant SSO
Provider 178
Configure the Management Center for SSO Using Any SAML 2.0-Compliant SSO Provider 180
Configure User Role Mapping at the Management Center for SAML 2.0-Compliant SSO
Providers 181
Configure Management Center User Role Mapping at the IdP for SAML 2.0-Compliant SSO
Providers 182
Customize User Roles for the Web Interface 183
Create Custom User Roles 183
Deactivate User Roles 185
Enable User Role Escalation 186
Set the Escalation Target Role 186
Configure a Custom User Role for Escalation 187
Escalate Your User Role 187
Troubleshooting LDAP Authentication Connections 188
Configure User Preferences 190
Changing Your Password 190
Changing an Expired Password 190
Change the Web Interface Appearance 191
Specifying Your Home Page 191
Configuring Event View Settings 192
Event View Preferences 192
File Download Preferences 193
Default Time Windows 194
Default Workflows 195
Setting Your Default Time Zone 196
Specifying Your Default Dashboard 196
History for User Accounts 197
Advanced Troubleshooting for the Secure Firewall Threat Defense Device 416
Using the Threat Defense Diagnostic CLI from the Web Interface 416
Packet Tracer Overview 417
Use the Packet Tracer 418
Packet Capture Overview 420
Use the Capture Trace 422
Feature-Specific Troubleshooting 424
Note If you have a CDO-managed device, and are using the on-prem management center for analytics only, then
the on-prem management center does not support policy configuration or upgrading. Some chapters and
procedures in this guide related might not apply to devices whose primary manager is CDO.
For the management center used as the primary manager: The management center is not compatible with other
managers because the management center owns the threat defense configuration, and you are not allowed to
configure the threat defense directly, bypassing the management center.
• Quick Start: Basic Setup, on page 2
• Threat Defense Devices, on page 6
• Features, on page 6
• Search the Management Center, on page 10
• Switching Domains on the Secure Firewall Management Center, on page 20
• The Context Menu, on page 21
• Sharing Data with Cisco, on page 23
• Online Help, How To, and Documentation, on page 23
• IP Address Conventions, on page 26
• Additional Resources, on page 26
Install and perform initial setup on all physical appliances using the documentation for your appliance:
• Management Center
• Cisco Firepower Management Center Getting Started Guide for your hardware model, available
from
http://www.cisco.com/go/firepower-mc-install
Procedure
Step 1 Determine the supported virtual platforms you will use for the Management Center and devices (these may
not be the same). See the Cisco Firepower Compatibility Guide.
Step 2 Deploy virtual Firepower Management Centers using the documentation for your environment:
• management center virtual running on VMware: Cisco Secure Firewall Management Center Virtual
Getting Started Guide
• management center virtual running on AWS: Cisco Secure Firewall Management Center Virtual Getting
Started Guide
• management center virtual running on KVM: Cisco Secure Firewall Management Center Virtual Getting
Started Guide
Step 3 Deploy virtual devices using the documentation for your appliance:
• threat defense virtual running on VMware: Cisco Secure Firewall Threat Defense Virtual for VMware
Getting Started Guide
• threat defense virtual running on AWS: Cisco Secure Firewall Threat Defense Virtual for AWS Getting
Started Guide
• threat defense virtual running on KVM: Cisco Secure Firewall Threat Defense Virtual for KVM Getting
Started Guide
• threat defense virtual running on Azure: Cisco Secure Firewall Threat Defense Virtual for Azure Getting
Started Guide
Values for these settings can be viewed and changed through the management center web interface; see
Modify Management Center Management Interfaces, on page 75 and Time Synchronization, on page
94 for more information.
• As a part of initial configuration, the system schedules weekly GeoDB updates. We recommend you
review this task and adjust if necessary, as described in Schedule GeoDB Updates, on page 214.
• As a part of initial configuration, the system schedules weekly downloads of newly available upgrades,
as well as of the latest VDB. We recommend you review this task and adjust if necessary, as described
in Automating Software Downloads, on page 469.
Important This task downloads updates only. It is your responsibility to install any updates
this task downloads.
• As a part of initial configuration, the system schedules weekly configuration-only management center
backups (locally stored). We recommend you review this task and adjust if necessary, as described in
Schedule Management Center Backups, on page 461.
• As a part of initial configuration, the system downloads and installs the latest VDB. To keep the system
up to date, we recommend you schedule recurring updates as described in Vulnerability Database Update
Automation, on page 472.
• As a part of initial configuration, the system schedules daily intrusion rule updates. We recommend you
review this task and adjust if necessary, as described in Schedule Intrusion Rule Updates, on page 217.
On completion of management center initial configuration, the web interface displays the device management
page, described in Cisco Secure Firewall Management Center Device Configuration Guide.
(This is the default login page only for the first time the admin user logs in. On subsequent logins by the
admin or any user, the default login page is determined as described in Specifying Your Home Page, on page
191.)
Once you have completed the initial configuration, begin controlling and analyzing traffic by configuring
basic policies as described in Setting Up Basic Policies and Configurations, on page 4.
Note This is not a full discussion of policy or feature capabilities. For guidance on other features and more advanced
configurations, see the rest of this guide.
Procedure
Step 1 Set a time zone for this account as described in Setting Your Default Time Zone, on page 196.
Step 2 If needed, add licenses as described in Licenses, on page 235.
Step 3 Add managed devices to your deployment as described in Add a Device to the Management Center in the
Cisco Secure Firewall Management Center Device Configuration Guide.
Step 4 Configure your managed devices as described in:
• Interface Overview in the Cisco Secure Firewall Management Center Device Configuration Guide, to
configure transparent or routed mode on Firepower Threat Defense devices
• Interface Overview in the Cisco Secure Firewall Management Center Device Configuration Guide, to
configure interfaces on threat defense devices
Step 5 Configure an access control policy as described in Creating a Basic Access Control Policy in the Cisco Secure
Firewall Management Center Device Configuration Guide.
• In most cases, Cisco suggests setting the Balanced Security and Connectivity intrusion policy as your
default action. For more information, see Access Control Policy Default Action and System-Provided
Network Analysis and Intrusion Policies in the Cisco Secure Firewall Management Center Device
Configuration Guide.
• In most cases, Cisco suggests enabling connection logging to meet the security and compliance needs
of your organization. Consider the traffic on your network when deciding which connections to log so
that you do not clutter your displays or overwhelm your system. For more information, see About
Connection Logging, on page 691.
Step 6 Apply the system-provided default health policy as described in Applying Health Policies, on page 347.
Step 7 Customize a few of your system configuration settings:
• If you want to allow inbound connections for a service (for example, SNMP or the syslog), modify the
ports in the access list as described in Configure an Access List, on page 41.
• Understand and consider editing your database event limits as described in Configuring Database Event
Limits, on page 54.
• If you want to change the display language, edit the language setting as described in Set the Language
for the Web Interface, on page 67.
• If your organization restricts network access using a proxy server, edit your proxy settings as described
in Modify Management Center Management Interfaces, on page 75.
Step 8 Customize your network discovery policy as described in Configuring the Network Discovery Policy in the
Cisco Secure Firewall Management Center Device Configuration Guide. By default, the network discovery
policy analyzes all traffic on your network. In most cases, Cisco suggests restricting discovery to the addresses
in RFC 1918.
Step 9 Consider customizing these other common settings:
• If you want to customize the default values for system variables, understand their use as described in
Variable Sets in the Cisco Secure Firewall Management Center Device Configuration Guide.
• If you want to create additional locally authenticated user accounts to access the management center, see
Add an Internal User, on page 113.
• If you want to use LDAP or RADIUS external authentication to allow access to the management center,
see Configure External Authentication for the Management Center, on page 116.
Step 10 Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
What to do next
• Review and consider configuring other features described in Features, on page 6 and the rest of this
guide.
Compatibility
For details on manager-device compatibility, including the software compatible with specific device models,
virtual hosting environments, operating systems, and so on, see the Cisco Secure Firewall Threat Defense
Release Notes and Cisco Firepower Compatibility Guide.
Features
These tables list some commonly used features.
Monitor the health of system hardware Health monitoring policy About Health Monitoring, on
and software page 335
Back up data on your appliance Backup and restore Backup/Restore, on page 427
Baseline your physical appliance Restore to factory defaults The Cisco Firepower
(reimage) Management Center Upgrade
Guide, Version 6.0–7.0, for a list
of links to instructions on
performing fresh installations.
Update the VDB, intrusion rule updates, Vulnerability Database (VDB) Updates, on page 209
or GeoDB on your appliance updates, intrusion rule updates,
or Geolocation Database
(GeoDB) updates
Apply licenses in order to take advantage Smart licensing About Licenses, on page 235
of license-controlled functionality
Ensure continuity of appliance operations Managed device high About Firepower Threat Defense
availability and/or management High Availability in the Cisco
center high availability Secure Firewall Management
Center Device Configuration
Guide
About Management Center High
Availability, on page 283
Configure packet switching between two Device switching Configure Bridge Group
or more networks Interfaces in the Cisco Secure
Firewall Management Center
Device Configuration Guide
Establish a secure tunnel between Site-to-Site virtual private VPN Overview in the Cisco
managed threat defense devices network (VPN) Secure Firewall Management
Center Device Configuration
Guide
Establish secure tunnels between remote Remote Access VPN VPN Overview in the Cisco
users and managed threat defense devices Secure Firewall Management
Center Device Configuration
Guide
Segment user access to managed devices, Multitenancy using domains Introduction to Multitenancy
configurations, and events Using Domains, on page 199
View and manage appliance REST API and REST API REST API Preferences, on page
configuration using a REST API client Explorer 80
Firepower REST API Quick
Start Guide
Block or monitor connections to or from Security Intelligence within your About Security Intelligence in
IP addresses, URLs, and/or domain access control policy the Cisco Secure Firewall
names Management Center Device
Configuration Guide
Control the websites that users on your URL filtering within your policy URL Filtering in the Cisco
network can access rules Secure Firewall Management
Center Device Configuration
Guide
Block encrypted traffic without SSL policy SSL Policies Overview in the
inspection Cisco Secure Firewall
Management Center Device
Inspect encrypted or decrypted traffic
Configuration Guide
Tailor deep inspection to encapsulated Prefilter policy About Prefiltering in the Cisco
traffic and improve performance with Secure Firewall Management
fastpathing Center Device Configuration
Guide
Rate limit network traffic that is allowed Quality of Service (QoS) policy About QoS Policies in the Cisco
or trusted by access control Secure Firewall Management
Center Device Configuration
Guide
Allow or block files (including malware) File/malware policy Network Malware Protection
on your network and File Policies in the Cisco
Secure Firewall Management
Center Device Configuration
Guide
Operationalize data from threat Cisco Threat Intelligence Secure Firewall threat
intelligence sources Director (TID) intelligence director Overview
in the Cisco Secure Firewall
Management Center Device
Configuration Guide
Configure passive or active user User awareness, user identity, About User Identity Sources in
authentication to perform user awareness identity policies the Cisco Secure Firewall
and user control Management Center Device
Configuration Guide
About Identity Policies in the
Cisco Secure Firewall
Management Center Device
Configuration Guide
Collect host, application, and user data Network Discovery policies Network Discovery Policies in
from traffic on your network to perform the Cisco Secure Firewall
user awareness Management Center Device
Configuration Guide
Use tools beyond your Firepower system Integration with external tools Event Analysis Using External
to collect and analyze data about network Tools, on page 589
traffic and potential threats
Stream event data from a management eStreamer integration eStreamer Server Streaming, on
center to a custom-developed client page 614
application
Firepower System eStreamer
Integration Guide
Query database tables on a management External database access External Database Access, on
center using a third-party client page 57
Firepower System Database
Access Guide
Augment discovery data by importing Host input Host Input Data in the Cisco
data from third-party sources Secure Firewall Management
Center Device Configuration
Guide
Firepower System Host Input
API Guide
Investigate events using external event Integration with external event Event Analysis Using External
data storage tools and other data analysis tools Tools, on page 589
resources
Note This feature is supported in Light and Dusk themes only. To change the theme, see Change the Web Interface
Appearance, on page 191.
You can search the management center configuration for the following entities:
• Names of web interface pages in top-level menus. (See Search for Web Interface Menu Options, on page
14.)
• For certain policy types:
• Policy names
• Policy descriptions
• Rule names
• Rule comments
1 The user has chosen to search child domains 2 A matching network object ExampleHostOne
(SubDomainA) as well as the current domain defined in the parent domain Global is displayed
(Domain1) and its ancestor (Global). with the domain name, and the External Domain
( ) icon indicating the user must switch domains
to edit details.
3 The matching network object ExampleHostThree 4 The matching network object ExampleHostThree
defined in the child domain SubDomainA is is currently selected, and information is provided
displayed with the domain name, and the
in the right pane. The External Domain ( )
External Domain ( ) icon indicating the user icon indicates that when the user clicks Edit ( ),
must switch domains to edit details. This object the system will prompt the user to confirm a
is currently selected. domain change before allowing edit access to the
object.
5 The matching network object ExampleHostTwo, 6 The matching access control policy
defined in the current domain, is displayed with ExampleACPolicyOne defined in the parent
the object value, and with the Current Domain domain Global is displayed with the domain
( ) icon indicating the user may edit this object name, and the External Domain ( ) icon
without switching domains. indicating the user must switch domains to edit
details.
7 The matching access control policy 8 The matching access control policy
ExampleACPolicyThree defined in the child ExampleACPolicyTwo defined in the current
domain SubDomainA is displayed with the domain is displayed with the Current Domain
domain name, and the External Domain ( ) ( ) icon indicating the user may edit details
icon indicating the user must switch domains to without switching domains.
edit details.
Procedure
• In the menu bar at the top of the management center web interface, click Search ( ).
• With focus outside of a text box, type / (forward slash).
Step 2 Enter one or more letters of the name of the menu option you seek. Search results appear below the text box
and update as you type; you do not need to press Enter to execute the search.
Step 3 Search results appear grouped by category. To go to a page listed under Navigation, click the menu path in
the search results list.
DNS Policy
SSL Policy
Identity Policy
Network Discovery
Application Detector
Correlation Policy
VPN category
• Dynamic Access Policy
• Site To Site
• Remote Access
Global search returns polices whose names match the search term, as well as access control policies using
rules whose name or comments match the search term. If you see an access control policy in the search result
list whose name does not match the search, the match was made on the name or comments for a rule configured
within the policy.
Important Global search returns the top results for your search expression determined by its relevance to the most
commonly used configuration entities in the management center. Your search term may exist in policy types
that are not in scope for this search feature. For a full description of the global search feature and alternative
search methods, see Search the Management Center.
Procedure
• In the menu bar at the top of the management center web interface, click Search ( ).
• With focus outside of a text box, type / (forward slash).
Step 2 Enter a search expression in the search text box. Search results appear below the text box and update as you
type; you do not need to press Enter to execute the search.
Step 3 (Optional) In a multidomain deployment, if your current domain has descendant domains, you can toggle
Include child domains in search results to see policies in those descendant domains.
Step 4 Search results appear grouped by category. In a multidomain deployment, within the Policies category the
search results are grouped by the domains within which found policies are defined. Under the Policies category
you can do the following:
To: Do this:
View search results for a single policy type. Click the policy type in the search results, such as
Access Control Policy.
View details about a policy. Click the policy name in the search results list to view
the details pane and display the General tab.
View the Access Control policies that reference Click the name of the Intrusion or Network Analysis
Intrusion and Network Analysis policies. policy in the search results to view the details pane
and display the Usages tab.
Open the policy configuration page for a policy in a Click the policy name in the search results, and in the
separate browser window. details pane click Edit ( ).
In a multidomain deployment, if you choose to edit a
policy not defined within your current domain the
system will prompt you to change your current
domain.
FlexConfig category
AS Path
• FlexConfig Object
Community List category
• Text Object
• Extended Community
PKI category
DNS Server Group
• External Cert Groups
External Attributes Category
• External Certs
• Dynamic Object
• Internal CA Groups
• Security Group Tag
• Internal CAs
Geolocation • Internal Cert Groups
Network (includes Network, Host, Range, FQDN, Network Group) • DNS Lists and Feeds
Port (objects and groups, TCP, UDP, ICMP, ICMP6, other) Variable Set
Route Map
SLA Monitor
Time Range
Time Zone
Tunnel Zone
VPN category
• Certificate Map
• Group Policy
• IKEv1 IPsec Proposal
• IKEv1 Policy
• IKEv2 IPSec Proposal
• IKEv2 Policy
Global search returns objects whose names or description match the search term, as well as objects with
configured values that match the search term. If you see an object in the search result list whose name does
not match the search, the match was made on the description or a configured value within the object.
Important Global search returns the top results for your search expression determined by its relevance to the most
commonly used configuration entities in the management center. Your search term may exist in object types
that are not in scope for this search feature. For a full description of the global search feature and alternative
search methods, see Search the Management Center.
Object searches can be particularly useful when you need to locate network information within your deployment.
You can search for the following in object names, descriptions, or configured values:
• IPv4 and IPv6 address information, including the following formats:
• Full addresses (For example, 194.164.0.23, 2001:0db8:85a3:0000:0000:8a2e:0370:7334.)
• Partial addresses (For example, 194.164, 2001:db8.)
• Port information:
• Port numbers (For example, 22 or 80.)
• Protocols. (For example, https or ssh.)
Procedure
• In the menu bar at the top of the management center web interface, click Search ( ).
• With focus outside of a text box, type / (forward slash).
Step 2 Enter a search expression in the search text box. Search results appear below the text box and update as you
type; you do not need to press Enter to execute the search.
If your search expression is found in objects defined in domains other than your current default domain, the
search results display the names of the domains within which those objects reside. If your search expression
is found in objects defined within your current domain, the search results display the object values.
Step 3 (Optional) In a multidomain deployment, if your current domain has descendant domains, you can toggle
Include child domains in search results to see objects in those descendant domains.
Step 4 Search results appear divided by category. In a multidomain deployment, within the Objects category the
search results are grouped by the domains within which found objects are defined. Under the Objects category
you can do the following:
To: Do this:
View search results for a single object type. Click on the object type in the search results, such as
Network.
View details about an object in the search results. Click the object name in the search results to view the
details pane and display the General tab.
To: Do this:
View a list of polices or objects that use an object in Click the object name in the search results to view the
the search results. details pane and display the Usages tab.
Note Global Search does not provide usage
information for all object types.
Open the object configuration page for an object in a Click the object name in the search results, and in the
separate browser window. details pane click Edit ( ).
In a multidomain deployment, if you choose to edit
an object not defined within your current domain the
system will prompt you to change your current
domain.
Procedure
• In the menu bar at the top of the management center web interface, click Search ( ).
• With focus outside of a text box, type / (forward slash).
Step 2 Enter a search term associated with a task for which you would like to see a walkthrough. Search results
appear below the text box and update as you type; you do not need to press Enter to execute the search.
Step 3 Search results appear grouped by category. To view a walkthrough listed under How-Tos, click the walkthrough
title in the search results list. For more information on How To walkthroughs, see Online Help, How To, and
Documentation, on page 23.
domains and assign different privileges for that user in each domain. For example, you can assign a user
read-only privileges in the Global domain, but Administrator privileges in a descendant domain.
Users associated with multiple domains can switch between domains within the same web interface session.
Under your user name in the toolbar, the system displays a tree of available domains. The tree:
• Displays ancestor domains, but may disable access to them based on the privileges assigned to your user
account.
• Hides any other domain your user account cannot access, including sibling and descendant domains.
Procedure
From the drop-down list under your user name, choose the domain you want to access.
On pages or locations that do not support the context menu, the normal context menu for your browser appears.
Policy Editors
Many policy editors contain hotspots over each rule. You can insert new rules and categories; cut, copy,
and paste rules; set the rule state; and edit the rule.
Intrusion Rules Editor
The intrusion rules editor contains hotspots over each intrusion rule. You can edit the rule, set the rule
state, configure thresholding and suppression options, and view rule documentation. Optionally, after
clicking Rule documentation in the context menu, you can click Rule Documentation in the
documentation pop-up window to view more-specific rule details.
Event Viewer
Event pages (the drill-down pages and table views available under the Analysis menu) contain hotspots
over each event, IP address, URL, DNS query, and certain files’ SHA-256 hash values. While viewing
most event types, you can:
• View related information in the Context Explorer.
• Drill down into event information in a new window.
• View the full text in places where an event field contains text too long to fully display in the event
view, such as a file’s SHA-256 hash value, a vulnerability description, or a URL.
• Open a web browser window with detailed information about the element from an external source,
using the Contextual Cross-Launch feature. For more information, see Event Investigation Using
Web-Based Resources, on page 598.
While viewing connection events, you can add items to the default Security Intelligence Block and Do
Not Block lists:
• An IP address, from an IP address hotspot.
• A URL or domain name, from a URL hotspot.
• A DNS query, from a DNS query hotspot.
While viewing captured files, file events, and malware events, you can:
• Add a file to or remove a file from the clean list or custom detection list.
• Download a copy of the file.
• View nested files inside an archive file.
• Download the parent archive file for a nested file.
• View the file composition.
• Submit the file for local malware and dynamic analysis.
While viewing intrusion events, you can perform similar tasks to those in the intrusion rules editor or an
intrusion policy:
• Edit the triggering rule.
• Set the rule state, including disabling the rule.
• Configure thresholding and suppression options.
• View rule documentation. Optionally, after clicking Rule documentation in the context menu,
you can click Rule Documentation in the documentation pop-up window to view more-specific
rule details.
Dashboard
Many dashboard widgets contain hotspots to view related information in the Context Explorer. Dashboard
widgets can also contain IP address and SHA-256 hash value hotspots.
Context Explorer
The Context Explorer contains hotspots over its charts, tables, and graphs. If you want to examine data
from graphs or lists in more detail than the Context Explorer allows, you can drill down to the table views
of the relevant data. You can also view related host, user, application, file, and intrusion rule information.
The Context Explorer uses a left-click context menu, which also contains filtering and other options
unique to the Context Explorer.
How To is a widget that provides walkthroughs to navigate through tasks on management center. The
walkthroughs guide you to perform the steps required to achieve a task by taking you through each step, one
after the other irrespective of the various UI screens that you may have to navigate, to complete the task. The
How To widget is enabled by default. To disable the widget, choose User Preferences from the drop-down
list under your user name, and uncheck the Enable How-Tos check box in How-To Settings. To open the
walkthroughs, choose Help > How-Tos.
Note The walkthroughs are generally available for all UI pages, and are not user role sensitive. However, depending
on the privileges of the user, some of the menu items will not appear on the management center interface.
Thereby, the walkthroughs will not execute on such pages.
• Configure Date and Time: This walkthrough guides you to configure the date and time of the threat
defense devices using a platform settings policy.
• Configure Interface Settings: This walkthrough guides you to configure the interfaces on the threat
defense devices.
• Create an Access Control Policy: An access control policy consists of a set of ordered rules, which are
evaluated from top to bottom. This walkthrough guides you to create an access control policy.
• Add an Access Control Rule - A Feature Walkthrough: This walkthrough describes the components of
an access control rule, and how you can use them in management center.
• Configure Routing Settings: Various routing protocols are supported by threat defense. A static route
defines where to send traffic for specific destination networks. This walkthrough guides you to configure
static routing for the devices.
• Create a NAT Policy - A Feature Walkthrough: This walkthrough guides you to create a NAT policy
and walks you through the various features of a NAT rule.
You can find additional documentation using the documentation roadmap: http://www.cisco.com/c/en/us/td/
docs/security/firepower/roadmap/firepower-roadmap.html.
Note Some of the linked documents are not applicable to Secure Firewall Management Center deployments. For
example, some links on Secure Firewall Threat Defense pages are specific to deployments managed by Secure
Firewall device manager, and some links on hardware pages are unrelated to management center. To avoid
confusion, pay careful attention to document titles. Also, some documents cover multiple products and therefore
may appear on multiple product pages.
Secure Firewall Threat Defense, also called NGFW (Next Generation Firewall) devices
• Secure Firewall Threat Defense software:
http://www.cisco.com/c/en/us/support/security/firepower-ngfw/tsd-products-support-series-home.html
IP Address Conventions
You can use IPv4 Classless Inter-Domain Routing (CIDR) notation and the similar IPv6 prefix length notation
to define address blocks in many places in the system.
When you use CIDR or prefix length notation to specify a block of IP addresses, the system uses only the
portion of the network IP address specified by the mask or prefix length. For example, if you type 10.1.2.3/8,
the system uses 10.0.0.0/8.
In other words, although Cisco recommends the standard method of using a network IP address on the bit
boundary when using CIDR or prefix length notation, the system does not require it.
Additional Resources
The Firewalls Community is an exhaustive repository of reference material that complements our extensive
documentation. This includes links to 3D models of our hardware, hardware configuration selector, product
collateral, configuration examples, troubleshooting tech notes, training videos, lab and Cisco Live sessions,
social media channels, Cisco Blogs and all the documentation published by the Technical Publications team.
Some of the individuals posting to community sites or video sharing sites, including the moderators, work
for Cisco Systems. Opinions expressed on those sites and in any corresponding comments are the personal
opinions of the original authors, not of Cisco. The content is provided for informational purposes only and is
not meant to be an endorsement or representation by Cisco or any other party.
Note Some of the videos, technical notes, and reference material in the Firewalls Community points to older versions
of the management center. Your version of the management center and the version referenced in the videos
or technical notes might have differences in the user interface that cause the procedures not to be identical.
User Accounts
You must provide a username and password to obtain local access to the web interface or CLI on management
center or a managed device. On managed devices, CLI users with Config level access can use the expert
command to access the Linux shell. On the management center, all CLI users can use the expert command.
The threat defense and management center can be configured to use external authentication, storing user
credentials on an external LDAP or RADIUS server; you can withhold or provide CLI access rights to external
users. The management center can be configured to support Single Sign-On (SSO) using any SSO provider
conforming to the Security Assertion Markup Language (SAML) 2.0 open standard for authentication and
authorization.
The management center CLI provides a single admin user who has access to all commands. The features
management center web interface users can access are controlled by the privileges an administrator grants to
the user account. On managed devices, the features that users can access for both the CLI and the web interface
are controlled by the privileges an administrator grants to the user account.
Note The system audits user activity based on user accounts; make sure that users log into the system with the
correct account.
Caution All management center CLI users and, on managed devices, users with Config level CLI access can obtain
root privileges in the Linux shell, which can present a security risk. For system security reasons, we strongly
recommend:
• If you establish external authentication, make sure that you restrict the list of users with CLI access
appropriately.
• When granting CLI access privileges on managed devices, restrict the list of internal users with Config
level CLI access.
• Do not establish Linux shell users; use only the pre-defined admin user and users created by the admin
user within the CLI.
Caution We strongly recommend that you do not use the Linux shell unless directed by Cisco TAC or explicit
instructions in the Firepower user documentation.
Different appliances support different types of user accounts, each with different capabilities.
Caution For system security reasons, Cisco strongly recommends that you not establish additional Linux shell users
on any appliance.
Secure Firewall Threat Defense and Secure Firewall Threat Defense Virtual Devices
Secure Firewall Threat Defense and Secure Firewall Threat Defense Virtual devices support the following
user account types:
• A pre-defined adminaccount which can be used for all forms of access to the device.
• Custom user accounts, which admin users and users with Config access can create and manage.
The Secure Firewall Threat Defense supports external authentication for SSH users.
Note On all appliances, after a user makes three consecutive failed attempts to log into the CLI via SSH, the system
terminates the SSH connection.
Secure Firewall Management • Supported for predefined • Supported for predefined • Supported for predefined
Center admin user and custom admin user and custom admin user.
user accounts. external user accounts.
• Must be accessed via
• Can be used for • Accessible using an SSH, expert command from the
administrative, serial, or keyboard and Secure Firewall
management, and analysis monitor connection. Management Center CLI.
tasks.
• Should be used only for • Accessible using an SSH,
administration and serial, or keyboard and
troubleshooting directed by monitor connection.
Cisco TAC.
• Should be used only for
administration and
troubleshooting directed by
Cisco TAC or by explicit
instructions in the
management center
documentation.
Secure Firewall Threat Defense — • Supported for predefined • Supported for predefined
admin user and custom admin user and custom
Secure Firewall Threat Defense
user accounts. user accounts.
Virtual
• Accessible in physical • Accessible by CLI users
devices using an SSH, with Config access using
serial, or keyboard and the expert command.
monitor connection.
Accessible in virtual • Should be used only for
devices via SSH or VM administration and
console. troubleshooting directed by
Cisco TAC or by explicit
• Can be used for setup and instructions in the
troubleshooting directed by management center
Cisco TAC. documentation..
Related Topics
Add an Internal User, on page 113
Related Topics
Specifying Your Home Page, on page 191
Session Timeout
By default, the system automatically logs you out of a session after 1 hour of inactivity, unless you are otherwise
configured to be exempt from session timeout.
Note For SSO users, when the management center session times out, the display briefly redirects to the IdP interface,
and then the management center login page. Unless the SSO session has been terminated from elsewhere,
anyone can access the management center without providing login credentials simply by clicking on the Single
Sign-On link on the login page. To ensure management center security and prevent others from accessing
the management center using your SSO account, we recommend you not leave a management center login
session unattended, and log out of the SSO federation at the IdP when you log out of the management center.
Users with the Administrator role can change the session timeout interval for an appliance via the following
settings:
System > Configuration > Shell Timeout
Related Topics
Configure Session Timeouts, on page 92
Configure SAML Single Sign-On, on page 132
Note This task applies to internal users and external users authenticated by LDAP or RADIUS servers. For SSO
login, see Logging Into the Management Center Web Interface Using SSO, on page 32.
Users are restricted to a single active session. If you try to log in with a user account that already has an active
session, the system prompts you to terminate the other session or log in as a different user.
In a NAT environment where multiple management centers share the same IP address:
• Each management center can support only one login session at a time.
• To access different management centers, use a different browser for each login (for example Firefox and
Chrome), or set the browser to incognito or private mode.
Procedure
Step 1 Direct your browser to https://ipaddress_or_hostname/, where ipaddress or hostname corresponds to your
management center.
Step 2 In the Username and Password fields, enter your user name and password. Pay attention to the following
guidelines:
• User names are not case-sensitive.
• In a multidomain deployment, prepend the user name with the domain where your user account was
created. You are not required to prepend any ancestor domains. For example, if your user account was
created in SubdomainB, which has an ancestor DomainA, enter your user name in the following format:
SubdomainB\username
• If your organization uses SecurID® tokens when logging in, append the token to your SecurID PIN and
use that as your password to log in. For example, if your PIN is 1111 and the SecurID token is 222222,
enter 1111222222. You must have already generated your SecurID PIN before you can log into the system.
Related Topics
Session Timeout, on page 30
Note The management center does not support logging in with CAC credentials for SSO accounts.
Users are restricted to a single active session. If you try to log in with a user account that already has an active
session, the system prompts you to terminate the other session or log in as a different user.
In a NAT environment where multiple management centers share the same IP address:
• Each management center can support only one login session at a time.
• To access different management centers, use a different browser for each login (for example Firefox and
Chrome), or set the browser to incognito or private mode.
Procedure
Step 1 Direct your browser to https://ipaddress_or_hostname/, where ipaddress or hostname corresponds to your
management center.
Note SSO users must consistently access the management center using the login URL specifically
configured for SSO access; ask your administrator for this information.
Related Topics
Session Timeout, on page 30
Configure SAML Single Sign-On, on page 132
Caution Do not remove a CAC during an active browsing session. If you remove or replace a CAC during a session,
your web browser terminates the session and the system logs you out of the web interface.
Procedure
Related Topics
Configure Common Access Card Authentication with LDAP, on page 131
Session Timeout, on page 30
SSO Guidelines for the Management Center, on page 133
Caution We strongly recommend that you do not use the Linux shell unless directed by Cisco TAC or explicit
instructions in the management center documentation.
Note For all appliances, after a user makes three consecutive failed attempts to log into the CLI via SSH, the system
terminates the SSH connection.
Procedure
Step 1 Use the admin user name and password to connect to the management center via SSH or the console port.
If your organization uses SecurID® tokens when logging in, append the token to your SecurID PIN and use
that as your password to log in. For example, if your PIN is 1111 and the SecurID token is 222222, enter
1111222222. You must have already generated your SecurID PIN before you can log in.
Procedure
Note If you are logging out of an SSO session at the management center, when you log out the system redirects
your browser to the SSO IdP for your organization. To ensure management center security and prevent others
from accessing the management center using your SSO account, we recommend you log out of the SSO
federation at the IdP.
Procedure
Step 1 From the drop-down list under your user name, choose Logout.
Step 2 If you are logging out of an SSO session at the management center, the system redirects you to the SSO IdP
for your organization. Log out at the IdP to ensure management center security.
Related Topics
Session Timeout, on page 30
Added support for Single 6.7 Added the ability for users configured at any third-party SAML 2.0-compliant identity provider
Sign-On (SSO) using any (IdP) to log into the management center using a new Single Sign-On link on the login page.
SAML 2.0-compliant
New/Modified screen:
SSO provider.
Login screen
View information about 6.5 View the date, time, and IP address from which you last logged in.
the last time you signed
New/Modified menus:
in to the Secure Firewall
Management Center The menu at the top right of the window that shows the username that you used to log in.
Supported platforms: management center
Automatic CLI access for 6.5 When you use SSH to log into the management center, you automatically access the CLI. Although
the management center strongly discouraged, you can then use the CLI expert command to access the Linux shell.
Note This feature deprecates the Version 6.3 ability to enable and disable CLI access for
the management center. As a consequence of deprecating this option, the virtual
management center no longer displays the System > Configuration > Console
Configuration page, which still appears on physical management centers.
Limit number of SSH 6.3 When a user accesses any device via SSH and fails three successive login attempts, the device
login failures terminates the SSH session.
Supported Domains
Global
User Roles
Admin
Procedure
Access List
You can limit access to the management center by IP address and port. By default, the following ports are
enabled for any IP address:
• 443 (HTTPS) for web interface access.
• 22 (SSH) for CLI access.
You can also add access to poll for SNMP information over port 161. Because SNMP is disabled by default,
you must first enable SNMP before you can add SNMP access rules. For more information, see Configure
SNMP Polling, on page 91.
Caution By default, access is not restricted. To operate in a more secure environment, consider adding access for
specific IP addresses and then deleting the default any option.
Caution If you delete access for the IP address that you are currently using to connect to the management center, and
there is no entry for “IP=any port=443”, you will lose access when you save.
Procedure
Related Topics
IP Address Conventions, on page 26
Object Optimization
When you deploy rule policies to a firewall device, you can configure the management center to evaluate and
optimize the network/host policy objects that you use in the rules when it creates the associated network object
groups on the device. Optimization merges adjacent networks and removes redundant network entries. This
reduces the runtime access list data structures and the size of the configuration, which can be beneficial to
some firewall devices that are memory-constrained.
For example, consider a network/host object that contains the following entries and that is used in an access
rule:
192.168.1.0/24
192.168.1.23
10.1.1.0
10.1.1.1
10.1.1.2/31
When optimization is enabled, when you deploy the policy, the resulting object group configuration is generated:
object-group network test
description (Optimized by management center)
network-object 10.1.1.0 255.255.255.252
network-object 192.168.1.0 255.255.255.0
This optimization does not change the definition of the network/host object, nor does it create a new
network/host policy object. If a network object-group contains another network, host object, or object-groups,
the objects are not combined. Instead, each network object-group is optimized separately. Also, only inline
values of network object-groups are being modified as part of the optimization process during a deployment.
Important The optimizations occur on the managed device on the first deploy after the feature is enabled on the
management center (including if it is enabled by an upgrade). If you have a high number of rules, the system
can take several minutes to an hour to evaluate your policies and perform object optimization. During this
time, you may also see higher CPU use on your devices. A similar thing occurs on the first deploy after the
feature is disabled. After this feature is enabled or disabled, we recommend you deploy when it will have the
least impact, such as a maintenance window or a low-traffic time.
This feature is enabled by default for reimaged and upgraded management centers. To disable it, contact Cisco
TAC.
Audit Log
The management center records user activity in read-only audit logs. You can review audit log data in several
ways:
• Use the web interface: Audit and Syslog, on page 381.
Audit logs are presented in a standard event view where you can view, sort, and filter audit log messages
based on any item in the audit view. You can easily delete and report on audit information and you can
view detailed reports of the changes that users make.
• Stream audit log messages to the syslog: Stream Audit Logs to Syslog, on page 43..
• Stream audit log messages to an HTTP server: Stream Audit Logs to an HTTP Server, on page 45.
Streaming audit log data to an external server allows you to conserve space on the management center. Note
that sending audit information to an external URL may affect system performance.
Optionally, you can secure the channel for audit log streaming, enable TLS and mutual authentication using
TLS certificates ; see Audit Log Certificate, on page 46.
Streaming to Multiple Syslog Servers
You can stream audit log data to a maximum of five syslog servers. However, if you have enabled TLS for
secured audit log streaming, you can stream only to a single syslog server.
Streaming Configuration Changes to Syslog
You can stream configuration changes as part of audit log data to syslog by specifying the configuration data
format and the hosts. The management center supports backup and restore of the audit configuration log. In
case of high availability, only the active management center sends the configuration changes syslog to the
external syslog servers. The log file is synchronized between the HA pairs so that during a failover or
switchover, the new active management center would resume sending the change logs. In case the HA pair
is working in split-brain mode, both management centers in the pair sends the config change syslog to the
external servers.
Where the local date, time, and originating hostname precede the bracketed optional tag, and the sending
device name precedes the audit log message.
For example, if you specify a tag of FMC-AUDIT-LOG for audit log messages from your management center, a
sample audit log message from your management center could appear as follows:
Mar 01 14:45:24 localhost [FMC-AUDIT-LOG] Dev-MC7000: [email protected], Operations > Monitoring,
Page View
If you specify a severity and facility, these values do not appear in syslog messages; instead, they tell the
system that receives the syslog messages how to categorize them.
Threat Defense Feature History:
• 7.4—Stream configuration changes as part of audit log data to external syslog servers.
Procedure
Option Description
Send To include configuration changes syslog in the audit log streaming, from the drop-down,
Configuration select the relevant options:
Changes
• JSON—the syslog includes detailed differences in the configuration changes.
• API—the syslog includes API to retrieve the detailed differences in the configuration
changes.
• None—to have all other audit logs except details of the configuration changes.
Host The IP address or the fully qualified name of the syslog server to which you will send
audit logs. You can add a maximum of five syslog hosts, seperated by commas.
Note You can specify multiple syslog hosts, only when TLS is disabled for the
Audit Server Certificate.
Step 5 (Optional) To test whether the IP address of the syslog servers are valid, click Test Syslog Server.
The system sends the following packets to verify whether the syslog server is reachable:
a. ICMP echo request
b. TCP SYN on 443 and 80 ports
c. ICMP time stamp query
d. TCP SYN on random ports
Note If the Management Center and syslog server are in the same subnet, ARP is used instead of ICMP.
Where the local date, time, and originating hostname precede the bracketed optional tag, and the sending
appliance name precedes the audit log message.
For example, if you specify a tag of FROMMC, a sample audit log message could appear as follows:
Mar 01 14:45:24 localhost [FROMMC] Dev-MC7000: [email protected], Operations > Monitoring,
Page View
Procedure
Caution To allow encrypted posts, use an HTTPS URL. Sending audit information to an external URL
may affect system performance.
Procedure
Step 1 Obtain and install a signed client certificate on the management center:
a) Obtain a Signed Audit Log Client Certificate for the Management Center, on page 47:
Generate a Certificate Signing Request (CSR) from the management center based on your system
information and the identification information you supply.
Submit the CSR to a recognized, trusted certificate authority (CA) to request a signed client certificate.
If you will require mutual authentication between the management center and the audit log server, the
client certificate must be signed by the same CA that signed the server certificate to be used for the
connection.
b) After you receive the signed certificate from the certificate authority, import it into the management center.
See Import an Audit Log Client Certificate into the Management Center, on page 48.
Step 2 Configure the communication channel with the server to use Transport Layer Security (TLS) and enable
mutual authentication.
See Require Valid Audit Log Server Certificates, on page 49.
Step 3 Configure audit log streaming if you have not yet done so.
See Stream Audit Logs to Syslog, on page 43 or Stream Audit Logs to an HTTP Server, on page 45.
Obtain a Signed Audit Log Client Certificate for the Management Center
Important The Audit Log Certificate page is not available on a standby management center in a high availability setup.
You cannot perform this task from a standby management center.
The system generates certificate request keys in Base-64 encoded PEM format.
Procedure
Step 12 Copy the entire block of text in the certificate request, including the BEGIN CERTIFICATE REQUEST and END
CERTIFICATE REQUEST lines, and paste it into a blank text file.
Step 13 Save the file as clientname.csr, where clientname is the name of the appliance where you plan to use the
certificate.
Step 14 Click Close.
What to do next
• Submit the certificate signing request to the certificate authority that you selected using the guidelines
in the "Before You Begin" section of this procedure.
• When you receive the signed certificate, import it to the appliance; see Import an Audit Log Client
Certificate into the Management Center, on page 48.
Procedure
Note If you choose to verify certificates using CRLs, the system uses the same CRLs to validate both audit log
server certificates and certificates used to secure the HTTP connection between an appliance and a web
browser.
Important You cannot perform this procedure on the standby management center in a high availablity pair.
Procedure
Step 4 If you do not want the client to authenticate itself against the server, but accept the server certificate when the
certificate is issued by the same CA (not recommended):
a) Deselect Enable Mutual Authentication.
Important Ensure that the server is configured to trust the client without verifying any client certificates.
Step 5 (Optional) To enable client certificate verification by the audit log server, select Enable Mutual
Authentication.
Important The Enable Mutual Authentication option is applicable only when TLS is enabled.
When mutual authentication is enabled, the syslog client (management center) sends a client certificate to the
syslog server for verification. The client uses the same CA certificate of the CA who signed the server certificate
of the syslog server. The connection succeeds only if client certificate verification is successful. For this
verification process, the following conditions must be met:
• Configure the syslog server to verify the certificate received from the client.
• Add a client certificate to be sent to the syslog server. This certificate must be signed by the same CA
who signed the server certificate of the syslog server.
Note To use mutual authentication for streaming Audit Log to the Syslog server, use PKCS#8 format
for the private key instead of PKCS#1 format. Use the following command line to convert PKCS#1
keys to PKCS#8 format:
openssl pkcs8 -topk8 -inform PEM -outform PEM
-nocrypt -in PKCS1 key file name -out PKCS8 key filename
Step 6 (Optional) To automatically recognize server certificates that are no longer valid:
a) Select Enable Fetching of CRL.
Important This option is displayed only when you select the Enable Mutual Authentication check
box. However, the Enable Fetching of CRL option is applicable only when the TLS option
is enabled. The use of CRL is for server certification verification, and it is not dependant on
the use of Mutual Authentication which is for enabling client certificate verification.
Enabling fetching of the CRL creates a scheduled task for the client to regularly update (download) the
CRL or CRLs. The CRL(s) are used for server certificate verification, where, the verification fails if there
is a CRL from the CA specifying that the server certificate being verified has been revoked by the CA.
b) Enter a valid URL to an existing CRL file and click Add CRL.
Repeat to add up to 25 CRLs.
c) Click Refresh CRL to load the current CRL or CRLs from the specified URL or URLs.
Step 7 Verify that you have a valid server certificate generated by the same certificate authority that created the client
certificate.
Step 8 Click Save.
What to do next
(Optional) Set the frequency of CRL updates. See Configuring Certificate Revocation List Downloads, on
page 463.
Procedure
Change Reconciliation
To monitor the changes that users make and ensure that they follow your organization’s preferred standard,
you can configure the system to send, via email, a detailed report of changes made over the past 24 hours.
Whenever a user saves changes to the system configuration, a snapshot is taken of the changes. The change
reconciliation report combines information from these snapshots to present a clear summary of recent system
changes.
The following sample graphic displays a User section of an example change reconciliation report and lists
both the previous value for each configuration and the value after changes. When users make multiple changes
to the same configuration, the report lists summaries of each distinct change in chronological order, beginning
with the most recent.
You can view changes made during the previous 24 hours.
Procedure
Step 6 If you want to include policy changes, check the Include Policy Configuration check box.
Step 7 If you want to include all changes over the past 24 hours, check the Show Full Change History check box.
Step 8 Click Save.
Related Topics
Using the Audit Log to Examine Changes, on page 385
Note The change reconciliation report does not include changes to threat defense interfaces and routing settings.
DNS Cache
You can configure the system to resolve IP addresses automatically on the event view pages. You can also
configure basic properties for DNS caching performed by the appliance. Configuring DNS caching allows
you to identify IP addresses you previously resolved without performing additional lookups. This can reduce
the amount of traffic on your network and speed the display of event pages when IP address resolution is
enabled.
Procedure
Step 4 In the DNS Cache Timeout (in minutes) field, enter the number of minutes a DNS entry remains cached in
memory before it is removed for inactivity.
The default setting is 300 minutes (five hours).
Related Topics
Configuring Event View Settings, on page 192
Dashboard
Dashboards provide you with at-a-glance views of current system status through the use of widgets: small,
self-contained components that provide insight into different aspects of the system. The system is delivered
with several predefined dashboard widgets.
You can configure the management center so that Custom Analysis widgets are enabled on the dashboard.
Related Topics
About Dashboards, on page 315
Procedure
Related Topics
About Dashboards, on page 315
Database
To manage disk space, the management center periodically prunes the oldest intrusion events, audit records,
Security Intelligence data, and URL filtering data from the event database. For each event type, you can
specify how many records the management center retains after pruning; never rely on the event database
containing more records of any type than the retention limit configured for that type. To improve performance,
tailor the event limits to the number of events you regularly work with. You can optionally choose to receive
email notifications when pruning occurs. For some event types, you can disable storage.
To manually delete individual events, use the event viewer. (Note that in Versions 6.6.0+, you cannot manually
delete connection or security Intelligence events in this way.)You can also manually purge the database; see
Data Purge and Storage, on page 487.
Procedure
Step 4 Optionally, in the Data Pruning Notification Address field, enter the email address where you want to
receive pruning notifications.
Step 5 Click Save.
Email Notification
Configure a mail host if you plan to:
• Email event-based reports
• Email status reports for scheduled tasks
• Email change reconciliation reports
• Email data-pruning notifications
• Use email for discovery event, impact flag, correlation event alerting, intrusion event alerting, and health
event alerting
When you configure email notification, you can select an encryption method for the communication between
the system and mail relay host, and can supply authentication credentials for the mail server if needed. After
configuring, you can test the connection.
Step 6 In the From Address field, enter the valid email address you want to use as the source email address for
messages sent by the appliance.
Step 7 Optionally, to supply a user name and password when connecting to the mail server, choose Use
Authentication. Enter a user name in the Username field. Enter a password in the Password field.
Step 8 To send a test email using the configured mail server, click Test Mail Server Settings.
A message appears next to the button indicating the success or failure of the test.
• any other reporting application (including a custom application) that supports JDBC SSL connections
• the Cisco-provided command-line Java application called RunQuery, which you can either run interactively
or use to obtain comma-separated results for a single query
Use the management center's system configuration to enable database access and create an access list that
allows selected hosts to query the database. Note that this access list does not also control appliance access.
You can also download a package that contains the following:
• RunQuery, the Cisco-provided database query tool
• InstallCert, a tool that you can use to retrieve and accept the SSL certificate from the management center
that you want to access
• the JDBC driver you must use to connect to the database
See the Firepower System Database Access Guide for information on using the tools in the package you
downloaded to configure database access.
Step 5 Next to Client JDBC Driver, click Download and follow your browser’s prompts to download the client.zip
package.
Step 6 To add database access for one or more IP addresses, click Add Hosts. An IP Address field appears in the
Access List field.
Step 7 In the IP Address field, enter an IP address or address range, or any.
Step 8 Click Add.
Step 9 Click Save.
Tip If you want to revert to the last saved database settings, click Refresh.
Related Topics
IP Address Conventions, on page 26
HTTPS Certificates
Secure Sockets Layer (SSL)/TLS certificates enable management centers to establish an encrypted channel
between the system and a web browser. A default certificate is included with all Firepower devices, but it is
not generated by a certificate authority (CA) trusted by any globally known CA. For this reason, consider
replacing it with a custom certificate signed by a globally known or internally trusted CA.
Caution The management center supports 4096-bit HTTPS certificates. If the certificate used by the management
center was generated using a public server key larger than 4096 bits, you will not be able to log in to the
management center web interface. If this happens, contact Cisco TAC.
Note HTTPS certificates are not supported on the management center REST API.
On the management center, you can renew the default certificate on the System ( ) > Configuration >
HTTPS Certificate page.
Subject Public Key Info Public key and an identifier for its algorithm. See RFC
5280, section 4.1.2.7.
Extended Key Usage extension Indicates one or more purposes for which the certified
public key may be used, in addition to or in place of
the basic purposes indicated in the Key Usage
extension. See RFC 5280, section 4.2.1.12. Be certain
you import certificates that can be used as server
certificates.
To verify client browser certificates, configure the system to use the online certificate status protocol (OCSP)
or load one or more certificate revocation lists (CRLs). Using the OCSP, when the web server receives a
connection request it communicates with the certificate authority to confirm the client certificate's validity
before establishing the connection. If you configure the server to load one or more CRLs, the web server
compares the client certificate against those listed in the CRLs. If a user selects a certificate that is listed in a
CRL as a revoked certificate, the browser cannot load the web interface.
Note If you choose to verify certificates using CRLs, the system uses the same CRLs to validate both client browser
certificates and audit log server certificates.
Procedure
Step 4 Enter a country code in the Country Name (two-letter code) field.
Step 5 Enter a state or province postal abbreviation in the State or Province field.
Step 6 Enter a Locality or City.
Step 7 Enter an Organization name.
Step 8 Enter an Organizational Unit (Department) name.
Step 9 Enter the fully qualified domain name of the server for which you want to request a certificate in the Common
Name field.
Note Enter the fully qualified domain name of the server exactly as it should appear in the certificate
in the Common Name field. If the common name and the DNS hostname do not match, you
receive a warning when connecting to the appliance.
Step 10 To request a certificate that secures multiple domain names or IP addresses, enter the folowing information
in the Subject Alternative Name section:
a) Domain Names: Enter the fully qualified domains and subdomains (if any) secured by the Subject
Alternative Name.
b) IP Addresses: Enter the IP addresses secured by the Subject Alternative Name.
Step 11 Click Generate.
Step 12 Open a text editor.
Step 13 Copy the entire block of text in the certificate request, including the BEGIN CERTIFICATE REQUEST and END
CERTIFICATE REQUEST lines, and paste it into a blank text file.
Step 14 Save the file as servername.csr, where servername is the name of the server where you plan to use the
certificate.
Step 15 Click Close.
What to do next
• Submit the certificate request to the certificate authority.
• When you receive the signed certificate, import it to the management center; see Importing HTTPS
Server Certificates, on page 63.
Caution The management center supports 4096-bit HTTPS certificates. If the certificate used by the management
center was generated using a public server key larger than 4096 bits, you will not be able to log in to the
Secure Firewall Management Center web interface. For more information about updating HTTPS Certificates
to Version 6.0.0, see "Update Management Center HTTPS Certificates to Version 6.0" in Firepower System
Release Notes, Version 6.0. If you generate or import an HTTPS Certificate and cannot log in to the management
center web interface, contact Support.
Procedure
Step 4 Open the server certificate in a text editor, copy the entire block of text, including the BEGIN CERTIFICATE
and END CERTIFICATE lines. Paste this text into the Server Certificate field.
Step 5 Whether you must supply a Private Key depends on how you generated the Certificate Signing Request:
• If you generated the Certificate Signing Request using the Secure Firewall Management Center web
interface (as described in Generating an HTTPS Server Certificate Signing Request, on page 62), the
system already has the private key and you need not enter one here.
• If you generated the Certificate Signing Request using some other means, you must supply the private
key here. Open the private key file and copy the entire block of text, include the BEGIN RSA PRIVATE
KEY and END RSA PRIVATE KEY lines. Paste this text into the Private Key field.
Step 6 Open any required intermediate certificates, copy the entire block of text for each, and paste it into the
Certificate Chain field. If you received a root certificate, paste it here. If you received an intermediate
certificate, paste it below the root certificate. In both cases, copy the entire block of text, including the BEGIN
CERTIFICATE and END CERTIFICATE lines.
Step 7 Click Save.
Note To access the web interface after enabling client certificates, you must have a valid client certificate present
in your browser (or a CAC inserted in your reader).
Procedure
Step 5 Enter a valid URL to an existing CRL file and click Add CRL. Repeat to add up to 25 CRLs.
Step 6 Click Refresh CRL to load the current CRL or CRLs from the specified URL or URLs.
Note Enabling fetching of the CRL creates a scheduled task to regularly update the CRL or CRLs. Edit
the task to set the frequency of the update.
Step 7 Verify that the client certificate is signed by the certificate authority loaded onto the appliance and the server
certificate is signed by a certificate authority loaded in the browser certificate store. (These should be the same
certificate authority.)
Caution Saving a configuration with enabled client certificates, with no valid client certificate in your
browser certificate store, disables all web server access to the appliance. Make sure that you have
a valid client certificate installed before saving settings.
Related Topics
Configuring Certificate Revocation List Downloads, on page 463
Procedure
Step 3 Click Renew HTTPS Certificate. (This option appears on the display below the certificate information only
if your system is configured to used the default HTTPS server certificate.)
Step 4 (Optional) In the Renew HTTPS Certificate dialog box, select Generate New Key to generate a new key
for the certificate.
Step 5 In the Renew HTTPS Certificate dialog box, click Save.
What to do next
You can confirm that the certificate has been renewed by checking that that certificate validity dates displayed
on the HTTPS Certificate page have updated.
Information
The System > Configuration page of the web interface includes the information listed in the table below.
Unless otherwise noted, all fields are read-only.
Note See also the Help > About page, which includes similar but slightly different information.
Field Description
Software Version The version of the software currently installed on the appliance.
Operating System Version The version of the operating system currently running on the appliance.
IPv4 Address The IPv4 address of the default (eth0) management interface. If IPv4 management
is disabled, this field indicates that.
IPv6 Address The IPv6 address of the default (eth0) management interface. If IPv6 management
is disabled, this field indicates that.
Current Policies The system-level policies currently deployed. If a policy has been updated since
it was last deployed, the name of the policy appears in italics.
Field Description
Model Number The appliance-specific model number stored on the internal flash drive. This
number may be important for troubleshooting.
Language
You can use the Language page to specify a different language for the web interface.
Procedure
Login Banner
You can use the Login Banner page to specify session, login, or custom message banners for a security
appliance or shared policy.
You can use ASCII characters and carriage returns to create a custom login banner. The system does not
preserve tab spacing. If your login banner is too large or causes errors, Telnet or SSH sessions can fail when
the system attempts to display the banner.
Management Interfaces
After setup, you can change the management network settings, including adding more management interfaces,
hostname, search domains, DNS servers, and HTTP proxy on the management center.
• configure policies for all your devices from a single location, making it easier to change configurations
• install various types of software updates on devices
• push health policies to your managed devices and monitor their health status from the management center
Note If you have a CDO-managed device, and are using the on-prem management center for analytics only, then
the on-prem management center does not support policy configuration or upgrading. Chapters and procedures
in this guide related to device configuration and other unsupported features do not apply to devices whose
primary manager is CDO.
The management center aggregates and correlates intrusion events, network discovery information, and device
performance data, allowing you to monitor the information that your devices are reporting in relation to one
another, and to assess the overall activity occurring on your network.
You can use the management center to manage nearly every aspect of a device’s behavior.
Note Although the management center can manage devices running certain previous releases as specified in the
compatibility matrix available at http://www.cisco.com/c/en/us/support/security/defense-center/
products-device-support-tables-list.html, new features that require the latest version of threat defense software
are not available to these previous-release devices. Some management center features may be available for
earlier versions.
Initiation always originates with eth0 on the management center or with the lowest-numbered management
interface on the device. Additional management interfaces are tried if the connection is not established. Multiple
management interfaces on the management center let you connect to discrete networks or to segregate
management and event traffic. However, the initiator does not choose the best interface based on the routing
table.
Note The management connection is a secure, SSL-encrypted communication channel between itself and the device.
You do not need to run this traffic over an additional encrypted tunnel such as Site-to-Site VPN for security
purposes. If the VPN goes down, for example, you will lose your management connection, so we recommend
a simple management path.
Note All management interfaces support HTTP administrator access as controlled by your Access List configuration
(Configure an Access List, on page 41). Conversely, you cannot restrict an interface to only HTTP access;
management interfaces always support device management (management traffic, event traffic, or both).
Note Only the eth0 interface supports DHCP IP addressing. Other management interfaces only support static IP
addresses.
Note The interface used for management connections is not determined by the routing table. Connections are always
tried using eth0 first, and then subsequent interfaces are tried in order until the managed device is reached.
NAT Environments
Network address translation (NAT) is a method of transmitting and receiving network traffic through a router
that involves reassigning the source or destination IP address. The most common use for NAT is to allow
private networks to communicate with the internet. Static NAT performs a 1:1 translation, which does not
pose a problem for management center communication with devices, but port address translation (PAT) is
more common. PAT lets you use a single public IP address and unique ports to access the public network;
these ports are dynamically assigned as needed, so you cannot initiate a connection to a device behind a PAT
router.
Normally, you need both IP addresses (along with a registration key) for both routing purposes and for
authentication: the management center specifies the device IP address when you add a device, and the device
specifies the management center IP address. However, if you only know one of the IP addresses, which is the
minimum requirement for routing purposes, then you must also specify a unique NAT ID on both sides of
the connection to establish trust for the initial communication and to look up the correct registration key. The
management center and device use the registration key and NAT ID (instead of IP addresses) to authenticate
and authorize for initial registration.
For example, you add a device to the management center, and you do not know the device IP address (for
example, the device is behind a PAT router), so you specify only the NAT ID and the registration key on the
management center; leave the IP address blank. On the device, you specify the management center IP address,
the same NAT ID, and the same registration key. The device registers to the management center's IP address.
At this point, the management center uses the NAT ID instead of IP address to authenticate the device.
Although the use of a NAT ID is most common for NAT environments, you might choose to use the NAT
ID to simplify adding many devices to the management center. On the management center, specify a unique
NAT ID for each device you want to add while leaving the IP address blank, and then on each device, specify
both the management center IP address and the NAT ID. Note: The NAT ID must be unique per device.
The following example shows three devices behind a PAT IP address. In this case, specify a unique NAT ID
per device on both the management center and the devices, and specify the management center IP address on
the devices.
Figure 2: NAT ID for Managed Devices Behind PAT
The following example shows the management center behind a PAT IP address. In this case, specify a unique
NAT ID per device on both the management center and the devices, and specify the device IP addresses on
the management center.
Note If you use a data interface for management on an threat defense, you cannot use separate management and
event interfaces for that device.
The following example shows the management center and managed devices using only the default management
interfaces.
Figure 4: Single Management Interface on the Secure Firewall Management Center
The following example shows the management center using separate management interfaces for devices; and
each managed device using 1 management interface.
The following example shows the management center and managed devices using a separate event interface.
Figure 6: Separate Event Interface on the Secure Firewall Management Center and Managed Devices
The following example shows a mix of multiple management interfaces and a separate event interface on the
management center and a mix of managed devices using a separate event interface, or using a single
management interface.
Caution Be careful when making changes to the management interface to which you are connected; if you cannot
re-connect because of a configuration error, you need to access the management center console port to
re-configure the network settings in the Linux shell. You must contact Cisco TAC to guide you in this operation.
If you change the management center IP address, then see Edit the management center IP Address or Hostname
on the Device in the Cisco Secure Firewall Management Center Device Configuration Guide. If you change
the management center IP address or hostname, you should also change the value at the device CLI so the
configurations match. Although in most cases, the management connection will be reestablished without
changing the management center IP address or hostname on the device, in at least one case, you must perform
this task for the connection to be reestablished: when you added the device to the management center and you
specified the NAT ID only. Even in other cases, we recommend keeping the management center IP address
or hostname up to date for extra network resiliency.
In a high availability configuration, when you modify the management IP address of a registered device from
the device CLI or from the management center, the secondary management center does not reflect the changes
even after an HA synchronization. To ensure that the secondary management center is also updated, switch
roles between the two management centers, making the secondary management center as the active unit.
Modify the management IP address of the registered device on the Device Management page of the now active
management center.
Procedure
Step 1 Choose System ( ) > Configuration, and then choose Management Interfaces.
Step 2 In the Interfaces area, click Edit next to the interface that you want to configure.
All available interfaces are listed in this section. You cannot add more interfaces.
You can configure the following options on each management interface:
• Enabled—Enable the management interface. Do not disable the default eth0 management interface.
Some processes require the eth0 interface.
• Channels—You must always have at least one interface with Management Traffic enabled. You can
optionally configure an event-only interface. You can configure only one event interface on the
management center. To do so, uncheck the Management Traffic check box, and leave the Event Traffic
check box checked. You can optionally disable Event Traffic for the remaining management interface(s).
In either case, the device will try to send events to the event-only interface, and if that interface is down,
it will send events on the management interface even if you disable the event channel. You cannot disable
both event and management channels on an interface.
• Mode—Specify a link mode. Note that any changes you make to auto-negotiation are ignored for
GigabitEthernet interfaces.
• MDI/MDIX—Set the Auto-MDIX setting.
• MTU—Set the maximum transmission unit (MTU) between 1280 and 1500. The default is 1500.
• IPv4 Configuration—Set the IPv4 IP address. Choose:
• Static—Manually enter the IPv4 Management IP address and IPv4 Netmask.
• DHCP—Set the interface to use DHCP (eth0 only).
If you use DHCP, you must use DHCP reservation, so the assigned address does not change. If the
DHCP address changes, device registration will fail because the management center network
configuration gets out of sync. To recover from a DHCP address change, connect to the management
center (using the hostname or the new IP address) and navigate to System ( ) > Configuration >
Management Interfaces to reset the network.
• Disabled—Disable IPv4. Do not disable both IPv4 and IPv6.
Step 3 In the Routes area, edit a static route by clicking Edit ( ), or add a route by clicking Add ( ).
View the route table by clicking .
You need a static route for each additional interface to reach remote networks. For more information about
when new routes are needed, see Network Routes on Management Center Management Interfaces, on page
71.
Note For the default route, you can change only the gateway IP address. The egress interface is chosen
automatically by matching the specified gateway to the interface's network.
Step 4 In the Shared Settings area, set network parameters shared by all interfaces.
Note If you selected DHCP for the eth0 interface, you cannot manually specify some shared settings
derived from the DHCP server.
Process
Use the web interface to control the shut down and restart of processes on the management center. You can:
• Shut down: Initiate a graceful shutdown of the appliance.
Caution Do not shut off Firepower appliances using the power button; it may cause a loss
of data. Using the web interface (or CLI) prepares the system to be safely powered
off and restarted without losing configuration data.
Tip For virtual devices, refer to the documentation for your virtual platform. For VMware in particular, custom
power options are part of VMware Tools.
Restart the console Click Run Command next to Restart Management Center Console.
Note Restarting may cause deleted hosts to reappear in the network map.
Note HTTPS certificates are not supported on the management center REST API.
By default, the management center allows requests from applications using the REST API. You can configure
the management center to block this access.
Note In deployments using the management center high availability, this feature is available only in the active
management center.
Procedure
Step 1 Choose the Cog ( ) in the upper right corner to open the system menu.
Step 2 Click REST API Preferences.
Step 3 To enable or disable REST API access to the management center, check or uncheck the Enable REST API
check box.
Step 4 Click Save.
Step 5 Access the REST API Explorer at:
https://<management_center_IP_or_name>:<https_port>/api/api-explorer
On supported physical-hardware-based systems, you can use Lights-Out Management (LOM) on a Serial
Over LAN (SOL) connection to remotely monitor or manage the system without logging into the management
interface of the system. You can perform limited tasks, such as viewing the chassis serial number or monitoring
such conditions as fan speed and temperature, using a command line interface on an out-of-band management
connection. The cable connection to support LOM varies by management center model:
• For management center models MC1600, MC2600, and MC4600, use a connection with the CIMC port
to support LOM. See the Cisco Firepower Management Center 1600, 2600, and 4600 Getting Started
Guide for more information.
• For all other management center hardware models, use a connection with the default (eth0) management
port to support LOM. See the Cisco Firepower Management Center Getting Started Guide for your
hardware model.
You must enable LOM for both the system and the user you want to manage the system. After you enable the
system and the user, you use a third-party Intelligent Platform Management Interface (IPMI) utility to access
and manage your system.
Procedure
Note The LOM IP address must be different from and in the same subnet as the management
center management interface IP address.
What to do next
• If you configured serial access, be sure the rear-panel serial port is connected to a local computer, terminal
server, or other device that can support remote serial access over ethernet as described in the Getting
Started Guide for your management center model.
• If you configured Lights-Out Management, enable a Lights-Out Management user; see Lights-Out
Management User Access Configuration, on page 82.
Note that if you deactivate, then reactivate, a user with LOM while a that user is logged in, or restore a user
from a backup during that user’s login session, that user may need to log back into the web interface to regain
access to impitool commands.
Procedure
Linux
IPMItool is standard with many distributions and is ready to use.
Mac
You must install IPMItool on a Mac. First, confirm that your Mac has Apple's XCode Developer tools installed,
making sure that the optional components for command line development are installed (UNIX Development
and System Tools in newer versions, or Command Line Support in older versions). Then you can install
macports and the IPMItool. Use your favorite search engine for more information or try these sites:
https://developer.apple.com/technologies/tools/
http://www.macports.org/
http://github.com/ipmitool/ipmitool/
Windows
For Windows Versions 10 and greater with Windows Subsystem for Linux (WSL) enabled, as well as some
older versions of Windows Server, you can use IPMItool. Otherwise, you must compile IPMIutil on your
Windows system; you can use IPMIutil itself to compile. Use your favorite search engine for more information
or try this site:
http://ipmiutil.sourceforge.net/man.html#ipmiutil
where:
• ipmitool invokes the utility.
• -I lanplus specifies to use an encrypted IPMI v2.0 RMCP+ LAN Interface for the session.
• -H IP_address indicates the IP address you have configured for Lights-Out Management on the appliance
you want to access.
• -U user_name is the name of an authorized remote session user.
• command is the name of the command you want to use.
This command connects you to the command line on the appliance where you can log in as if you were
physically present at the appliance. You may be prompted to enter a password.
Procedure
Procedure
Caution In rare cases, if your computer is on a different subnet than the system's management interface and the system
is configured for DHCP, attempting to access LOM features can fail. If this occurs, you can either disable and
then re-enable LOM on the system, or use a computer on the same subnet as the system to ping its management
interface. You should then be able to use LOM.
Caution Cisco is aware of a vulnerability inherent in the Intelligent Platform Management Interface (IPMI) standard
(CVE-2013-4786). Enabling Lights-Out Management (LOM) on an system exposes this vulnerability. To
mitigate this vulnerability, deploy your systems on a secure management network accessible only to trusted
users and use a complex, non-dictionary-based password of the maximum supported length for your system
and change it every three months. To prevent exposure to this vulnerability, do not enable LOM.
If all attempts to access your system have failed, you can use LOM to restart your system remotely. Note that
if a system is restarted while the SOL connection is active, the LOM session may disconnect or time out.
Caution Do not restart your system unless it does not respond to any other attempts to restart. Remotely restarting
does not gracefully reboot the system and you may lose data.
-H hostname/IP address -N nodename/IP address Indicates the LOM IP address or hostname for the
center
For example, to display a list of appliance information, the IPMItool command is:
Procedure
Procedure
You cannot send backups to one remote system and reports to another, but you can choose to send either to
a remote system and store the other on the management center.
Tip After configuring and selecting remote storage, you can switch back to local storage only if you have not
increased the connection database limit.
Procedure
Step 5 Optionally, check the Use Advanced Options check box and enter any required command line options; see
Remote Storage Management Advanced Options, on page 90.
Step 6 Under System Usage:
• Choose Use for Backups to store backups on the designated host.
• Choose Use for Reports to store reports on the designated host.
• Enter Disk Space Threshold for backup to remote storage. Default is 90%.
Procedure
Step 5 Optionally, check the Use Advanced Options check box and enter any required command line options; see
Remote Storage Management Advanced Options, on page 90.
Step 6 Under System Usage:
• Choose Use for Backups to store backups on the designated host.
• Choose Use for Reports to store reports on the designated host.
Procedure
• To use SSH keys, copy the content of the SSH Public Key field and place it in your authorized_keys
file.
Step 5 Optionally, check the Use Advanced Options check box and enter any required command line options; see
Remote Storage Management Advanced Options, on page 90.
Step 6 Under System Usage:
• Choose Use for Backups to store backups on the designated host.
• Choose Use for Reports to store reports on the designated host.
Step 7 If you want to test the settings, you must click Test.
Step 8 Click Save.
where version is the version number of SMB or NFS remote storage you want to use. For example, to select
NFSv4, enter vers=4.0.
If SMB encryption is enabled for a file server, only SMB version 3.0 clients are allowed to access the file
server. To access encrypted SMB file server from the management center, type the following in the Command
Line Option field:
vers=3.0
where you select encrypted SMBv3 to copy or save backup files from the management center to the encrypted
SMB file server.
SNMP
You can enable Simple Network Management Protocol (SNMP) polling. This feature supports use of versions
1, 2, and 3 of the SNMP protocol. This feature allows access to the standard management information base
(MIB), which includes system details such as contact, administrative, location, service information, IP
addressing and routing information, and transmission protocol usage statistics.
Note When selecting SNMP versions for the SNMP protocol, note that SNMPv2 only supports read-only communities
and SNMPv3 only supports read-only users. SNMPv3 also supports encryption with AES128.
Enabling SNMP polling does not cause the system to send SNMP traps; it only makes the information in the
MIBs available for polling by your network management system.
Note The SNMP MIB contains information that could be used to attack your deployment. We recommend that you
restrict your access list for SNMP access to the specific hosts that will be used to poll for the MIB. We also
recommend you use SNMPv3 and use strong passwords for network management access.
Procedure
• Version 3: Click Add User to display the user definition page. SNMPv3 only supports read-only users
and encryption with AES128.
Session Timeout
Unattended login sessions may be security risks. You can configure the amount of idle time before a user’s
login session times out due to inactivity.
Note that you can exempt specific web interface users from timeout, for scenarios where you plan to passively,
securely monitor the system for long periods of time. Users with the Administrator role, whose complete
access to menu options poses an extra risk if compromised, cannot be made exempt from session timeouts.
Time
Time settings are displayed on most pages in local time using the time zone you set on the Time Zone page
in User Preferences (the default is America/New York), but are stored on the appliance using UTC time.
Restriction The Time Zone function (in User Preferences) assumes that the default system clock is set to UTC time. DO
NOT ATTEMPT TO CHANGE THE SYSTEM TIME. Be advised that changing the system time from UTC
is NOT supported, and doing so will require you to reimage the device to recover from an unsupported state.
Procedure
Column Description
Authentication The authentication status for communication between the management center and the
NTP server:
• none indicates no authentication is configured.
• bad indicates authentication is configured but has failed.
• ok indicates authentication is successful.
If authentication has been configured, the system displays the key number and key
type (SHA-1, MD5, or AES-128 CMAC) following the status value. For example:
bad, key 2, MD5.
Offset The number of milliseconds of difference between the time on the appliance and the
configured NTP server. Negative values indicate that the appliance is behind the NTP
server, and positive values indicate that it is ahead.
Last Update The number of seconds that have elapsed since the time was last synchronized with
the NTP server. The NTP daemon automatically adjusts the synchronization times
based on a number of conditions. For example, if you see larger update times such as
300 seconds, that indicates that the time is relatively stable and the NTP daemon has
determined that it does not need to use a lower update increment.
Time Synchronization
Synchronizing the system time on your Secure Firewall Management Center (management center) and its
managed devices is essential to successful operation of your system. We recommend that you specify NTP
servers during management center initial configuration, but you can use the information in this section to
establish or change time sychronization settings after intial configuration is complete.
Use a Network Time Protocol (NTP) server to synchronize system time on the management center and all
devices. The management center supports secure communications with NTP servers using MD5, SHA-1, or
AES-128 CMAC symmetric key authentication; for system security, we recommend using this feature.
The management center can also be configured to connect solely with authenticated NTP servers; using this
option improves security in a mixed-authentication environment, or when migrating your system to different
NTP servers. It is redundant to use this setting in an environment where all reachable NTP servers are
authenticated.
Note If you specified an NTP server for the management center during initial configuration, the connection with
that NTP server is not secured. You must edit the configuration for that connection to specify MD5, SHA-1,
or AES-128 CMAC keys.
Caution Unintended consequences can occur when time is not synchronized between the management center and
managed devices.
Caution If the management center is rebooted and your DHCP server sets an NTP server record different than the one
you specify here, the DHCP-provided NTP server will be used instead. To avoid this situation, configure your
DHCP server to use the same NTP server.
Procedure
What to do next
Set managed devices to synchronize with the same NTP server or servers:
• Configure device platform settings: Configure NTP Time Synchronization for Threat Defense in the
Cisco Secure Firewall Management Center Device Configuration Guide.
Note that even if you force the management center to make a secure connection with an NTP server (Use
the authenticated NTP server only), device connections to that server do not use authentication.
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
Important • Do not use this procedure unless you have no other NTP server. Instead, use the procedure in Synchronize
Time on the Management Center with an NTP Server, on page 94.
• Do not use a virtual management center as an NTP server.
To change the time manually after configuring the management center as an NTP server, you must disable
the NTP option, change the time manually, and then re-enable the NTP option.
Procedure
For threat defense devices, see Configure NTP Time Synchronization for Threat Defense in the Cisco Secure
Firewall Management Center Device Configuration Guide.
UCAPL/CC Compliance
Your organization might be required to use only equipment and software complying with security standards
established by the U.S. Department of Defense and global certification organizations. For more information
about this setting, see Security Certifications Compliance Modes, on page 305.
User Configuration
Global User Configuration settings affect all users on the management center. Configure these settings on the
User Configuration page (System ( ) > Configuration > User Configuration):
• Password Reuse Limit: The number of passwords in a user’s most recent history that cannot be reused.
This limit applies to web interface access for all users. For the admin user, this applies to CLI access as
well; the system maintains separate password lists for each form of access. Setting the limit to zero (the
default) places no restrictions on password reuse. See Set Password Reuse Limit, on page 98.
• Track Successful Logins: The number of days that the system tracks successful logins to the management
center, per user, per access method (web interface or CLI). When users log in, the system displays their
successful login count for the interface being used. When Track Successful Logins is set to zero (the
default), the system does not track or report successful login activity. See Track Successful Logins, on
page 99.
• Max Number of Login Failures: The number of times in a row that users can enter incorrect web
interface login credentials before the system temporarily blocks the account from access for a configurable
time period. If a user continues login attempts while the temporary lockout is in force:
• The system refuses access for that account (even with a valid password) without informing the user
that a temporary lockout is in force.
• The system continues to increment the failed login count for that account with each login attempt.
• If the user exceeds the Maximum Number of Failed Logins configured for that account on the
individual User Configuration page, the account is locked out until an admin user reactivates it.
• Set Time in Minutes to Temporarily Lockout Users: The duration in minutes for a temporary web
interface user lockout if Max Number of Failed Logins is non-zero.
• Max Concurrent Sessions Allowed: The number of sessions of a particular type (read-only or read/write)
that can be open at the same time. The type of session is determined by the roles assigned to a user. If a
user is assigned only read-only roles, that user's session is counted toward the (Read Only) session limit.
If a user has any roles with write privileges, the session is counted toward the Read/Write session limit.
For example, if a user is assigned the Admin role and the Maximum sessions for users with Read/Write
privileges/CLI users is set to 5, the user will not be allowed to log in if there are already five other users
logged in that have read/write privileges.
Note Predefined user roles and custom user roles that the system considers read-only
for the purposes of concurrent session limits, are labeled with (Read Only) in
the role name on the System ( ) > Users > Users and the System ( ) > Users >
User Roles. If a user role does not contain (Read Only) in the role name, the
system considers the role to be read/write. The system automatically applies
(Read Only) to roles that meet the required criteria. You cannot make a role
read-only by adding that text string manually to the role name.
For each type of session, you can set a maximum limit ranging from 1 to 1024. When Max Concurrent
Sessions Allowed is set to zero (the default), the number of concurrent sessions is unlimited.
If you change the concurrent session limit to a value more restrictive, the system will not close any
currently open sessions; it will, however, prevent new sessions beyond the number specified from being
opened.
Procedure
Note If you lower the number of days, the system deletes records of older logins. If you then increase the limit, the
system does not restore the count from those days. In that case, the reported number of successful logins may
be temporarily lower than the actual number.
Procedure
Procedure
Step 4 Set the Time in Minutes to Temporarily Lockout Users to the number of minutes to lock out users who
have triggered a temporary lockout.
When this value is zero, users do not have to wait to retry to log in, even if the Max Number of Login Failures
is non-zero.
Procedure
VMware Tools
VMware Tools is a suite of performance-enhancing utilities intended for virtual machines. These utilities
allow you to make full use of the convenient features of VMware products. Firepower virtual appliances
running on VMware support the following plugins:
• guestInfo
• powerOps
• timeSync
• vmbackup
You can also enable VMware Tools on all supported versions of ESXi. For information on the full functionality
of VMware Tools, see the VMware website (http://www.vmware.com/).
Vulnerability Mapping
The system automatically maps vulnerabilities to a host IP address for any application protocol traffic received
or sent from that address, when the server has an application ID in the discovery event database and the packet
header for the traffic includes a vendor and version.
For any servers which do not include vendor or version information in their packets, you can configure whether
the system associates vulnerabilities with server traffic for these vendor and versionless servers.
For example, a host serves SMTP traffic that does not have a vendor or version in the header. If you enable
the SMTP server on the Vulnerability Mapping page of a system configuration, then save that configuration
to the management center managing the device that detects the traffic, all vulnerabilities associated with SMTP
servers are added to the host profile for the host.
Although detectors collect server information and add it to host profiles, the application protocol detectors
will not be used for vulnerability mapping, because you cannot specify a vendor or version for a custom
application protocol detector and cannot select the server for vulnerability mapping.
Procedure
Web Analytics
By default, in order to improve Firepower products, Cisco collects non-personally-identifiable usage data,
including but not limited to page interactions, browser versions, product versions, user location, and management
IP addresses or hostnames of your management center appliances.
Data collection begins after you accept the End User License Agreement. If you do not want Cisco to continue
to collect this data, you can opt out using the following procedure.
Procedure
What to do next
(Optional) Determine whether to share data via the Configure Cisco Success Network Enrollment.
Access control performance 7.2.4 Access control object optimization improves performance and consumes fewer device
improvements (object resources when you have access control rules with overlapping networks.
7.4.0
optimization).
The optimizations occur on the managed device on the first deploy after the feature is
enabled on the management center (including if it is enabled by an upgrade). If you
have a high number of rules, the system can take several minutes to an hour to evaluate
your policies and perform object optimization. During this time, you may also see higher
CPU use on your devices. A similar thing occurs on the first deploy after the feature is
disabled (including if it is disabled by upgrade). After this feature is enabled or disabled,
we recommend you deploy when it will have the least impact, such as a maintenance
window or a low-traffic time.
So that you can plan:
• In Version 7.2.0–7.2.3 and 7.3, this feature is not supported. Upgrading or reimaging
to one of these releases disables the feature.
• In Version 7.2.4–7.2.5 and 7.4.0, this feature is enabled by default for reimaged
and upgraded management centers. To disable it, contact Cisco TAC.
Configuration changes in 7.4 You can stream configuration changes as part of audit log data to external syslog servers
audit log. by specifying the configuration data format and the hosts. The management center
supports backup and restore of the audit configuration log. This feature is also supported
in management center high availability setup.
French language option. 7.2 You can now switch the management center web interface to French from System ( ) >
Configuration > Lanaguage.
Exempt most connection 7.0 Setting the Maximum Connection Events value for the Connection Database to zero
events from event rate now exempts low priority connection events from counting towards the flow rate limit
limits. for your FMC hardware. Previously, setting this value to zero applied only to event
storage, and did not affect the flow rate limit.
Support for AES-128 7.0 Connections between the FMC and NTP servers can be secured with AES-128 CMAC
CMAC authentication for keys as well as previously-supported MD5 and SHA-1 keys.
NTP servers.
New/modified screens: System ( ) > Configuration > Time Synchronization
Subject Alternative Name 6.6 When creating an HTTPS certificate for the FMC, you can specify SAN fields. We
(SAN). recommend you use SAN if the certificate secures multiple domain names or IP
addresses. For more information about SAN, see RFC 5280, section 4.2.1.6.
HTTPS certificates. 6.6 The default HTTPS server certificate provided with the system now expires in 800 days.
If your appliance uses a default certificate that was generated before you upgraded to
Version 6.6, the certificate lifetime varies depending on the Firepower version being
used when the certificate was generated. See Default HTTPS Server Certificates, on
page 59 for more information.
Supported platforms: Hardware FMCs.
Secure NTP. 6.5 The FMC supports secure communications with NTP servers using SHA1 or MD5
symmetric key authentication.
Web analytics. 6.5 Web analytics data collection begins after you accept the EULA. As before, you can
opt not to continue to share data. See Web Analytics, on page 102.
Automatic CLI access for 6.5 When you use SSH to log into the FMC, you automatically access the CLI. Although
the FMC. strongly discouraged, you can then use the CLI expert command to access the Linux
shell.
Note This feature deprecates the Version 6.3 ability to enable and disable CLI
access for the FMC. As a consequence of deprecating this option, the
virtual FMC no longer displays the System ( ) > Configuration >
Console Configuration page, which still appears on physical FMCs.
Configurable session limits 6.5 Added the Max Concurrent Sessions Allowed setting. This setting allows the
for read-only and read/write administrator to specify the maximum number of sessions of a particular type (read-only
access. or read/write) that can be open at the same time.
Note Predefined user roles and custom user roles that the system considers
read-only for the purposes of concurrent session limits, are labeled with
(Read Only) in the role name on System ( ) > Users > Users and System
( ) > Users > User Roles. If a user role does not contain (Read Only)
in the role name, the system considers the role to be read/write.
New/modified screens:
Ability to disable Duplicate 6.4 When you enable IPv6, you can disable DAD. You might want to disable DAD because
Address Detection (DAD) the use of DAD opens up the possibility of denial of service attacks. If you disable this
on management interfaces. setting, you need check manually that this interface is not using an already-assigned
address.
Ability to disable ICMPv6 6.4 When you enable IPv6, you can now disable ICMPv6 Echo Reply and Destination
Echo Reply and Destination Unreachable messages. You might want to disable these packets to guard against potential
Unreachable messages on denial of service attacks. Disabling Echo Reply packets means you cannot use IPv6
management interfaces. ping to the device management interfaces for testing purposes.
Global User Configuration 6.3 Added the Track Successful Logins setting. The system can track the number of
Settings. successful logins each FMC account has performed within a selected number of days.
When this feature is enabled, on log in users see a message reporting how many times
they have successfully logged in to the system in the past configured number of days.
(Applies to web interface as well as shell/CLI access.)
Added the Password Reuse Limit setting. The system can track the password history
for each account for a configurable number of previous passwords. The system prevents
all users from re-using passwords that appear in that history. (Applies to web interface
as well as shell/CLI access.)
Added the Max Number of Login Failures and Set Time in Minutes to Temporarily
Lockout Users settings. These allow the administrator to limit the number of times in
a row a user can enter incorrect web interface login credentials before the system
temporarily blocks the account for a configurable period of time.
HTTPS Certificates. 6.3 The default HTTPS server certificate provided with the system now expires in three
years. If your appliance uses a default server certificate that was generated before you
upgraded to Version 6.3, the server certificate will expire 20 years from when it was
first generated. If you are using the default HTTPS server certificate the system now
provides the ability to renew it.
New/modified screens: System ( ) > Configuration > HTTPS Certificate > Renew
HTTPS Certificate
Supported platforms: FMC
Ability to enable and disable 6.3 There is a new check box available to administrators in FMC web interface: Enable
CLI access for the FMC. CLI Access on the System ( ) > Configuration > Console Configuration.
• Checked: Logging into the FMC using SSH accesses the CLI.
• Unchecked: Logging into FMC using SSH accesses the Linux shell. This is the
default state for fresh Version 6.3 installations as well as upgrades to Version 6.3
from a previous release.
Previous to Version 6.3, there was only one setting on the Console Configuration page,
and it applied to physical devices only. So the Console Configuration page was not
available on virtual FMCs. With the addition of this new option, the Console
Configuration page now appears on virtual FMCs as well as physical. However, for
virtual FMCs, this check box is the only thing that appears on the page.
Supported platforms: FMC
About Users
You can add custom user accounts on managed devices, either as internal users or as external users on a LDAP
or RADIUS server. Each managed device maintains separate user accounts. For example, when you add a
user to the management center, that user only has access to the management center; you cannot then use that
username to log directly into a managed device. You must separately add a user on the managed device.
Caution CLI users can access the Linux shell using the expert command. We strongly recommend that you do not
use the Linux shell unless directed by Cisco TAC or explicit instructions in the management center
documentation. CLI users can obtain sudoers privileges in the Linux shell, which can present a security risk.
For system security reasons, we strongly recommend that you:
• Restrict the list of external users with CLI access appropriately.
• Do not add users directly in the Linux shell; only use the procedures in this chapter.
User Roles
CLI User Role
CLI external users on the management center do not have a user role; they can use all available commands.
Note Predefined user roles that the system considers read-only for the purposes of concurrent session limits, are
labeled with (Read Only) in the role name under System ( ) > Users > Users and System ( ) > Users >
User Roles. If a user role does not contain (Read Only) in the role name, the system considers the role to be
read/write. For more information on concurrent session limits, see User Configuration, on page 97.
Access Admin
Provides access to access control policy and associated features in the Policies menu. Access Admins
cannot deploy policies.
Administrator
Administrators have access to everything in the product; their sessions present a higher security risk if
compromised, so you cannot make them exempt from login session timeouts.
You should limit use of the Administrator role for security reasons.
Discovery Admin
Provides access to network discovery, application detection, and correlation features in the Policies
menu. Discovery Admins cannot deploy policies.
External Database User (Read Only)
Provides read-only access to the database using an application that supports JDBC SSL connections. For
the third-party application to authenticate to the appliance, you must enable database access in the system
settings. On the web interface, External Database Users have access only to online help-related options
in the Help menu. Because this role’s function does not involve the web interface, access is provided
only for ease of support and password changes.
Intrusion Admin
Provides access to all intrusion policy, intrusion rule, and network analysis policy features in the Policies
and Objects menus. Intrusion Admins cannot deploy policies.
Maintenance User
Provides access to monitoring and maintenance features. Maintenance Users have access to
maintenance-related options in the Health and System menus.
Network Admin
Provides access to access control, SSL inspection, DNS policy, and identity policy features in the Policies
menu, as well as device configuration features in the Devices menus. Network Admins can deploy
configuration changes to devices.
Security Analyst
Provides access to security event analysis features, and read-only access to health events, in the Overview,
Analysis, Health, and System menus.
Security Analyst (Read Only)
Provides read-only access to security event analysis features and health event features in the Overview,
Analysis, Health, and System menus.
User with this role can also:
• From the health monitor pages for specific devices, generate and download troubleshooting files.
Security Approver
Provides limited access to access control and associated policies and network discovery policies in the
Policies menu. Security Approvers can view and deploy these policies, but cannot make policy changes.
Threat Intelligence Director (TID) User
Provides access to Threat Intelligence Director configurations in the Intelligence menu. Threat Intelligence
Director (TID) Users can view and configure TID.
User Passwords
The following rules apply to passwords for internal user accounts on the management center, with Lights-Out
Management (LOM) enabled or disabled. Different password requirements apply for externally authenticated
accounts or in systems with security certifications compliance enabled. See Configure External Authentication
for the Management Center, on page 116 and Security Certifications Compliance, on page 305 for more
information.
During management center initial configuration, the system requires the admin user to set the account password
to comply with strong password requirements described in the table below. For physical management centers,
the strong password requirements with LOM enabled are used, and for virtual management centers, the strong
password requirements with LOM not enabled are used. At this time the system synchronizes the passwords
for the web interface admin and the CLI access admin. After initial configuration, the web interface admin
can remove the strong password requirement, but the CLI access admin must always comply with strong
password requirements with LOM not enabled.
The system checks passwords against a The rules for special characters vary
special dictionary containing not only between different series of physical
many English dictionary words, but also management centers. We recommend
other character strings that could be easily restricting your choice of special characters
cracked with common password hacking to those listed in the final bullet above.
techniques.
Do not include the user name in the
password.
The system checks passwords against a
special dictionary containing not only
many English dictionary words, but also
other character strings that could be easily
cracked with common password hacking
techniques.
Password Strength Passwords must include the minimum Passwords must include:
Checking Off number of characters configured for the
• Between eight and twenty characters
user by the administrator. (See Add an
(On MC 1000, MC 2500, and MC
Internal User, on page 113 for more
4500 the upper limit is fourteen
information.)
characters rather than twenty.)
• Characters from at least three of the
following four categories:
• Uppercase letters
• Lowercase letters
• Digits
• Special characters such as ! @ #
*-_+
You can change these settings for all users as a system configuration. (System ( ) > Configuration >
User Configuration) See User Configuration, on page 97.
• Ensure that you follow the principles of least privilege when assigning default access roles to users at
initial setup. When a user first logs in to the system with their credentials, their account will be assigned
this default access role. We recommend that the default access role be the lowest possible privilege
required for anyone to log in to the system. For example, common users can be given the Security Analyst
(Read-Only) role as the default access role, and administrators can be added to a separate administrator’s
group to give them full administrator rights. If you do not follow the principles of least privilege while
assigning the default access role, users may be assigned an unintended privilege level on subsequent
logins. This could result in the users having privileges beyond their required access role. Note that this
guideline applies to all users - internal, external, or CAC users.
If a user who has logged in with the default access role needs a temporary elevation of their privileges,
a user with administrative privileges can temporarily provide that user the required higher level of access
by assigning them a role with higher privilege. This privilege will be revoked after 24 hours of inactivity,
and the user will return to their default access role.
If a user needs a permanent access role reassignment to a higher privilege level, such as System Admin,
use the Group Controlled Access Roles method to provide admin access to the user. This method ensures
that the provided access role persists beyond 24 hours and users will have the correct privilege level as
per the group assignment. For more information on configuring Group Controlled Access Roles, see the
Step 15 section.
Supported Domains
• SSO configuration—Global only.
• All other features—Any.
User Roles
• SSO configuration—Only users with the Admin role authenticated internally or by LDAP or RADIUS
can configure SSO.
• All other features—Any user with the Admin role.
• Configure Common Access Card Authentication with LDAP, on page 131 also supports the Network
Admin role.
The System > Users > Users shows both internal users that you added manually and external users that were
added automatically when a user logged in with LDAP or RADIUS authentication. For external users, you
can modify the user role on this screen if you assign a role with higher privileges; you cannot modify the
password settings.
In a multidomain deployment on the management center, users are only visible in the domain in which they
are created. Note that if you add a user in the Global domain, but then assign a user role for a leaf domain,
then that user still shows on the Global Users page where it was added, even though the user "belongs" to a
leaf domain.
If you enable security certifications compliance or Lights-Out Management (LOM) on a device, different
password restrictions apply. For more information on security certifications compliance, see Security
Certifications Compliance, on page 305.
When you add a user in a leaf domain, that user is not visible from the global domain.
Note Avoid having multiple Admin users simultaneously creating new users on the management center, as this
may cause an error resulting from a conflict in user database access.
Procedure
Step 4 Real Name: Enter descriptive information to identify the user or department to whom the account belongs.
Step 5 The Use External Authentication Method checkbox is checked for users that were added automatically
when they logged in with LDAP or RADIUS. You do not need to pre-configure external users, so you can
ignore this field. For an external user, you can revert this user to an internal user by unchecking the check
box.
Step 6 Enter values in the Password and Confirm Password fields.
The values must conform to the password options you set for this user.
Enter an integer, without spaces, that determines the minimum required length, in characters, of a user's
password. The default setting is 8. A value of 0 indicates that no minimum length is required.
Step 12 In the User Role Configuration area, assign user role(s). For more information about user roles, see Customize
User Roles for the Web Interface, on page 183.
For external users, if the user role is assigned through group membership (LDAP), or based on a user attribute
(RADIUS), you cannot remove the minimum access rights. You can, however, assign additional rights. If the
user role is the default user role that you set on the device, then you can modify the role in the user account
without limitations. When you modify the user role, the Authentication Method column on the Users tab
provides a status of External - Locally Modified.
The options you see depend on whether the device is in a single domain or multidomain deployment.
• Single domain—Check the user role(s) you want to assign the user.
• Multidomain—In a multidomain deployment, you can create user accounts in any domain in which you
have been assigned Administrator access. Users can have different privileges in each domain. You can
assign user roles in both ancestor and descendant domains. For example, you can assign read-only
privileges to a user in the Global domain, but Administrator privileges in a descendant domain. See the
following steps:
a. Click Add Domain.
b. Choose a domain from the Domain drop-down list.
c. Check the user roles you want to assign the user.
d. Click Save.
Step 13 (Optional, for physical management centers only.) If you have assigned the user the Administrator role, the
Administrator Options appear. You can select Allow Lights-Out Management Access to grant Lights-Out
Management access to the user. See Lights-Out Management Overview, on page 85 for more information
about Lights-Out Management.
Note The timeout range is different for the threat defense and the management center, so if you share an object, be
sure not to exceed the threat defense's smaller timeout range (1-30 seconds for LDAP, and 1-300 seconds for
RADIUS). If you set the timeout to a higher value, the threat defense external authentication configuration
will not work.
For the management center, enable the external authentication objects directly on the System > Users >
External Authentication tab; this setting only affects management center usage, and it does not need to be
enabled on this tab for managed device usage. For threat defense devices, you must enable the external
authentication object in the platform settings that you deploy to the devices.
Web interface users are defined separately from CLI users in the external authentication object. For CLI users
on RADIUS, you must pre-configure the list of RADIUS usernames in the external authentication object. For
LDAP, you can specify a filter to match CLI users on the LDAP server.
You cannot use an LDAP object for CLI access that is also configured for CAC authentication.
Note Users with CLI access can gain Linux shell access with the expert command. Linux shell users can obtain
root privileges, which can present a security risk. Make sure that you:
• Restrict the list of users with CLI or Linux shell access.
• Do not create Linux shell users.
About LDAP
The Lightweight Directory Access Protocol (LDAP) allows you to set up a directory on your network that
organizes objects, such as user credentials, in a centralized location. Multiple applications can then access
those credentials and the information used to describe them. If you ever need to change a user's credentials,
you can change them in one place.
Microsoft has announced that Active Directory servers will start enforcing LDAP binding and LDAP signing
in 2020. Microsoft is making these a requirement because when using default settings, an elevation of privilege
vulnerability exists in Microsoft Windows that could allow a man-in-the-middle attacker to successfully
forward an authentication request to a Windows LDAP server. For more information, see 2020 LDAP channel
binding and LDAP signing requirement for Windows on the Microsoft support site.
If you have not done so already, we recommend you start using TLS/SSL encryption to authenticate with an
Active Directory server.
About RADIUS
Remote Authentication Dial In User Service (RADIUS) is an authentication protocol used to authenticate,
authorize, and account for user access to network resources. You can create an authentication object for any
RADIUS server that conforms to RFC 2865.
Firepower devices support the use of SecurID tokens. When you configure authentication by a server using
SecurID, users authenticated against that server append the SecurID token to the end of their SecurID PIN
and use that as their password when they log in. You do not need to configure anything extra on the Firepower
device to support SecurID.
Procedure
You must also follow the procedure in Configure Common Access Card Authentication with LDAP, on page
131 to fully configure CAC authentication and authorization. You cannot use this object for CLI users.
Step 6 In the CAC Environment Variable field, enter the environment variable containing the username used for
login. This field appears when CAC check box is selected. With CAC enabled and used with browser to
access the appliance, environment variables containing CAC information can be used for login. Example,
SSL_CLIENT_S_DN_CN = last.first.1234567890
Step 7 In the CAC User Name Template field, enter the template to extract the username portion from the CAC
Environment Variable. Example, enter \.(\d{10})$ to extract the last 10 digits of the CAC environment
variable string.
Step 8 Enter a Name and optional Description.
Step 9 Choose a Server Type from the drop-down list.
Tip If you click Set Defaults, the device populates the User Name Template, UI Access Attribute,
CLI Access Attribute, Group Member Attribute, and Group Member URL Attribute fields
with default values for the server type.
If you are using CAC authentication, to filter only active user accounts (excluding the disabled user
accounts), enter (!(userAccountControl:1.2.840.113556.1.4.803:=2)). This criteria retrieves user
accounts within AD belonging to ldpgrp group and with userAccountControl attribute value that is not
2 (disabled).
c) Enter a User Name for a user who has sufficient credentials to browse the LDAP server. For example, if
you are connecting to an OpenLDAP server where user objects have a uid attribute, and the object for
the administrator in the Security division at your example company has a uid value of NetworkAdmin,
you might enter uid=NetworkAdmin,ou=security,dc=example,dc=com.
d) Enter the user password in the Password and the Confirm Password fields.
e) (Optional) Click Show Advanced Options to configure the following advanced options.
• Encryption—Click None, TLS, or SSL.
If you change the encryption method after specifying a port, you reset the port to the default value
for that method. For None or TLS, the port resets to the default value of 389. If you choose SSL
encryption, the port resets to 636.
• SSL Certificate Upload Path—For SSL or TLS encryption, you must choose a certificate by clicking
Choose File.
If you previously uploaded a certificate and want to replace it, upload the new certificate and redeploy
the configuration to your devices to copy over the new certificate.
Note TLS encryption requires a certificate on all platforms. We recommend that you always
upload a certificate for SSL to prevent man-in-the-middle attacks.
• User Name Template—Provide a template that corresponds with your UI Access Attribute. For
example, to authenticate all users who work in the Security organization of the Example company
by connecting to an OpenLDAP server where the UI access attribute is uid, you might enter
uid=%s,ou=security,dc=example,dc=com in the User Name Template field. For a Microsoft Active
Directory server, you could enter %[email protected].
This field is required for CAC authentication.
• Shell User Name Template—Provide a template that corresponds with your CLI Access Attribute
to authenticate CLI users. For example, to authenticate all users who work in the Security organization
by connecting to an OpenLDAP server where the CLI access attribute is sAMAccountName, you might
enter %s in the Shell User Name Template field.
• Timeout (Seconds)—Enter the number of seconds before rolling over to the backup connection,
between 1 and 1024. The default is 30.
Note The timeout range is different for threat defense and the management center, so if you
share an object, be sure not to exceed the threat defense's smaller timeout range (1-30
seconds). If you set the timeout to a higher value, the threat defense LDAP configuration
will not work.
If you use a dynamic group, the LDAP query is used exactly as it is configured on the LDAP server. For
this reason, the Firepower device limits the number of recursions of a search to 4 to prevent search syntax
errors from causing infinite loops.
Example:
Enter the following in the Administrator field to authenticate names in the information technology
organization at the Example company:
cn=itgroup,ou=groups, dc=example,dc=com
b) Choose a Default User Role for users that do not belong to any of the specified groups.
c) If you use static groups, enter a Group Member Attribute.
Example:
If the member attribute is used to indicate membership in the static group for default Security Analyst
access, enter member.
d) If you use dynamic groups, enter a Group Member URL Attribute.
Example:
If the memberURL attribute contains the LDAP search that retrieves members for the dynamic group you
specified for default Admin access, enter memberURL.
If you change a user's role, you must save/deploy the changed external authentication object and also remove
the user from the Users screen. The user will be re-added automatically the next time they log in.
Step 16 (Optional) Set the CLI Access Filter to allow CLI users.
To prevent LDAP authentication of CLI access, leave this field blank. To specify CLI users, choose one of
the following methods:
• To use the same filter you specified when configuring authentication settings, check the check box of
Same as Base Filter.
• To retrieve administrative user entries based on attribute value, enter the attribute name, a comparison
operator, and the attribute value you want to use as a filter, enclosed in parentheses. For example, if all
network administrators have a manager attribute which has an attribute value of shell, you can set a
base filter of (manager=shell).
Note Users with CLI access can gain Linux shell access with the expert command. Linux shell users
can obtain root privileges, which can present a security risk. Make sure that you restrict the list
of users with CLI or Linux shell access.
Note Do not create any internal users that have the same user name as users included in the CLI Access
Filter. The only internal management center user should be admin; do not include an admin
user in the CLI Access Filter.
Step 18 (Optional) You can also enter Additional Test Parameters to test user credentials for a user who should be
able to authenticate: enter a User Name uid and Password, and then click Test.
If you are connecting to a Microsoft Active Directory Server and supplied a UI access attribute in place of
uid, use the value for that attribute as the user name. You can also specify a fully qualified distinguished name
for the user.
Tip If you mistype the name or password of the test user, the test fails even if the server configuration
is correct. To verify that the server configuration is correct, click Test without entering user
information in the Additional Test Parameters field first. If that succeeds, supply a user name
and password to test with the specific user.
Example:
To test if you can retrieve the JSmith user credentials at the Example company, enter JSmith and the correct
password.
Examples
Basic Example
The following figures illustrate a basic configuration of an LDAP login authentication object for a
Microsoft Active Directory Server. The LDAP server in this example has an IP address of 10.11.3.4.
The connection uses port 389 for access.
However, because this server is a Microsoft Active Directory server, it uses the sAMAccountName
attribute to store user names rather than the uid attribute. Choosing the MS Active Directory server
type and clicking Set Defaults sets the UI Access Attribute to sAMAccountName. As a result, the
system checks the sAMAccountName attribute for each object for matching user names when a user
attempts to log into the system.
In addition, a CLIAccess Attribute of sAMAccountName causes each sAMAccountName attribute to be
checked for all objects in the directory for matches when a user logs into a CLI account on the
appliance.
Note that because no base filter is applied to this server, the system checks attributes for all objects
in the directory indicated by the base distinguished name. Connections to the server time out after
the default time period (or the timeout period set on the LDAP server).
Advanced Example
This example illustrates an advanced configuration of an LDAP login authentication object for a
Microsoft Active Directory Server. The LDAP server in this example has an IP address of 10.11.3.4.
The connection uses port 636 for access.
The connection to the server is encrypted using SSL and a certificate named certificate.pem is
used for the connection. In addition, connections to the server time out after 60 seconds because of
the Timeout (Seconds) setting.
Because this server is a Microsoft Active Directory server, it uses the sAMAccountName attribute to
store user names rather than the uid attribute. Note that the configuration includes a UI Access
Attribute of sAMAccountName. As a result, the system checks the sAMAccountName attribute for each
object for matching user names when a user attempts to log into the system.
In addition, a CLI Access Attribute of sAMAccountName causes each sAMAccountName attribute to
be checked for all objects in the directory for matches when a user logs into a CLI account on the
appliance.
This example also has group settings in place. The Maintenance User role is automatically assigned
to all members of the group with a member group attribute and the base domain name of
CN=SFmaintenance,DC=it,DC=example,DC=com.
The CLI Access Filter is set to be the same as the base filter, so the same users can access the
appliance through the CLI as through the web interface.
Procedure
b) Enter the Retries before rolling over to the backup server. The default is 3.
c) In the fields that correspond to user roles, enter the name of each user or identifying attribute-value pair
that should be assigned to those roles.
Separate usernames and attribute-value pairs with commas.
Example:
If you know all users who should be Security Analysts have the value Analyst for their User-Category
attribute, you can enter User-Category=Analyst in the Security Analyst field to grant that role to those
users.
Example:
To grant the Administrator role to the users jsmith and jdoe, enter jsmith, jdoe in the Administrator
field.
Example:
To grant the Maintenance User role to all users with a User-Category value of Maintenance, enter
User-Category=Maintenance in the Maintenance User field.
d) Select the Default User Role for users that do not belong to any of the specified groups.
If you change a user's role, you must save/deploy the changed external authentication object and also remove
the user from the Users screen. The user will be re-added automatically the next time they log in.
When you define an attribute, you provide the name of the attribute, which consists of alphanumeric
characters. Note that words in an attribute name should be separated by dashes rather than spaces.
b) Enter the Attribute ID as an integer.
The attribute ID should be an integer and should not conflict with any existing attribute IDs in the
etc/radiusclient/dictionary file.
You could then enter Ascend-Assign-IP-Pool=2 in the Security Analyst (Read Only) field to grant read-only
security analyst rights to all users with an Ascend-IP-Pool-Definition attribute value of 2.
Step 12 (Optional) In the CLI Access Filter area Administrator CLI Access User List field, enter the user names
that should have CLI access, separated by commas.
Make sure that these usernames match usernames on the RADIUS server. The names must be Linux-valid
usernames:
• Maximum 32 alphanumeric characters, plus period (.), hyphen (-), and underscore (_)
• All lowercase
• Cannot start with hyphen (-); cannot be all numbers; cannot include at sign (@) or slash (/)
Note Remove any internal users that have the same user name as users included in the shell access
filter. For the management center, the only internal CLI user is admin, so do not also create an
admin external user.
Step 13 (Optional) Click Test to test management center connectivity to the RADIUS server.
Step 14 (Optional) You can also enter Additional Test Parameters to test user credentials for a user who should be
able to authenticate: enter a User Name and Password, and then click Test.
Tip If you mistype the name or password of the test user, the test fails even if the server configuration
is correct. To verify that the server configuration is correct, click Test without entering user
information in the Additional Test Parameters field first. If that succeeds, supply a user name
and password to test with the specific user.
Example:
To test if you can retrieve the JSmith user credentials at the Example company, enter JSmith and the correct
password.
Examples
Simple User Role Assignments
The following figure illustrates a sample RADIUS login authentication object for a server running
Cisco Identity Services Engine (ISE) with an IP address of 10.10.10.98 on port 1812. No backup
server is defined.
The following example shows RADIUS-specific parameters, including the timeout (30 seconds) and
number of failed retries before the Firepower System attempts to contact the backup server, if any.
This example illustrates important aspects of RADIUS user role configuration:
Users ewharton and gsand are granted web interface Administrative access.
The user cbronte is granted web interface Maintenance User access.
The user jausten is granted web interface Security Analyst access.
The user ewharton can log into the device using a CLI account.
The following graphic depicts the role configuration for the example:
Procedure
Step 4 Click the Slider enabled ( ) next to the each external authentication object that you want to use. If you
enable more than 1 object, then users are compared against servers in the order specified. See the next step
to reorder servers.
If you enable shell authentication, you must enable an external authentication object that includes a CLI
Access Filter. Also, CLI access users can only authenticate against the server whose authentication object is
highest in the list.
Step 5 (Optional) Drag and drop servers to change the order in which authentication they are accessed when an
authentication request occurs.
Step 6 Choose Shell Authentication > Enabled if you want to allow CLI access for external users.
The first external authentication object name is shown next to the Enabled option to remind you that only
the first object is used for CLI.
Caution When configuring CAC authentication with LDAP, ensure that you follow the principles of least privilege
while assigning a default access role to the users. When a user first logs in to the system with their CAC
credentials, their account will be assigned this default access role.
If you do not follow the principles of least privilege while assigning the default access role, users may be
assigned an unintended privilege level on subsequent logins. This could result in the users having privileges
beyond their required access role.
If a user who has logged in with the default access role needs a temporary elevation of their privileges, a user
with administrative privileges can temporarily provide that user the required higher level of access by assigning
them a role with higher privilege. This privilege will be revoked after 24 hours of inactivity, and the user will
return to their default access role.
If a user needs a permanent access role reassignment to a higher privilege level, such as System Admin, use
the Group Controlled Access Roles method to provide admin access to the user. This method ensures that
the provided access role persists beyond 24 hours and users will have the correct privilege level as per the
group assignment. For more information on configuring Group Controlled Access Roles, see the Step 15
section.
Procedure
Step 12 Under HTTPS Client Certificate Settings, choose Enable Client Certificates. For more information, see
Requiring Valid HTTPS Client Certificates, on page 64.
Step 13 Log in to the device according to Logging Into the Secure Firewall Management Center with CAC Credentials,
on page 33.
supplying a username and password on the management center Login page. Once successfully authenticated
by the IdP, SSO users are redirected back to the management center web interface and logged in. All the
communication between the management center and the IdP to accomplish this takes place using the browser
as an intermediary; as a result, the management center does not require a network connection to directly access
the identity provider.
The management center supports SSO using any SSO provider conforming to the Security Assertion Markup
Language (SAML) 2.0 open standard for authentication and authorization.
Note The management center cannot sign SAML authentication request messages. Hence, if the IdP requires service
provider’s signature on the authentication requests, the SSO on the management center would fail.
The management center web interface offers configuration options for the following SSO providers:
• Okta
• OneLogin
• Azure
• PingID's PingOne for Customers cloud solution
• Other
Note The Cisco Secure Sign On SSO product does not recognize the management center as a pre-integrated service
provider.
• If you configure SSO on the secondary management center, you are required to configure SSO
on the primary management center as well. (This is because SSO users must login into the
primary management center at least once before logging into the secondary management center.)
• In a management center that uses multi-tenancy, the SSO configuration can be applied only at the global
domain level, and applies to the global domain and all subdomains.
• Only users with the Admin role authenticated internally or by LDAP or RADIUS can configure SSO.
• The management center does not support SSO initiated from the IdP.
• The management center does not support logging in with CAC credentials for SSO accounts.
• Do not configure SSO in deployments using CC mode.
• SSO activities are logged in the management center audit log with Login or Logout specified in the
Subsystem field.
Related Topics
High Availability, on page 283
Domains, on page 199
Logging Into the Secure Firewall Management Center with CAC Credentials, on page 33
Security Certifications Compliance, on page 305
Audit Records, on page 383
Note The system requires that user names for SSO accounts as well as the NameID attribute the IdP sends to the
management center during the SAML login process must be both be valid email addresses. Many IdP's
automatically use the username of the user trying to logon as the NameID attribute, but you should confirm
this is the case for your IdP. Keep this in mind when configuring a service provider application at your IdP
and creating IdP user accounts that are to be granted SSO access to the management center.
The following account characteristics for SSO users can be configured from the management center web
interface under System ( ) > Users > Edit User:
• Real Name
• Exempt from Browser Session Timeout
Note You can configure management center roles to be mapped based on individual user permissions or based on
group permissions, but a single management center application cannot support role mapping for both groups
and individual users.
• To configure a management center service provider application for any SAML 2.0-compliant SSO
provider, see Configure Management Center Service Provider Application for Any SAML
2.0-Compliant SSO Provider, on page 178.
Procedure
What to do next
Proceed with the instructions appropriate to your choice of SSO provider:
• Configure the management center for Okta SSO; see Configure the Management Center for Okta SSO,
on page 139.
• Configure the management center for SSO using PingID's PingOne for Customers cloud solution; see
Configure the Management Center for SSO with PingID PingOne for Customers, on page 176.
• Configure the management center for Azure SSO; see Configure the Management Center for Azure SSO,
on page 163.
• Configure the management center for OneLogin SSO; see Configure the Management Center for OneLogin
SSO, on page 151.
• Configure the management center for SSO using any SAML 2.0-compliant provider; see Configure the
Management Center for SSO Using Any SAML 2.0-Compliant SSO Provider, on page 180.
Okta UI Admin Configure the Management Center Service Provider Application for Okta, on
Console page 137
management center Enable Single Sign-On at the Management Center, on page 135
management center Configure the Management Center for Okta SSO, on page 139
management center Configure User Role Mapping for Okta at the Management Center, on page 140
Okta UI Admin Configure User Role Mapping at the Okta IdP, on page 141
Console
Keep in mind that you can configure management center roles to be mapped based on individual user
permissions or based on group permissions, but a single management center application cannot support role
mapping for both groups and individual users.
This documentation assumes you are already familiar with the Okta Classic UI Admin Console, and have an
account that can perform configuration functions requiring Super Admin permissions. If you need more
information, see Okta's documentation available online.
Note If you plan to assign user groups to the management center application, do not also assign users within those
groups as individuals.
Note The management center cannot support role mapping using multiple SSO attributes; you must select either
user role mapping or group role mapping and configure a single attribute to convey user role information from
OneLogin to the management center.
Note The system requires that user names for SSO accounts as well as the NameID
attribute the IdP sends to the management center during the SAML login process
must be both be valid email addresses. Many IdP's automatically use the username
of the user trying to logon as the NameID attribute, but you should confirm this
is the case for your IdP. Keep this in mind when configuring a service provider
application at your IdP and creating IdP user accounts that are to be granted SSO
access to the management center.
• Confirm the login URL for the target management center (https://ipaddress_or_hostname).
Note If your management center web interface can be reached with multiple URLs
(for instance, a fully-qualified domain name as well as an IP address), SSO users
must consistently access the management center using the login URL that you
configure in this task.
Procedure
Step 1 From the Okta Classic UI Admin Console, create a service provider application for the management center.
Configure the management center application with the following selections:
• Select Web for the Platform.
• Select SAML 2.0 for the Sign on method.
• Provide a Single sign on URL.
This is the management center URL to which the browser sends information on behalf of the IdP.
Append the string saml/acs to the management center login URL. For example:
https://ExampleFMC/saml/acs.
Step 2 (Optional if you are assigning groups to the application.) Assign individual Okta users to the management
center application. (If you plan to assign groups to the management center application, do not assign users
that are members of those groups as individuals.)
Step 3 (Optional if you are assigning individual users to the application.) Assign Okta groups to the management
center application.
Step 4 (Optional) To make SSO setup at the management center easier, you can download the SAML XML metadata
file for the management center service provider application from Okta to your local computer.
What to do next
Enable single sign-on; see Enable Single Sign-On at the Management Center, on page 135.
Procedure
Step 1 (This step continues directly from Enable Single Sign-On at the Management Center, on page 135.) At the
Configure Okta Metadata dialog box, you have two choices:
• To enter the SSO configuration information manually:
a. Click the Manual Configuration radio button.
b. Enter the following values from the Okta SSO Service Provider application. (Retrieve these values
from the Okta Classic UI Admin Console.)
• Identity Provider Single Sign-On (SSO) URL
• Identity Provider Issuer
• X.509 Certificate
• If you saved the XML metadata file generated by Okta to your local computer (Step 4 in Configure the
Management Center Service Provider Application for Okta, on page 137), you can upload the file to the
management center:
a. Click the Upload XML File radio button.
b. Follow the on-screen instructions to navigate to and choose the XML metadata file on your local
computer.
What to do next
You may optionally configure user role mapping for SSO users; see Configure User Role Mapping for Okta
at the Management Center, on page 140. If you choose not to configure role mapping, by default all SSO users
that log into the management center are assigned the user role you configure in Step 4 of Configure User Role
Mapping for Okta at the Management Center, on page 140.
Procedure
Step 5 Enter a Group Member Attribute. This string must match an attribute name configured at the Okta
management center provider application for user role mapping for either users or groups. (See Step 1 of
Configure a User Attribute for Role Mapping at the Okta IdP, on page 141 or Step 1 of Configure a Group
Attribute for Role Mapping at the Okta IdP, on page 142 .)
Step 6 Next to each management center user role you wish to assign to SSO users, enter a regular expression. (The
management center uses a restricted version of Google's RE2 regular expression standard supported by Golang
and Perl.) The management center compares these values against the user role mapping attribute value the
IdP sends to the management center with SSO user information. The management center grants users a union
of all the roles for which a match is found.
What to do next
• Configure user role mapping at the service provider application; see Configure User Role Mapping at
the Okta IdP, on page 141.
When an SSO user logs in to the management center, Okta presents to the management center a user or group
role attribute value configured at the Okta IdP. The management center compares that attribute value against
the regular expressions assigned to each management center user role in the SSO configuration, and grants
the user all the roles for which a match is found. (If no match is found, the management center grants the user
a configurable default user role.) The expression you assign to each management center user role must comply
with the restricted version of Google's RE2 regular expression standard supported by Golang and Perl. The
management center treats the attribute value received from Okta as a regular expression using that same
standard for purposes of comparison with the management center user role expressions.
Note A single management center cannot support role mapping for both groups and individual users; you must
choose one mapping method for the management center service provider application and use it consistently.
Furthermore, the management center can support group role mapping using only one group attribute statement
per management center service provider application configured in Okta. Generally group-based roll mapping
is more efficient for a management center with many users. You should take into account user and group
definitions established throughout your Okta org.
• Okta user profiles, which can be extended with any custom attribute.
• App user profiles, which can be extended only with attributes from a predefined list that Okta generates
by querying a third-party application or directory (such as Active directory, LDAP, or Radius) for
supported attributes.
You may use either type of user profile in your Okta org; consult Okta documentation for information on how
to configure them. Whichever type of user profile you use, to support user role mapping with the management
center you must configure a custom attribute in the profile to convey each user's role mapping expression to
the management center.
This documentation describes role mapping using Okta user profiles; mapping with App profiles requires
familiarity with the third-party user management application in use at your organization to set up custom
attributes. See the Okta documentation for details.
Procedure
Step 2 For each user assigned to the management center service provider application using this profile, assign a value
to the user role attribute you have just created.
Use an expression to represent the role or roles the management center will assign to the user. The management
center compares this string against the expressions you assigned to each management center user role in Step
6 of Configure User Role Mapping for Okta at the Management Center, on page 140. (For purposes of
comparison with the management center user role expressions, the management center treats the attribute
value received from Okta as an expression complying with the restricted version of Google's RE2 regular
expression standard supported by Golang and Perl.)
You may use either type of group in your Okta org; consult Okta documentation for information on how to
configure them. Whichever type of group you use, to support user role mapping with the management center
you must configure a custom attribute for the group to convey its role mapping expression to the management
center.
This documentation describes role mapping using Okta groups; mapping with application groups requires
familiarity with the third-party user management application in use at your organization to set up custom
attributes. See the Okta documentation for details.
Procedure
Create a new SAML group attribute for the management center service provider application:
• For Name, use the same string you entered at the management center SSO configuration for Group
Member Attribute. (See Step 5 in Configure User Role Mapping for Okta at the Management Center,
on page 140.)
• For Filter, specify an expression to represent the role or roles the management center will assign to the
members of the group. Okta compares this value against the names of the group(s) of which a user is a
member, and sends the management center the group names that match. The management center in turn
compares those group names against the regular expressions you assigned to each management center
user role in Step 6 of Configure User Role Mapping for Okta at the Management Center, on page 140.
Note You can configure management center roles to be mapped based on individual user permissions or based on
group permissions, but a single management center application cannot support role mapping for both groups
and individual users. Furthermore, the management center can support group role mapping using only one
group attribute statement per management center service provider application configured in Okta.
• In this diagram [email protected] uses the FMCrole value PolicyAdmin, and the management center
assigns him the roles Access Admin, Discovery Admin, and Intrusion Admin.
• Other users assigned to the Okta service application for this management center are assigned the default
user role Security Analyst (Read Only) for one of the following reasons:
• They have no value assigned to the FMCrole variable in their Okta user profile.
• The value assigned to the FMCrole variable in their Okta user profile does not match any expression
configured for a user role in the SSO configuration at the management center.
• In this diagram [email protected] is a member of the Okta IdP group PolicyAdmin, which matches the
expression ^(.*)Admin$. Okta sends the management center Sue's PolicyAdmin group membership, and
the management center assigns her the roles Access Admin, Discovery Admin, and Intrusion Admin.
Sue is also a member of the Okta group Maint, but because this group name does not match the expression
assigned to the group membership attribute in the Okta management center service application, Okta
does not send information about Sue's Maint group membership to the management center, and her
membership in the Maint group plays no part in the roles the management center assigns to her.
• In this diagram [email protected] is a member of the Okta IdP group Maint. This group name does
not match the expression ^(.*)Admin$, so, when [email protected] logs into the management center,
Okta does not send information about Sean's Maint group membership to the management center and
Sean is assigned the default user role (Security Analyst (Read Only)) rather than the Maintenance User
role.
These diagrams illustrate the importance of advance planning when establishing a role mapping strategy. In
this example, any Okta user with access to this management center who is a member of only the Maint group
can be assigned only the default user role. The management center supports using only one custom group
attribute in its Okta Service Application configuration. The expression you assign to that attribute and the
group names you establish to match against it must be carefully crafted. You can add more flexibility to role
mapping by using regular expressions in the user role assignment strings in the management center SSO
configuration. (The expression you assign to each management center user role must comply with the restricted
version of Google's RE2 regular expression standard supported by Golang and Perl.)
management center Configure the Management Center Service Provider Application for OneLogin,
on page 149
OneLogin Admin Enable Single Sign-On at the Management Center, on page 135
Portal
OneLogin Admin Configure the Management Center for OneLogin SSO, on page 151
Portal
OneLogin Admin Configure User Role Mapping for OneLogin at the Management Center, on
Portal page 152
management center Configure User Role Mapping at the OneLogin IdP, on page 153
Keep in mind that you can configure management center roles to be mapped based on individual users or
based on groups, but a single management center application cannot support role mapping for both groups
and individual users.
This documentation assumes you are already familiar with the OneLogin Admin Portal, and have an account
with Super User privilege. To configure user role mapping, you will also need a subscription to the OneLogin
Unlimited plan, which supports Custom User Fields. If you need more information, see the OneLogin
documentation available online.
you need to establish a fully functional SSO org; for instance, to create users and groups, or to import user
and group definitions from another user management application, see the OneLogin documentation.
Note If you plan to assign user groups to the management center application, do not also assign users within those
groups as individuals.
Note The management center cannot support role mapping using multiple SSO attributes; you must select either
user role mapping or grup role mapping and configure a single attribute to convey user role information from
OneLogin to the management center.
Note The system requires that user names for SSO accounts as well as the NameID
attribute the IdP sends to the management center during the SAML login process
must be both be valid email addresses. Many IdP's automatically use the username
of the user trying to logon as the NameID attribute, but you should confirm this
is the case for your IdP. Keep this in mind when configuring a service provider
application at your IdP and creating IdP user accounts that are to be granted SSO
access to the management center.
• Confirm the login URL for the target management center (https://ipaddress_or_hostname/).
Note If your management center web interface can be reached with multiple URLs.
(for instance, a fully-qualified domain name as well as an IP address), SSO users
must consistently access the management center using the login URL that you
configure in this task.
Procedure
Step 1 Create the management center service provider application using the SAML Test Connector (Advanced)
as its basis.
Step 2 Configure the application with the following settings:
• For the Audience (Entity ID), append the string /saml/metadata to the management center login URL.
For example: https://ExampleFMC/saml/metadata.
• For Recipient, append the string /saml/acs to the management center login URL. For example:
https://ExampleFMC/saml/acs.
• For ACS (Consumer) URL Validator, enter an expression that OneLogin uses to confirm it is using
the correct management center URL. You can create a simple validator by using the ACS URL and
altering it as follows:
• Append a ^ to the beginning of the ACS URL.
• Append a $ to the end of the ACS URL.
• Insert a \ preceding every / and ? within the ACS URL.
For example, for the ACS URL https://ExampleFMC/saml/acs, an appropriate URL validator would be
^https:\/\/2.gy-118.workers.dev/:443\/https\/ExampleFMC\/saml\/acs$.
• For ACS (Consumer) URL, append the string /saml/acs to the management center login URL. For
example: https://ExampleFMC/saml/acs.
• For Login URL, append the string /saml/acs to the management center login URL. For example:
https://ExampleFMC/saml/acs.
Step 3 Assign OneLogin users to the management center service provider application.
Step 4 (Optional) To make SSO setup at the management center easier, you can download the SAML XML metadata
for the management center service provider application from OneLogin to your local computer.
What to do next
Enable single sign-on; see Enable Single Sign-On at the Management Center, on page 135.
Procedure
Step 1 (This step continues directly from Enable Single Sign-On at the Management Center, on page 135.) At the
Configure OneLogin Metadata dialog, you have two choices:
• To enter the SSO configuration information manually:
a. Click the Manual Configuration radio button.
b. Enter the following SSO configuration values from the OneLogin service provide application:
• Identity Provider Single Sign-On URL: Enter the SAML 2.0 Endpoint (HTTP) from
OneLogin.
• Identity Provider Issuer: Enter the Issuer URL from OneLogin.
• X.509 Certificate: Enter the X.509 Certificate from OneLogin.
• If you saved the XML metadata file generated by OneLogin to your local computer (Step 4 in Configure
the Management Center Service Provider Application for OneLogin, on page 149), you can upload the
file to the management center:
a. Click the Upload XML File radio button.
b. Follow the on-screen instructions to navigate to and choose the XML metadata file on your local
computer.
What to do next
You may optionally configure user role mapping for SSO users; see Configure User Role Mapping for
OneLogin at the Management Center, on page 152. If you choose not to configure role mapping, by default
all SSO users that log into the management center are assigned the user role you configure in Step 4 of
Configure User Role Mapping for OneLogin at the Management Center, on page 152.
Procedure
Step 1 Choose System ( ) > Users > Single Sign-OnSystem > Users.
Step 2 Expand Advanced Configuration (Role Mapping).
Step 3 Select a management center user role to assign to users as a default value from the Default User Role
drop-down.
Step 4 Enter a Group Member Attribute. This string must match the field name for a custom parameter you define
for role mapping at the management center service provider application in OneLogin. (See Step 1 of Configure
User Role Mapping for Individual Users at the OneLogin IdP, on page 154 or Step 1 of Configure User Role
Mapping for Groups at the OneLogin IdP, on page 155.)
Step 5 Next to each management center user roll you wish to assign to SSO users, enter a regular expression. The
management center compares these values against the user role mapping attribute the IdP sends to the
management center with SSO user information. The management center grants users a union of all the roles
for which a match is found.
What to do next
Configure user role mapping at the service provider application; see Configure User Role Mapping at the
OneLogin IdP, on page 153.
When an SSO user logs into the management center, OneLogin presents to the management center a user or
group role attribute value that gets its value from a custom user field configured at the OneLogin IdP. The
management center compares that attribute value against the regular expression assigned to each management
center user role in the SSO configuration, and grants the user all the roles for which a match is found. (If no
match is found, the management center grants the user a configurable default user role.) The expression you
assign to each management center user role must comply with the restricted version of Google's RE2 regular
expression standard supported by Golang and Perl. The management center treats the attribute value received
from OneLogin as a regular expression using that same standard for purposes of comparison with the
management center user role expressions.
Note A single management center cannot support role mapping for both groups and individual users; you must
choose one mapping method for the management center service provider application and use it consistently.
The management center can support role mapping using only one custom user field configured in OneLogin.
Generally group-based role mapping is more efficient for a management center with many users. You should
take into account user and group definitions established throughout your OneLogin subdomain.
Configure User Role Mapping for Individual Users at the OneLogin IdP
Use the OneLogin Admin Portal to create a custom parameter for the management center service provider
application and a custom user field. These provide the means for OneLogin to pass user role information to
the management center during the SSO login process.
Procedure
Step 1 Create a custom parameter for the management center service provider application.
• For the Field Name, use the same name you used for the Group Member Attribute in the management
center SSO configuration. (See Step 4 in Configure User Role Mapping for OneLogin at the Management
Center, on page 152.)
• For the Value, provide a mnemonic name such as FMCUserRole. This must match the name of the customer
user field you will configure in Step 2 of this procedure.
Step 2 Create a custom user field to contain user role information for each OneLogin user with access the management
center.
• For the field Name, provide a mnemonic name such as FMCUserRole. This must match the value provided
for the application custom parameter described in Step 1 of this procedure.
• For the Short name, provide an abbreviated alternate name for the field. (This is used for OneLogin
programmatic interfaces.)
Step 3 For each user with access to the management center service provider application, assign a value to the custom
user field you created in Step 2 of this procedure.
When a user logs into the management center using SSO, the value you assign to this field for that user is the
value the management center compares against the expressions you assigned to management center user roles
in the SSO configuration. (See Step 5 in Configure User Role Mapping for OneLogin at the Management
Center, on page 152.)
What to do next
• Test your role mapping scheme by logging into the management center using SSO from various accounts
and confirming that users are assigned management center user roles as you expect.
You may user either type of group for management center group role mapping. This documentation describes
role mapping using OneLogin groups; using third-party application groups requires familiarity with the
third-party user management application in use at your organization. See the OneLogin documentation for
details.
Procedure
Step 1 Create a custom parameter for the management center service provider application.
• For the Field Name, use the same name you used for the Group Member Attribute in the management
center SSO configuration. (See Step 4 in Configure User Role Mapping for OneLogin at the Management
Center, on page 152.)
• For the Value, provide a mnemonic name such as FMCUserRole. This must match the name of the customer
user field you will configure in Step 2 of this procedure.
Step 2 Create a custom user field to contain user role information for each OneLogin user with access the management
center.
• For the field Name, provide a mnemonic name such as FMCUserRole. This must match the value provided
for the application custom parameter described in Step 1 of this procedure.
• For the Short name, provide an abbreviated alternate name for the field. (This is used for OneLogin
programmatic interfaces.)
Step 3 Create one or more user field mappings to assign group-based values to the custom user field you created in
Step 2 of this procedure. Create as many mappings as you need to assign the correct management center user
role to each OneLogin user group.
• Create one or more Conditions for the mapping, comparing the user Group field against group names.
• If you create multiple Conditions, choose whether a user's group must match any or all of the conditions
for the mapping to take place.
• Create an Action for the mapping, to assign a value to the custom user field you created in Step 2 of this
procedure. Provide the field Name, and the string that OneLogin assigns to this custom user field for all
users that meet the Conditions you specified.
The management center compares this string against the expressions you assign to each management
center user role in Step 5 of Configure User Role Mapping for OneLogin at the Management Center, on
page 152.
• Reapply All Mappings when you have completed your changes.
What to do next
• Test your role mapping scheme by logging into the management center using SSO from various accounts
and confirming that users are assigned management center user roles as you expect.
Note A single management center cannot support role mapping for both groups and individual users; you must
choose one mapping method for the management center service provider application and use it consistently.
The management center can support role mapping using only one custom user field configured in OneLogin.
Generally group-based role mapping is more efficient for a management center with many users. You should
take into account user and group definitions established throughout your OneLogin subdomain.
• In this diagram [email protected] uses the FMCUserRole value FMCAdmin, and the management center
assigns her the Administrator role.
• Other users assigned to the OneLogin service application for this management center are assigned the
default user role Security Analyst (Read Only) for one of the following reasons:
• In this diagram [email protected] is a member of the OneLogin IdP group FMCAdminGroup. A OneLogin
mapping assigns the value FMCAdmin to the custom user field FMCUserRole for members of the
FMCAdminGroup. The management center assigns Sue and other members of the FMCAdminGroup the
Administrator role.
• In this diagram [email protected] is a member of the Idp group FMCMaintGroup. There is no OneLogin
mapping associated with this group, so OneLogin does not assign a value to the custom user field
FMCUserRole for Sean. The management center assigns Sean the default user role (Security Analyst
(Read Only)) rather than the Maintenance User role.
Azure AD Portal Configure the Management Center Service Provider Application for Azure, on
page 161
management center Enable Single Sign-On at the Management Center, on page 135
management center Configure the Management Center for Azure SSO, on page 163
management center Configure User Role Mapping for Azure at the Management Center, on page
164
Azure AD Portal Configure User Role Mapping at the Azure IdP, on page 165
This documentation assumes you are already familiar with the Azure Active Directory Portal and have an
account with application admin privileges for the Azure AD tenant. Keep in mind that the management center
supports Azure SSO only with tenant-specific single sign-on and single sign-out endpoints. You must have
an Azure AD Premium P1 or above license and Global Administrator permissions; see Azure documentation
for more information.
Note If you plan to assign user groups to the management center application, do not also assign users within those
groups as individuals.
Note The management center cannot support role mapping using multiple SSO attributes; you must select either
user role mapping or grup role mapping and configure a single attribute to convey user role information from
OneLogin to the management center.
Note The system requires that user names for SSO accounts as well as the NameID
attribute the IdP sends to the management center during the SAML login process
must be both be valid email addresses. Many IdP's automatically use the username
of the user trying to logon as the NameID attribute, but you should confirm this
is the case for your IdP. Keep this in mind when configuring a service provider
application at your IdP and creating IdP user accounts that are to be granted SSO
access to the management center.
• Confirm the login URL for the target management center (https://ipaddress_or_hostname)
Note If your management center web interface can be reached with multiple URLs
(for instance, a fully-qualified domain name as well as an IP address), SSO users
must consistently access the management center using the login URL that you
configure in this task.
Procedure
Step 1 Create the management center service provider application using the Azure AD SAML Toolkit as its basis.
Step 2 Configure the application with the following setttings for Basic SAML Configuration:
• For the Identifier (Entity ID) append the string /saml/metadata to the management center login URL.
For example: https://ExampleFMC/saml/metadata.
• For the Reply URL (Assertion Consumer Service URL) append the string /saml/acs to the management
center login URL. For example: https://ExampleFMC/saml/acs.
• For the Sign on URL append the string /saml/acs to the management center login URL. For example:
https://ExampleFMC/saml/acs.
Step 3 Edit the Unique User Identifier Name (Name ID) claim for the application to force the username for sign-on
at the management center to be the email address associated with the user account:
• For Source choose Attribute.
Step 4 Generate a certificate to secure SSO on the management center. Use the following options for the certificate:
• Select Sign SAML Response and Assertion for the Signing Option.
• Select SHA-256 for the Signing Algorithm.
Step 5 Download the Base-64 version of the certificate to your local computer; you will need it when you configure
Azure SSO at the management center web interface
Step 6 In the SAML-based Sign-on information for the application, note the following values:
• Login URL
• Azure AD Identifier
You will need these values when you configure Azure SSO at the management center web interface.
Step 7 (Optional) to make SSO setup at the management center easier, you can download the SAML XML metadata
file for the management center service provider application (called the Federation Metadata XML in the
Azure Portal) to your local computer.
Step 8 Assign existing Azure users and groups to the management center service application.
Note If you plan to assign user groups to the management center Application, do not also assign users
within those groups as individuals.
Note If you plan to configure user role mapping, you can configure roles to be mapped based on
individual user permissions or based on group permissions, but a single management center
application cannot support role mapping for both groups and individual users.
What to do next
Enable single sign-on; see Enable Single Sign-On at the Management Center, on page 135.
Procedure
Step 1 (This step continues directly from Enable Single Sign-On at the Management Center, on page 135.) At the
Configure Azure Metadata dialog, you have two choices:
• To enter the SSO configuration information manually:
• For Identity Provider Single Sign-On URL enter the Login URL you noted in Step 6 of Configure
the Management Center Service Provider Application for Azure, on page 161.
• For Identity Provider Issuer enter the Azure AD Identifier you noted in Step 6 of Configure the
Management Center Service Provider Application for Azure, on page 161.
• For the X.509 Certificate, use the certificate you downloaded from Azure in Step 5 of Configure
the Management Center Service Provider Application for Azure, on page 161. (Use a text editor to
open the certificate file, copy the contents, and paste it into the X.509 Certificate field.)
• If you saved the XML metadata file generated by Azure to your local computer (Step 7 of Configure the
Management Center Service Provider Application for Azure, on page 161), you can upload the file the
management center:
a. Click the Upload XML File radio button.
b. Follow the on-screen instructions to navigate to and choose the XML metadata file on your local
computer.
What to do next
You may optionally configure role mapping for SSO users; see Configure User Role Mapping for Azure at
the Management Center, on page 164. If you choose not to configure role mapping, by default all SSO users
that log into the management center are assigned the default user role you configure in Step 4 of Configure
User Role Mapping for Azure at the Management Center, on page 164.
Procedure
What to do next
Configure user role mapping at the service provider application; see Configure User Role Mapping at the
Azure IdP, on page 165.
When an SSO user logs into the management center, Azure presents to the management center a user or group
role attribute value that gets its value from an application role configured at the Azure AD Portal. The
management center compares that attribute value against the regular expression assigned to each management
center user role in the SSO configuration, and grants the user all the roles for which a match is found. (If no
match is found, the management center grants the user a configurable default user role.) The expression you
assign to each management center user role must comply with the restricted version of Google's RE2 regular
expression standard supported by Golang and Perl. The management center treats the attribute value received
from Azure as a regular expression using that same standard for purposes of comparison with the management
center user role expressions.
Note A single management center cannot support role mapping for both groups and individual users; you must
choose one mapping method for the management center service provider application and use it consistently.
The management center can support role mapping using only one claim configured in Azure. Generally
group-based role mapping is more efficient for a management center with many users. You should take into
account user and group definitions established throughout your Azure tenant.
Configure User Role Mapping for Individual Users at the Azure IdP
To establish role mapping for individual users of the management center service application in Azure, use the
Azure AD Portal to add a claim to the application, add roles to the application's registration manifest, and
assign roles to users.
Procedure
Step 1 Add a user claim to the SSO configuration for the management center service application with the following
characteristics:
• Name: Use the same string you entered for the Group Member Attribute in the management center
SSO configuration. (See Step 5 in Configure User Role Mapping for Azure at the Management Center,
on page 164.)
• Name identifier format: Choose Persistent.
• Source: Choose Attribute.
• Source attribute: Choose user.assignedroles.
Step 2 Edit the manifest for the management center service application (in JSON format) and add application roles
to represent management center user roles you wish to assign to SSO users. The simplest approach is to copy
an existing application role definition and change the following properties:
• displayName: The name for the role that will appear in the AD Azure Portal.
• description: A brief description of the role.
• Id: An alphanumeric string that must be unique among ID properties within the manifest.
• value: A string to represent one or more management center user roles. (Note: Azure does not permit
spaces in this string.)
Step 3 For each user assigned to the management center Service application, assign one of the application roles you
have added to the manifest for that application. When a user logs in to the management center using SSO, the
application role you assign to that user is the value Azure sends to the management center in the claim for the
service application. The management center compares the claim against the expressions you assigned to
management center user roles in the SSO configuration (See Step 6 of Configure User Role Mapping for
Azure at the Management Center, on page 164.), and assigns the user all the management center user roles for
which there is a match.
What to do next
• Test your role mapping scheme by logging into the management center using SSO from various accounts
and confirming that users are assigned management center user roles as you expect.
Procedure
Step 1 Add a user claim to the SSO configuration for the management center service application with the following
characteristics:
• Name: Use the same string you entered for the Group Member Attribute in the management center
SSO configuration. (See Step 5 in Configure User Role Mapping for Azure at the Management Center,
on page 164.)
• Name identifier format: Choose Persistent.
• Source: Choose Attribute.
• Source attribute: Choose user.assignedroles.
Step 2 Edit the manifest for the management center service application (in JSON format) and add application roles
to represent management center user roles you wish to assign to SSO users. The simplest approach is to copy
an existing application role definition and change the following properties:
• displayName: The name for the role that will appear in the Ad Azure Portal.
• description: A brief description of the role.
• Id: An alphanumeric string that must be unique among id properties within the manifest.
• value: A string to represent one or more management center user roles. (Azure does not permit spaces
in this string.)
Step 3 For each group assigned to the management center Service application, assign one of the application roles
you have added to the manifest for that application. When a user logs in to the management center using SSO,
the application role you assign to that user's group is the value Azure sends to the management center in the
claim for the service application. The management center compares the claim against the expressions you
assigned to management center user roles in the SSO configuration (see Step 6 of Configure User Role Mapping
for Azure at the Management Center, on page 164), and assigns the user all the management center user roles
for which there is a match.
What to do next
Test your role mapping scheme by logging into the management center using SSO from various accounts and
confirming that users are assigned management center user roles as you expect.
Note You can configure management center roles to be mapped based on individual permissions or based on group
permissions, but a single management center application cannot support role mapping for both groups and
individual users. The management center can support role mapping using only one claim configured in Azure.
• In this diagram fred @ example .com uses the assignedroles attribute value PolicyAdmin, and the
management center assigns him the roles Access Admin, Discovery Admin, and Intrusion Admin.
• Other users assigned to the Azure service application for this management center are assigned the default
user role Security Analyst (Read Only) for one of the following reasons:
• In this diagram [email protected] is a member of the FMCAdmins group, from which he inherits the
custom role FMCAdmin. When Fred logs into the management center using SSO the management center
assigns him the Administrator role.
• In this diagram [email protected] is a member of the FMCMaintUsers group, but because no custom
role has been assigned to FMCMaintUsers within the Azure management center service provider application,
Sean has no roles assigned to him, and when he logs into the management center using SSO, the
management center assigns him the default role Security Analyst (Read Only).
PingOne for Review the PingID PingOne for Customers Environment, on page 174.
Customers
Administrator's
Console
PingOne for Configure the Management Center Service Provider Application for PingID
Customers PingOne for Customers, on page 174.
Administrator's
Console
management center Enable Single Sign-On at the Management Center, on page 135.
management center Configure the Management Center for SSO with PingID PingOne for Customers,
on page 176.
This documentation assumes you are already familiar with the PingOne for Customers Administrator Console
and have an account with the Organization Admin role.
Configure the Management Center Service Provider Application for PingID PingOne for Customers
Use the PingOne for Customers Administrator Console to create a management center service provider
application within your PingOne for Customers environment and establish basic configuration settings. This
documentation does not describe all the PingOne for Customers functions you need to establish a fully
functional SSO environment; for instance, to create users see the PingOne for Customers documentation.
Note The system requires that user names for SSO accounts as well as the NameID
attribute the IdP sends to the management center during the SAML login process
must be both be valid email addresses. Many IdP's automatically use the username
of the user trying to logon as the NameID attribute, but you should confirm this
is the case for your IdP. Keep this in mind when configuring a service provider
application at your IdP and creating IdP user accounts that are to be granted SSO
access to the management center.
• Confirm the login URL for the target management center (https://ipaddress_or_hostname)
Note If your management center web interface can be reached with multiple URLs
(for instance, a fully-qualified domain name as well as an IP address), SSO users
must consistently access the management center using the login URL that you
configure in this task.
Procedure
Step 1 Use the PingOne for Customer Administrator Console to create the application in your environment using
these settings:
• Choose the Web App application type.
• Choose the SAML connection type.
Step 2 Configure the application with the following settings for the SAML Connection:
• For the ACS URL, append the string /sam/acs to the management center login URL. For example:
https://ExampleFMC/saml/acs.
Step 3 In the SAMLConnection information for the application, note the following values:
• Single Sign-On Service
• Issuer ID
You will need these values when you configure SSO using PingID's PingOne for Customers product at the
management center web interface.
Step 4 For SAML ATTRIBUTES, make the following selections for a single required attribute:
• PINGONE USER ATTRIBUTE: Email Address
Step 5 Download the signing certificate in X509 PEM (.crt) format and save it to your local computer.
Step 6 (Optional) to make SSO setup at the management center easier, you can download the SAML XML metadata
file for the management center service provider application to your local computer.
What to do next
Enable single sign-on; see Enable Single Sign-On at the Management Center, on page 135.
Configure the Management Center for SSO with PingID PingOne for Customers
Use these instructions at the management center web interface.
Procedure
Step 1 (This step continues directly from Enable Single Sign-On at the Management Center, on page 135.) At the
Configure PingID Metadata dialog, you have two choices:
• To enter the SSO configuration information manually:
a. Click the Manual Configuration radio button.
b. Enter the values you retrieved from the PingOne for Customers Administrator Console:
• For Identity Provider Single Sign-On URL enter the Single Signon Service you noted in Step
3 of Configure the Management Center Service Provider Application for PingID PingOne for
Customers, on page 174.
• For Identity Provider Issuer enter the Issuer ID you noted in Step 3 of Configure the
Management Center Service Provider Application for PingID PingOne for Customers, on page
174.
• For the X.509 Certificate, use the certificate you downloaded from PingOne for Customers in
Step 5 of Configure the Management Center Service Provider Application for PingID PingOne
for Customers, on page 174. (Use a text editor to open the certificate file, copy the contents, and
paste it into the X.509 Certificate field.)
• If you saved the XML metadata file generated by PingOne for Customers to your local computer (Step
6 of Configure the Management Center Service Provider Application for PingID PingOne for Customers,
on page 174), you can upload the file to the management center:
a. Click the Upload XML File radio button.
b. Follow the on-screen instructions to navigate to and choose the XML metadata file on your local
computer.
Familiarize Yourself with the SSO Identity Provider and the SSO Federation
Read the IdP vendor documentation with the following considerations in mind:
• Does the SSO provider require that users subscribe to or register with any services before using the IdP?
• What terminology does the SSO provider use for common SSO concepts? For instance, to refer to a
group of federated service provider applications, Okta uses "org" where Azure uses "tenant."
• Does the SSO provider support SSO exclusively, or a suite of functions—for instance, multifactor
authentication or domain management? (This can affect configuration of some elements shared between
features—especially users and groups.)
• What permissions does an IdP user account need to configure SSO?
• What configurations does the SSO provider require you to establish for a service provider application?
For instance, Okta automatically generates an X509 Certificate to secure its communications with the
management center, while Azure requires that you generate that certificate using the Azure portal interface.
• How are users and groups created and configured? How are users assigned to groups? How are users
and groups granted access to service provider applications?
• Does the SSO provider require that at least one user be assigned to a service provider application before
the SSO connection can be tested?
• Does the SSO provider support user groups? How are user and group attributes configured? How can
you map attributes to management center user roles in the SSO configuration?
• Do you need to add more users or groups to the federation to support SSO on the management center?
• Are users within the federation members of groups?
• Are user and group definition native to the IdP or imported from a user management application such as
Active Directory, RADIUS, or LDAP?
• What kind of user role assignments do you want to make? (If you choose not to assign user roles, the
management center automatically assigns the user a configurable default user role role to all SSO users.)
• How must users and groups within the federation be organized to support your plan for user role mapping?
Configure Management Center Service Provider Application for Any SAML 2.0-Compliant SSO
Provider
Generally SSO providers require that you configure a service provider application at the IdP for each federated
application. All IdPs that support SAML 2.0 SSO need the same configuration information for service provider
applications, but some IdP's automatically generate some configuration settings for you, while others require
that you configure all settings yourself.
Note If you plan to assign user groups to the management center Application, do not also assign users within those
groups as individuals.
Note The management center cannot support role mapping using multiple SSO attributes; you must select either
user role mapping or group role mapping and configure a single attribute to convey user role information from
the IdP to the management center.
Note The system requires that user names for SSO accounts as well as the NameID
attribute the IdP sends to the management center during the SAML login process
must be both be valid email addresses. Many IdP's automatically use the username
of the user trying to logon as the NameID attribute, but you should confirm this
is the case for your IdP. Keep this in mind when configuring a service provider
application at your IdP and creating IdP user accounts that are to be granted SSO
access to the management center.
• Confirm the login URL for the target management center (https://ipaddress_or_hostname)
Note If your management center web interface can be reached with multiple URLs.
(for instance, a full-qualified domain name as well as an IP address), SSO users
must consistently access the management center using the login URL that you
configure in this task.
Procedure
• Service Provider Entity ID, Service Provider Identifier, Audience URI: A globally unique name for the
service provider (the management center), formatted as a URL. To create this, append the string
/saml/metadata to the management center login URL, such as https://ExampleFMC/saml/metadata.
• Single Sign on URL, Recipient URL, Assertion Consumer Service URL: The service provider
(management center) address to which the browser sends information on behalf of the IdP. To create
this, append the string saml/acs to the management center login URL, such as
https://ExampleFMC/saml/acs.
• X.509 Certificate: Certificate to secure communications between the management center and the IdP.
Some IdP's may automatically generate the certificate, and some may require that you explicitly generate
it using the IDP interface.
Step 3 (Optional if you are assigning groups to the application) Assign individual users to the management center
application. (If you plan to assign groups to the management center application, do not assign members of
those groups as individuals.)
Step 4 (Optional if you are assigning individual users to the application.) Assign user groups to the management
center application.
Step 5 (Optional) Some IdP's provide the ability to generate a SAML XML metadata file containing the information
you have configured in this task formatted to comply with SAML 2.0 standards. If your IdP provides this
ability, you can download the file to your local computer to ease the SSO configuration process at the
management center.
What to do next
Enable single sign-on; see Enable Single Sign-On at the Management Center, on page 135.
Configure the Management Center for SSO Using Any SAML 2.0-Compliant SSO Provider
Use these instructions at the management center web interface. To configure the management center for SSO
using any SAML 2.0-compliant SSO provider, you need information from the IdP.
• Enable single sign-on; see Enable Single Sign-On at the Management Center, on page 135.
Procedure
Step 1 (This step continues directly from Enable Single Sign-On at the Management Center, on page 135.) At the
Configure SAML Metadata dialog, you have two choices:
• To enter the SSO configuration information manually:
a. Click the Manual Configuration radio button.
b. Enter the following values previously obtained from the SSO Service Provider application:
• Identity Provider Single Sign-On URL
• Identity Provider Issuer
• X.509 Certificate
• If you saved an the XML metadata file generated at the IdP (Step 5 in Configure Management Center
Service Provider Application for Any SAML 2.0-Compliant SSO Provider, on page 178), you can upload
the file to the management center:
a. Click the Upload XML File radio button.
b. Follow the on-screen instructions to navigate to and choose the XML metadata file on your local
computer.
What to do next
You may optionally configure user role mapping for SSO users; see Configure User Role Mapping at the
Management Center for SAML 2.0-Compliant SSO Providers, on page 181. If you choose not to configure
role mapping, by default all SSO users that log into the management center are assigned the default user role
you configure in Step 4 of Configure User Role Mapping at the Management Center for SAML 2.0-Compliant
SSO Providers, on page 181.
Configure User Role Mapping at the Management Center for SAML 2.0-Compliant SSO Providers
To implement SAML SSO user role mapping you must establish coordinating configurations at the IdP and
at the management center.
• At the IdP, establish user or group attributes to convey user role information and assign values to them;
the IdP sends these to the management center once it has authenticated and authorized an SSO user.
• At the management center, associate values with each of the management center user roles you want to
assign to users.
When the IdP sends the management center the user or group attribute associated with an authorized user, the
management center compares the attribute value against values associated with each management center user
role, and assigns the user all the roles that produce a match. The management center performs this comparison
treating both values as regular expressions complying with the restricted version of Google's RE2 regular
expression standard supported by Golang and Perl.
The fields to configure for user role mapping at the management center web interface are the same regardless
of your choice of SSO provider. But the values you configure must take into account how the SAML SSO
provider you use implements user role mapping. Your IdP may enforce syntactical limitations on user or
group attributes; if so, you must devise a user role mapping scheme using role names and regular expressions
compatible with those requirements.
Procedure
What to do next
Configure user role mapping at the service provider application; see Configure Management Center User Role
Mapping at the IdP for SAML 2.0-Compliant SSO Providers, on page 182.
Configure Management Center User Role Mapping at the IdP for SAML 2.0-Compliant SSO Providers
The detailed steps for configuring user role mapping are different for each IdP. You must determine how to
create a custom user or group attribute for the service provider application, and assign values to the attribute
for each user or group at the IdP to convey user or group privileges to the management center. Keep in mind
the following:
• If your IdP imports user or group profiles from a third-party user management application (such as Active
directory, LDAP, or Radius), this may affect how you can use attributes for role mapping.
• Take into account user and group role definitions throughout your SSO federation.
• The management center cannot support role mapping using multiple SSO attributes; you must select
either user role mapping or group role mapping and configure a single attribute to convey user role
information from the IdP to the management center.
• Group role mapping is generally more efficient for a management center with many users.
• If you assign user groups to management center applications, do not also assign users within those groups
as individuals.
• For the purpose of determining a match with management center user roles, the management center treats
user and group role attribute values received from the IdP as regular expressions complying with the
restricted version of Google's RE2 regular expression standard supported by Golang and Perl. Your IdP
may enforce certain syntactical limitations on user or group attributes. if so, you must devise a user role
mapping scheme using role names and regular expressions compatible with those requirements.
Procedure
Step 1 At the IdP, create or designate an attribute to be sent to the management center to contain role mapping
information for each user sign-in. This may be a user attribute, a group attribute, or a different attribute that
obtains its value from a source such as user or group definitions maintained by the IdP or a third party user
management application.
Step 2 Configure how the attribute gets its value. Coordinate the possible values with the values associated with the
user roles in the management center SSO configuration.
Procedure
• Click the Copy ( ) next to the user role you want to copy.
• Import a custom user role from another management center:
a. On the other management center, click the Export ( ) to save the role to your computer.
b. On the new management center, choose System ( ) > Tools > Import/Export.
c. Click Upload Package, then follow the instructions to import the saved user role to the new
management center.
Step 4 Enter a Name for the new user role. User role names are case sensitive.
Step 5 (Optional) Add a Description.
Step 6 Choose Menu-Based Permissions for the new role.
When you choose a permission, all of its children are chosen, and the multi-value permissions use the first
value. If you clear a high-level permission, all of its children are cleared also. If you choose a permission but
not its children, it appears in italic text.
Copying a predefined user role to use as the base for your custom role preselects the permissions associated
with that predefined role.
You can apply restrictive searches to a custom user role. These searches constrain the data a user can see in
the tables on the pages available under the Analysis menu. You can configure a restrictive search by first
creating a private saved search and selecting it from the Restrictive Search drop-down menu under the
appropriate menu-based permission.
Step 7 (Optional) Check the External Database Access (Read Only) check box to set database access permissions
for the new role.
This option provides read-only access to the database using an application that supports JDBC SSL connections.
For the third-party application to authenticate to the management center, you must enable database access in
the system settings.
Step 8 (Optional) To set escalation permissions for the new user role, see Enable User Role Escalation, on page 186.
Step 9 Click Save.
The custom role is saved. If the system determines it is a read-only role, it labels the role with '(Read Only)'.
This is relevant when configuring the number of concurrent sessions for read-only vs read-write users. You
cannot make a role read-only by adding '(Read Only)' to the role name. For more information on concurrent
session limits, see User Configuration, on page 97.
Example
You can create custom user roles for access control-related features to designate whether users can
view and modify access control and associated policies.
The following table shows how to differentiate between network administrators, who should be able
to configure all aspects of access control policies except the intrusion configuration, and intrusion
administrators, who should be able to configure intrusion-related features only. The Modify Threat
Configuration permission allows the selection of intrusion policy, variable set, and file policy in a
rule, the configuration of the advanced options for network analysis and intrusion policies, the
configuration of the Security Intelligence policy for the access control policy, and intrusion actions
in the policy default action. The Modify Remaining Access Control Policy Configuration permission
covers all other aspects of the policy and rules, including creating and deleting them. In this example,
Policy Approvers can view (but not modify) access control and intrusion policies. They can also
deploy configuration changes to devices.
Procedure
Procedure
Step 1 Set the Escalation Target Role, on page 186. Only one user role at a time can be the escalation target role.
Step 2 Configure a Custom User Role for Escalation, on page 187.
Step 3 (For the logged in user) Escalate Your User Role, on page 187.
Procedure
Procedure
Step 1 Begin configuring your custom user role as described in Create Custom User Roles, on page 183.
Step 2 In System Permissions, choose the Set this role to escalate to: Maintenance User check box.
The current escalation target role is listed beside the check box.
Step 3 Choose the password that this role uses to escalate. You have two options:
• Choose Authenticate with the assigned user’s password if you want users with this role to use their
own passwords when they escalate, .
• Choose Authenticate with the specified user’s password and enter that username if you want users
with this role to use the password of another user.
Note When authenticating with another user’s password, you can enter any username, even that
of a deactivated or nonexistent user. Deactivating the user whose password is used for
escalation makes escalation impossible for users with the role that requires it. You can use
this feature to quickly remove escalation powers if necessary.
Procedure
Step 1 From the drop-down list under your user name, choose Escalate Permissions.
If you do not see this option, your administrator did not enable escalation for your user role.
• If you typed in your base-distinguished name, click Fetch DNs to retrieve all the available base
distinguished names on the server, and select the name from the list.
• If you are using any filters, access attributes, or advanced settings, check that each is valid and typed
correctly.
• If you are using any filters, access attributes, or advanced settings, try removing each setting and testing
the object without it.
• If you are using a base filter or a CLI access filter, make sure that the filter is enclosed in parentheses
and that you are using a valid comparison operator (maximum 450 characters, including the enclosing
parentheses).
• To test a more restricted base filter, try setting it to the base distinguished name for the user to retrieve
just that user.
• If you are using an encrypted connection:
• Check that the name of the LDAP server in the certificate matches the host name that you use to
connect.
• Check that you have not used an IPv6 address with an encrypted server connection.
• If you are using a test user, make sure that the user name and password are typed correctly.
• If you are using a test user, remove the user credentials and test the object.
• Test the query that you are using by connecting to the LDAP server and using this syntax:
ldapsearch -x -b 'base_distinguished_name'
-h LDAPserver_ip_address -p port -v -D
'user_distinguished_name' -W 'base_filter'
For example, if you are trying to connect to the security domain on myrtle.example.com using the
[email protected] user and a base filter of (cn=*), you could test the connection using
this statement:
ldapsearch -x -b 'CN=security,DC=myrtle,DC=example,DC=com'
-h myrtle.example.com -p 389 -v -D
'[email protected]' -W '(cn=*)'
If you can test your connection successfully but authentication does not work after you deploy a platform
settings policy, check that authentication and the object you want to use are both enabled in the platform
settings policy that is applied to the device.
If you connect successfully but want to adjust the list of users retrieved by your connection, you can add or
change a base filter or CLI access filter or use a more restrictive or less restrictive base DN.
While authenticating a connection to Active Directory (AD) server, rarely the connection event log indicates
blocked LDAP traffic although the connection to AD server is successful. This incorrect connection log occurs
when the AD server sends a duplicate reset packet. The threat defense device identifies the second reset packet
as part of a new connection request and logs the connection with Block action.
Procedure
Step 1 From the drop-down list under your user name, choose User Preferences.
Step 2 Click Change Password.
Step 3 Optionally, check the Show password check box to see the password while using this dialog.
Step 4 Enter your Current Password.
Step 5 You have two options:
• Enter your new password for New Password and Confirm Password.
• Click Generate Password to have the system create a password for you which complies with the listed
criteria. (Generated passwords are non-mnemonic; take careful note of the password if you choose this
option.)
Procedure
Tip When password strength checking is enabled, passwords must comply with the strong
password requirements described in Guidelines and Limitations for User Accounts for
Management Center, on page 112.
Procedure
Step 1 From the drop-down list under your user name, choose User Preferences. The General tab displays by
default.
Step 2 Select a theme:
• Light
• Dusk
• Classic (the look and feel of releases earlier than 6.6)
Procedure
Step 1 From the drop-down list under your user name, choose User Preferences.
Step 2 Click Home Page.
Step 3 Choose the page you want to use as your home page from the drop-down list.
The options in the drop-down list are based on the access privileges for your user account. For more information,
see User Roles, on page 108.
Procedure
Step 1 From the drop-down list under your user name, choose User Preferences.
Step 2 Click Event View Settings.
Step 3 In the Event Preferences section, configure the basic characteristics of event views; see Event View
Preferences, on page 192.
Step 4 In the File Preferences section, configure file download preferences; see File Download Preferences, on page
193.
Step 5 In the Default Time Windows section, configure the default time window or windows; see Default Time
Windows, on page 194.
Step 6 In the Default Workflow sections, configure default workflows; see Default Workflows, on page 195.
Step 7 Click Save.
• The Expand Packet View field allows you to configure how the packet view for intrusion events appears.
By default, the appliance displays a collapsed version of the packet view:
• None - collapse all subsections of the Packet Information section of the packet view
• Packet Text - expand only the Packet Text subsection
• Packet Bytes - expand only the Packet Bytes subsection
Regardless of the default setting, you can always manually expand the sections in the packet view to view
detailed information about a captured packet.
• The Rows Per Page field controls how many rows of events per page you want to appear in drill-down
pages and table views.
• The Refresh Interval field sets the refresh interval for event views in minutes. Entering 0 disables the
refresh option. Note that this interval does not apply to dashboards.
• The Statistics Refresh Interval controls the refresh interval for event summary pages such as the Intrusion
Event Statistics and Discovery Statistics pages. Entering 0 disables the refresh option. Note that this
interval does not apply to dashboards.
• The Deactivate Rules field controls which links appear on the packet view of intrusion events generated
by standard text rules:
• All Policies - a single link that deactivates the standard text rule in all the locally defined custom
intrusion policies
• Current Policy - a single link that deactivates the standard text rule in only the currently deployed
intrusion policy. Note that you cannot deactivate rules in the default policies.
• Ask - links for each of these options
To see these links on the packet view, your user account must have either Administrator or Intrusion Admin
access.
Caution Cisco strongly recommends you do not download malware, as it can cause adverse
consequences. Exercise caution when downloading any file, as it may contain
malware. Ensure you have taken any necessary precautions to secure the download
destination before downloading files.
Note that you can disable this option any time you download a file.
• When you download a captured file, the system creates a password-protected .zip archive containing the
file. The Zip File Password field defines the password you want to use to restrict access to the .zip file.
If you leave this field blank, the system creates archive files without passwords.
• The Show Zip File Password check box toggles displaying plain text or obfuscated characters in the
Zip File Password field. When this field is cleared, the Zip File Password displays obfuscated characters.
Note that, regardless of the default time window setting, you can always manually change the time window
for individual event views during your event analysis. Also, keep in mind that time window settings are valid
for only the current session. When you log out and then log back in, time windows are reset to the defaults
you configured on this page.
There are three types of events for which you can set the default time window:
• The Events Time Window sets a single default time window for most events that can be constrained by
time.
• The Audit Log Time Window sets the default time window for the audit log.
• The Health Monitoring Time Window sets the default time window for health events.
You can only set time windows for event types your user account can access. All user types can set event
time windows. Administrators, Maintenance Users, and Security Analysts can set health monitoring time
windows. Administrators and Maintenance Users can set audit log time windows.
Note that because not all event views can be constrained by time, time window settings have no effect on
event views that display hosts, host attributes, applications, clients, vulnerabilities, user identity, or compliance
allow list violations.
You can either use Multiple time windows, one for each of these types of events, or you can use a Single
time window that applies to all events. If you use a single time window, the settings for the three types of
time window disappear and a new Global Time Window setting appears.
There are three types of time window:
• static, which displays all the events generated from a specific start time to a specific end time
• expanding, which displays all the events generated from a specific start time to the present; as time moves
forward, the time window expands and new events are added to the event view
• sliding, which displays all the events generated from a specific start time (for example, one day ago) to
the present; as time moves forward, the time window “slides” so that you see only the events for the
range you configured (in this example, for the last day)
The maximum time range for all time windows is from midnight on January 1, 1970 (UTC) to 3:14:07 AM
on January 19, 2038 (UTC).
The following options appear in the Time Window Settings drop-down list:
• The Show the Last - Sliding option allows you configure a sliding default time window of the length
you specify.
The appliance displays all the events generated from a specific start time (for example, 1 hour ago) to
the present. As you change event views, the time window “slides” so that you always see events from
the last hour.
• The Show the Last - Static/Expanding option allows you to configure either a static or expanding
default time window of the length you specify.
For static time windows, enable the Use End Time check box. The appliance displays all the events
generated from a specific start time (for example, 1 hour ago) to the time when you first viewed the
events. As you change event views, the time window stays fixed so that you see only the events that
occurred during the static time window.
For expanding time windows, disable the Use End Time check box. The appliance displays all the
events generated from a specific start time (for example, 1 hour ago) to the present. As you change event
views, the time window expands to the present time.
• The Current Day - Static/Expanding option allows you to configure either a static or expanding default
time window for the current day. The current day begins at midnight, based on the time zone setting for
your current session.
For static time windows, enable the Use End Time check box. The appliance displays all the events
generated from midnight to the time when you first viewed the events. As you change event views, the
time window stays fixed so that you see only the events that occurred during the static time window.
For expanding time windows, disable the Use End Time check box. The appliance displays all the
events generated from midnight to the present. As you change event views, the time window expands to
the present time. Note that if your analysis continues for over 24 hours before you log out, this time
window can be more than 24 hours.
• The Current Week - Static/Expanding option allows you to configure either a static or expanding
default time window for the current week. The current week begins at midnight on the previous Sunday,
based on the time zone setting for your current session.
For static time windows, enable the Use End Time check box. The appliance displays all the events
generated from midnight to the time when you first viewed the events. As you change event views, the
time window stays fixed so that you see only the events that occurred during the static time window.
For expanding time windows, disable the Use End Time check box. The appliance displays all the
events generated from midnight Sunday to the present. As you change event views, the time window
expands to the present time. Note that if your analysis continues for over 1 week before you log out, this
time window can be more than 1 week.
Default Workflows
A workflow is a series of pages displaying data that analysts use to evaluate events. For each event type, the
appliance ships with at least one predefined workflow. For example, as a Security Analyst, depending on the
type of analysis you are performing, you can choose among ten different intrusion event workflows, each of
which presents intrusion event data in a different way.
The appliance is configured with a default workflow for each event type. For example, the Events by Priority
and Classification workflow is the default for intrusion events. This means whenever you view intrusion
events (including reviewed intrusion events), the appliance displays the Events by Priority and Classification
workflow.
You can, however, change the default workflow for each event type. The default workflows you are able to
configure depend on your user role. For example, intrusion event analysts cannot set default discovery event
workflows.
Warning The Time Zone function (in User Preferences) assumes that the system clock is set to UTC time. DO NOT
ATTEMPT TO CHANGE THE SYSTEM TIME. Changing the system time from UTC is NOT supported,
and doing so will require you to reimage the device to recover from an unsupported state.
Note This feature does not affect the time zone used for time-based policy application. Set the time zone for a device
in Devices > Platform Settings.
Procedure
Step 1 From the drop-down list under your user name, choose User Preferences.
Step 2 Click Time Zone drop-down.
Step 3 Choose the continent or area that contains the time zone you want to use.
Step 4 Choose the country and state name that corresponds with the time zone you want to use.
Procedure
Step 1 From the drop-down list under your user name, choose User Preferences.
Granular permissions for 7.4 You can define custom user roles to differentiate between the intrusion configuration
modifying access control in access control policies and rules and the rest of the access control policy and rules.
policies and rules. Using these permissions, you can separate the responsibilities of your network
administration team and your intrusion administration teams.
When defining user roles, you can select the Policies > Access Control > Access
Control Policy > Modify Access Control Policy > Modify Threat Configuration
option to allow the selection of intrusion policy, variable set, and file policy in a rule,
the configuration of the advanced options for Network Analysis and Intrusion Policies,
the configuration of the Security Intelligence policy for the access control policy, and
intrusion actions in the policy default action. You can use the Modify Remaining
Access Control Policy Configuration to control the ability to edit all other aspects of
the policy. The existing pre-defined user roles that included the Modify Access Control
Policy permission continue to support all sub-permissions; you need to create your own
custom roles if you want to apply granular permissions.
Added new field for assigning 7.0 Provision to specify a template for CLI access attributes for LDAP external
Shell user name template. authentication—Shell User Name Template was introduced. Thus, CLI attribute would
have its own template to identify the LDAP CLI users.
New/Modified screens:
Added support of Single 6.7 Added the ability to support Single Sign-On for external users configured at any
Sign-On using any SAML third-party SAML 2.0-compliant identity provider (IdP). This includes the ability to
2.0-compliant SSO provider. map user or group roles from the IdP to management center user roles.
Only users with the Admin role authenticated internally or by LDAP or RADIUS can
configure SSO.
New/Modified screens:
Themes for the web interface. 6.6 You can choose the look and feel of the web interface.
Choose the Light or Dusk theme, or use the Classic theme that appeared in previous
releases.
New/Modified Screens:
User Name > User Preferences > General > UI Theme
Supported Platforms: management center
Added a new field for name in 6.6 Added a field that can identify the user or department responsible for an internal user
user accounts. account.
New/Modified screens:
Note In the management center that uses multi-tenancy, the SSO configuration can be applied only at the global
domain level, and applies to the global domain and all subdomains.
Related Topics
Configure SAML Single Sign-On, on page 132
Domains Terminology
This documentation uses the following terms when describing domains and multidomain deployments:
Global Domain
In a multidomain deployment, the top-level domain. If you do not configure multitenancy, all devices,
configurations, and events belong to the Global domain. Administrators in the Global domain can manage
the entire Firepower System deployment.
Subdomain
A second or third-level domain.
Second-level domain
A child of the Global domain. Second-level domains can be leaf domains, or they can have subdomains.
Third-level domain
A child of a second-level domain. Third-level domains are always leaf domains.
Leaf domain
A domain with no subdomains. Each device must belong to a leaf domain.
Descendant domain
A domain descending from the current domain in the hierarchy.
Child domain
A domain’s direct descendant.
Ancestor domain
A domain from which the current domain descends.
Parent domain
A domain’s direct ancestor.
Sibling domain
A domain with the same parent.
Current domain
The domain you are logged into now. The system displays the name of the current domain before your
user name at the top right of the web interface. Unless your user role is restricted, you can edit
configurations in the current domain.
Domain Properties
To modify a domain's properties, you must have Administrator access in that domain's parent domain.
Name and Description
Each domain must have a unique name within its hierarchy. A description is optional.
Parent Domain
Second- and third-level domains have a parent domain. You cannot change a domain's parent after you
create the domain.
Devices
Only leaf domains may contain devices. In other words, a domain may contain subdomains or devices,
but not both. You cannot save a deployment where a non-leaf domain directly controls a device.
In the domain editor, the web interface displays available and selected devices according to their current
place in your domain hierarchy.
Host Limit
The number of hosts the management center can monitor, and therefore store in network maps, depends
on its model. In a multidomain deployment, leaf domains share the available pool of monitored hosts,
but have separate network maps.
To ensure that each leaf domain can populate its network map, you can set host limits at each subdomain
level. If you set a domain's host limit to 0, the domain shares in the general pool.
Setting the host limit has a different effect at each domain level:
• Leaf — For a leaf domain, a host limit is a simple limit on the number of hosts the leaf domain can
monitor.
• Second Level — For a second-level domain that manages third-level leaf domains, a host limit
represents the total number of hosts that the leaf domains can monitor. The leaf domains share the
pool of available hosts.
• Global — For the Global domain, the host limit is equal to the total number of hosts the management
center can monitor. You cannot change it
The sum of subdomains' host limits can add up to more than their parent domain's host limit. For example,
if the Global domain host limit is 150,000, you can configure multiple subdomains each with a host limit
of 100,000. Any of those domains, but not all, can monitor 100,000 hosts.
The network discovery policy controls what happens when you detect a new host after you reach the
host limit; you can drop the new host, or replace the host that has been inactive for the longest time.
Because each leaf domain has its own network discovery policy, each leaf domain governs its own
behavior when the system discovers a new host.
If you reduce the host limit for a domain and its network map contains more hosts than the new limit,
the system deletes the hosts that have been inactive the longest.
Related Topics
Host Limit
Network Discovery Data Storage Settings
Supported Domains
Any
User Roles
• Admin
Managing Domains
To modify a domain's properties, you must have Administrator access in that domain's parent domain.
Procedure
Step 3 When you are done making changes to the domain structure and all devices are associated with leaf domains,
click Save to implement your changes.
Step 4 If prompted, make additional changes:
• If you changed a leaf domain to a parent domain, move or delete the old network map; see Moving Data
Between Domains, on page 204.
• If you moved devices between domains and must assign new policies and security zones or interface
groups, see Moving Devices Between Domains, on page 205.
What to do next
• Configure user roles and policies (access control, network discovery, and so on) for any new domains.
Update device properties as needed.
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
Procedure
Step 8 When you are done making changes to the domain structure and all devices are associated with leaf domains,
click Save to implement your changes.
Step 9 If prompted, make additional changes:
• If you changed a leaf domain to a parent domain, move or delete the old network map; see Moving Data
Between Domains, on page 204.
• If you moved devices between domains and must assign new policies and security zones or interface
groups, see Moving Devices Between Domains, on page 205.
What to do next
• Configure user roles and policies (access control, network discovery, and so on) for any new domains.
Update device properties as needed.
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
Procedure
Step 1 For each former leaf domain that is now a parent domain:
• Choose a new Leaf Domain to inherit the Parent Domain's events and network map.
• Choose None to delete the parent domain's network map, but retain old events.
What to do next
Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
The following changes can occur to the configuration of a device when it is moved between domains:
• If you want the system to retain the device configurations after the devices are moved to the target domain,
ensure that:
• The shared access control policies are in the Global domain. We also recommend that the other
shared policies are in the Global domain.
• You can move the device into any child domain without deleting the enrolled certificate on the device.
Specifically:
• If the health policy applied to a moved device is inaccessible in the new domain, you can choose a
new health policy.
• If the access control policy assigned to a moved device is not valid or accessible in the new domain,
choose a new policy. Every device must have an assigned access control policy.
• If the interfaces on the moved device belong to a security zone that is inaccessible in the new domain,
you can choose a new zone.
• Interfaces are removed from:
• Security zones that are inaccessible in the new domain and not used in an access control policy.
• All interface groups.
If devices require a policy update but you do not need to move interfaces between zones, the system displays
a message stating that zone configurations are up to date. For example, if a device's interfaces belong to a
security zone configured in a common ancestor domain, you do not need to update zone configurations when
you move devices from subdomain to subdomain.
Procedure
b. Choose an Access Control Policy to apply to the device, or choose New Policy to create a new policy.
c. Choose a Health Policy to apply to the device, or choose None to leave the device without a health policy.
d. If prompted to assign interfaces to new zones, choose a New Security Zone for each listed interface, or
choose None to assign it later.
e. After you configure all affected devices, click Save to save policy and zone assignments.
Step 6 If you want to retain the device configuration after the move, check the Retain device configuration? check
box.
If you select this option, the system retains the device configurations after the devices are moved to the target
domain. If you do not select this option, you must manually update the device configurations on the moved
device that were affected by the move.
The following table shows how objects are handled in various scenarios.
Objects with the same name but • Network and Port—Create object overrides.
different values exist in the target
domain. • Interface Objects—Create new objects if the type is different.
• Reuse all other object types depending on the name match.
What to do next
• Update other configurations on the moved device that were affected by the move.
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
• You can manually restore the device configuration if the system fails to retain it after moving a device
between domains. For more information, see Export and Import the Device Configuration in the Cisco
Secure Firewall Management Center Device Configuration Guide.
Retain device configurations 7.3 While moving devices from one domain to
associated with site-to-site VPN another, you can now retain the device
configurations associated with site-to-site
VPN only if the site-to-site VPN is
configured at the target domain.
Retain the device configuration 7.2 You can now retain the device configuration
while moving the device from one domain
to another.
Increased maximum number of 6.5 You can now add up to to 100 domains.
supported domains Previously, the maximum was 50 domains.
Supported platforms: Secure Firewall
Management Center
System software Major software releases contain new Direct Download: Select patches and maintenance releases
features, functionality, and enhancements. only, usually some time after the release is available for manual
They may include infrastructure or download. The length of the delay depends on release type,
architectural changes. release adoption, and other factors. Both on-demand and
scheduled downloads are supported.
Maintenance releases contain general bug
and security related fixes. Behavior changes Schedule Install: Patches and maintenance releases only, as a
are rare, and are related to those fixes. scheduled task.
Patches are on-demand updates limited to Uninstall: Patches only.
critical fixes with time urgency.
Revert: Major and maintenance releases for threat defense only.
Hotfixes can address specific customer Revert is not supported for the management center or for Classic
issues. devices.
Reimage: Major and maintenance releases only.
See: The Cisco Secure Firewall Threat Defense Upgrade Guide
for Management Center for the version that the management
center is currently running.
Vulnerability database The Cisco vulnerability database (VDB) is Direct Download: Yes.
(VDB) a database of known vulnerabilities to
Schedule: Yes, as a scheduled task.
which hosts may be susceptible, as well as
fingerprints for operating systems, clients, Uninstall: Starting with VDB 357, you can install any VDB as
and applications. The system uses the VDB far back as the baseline VDB for the management center.
to help determine whether a particular host
See: Update the Vulnerability Database (VDB), on page 212
increases your risk of compromise.
Geolocation database The Cisco geolocation database (GeoDB) Direct Download: Yes.
(GeoDB) is a database of geographical and
Schedule: Yes, from its own update page
connection-related data associated with
routable IP addresses. Uninstall: No.
See: Update the Geolocation Database (GeoDB), on page 214
Intrusion rules Intrusion rule updates provide new and Direct Download: Yes.
(SRU/LSP) updated intrusion rules and preprocessor
Schedule: Yes, from its own update page.
rules, modified states for existing rules, and
modified default intrusion policy settings. Uninstall: No.
Rule updates may also delete rules, provide See: Update Intrusion Rules, on page 215
new rule categories and default variables,
and modify default variable values.
Security Intelligence Security Intelligence feeds are collections Direct Download: Yes.
feeds of IP addresses, domain names, and URLs
Schedule: Yes, from the object manager.
that you can use to quickly filter traffic that
matches an entry. Uninstall: No.
See: Cisco Secure Firewall Management Center Device
Configuration Guide
URL categories and URL filtering allows you to control access Direct Download: Yes.
reputations to websites based on the URL’s general
Schedule: Yes, when you configure integrations/cloud services,
classification (category) and risk level
or as a scheduled task.
(reputation).
Uninstall: No.
See: Cisco Secure Firewall Management Center Device
Configuration Guide
Supported Domains
Global unless indicated otherwise.
User Roles
Admin
Scheduled Updates
The system schedules tasks — including updates — in UTC. This means that when they occur locally depends
on the date and your specific location. Also, because updates are scheduled in UTC, they do not adjust for
Daylight Saving Time, summer time, or any such seasonal adjustments that you may observe in your location.
If you are affected, scheduled updates occur one hour "later" in the summer than in the winter, according to
local time.
Important We strongly recommend you review scheduled updates to be sure they occur when you intend.
Bandwidth Guidelines
To upgrade a the system software or perform a readiness check, the upgrade package must be on the appliance.
Upgrade package sizes vary. Make sure you have the bandwidth to perform a large data transfer to your
managed devices. See Guidelines for Downloading Data from the Firepower Management Center to Managed
Devices (Troubleshooting TechNote).
Note The initial setup on the management center automatically downloads and installs the latest VDB from Cisco
as a one-time operation. It also schedules a weekly task to download the latest available software updates,
which includes the latest VDB. We recommend you review this weekly task and adjust if necessary. Optionally,
schedule a new weekly task to actually update the VDB and deploy configurations. For more information,
see Vulnerability Database Update Automation, on page 472.
Caution Do not perform tasks related to mapped vulnerabilities while the VDB is updating. Even if the Message Center
shows no progress for several minutes or indicates that the update has failed, do not restart the update. Instead,
contact Cisco TAC.
In most cases, the first deploy after a VDB update restarts the Snort process, interrupting traffic inspection.
The system warns you when this will happen (updated application detectors and operating system fingerprints
require a restart; vulnerability information does not). Whether traffic drops or passes without further inspection
during this interruption depends on how the targeted device handles traffic. For more information, see Snort
Restart Traffic Behavior.
Procedure
What to do next
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
• If you based configurations on vulnerabilities, application detectors, or fingerprints that are no longer
available, examine those configurations to make sure you are handling traffic as expected. Also, keep in
mind a scheduled task to update the VDB can undo a rollback. To avoid this, change the scheduled task
or delete any newer VDB packages.
Note As a part of initial configuration, the system schedules weekly GeoDB updates. We recommend you review
this task and adjust if necessary, as described in Schedule GeoDB Updates, on page 214.
A GeoDB update overrides any previous versions of the GeoDB and is effective immediately. The management
center automatically updates its managed devices. You do not need to redeploy.
The time needed to update the GeoDB depends on your appliance, but can take up to 45 minutes depending
on the size of the update—for example, if the system is downloading and processing a full IP package. Although
a GeoDB update does not interrupt any other system functions (including the ongoing collection of geolocation
information), the update does consume system resources while it completes. Consider this when planning
your updates.
Procedure
Step 3 Under Recurring Geolocation Updates, check Enable Recurring Weekly Updates....
Step 4 Specify the Update Start Time.
Step 5 Click Save.
Procedure
Step 3 Under IP Package Configuration, use the IP Package Download option to specify whether you want to use
the country code package only, or if you also want to use the IP package.
Omitting the IP package saves disk space, but also eliminates contexual geolocation data for IP addresses.
Note that even if you manually upload GeoDB packages, you should disable this option if you do not need
the data in the IP package. This is because disabling the option deletes any existing/stale IP package.
If you change this configuration, click Save.
The Geolocation Updates page and the Help ( ) > About page both list the current version.
Step 6 (Optional) If you are manually uploading the update, repeat this procedure for the IP package.
your managed devices. These updates affect intrusion rules, preprocessor rules, and the policies that use the
rules.
Intrusion rule updates are cumulative, and Cisco recommends you always import the latest update. You cannot
import an intrusion rule update that either matches or predates the version of the currently installed rules.
If your deployment includes a high availability pair of management centers, import the update on the primary
only. The secondary management center receives the rule update as part of the regular synchronization process.
An intrusion rule update may provide the following:
• New and modified rules and rule states—Rule updates provide new and updated intrusion and
preprocessor rules. For new rules, the rule state may be different in each system-provided intrusion policy.
For example, a new rule may be enabled in the Security over Connectivity intrusion policy and disabled
in the Connectivity over Security intrusion policy. Rule updates may also change the default state of
existing rules, or delete existing rules entirely.
• New rule categories—Rule updates may include new rule categories, which are always added.
• Modified preprocessor and advanced settings—Rule updates may change the advanced settings in
the system-provided intrusion policies and the preprocessor settings in system-provided network analysis
policies. They can also update default values for the advanced preprocessing and performance options
in your access control policies.
• New and modified variables—Rule updates may modify default values for existing default variables,
but do not override your changes. New variables are always added.
In a multidomain deployment, you can import local intrusion rules in any domain, but you can import intrusion
rule updates from Talos in the Global domain only.
Note that importing a rule update discards all cached changes to network analysis and intrusion policies. For
your convenience, the Rule Updates page lists policies with cached changes and the users who made those
changes.
Caution Although a rule update by itself does not restart the Snort process when you deploy, other changes you have
made may. Restarting Snort briefly interrupts traffic flow and inspection on all devices, including those
configured for high availability/scalability. Interface configurations determine whether traffic drops or passes
without inspection during the interruption. When you deploy without restarting Snort, resource demands may
result in a small number of packets dropping without inspection.
Procedure
Procedure
Step 3 (Optional) Check Reapply all policies... to deploy after the update.
Step 4 Click Import.
Monitor update progress in the Message Center. Even if the Message Center shows no progress for several
minutes or indicates that the update has failed, do not restart the update. Instead, contact Cisco TAC.
Step 5 Verify update success.
Choose Help ( ) > About to view the current rule update version.
What to do next
If you did not deploy as a part of the update, deploy now; see Deploy Configuration Changes.
Procedure
Step 3 Under One-Time Rule Update/Rules Import, choose Rule update or text rule file to upload and install,
then click Choose File and browse to your local rule file.
Step 4 Click Import.
You can monitor import progress in the Message Center. Even if the Message Center shows no progress for
several minutes or indicates that the update has failed, do not restart the import. Instead, contact Cisco TAC.
What to do next
• Edit intrusion policies and enable the rules you imported.
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
• The text file name can include alphanumeric characters, spaces, and no special characters other than
underscore (_), period (.), and dash (-).
• The system imports local rules preceded with a single pound character (#), but they are flagged as deleted.
• The system imports local rules preceded with a single pound character (#), and does not import local
rules preceded with two pound characters (##).
• Rules cannot contain any escape characters.
• In a multidomain deployment, the system assigns a GID of 1 to a rule imported into or created in the
Global domain, and a domain-specific GID between 1000 and 2000 for all other domains.
• You do not have to specify a Generator ID (GID) when importing a local rule. If you do, specify only
GID 1 for a standard text rule.
• When importing a rule for the first time, do not specify a Snort ID (SID) or revision number. This avoids
collisions with SIDs of other rules, including deleted rules. The system will automatically assign the rule
the next available custom rule SID of 1000000 or greater, and a revision number of 1.
If you must import rules with SIDs, a SID can be any unique number 1,000,000 or greater.
In a multidomain deployment, if multiple administrators are importing local rules at the same time, SIDs
within an individual domain might appear to be non-sequential because the system assigned the intervening
numbers in the sequence to another domain.
• When importing an updated version of a local rule you have previously imported, or when reinstating a
local rule you have deleted, you must include the SID assigned by the system and a revision number
greater than the current revision number. You can determine the revision number for a current or deleted
rule by editing the rule.
Note The system automatically increments the revision number when you delete a local
rule; this is a device that allows you to reinstate local rules. All deleted local rules
are moved from the local rule category to the deleted rule category.
• Import local rules on the primary management center in a high availability pair to avoid SID numbering
issues.
• The import fails if a rule contains any of the following: .
• A SID greater than 2147483647.
• A list of source or destination ports that is longer than 64 characters.
• When importing into the Global domain in a multidomain deployment, a GID:SID combination
uses GID 1 and a SID that already exists in another domain; this indicates that the combination
existed before Version 6.2.1. You can reimport the rule using GID 1 and a unique SID.
• Policy validation fails if you enable an imported local rule that uses the deprecated threshold keyword
in combination with the intrusion event thresholding feature in an intrusion policy.
• All imported local rules are automatically saved in the local rule category.
• The system always sets local rules that you import to the disabled rule state. You must manually set the
state of local rules before you can use them in your intrusion policy.
Procedure
Tip You search the entire Rule Update Import Log database even when you initiate a search by clicking Search
on the toolbar from the Rule Update Import Log detailed view with only the records for a single import file
displayed. Make sure you set your time constraints to include all objects you want to include in the search.
Field Description
Action An indication that one of the following has occurred for the object type:
• new (for a rule, this is the first time the rule has been stored on this appliance)
• changed (for a rule update component or rule, the rule update component has been modified, or the rule
has a higher revision number and the same GID and SID)
• collision (for a rule update component or rule, import was skipped because its revision conflicts with
an existing component or rule on the appliance)
• deleted (for rules, the rule has been deleted from the rule update)
• enabled (for a rule update edit, a preprocessor, rule, or other feature has been enabled in a default policy
provided with the system)
• disabled (for rules, the rule has been disabled in a default policy provided with the system)
• drop (for rules, the rule has been set to Drop and Generate Events in a default policy provided with the
system)
• error (for a rule update or local rule file, the import failed)
• apply (the Reapply all policies after the rule update import completes option was enabled for the
import)
Default Action The default action defined by the rule update. When the imported object type is rule, the default action is
Pass, Alert, or Drop. For all other imported object types, there is no default action.
Details A string unique to the component or rule. For rules, the GID, SID, and previous revision number for a changed
rule, displayed as previously (GID:SID:Rev). This field is blank for a rule that has not changed.
Domain The domain whose intrusion policies can use the updated rule. Intrusion policies in descendant domains can
also use the rule. This field is only present in a multidomain deployment.
GID The generator ID for a rule. For example, 1 (standard text rule, Global domain or legacy GID) or 3 (shared
object rule).
Name The name of the imported object, which for rules corresponds to the rule Message field, and for rule update
components is the component name.
Policy For imported rules, this field displays All. This means that the rule was imported successfully, and can be
enabled in all appropriate default intrusion policies. For other types of imported objects, this field is blank.
Field Description
Type The type of imported object, which can be one of the following:
• rule update component (an imported component such as a rule pack or policy pack)
• rule (for rules, a new or updated rule)
• policy apply (the Reapply all policies after the rule update import completes option was enabled
for the import)
Count The count (1) for each record. The Count field appears in a table view when the table is constrained, and the
Rule Update Log detailed view is constrained by default to rule update records. This field is not searchable.
Download only the country 7.4 You can now configure the system to download only the country code package of the
code geolocation package. geolocation database (GeoDB), which maps IP addresses to countries/continents. The
larger IP package that contains contextual data is now optional. By default, the system
downloads both packages.
New/modified screens: System ( ) > Updates > Geolocation Updates > IP Package
Configuration
Minimum threat defense: Any
Usability improvements. 7.3 We introduced some usability improvements to the threat defense upgrade wizard:
• You can now use the wizard to select devices to upgrade. You can toggle the view
between selected devices, remaining upgrade candidates, ineligible devices (with
reasons why), devices that need the upgrade package, and so on.
Previously, you could only use the Device Management page and the process was
much less flexible.
• You can now use the wizard to upload threat defense upgrade packages or specify
upgrade package locations.
Previously, you could only use the System Updates page.
• We now allow simultaneous upgrade workflows by different users, as long as you
are upgrading different devices. The system prevents you from upgrading devices
already in someone else's workflow.
Previously, only one upgrade workflow was allowed at a time across all users.
For all threat defense upgrades, we offer smaller upgrade packages and faster upgrades
and readiness checks.
Unattended threat defense 7.3 The threat defense upgrade wizard now supports unattended upgrades, using a new
upgrades. Unattended Mode menu. You just need to select the target version and the devices you
want to upgrade, specify a few upgrade options, and step away. You can even log out
or close the browser.
With an unattended upgrade, the system automatically copies needed upgrade packages
to devices, performs compatibility and readiness checks, and begins the upgrade. Just
as happens when you manually step through the wizard, any devices that do not "pass"
a stage in the upgrade (for example, failing checks) are not included in the next stage.
After the upgrade completes, you pick up with the verification and post-upgrade tasks.
You can pause and restart unattended mode during the copy and checks phases. However,
pausing unattended mode does not stop tasks in progress. Copies and checks that have
started will run to completion. Similarly, you cannot cancel an upgrade in progress by
stopping unattended mode; to cancel an upgrade, use the Upgrade Status pop-up,
accessible from the Upgrade tab on Device Management page, and from the Message
Center.
Skip threat defense 7.3 From the threat defense upgrade wizard, you can now skip the automatic generating of
pre-upgrade troubleshoot troubleshooting files before major and maintenance upgrades by disabling the new
generation. Generate troubleshooting files before upgrade begins option. This saves time and
disk space.
To manually generate troubleshooting files for a threat defense device, choose System
( ) > Health > Monitor, click the device in the left panel, then View System &
Troubleshoot Details, then Generate Troubleshooting Files.
Unified upgrade and install 7.3 In Version 7.3, we combined the threat defense install and upgrade package for the
package for Secure Firewall Secure Firewall 3100, as follows:
3100
• Version 7.1–7.2 install package: cisco-ftd-fp3k.version.SPA
• Version 7.1–7.2 upgrade package:
Cisco_FTD_SSP_FP3K_Upgrade-version-build.sh.REL.tar
• Version 7.3+ combined package:
Cisco_FTD_SSP_FP3K_Upgrade-version-build.sh.REL.tar
Although you can upgrade threat defense without issue, you cannot reimage from older
threat defense and ASA versions directly to threat defense Version 7.3+. This is due to
a ROMMON update required by the new image type. To reimage from those older
versions, you must "go through" ASA 9.19+, which is supported with the old ROMMON
but also updates to the new ROMMON. There is no separate ROMMON updater.
To get to threat defense Version 7.3+, your options are:
• Upgrade from threat defense Version 7.1 or 7.2 — use the normal upgrade process.
See the appropriate Upgrade Guide.
• Reimage from threat defense Version 7.1 or 7.2 — reimage to ASA 9.19+ first,
then reimage to threat defense Version 7.3+.
See Threat Defense→ASA: Firepower 1000, 2100; Secure Firewall 3100 and then
ASA→Threat Defense: Firepower 1000, 2100 Appliance Mode; Secure Firewall
3100 in the Cisco Secure Firewall ASA and Secure Firewall Threat Defense
Reimage Guide.
• Reimage from ASA 9.17 or 9.18 — upgrade to ASA 9.19+ first, then reimage to
threat defense Version 7.3+.
See the Cisco Secure Firewall ASA Upgrade Guide and then ASA→Threat Defense:
Firepower 1000, 2100 Appliance Mode; Secure Firewall 3100 in the Cisco Secure
Firewall ASA and Secure Firewall Threat Defense Reimage Guide.
• Reimage from threat defense Version 7.3+ — use the normal reimage process.
See Reimage the System with a New Software Version in the Cisco FXOS
Troubleshooting Guide for the Firepower 1000/2100 and Secure Firewall 3100/4200
with Firepower Threat Defense.
Auto-upgrade to Snort 3 7.3 When you upgrade threat defense to Version 7.3+, you can no longer disable the Upgrade
after successful threat Snort 2 to Snort 3 option.
defense upgrade is no
After the software upgrade, all eligible devices will upgrade from Snort 2 to Snort 3
longer optional.
when you deploy configurations. Although you can switch individual devices back,
Snort 2 will be deprecated in a future release and we strongly recommend you stop
using it now.
For devices that are ineligible for auto-upgrade because they use custom intrusion or
network analysis policies, we strongly recommend you manually upgrade to Snort 3
for improved detection and performance. For migration assistance, see the Cisco Secure
Firewall Management Center Snort 3 Configuration Guide for your version.
Minimum threat defense: Any
Choose and 7.3 You can now choose which threat defense upgrade packages you want to direct download
direct-download select to the management center. Use the new Download Updates sub-tab on > Updates >
upgrade packages from Product Updates.
Cisco.
Automatic VDB downloads. 7.3 The initial setup on the management center schedules a weekly task to download the
latest available software updates, which now includes the latest vulnerability database
(VDB). We recommend you review this weekly task and adjust if necessary. Optionally,
schedule a new weekly task to actually update the VDB and deploy configurations.
New/modified screens: The Vulnerability Database check box is now enabled by
default in the system-created Weekly Software Download scheduled task.
Install any VDB. 7.3 Starting with VDB 357, you can now install any VDB as far back as the baseline VDB
for that management center.
After you update the VDB, deploy configuration changes. If you based configurations
on vulnerabilities, application detectors, or fingerprints that are no longer available,
examine those configurations to make sure you are handling traffic as expected. Also,
keep in mind a scheduled task to update the VDB can undo a rollback. To avoid this,
change the scheduled task or delete any newer VDB packages.
New/modified screens: On System ( ) > Updates > Product Updates > Available
Updates, if you upload an older VDB, a new Rollback icon appears instead of the
Install icon.
Copy upgrade packages 7.2 Instead of copying upgrade packages to each device from the management center or
("peer-to-peer sync") from internal web server, you can use the threat defense CLI to copy upgrade packages
device to device. between devices ("peer to peer sync"). This secure and reliable resource-sharing goes
over the management network but does not rely on the management center. Each device
can accommodate 5 package concurrent transfers.
This feature is supported for Version 7.2+ standalone devices managed by the same
standalone management center. It is not supported for:
• Container instances.
• Device high availability pairs and clusters.
These devices get the package from each other as part of their normal sync process.
Copying the upgrade package to one group member automatically syncs it to all
group members.
• Devices managed by high availability management centers.
• Devices managed by the cloud-delivered management center, but added to a
customer-deployed management center in analytics mode.
• Devices in different domains, or devices separated by a NAT gateway.
• Devices upgrading from Version 7.1 or earlier, regardless of management center
version.
Auto-upgrade to Snort 3 7.2 When you use a Version 7.2+ management center to upgrade threat defense, you can
after successful threat now choose whether to Upgrade Snort 2 to Snort 3.
defense upgrade.
After the software upgrade, eligible devices will upgrade from Snort 2 to Snort 3 when
you deploy configurations. For devices that are ineligible because they use custom
intrusion or network analysis policies, we strongly recommend you manually upgrade
to Snort 3 for improved detection and performance. For migration assistance, see the
Cisco Secure Firewall Management Center Snort 3 Configuration Guide for your version.
This option is supported for major and maintenance threat defense upgrades to Version
7.2+. It is not supported for threat defense upgrades to Version 7.0 or 7.1, or for patches
to any version.
Upgrade for single-node 7.2 You can now use the device upgrade page (Devices > Device Upgrade) to upgrade
clusters. clusters with only one active node. Any deactivated nodes are also upgraded. Previously,
this type of upgrade would fail. This feature is not supported from the system updates
page (System ( )Updates).
Hitless upgrades are also not supported in this case. Interruptions to traffic flow and
inspection depend on the interface configurations of the lone active unit, just as with
standalone devices.
Supported platforms: Firepower 4100/9300, Secure Firewall 3100
Revert threat defense 7.2 You can now revert threat defense upgrades from the device CLI if communications
upgrades from the CLI. between the management center and device are disrupted. Note that in high
availability/scalability deployments, revert is more successful when all units are reverted
simultaneously. When reverting with the CLI, open sessions with all units, verify that
revert is possible on each, then start the processes at the same time.
Caution Reverting from the CLI can cause configurations between the device and
the management center to go out of sync, depending on what you changed
post-upgrade. This can cause further communication and deployment
issues.
GeoDB is split into two 7.2 In May 2022, shortly before the Version 7.2 release, we split the GeoDB into two
packages. packages: a country code package that maps IP addresses to countries/continents, and
an IP package that contains additional contextual data associated with routable IP
addresses. The contextual data in the IP package can include additional location details,
as well as connection information such as ISP, connection type, proxy type, domain
name, and so on.
If your Version 7.2+ management center has internet access and you enable recurring
updates or you manually kick off a one-time update from the Cisco Support & Download
site, the system automatically obtains and imports both packages. However, if you
manually download updates—for example, in an air-gapped deployment—make sure
you get and import both GeoDB packages:
• Country code package: Cisco_GEODB_Update-date-build.sh.REL.tar
• IP package: Cisco_IP_GEODB_Update-date-build.sh.REL.tar
The Geolocation Updates (System ( ) > Updates > Geolocation Updates) page and
the About page (Help > About) list the versions of the packages currently being used
by the system.
Management center upgrade 7.2 To save time and disk space, the management center upgrade process no longer
no longer automatically automatically generates troubleshooting files before the upgrade begins. Note that device
generates troubleshooting upgrades are unaffected and continue to generate troubleshooting files.
files.
To manually generate troubleshooting files for the management center, choose System
( ) > Health > Monitor, click Firewall Management Center in the left panel, then
View System & Troubleshoot Details, then Generate Troubleshooting Files.
Revert a successful device 7.1 You can now revert major and maintenance upgrades to FTD from the FMC web
upgrade. interface. Reverting returns the software to its state just before the last upgrade, also
called a snapshot. Reverting after patching necessarily removes patches as well.
If you think you might need to revert, you must use System ( ) > Updates to upgrade
FTD. The System Updates page is the only place you can enable the Enable revert
after successful upgrade option, which configures the system to save a revert snapshot
when you initiate the upgrade. This is in contrast to our usual recommendation to use
the wizard on the Devices > Device Upgrade page.
This is not supported for container instances.
Improvements to the 7.1 The FTD upgrade wizard now correctly displays clustered and high availability unit as
upgrade workflow for groups, rather than as individual devices. The system can identify, report, and
clustered and high preemptively require fixes for group-related issues you might have. For example, you
availability devices. cannot upgrade a cluster on the Firepower 4100/9300 if you have made unsynced changes
on chassis manager.
You can also specify the upgrade order of data units in a cluster.
Improved FTD upgrade 7.0 Upgrading FTD is now easier faster, more reliable, and takes up less disk space. A new
performance and status Upgrades tab in the Message Center provides further enhancements to upgrade status
reporting. and error reporting.
Easy-to-follow FTD 7.0 A new device upgrade page (Devices > Device Upgrade) provides an easy-to-follow
upgrade wizard. wizard for upgrading Version 6.4+ FTD.
The system walks you through important pre-upgrade stages, including:
• Selecting devices to upgrade.
• Copying the upgrade package to the devices.
• Compatibility and readiness checks.
To begin, use the new Upgrade Firepower Software action on the Device Management
page (Devices > Device Management > Select Action).
Note You must still use System ( ) > Updates) to upload or specify the location
of FTD upgrade packages. You must also use the System Updates page
to upgrade the FMC itself, as well as all non-FTD managed devices.
As you proceed, the system displays basic information about your selected devices, as
well as the current upgrade-related status. This includes any reasons why you cannot
upgrade. If a device does not "pass" a stage, it does not appear in the next stage.
If you navigate away from the wizard, your progress is preserved, although other users
with Administrator access can reset, modify, or continue the workflow.
Note In Version 7.0, the Device Upgrade page does not correctly display devices
in clusters or high availability pairs. Even though you must select and
upgrade these devices as a unit, the system displays them as standalone
devices. Device status and upgrade readiness are evaluated and reported
on an individual basis. This means it is possible for one unit to appear to
"pass" to the next stage while the other unit or units do not. However, these
devices are still grouped. Running a readiness check on one, runs it on all.
Starting the upgrade on one, starts it on all.
To avoid possible time-consuming upgrade failures, manually ensure all
group members are ready to move on to the next step before you click
Next.
Upgrade more FTD devices 7.0 The FTD upgrade wizard lifts the following restrictions:
at once.
• Simultaneous device upgrades.
The number of devices you can upgrade at once is now limited by your management
network bandwidth—not the system's ability to manage simultaneous upgrades.
Previously, we recommended against upgrading more than five devices at a time.
Important Only upgrades to FTD Version 6.7+ see this improvement. If you are
upgrading devices to an older FTD release—even if you are using
the new upgrade wizard—we still recommend you limit to five devices
at a time.
Improved FTD upgrade 6.7 You can now view the status of FTD device upgrades and readiness checks in progress
status reporting and on the Device Management page, as well as a 7-day history of upgrade success/failures.
cancel/retry options. The Message Center also provides enhanced status and error messages.
A new Upgrade Status pop-up, accessible from both Device Management and the
Message Center with a single click, shows detailed upgrade information, including
percentage/time remaining, specific upgrade stage, success/failure data, upgrade logs,
and so on.
Also on this pop-up, you can manually cancel failed or in-progress upgrades (Cancel
Upgrade), or retry failed upgrades (Retry Upgrade). Canceling an upgrade reverts the
device to its pre-upgrade state.
Note To be able to manually cancel or retry a failed upgrade, you must disable
the new auto-cancel option, which appears when you use the FMC to
upgrade an FTD device: Automatically cancel on upgrade failure and
roll back to the previous version. With the option enabled, the device
automatically reverts to its pre-upgrade state upon upgrade failure.
Auto-cancel is not supported for patches. In an HA or clustered deployment,
auto-cancel applies to each device individually. That is, if the upgrade fails
on one device, only that device is reverted.
New/modified screens:
• System ( ) > Updates > Product Updates > Available Updates > Install icon
for the FTD upgrade package
• Devices > Device Management > Upgrade
• Message Center > Tasks
New/modified CLI commands: show upgrade status detail, show upgrade status
continuous, show upgrade status, upgrade cancel, upgrade retry
Upgrades remove PCAP 6.7 Upgrades now remove locally stored PCAP files. You must have enough free disk space
files to save disk space. or the upgrade fails.
Custom intrusion rule 6.7 The FMC now warns you of rule collisions when you import custom (local) intrusion
import warns when rules rules. Previously, the system would silently skip the rules that cause collisions—with
collide. the exception of Version 6.6.0.1, where a rule import with collisions would fail entirely.
On the Rule Updates page, if a rule import had collisions, a warning icon is displayed
in the Status column. For more information, hover your pointer over the warning icon
and read the tooltip.
Note that a collision occurs when you try to import an intrusion rule that has the same
SID/revision number as an existing rule. You should always make sure that updated
versions of custom rules have new revision numbers; for more best practices, see Best
Practices for Importing Local Intrusion Rules, on page 219.
New/modified screens: We added a warning icon to System ( ) > Updates > Rule
Updates.
Get FTD upgrade packages 6.6 FTD devices can now get upgrade packages from your own internal web server, rather
from an internal web server. than from the FMC. This is especially useful if you have limited bandwidth between
the FMC and its devices. It also saves space on the FMC.
Note This feature is supported only for FTD devices running Version 6.6+. It
is not supported for upgrades to Version 6.6, nor is it supported for the
FMC or Classic devices.
New/modified screens: We added a Specify software update source option to the page
where you upload upgrade packages.
Automatic VDB update 6.6 When you set up a new or reimaged FMC, the system automatically attempts to update
during initial setup. the vulnerability database (VDB).
This is a one-time operation. If the FMC has internet access, we recommend you schedule
tasks to perform automatic recurring VDB update downloads and installations.
Automatic software 6.5 When you set up a new or reimaged FMC, the system automatically schedules:
downloads and GeoDB
• A weekly task to download software updates for the FMC and its managed devices.
updates.
• Weekly updates for the GeoDB.
The tasks are scheduled in UTC, which means that when they occur locally depends on
the date and your specific location. Also, because tasks are scheduled in UTC, they do
not adjust for Daylight Saving Time, summer time, or any such seasonal adjustments
that you may observe in your location. If you are affected, scheduled tasks occur one
hour “later” in the summer than in the winter, according to local time. We recommend
you review the auto-scheduled configurations and adjust them if necessary.
Scheduled tasks postponed 6.7 Scheduled tasks are now postponed during FMC upgrades. Any task scheduled to begin
during FMC upgrades. during the upgrade will begin five minutes after the post-upgrade reboot.
6.6.3
Note Before you begin any upgrade, you must still make sure running tasks are
6.4.0.10
complete. Tasks running when the upgrade begins are stopped, become
failed tasks, and cannot be resumed.
Note that this feature is supported for all upgrades from a supported version. This includes
Version 6.4.0.10 and later patches, Version 6.6.3 and later maintenance releases, and
Version 6.7+. This feature is not supported for upgrades to a supported version from
an unsupported version.
Signed SRU, VDB, and 6.4 So the system can verify that you are using the correct update files, the system now uses
GeoDB updates. signed updates for intrusion rules (SRU), the vulnerability database (VDB), and the
geolocation database (GeoDB). Earlier versions continue to use unsigned updates.
Unless you manually download updates from the Cisco Support & Download site—for
example, in an air-gapped deployment—you should not notice any difference in
functionality.
If, however, you do manually download and install SRU, VDB, and GeoDB updates,
make sure you download the correct package for your current version. Signed update
files begin with 'Cisco' instead of 'Sourcefire,' and terminate in .sh.REL.tar instead of
.sh:
• SRU: Cisco_Firepower_SRU-date-build-vrt.sh.REL.tar
• VDB: Cisco_VDB_Fingerprint_Database-4.5.0-version.sh.REL.tar
• GeoDB: Cisco_GEODB_Update-date-build.sh.REL.tar
Faster upgrade. 6.4 Improvements to the event database allow faster upgrade.
Copy upgrade packages to 6.2.3 You can now copy (or push) an upgrade package from the FMC to a managed device
managed devices before the before you run the actual upgrade. This is useful because you can push during times of
upgrade. low bandwidth use, outside of the upgrade maintenance window.
When you push to high availability, clustered, or stacked devices, the system sends the
upgrade package to the active/control/primary first, then to the standby/data/secondary.
FMC warns of Snort restart 6.2.3 The FMC now warns you that Vulnerability Database (VDB) updates restart the Snort
before VDB updates. process. This interrupts traffic inspection and, depending on how the managed device
handles traffic, possibly interrupts traffic flow. You can cancel the install until a more
convenient time, such as during a maintenance window.
These warnings can appear:
• After you download and manually install a VDB.
• When you create a scheduled task to install the VDB.
• When the VDB installs in the background, such as during a previously scheduled
task or as part of a software upgrade.
Note The Management Center supports either a Smart License or a legacy PAK (Product Activation Keys) license
for its platform license. For more information about using the PAK license, see Configure Legacy Management
Center PAK-Based Licenses, on page 279.
About Licenses
Cisco Smart Licensing is a flexible licensing model that provides you with an easier, faster, and more consistent
way to purchase and manage software across the Cisco portfolio and across your organization. And it’s
secure—you control what users can access. With Smart Licensing you get:
• Easy Activation: Smart Licensing establishes a pool of software licenses that can be used across the
entire organization—no more PAKs (Product Activation Keys).
• Unified Management: My Cisco Entitlements (MCE) provides a complete view into all of your Cisco
products and services in an easy-to-use portal, so you always know what you have and what you are
using.
• License Flexibility: Your software is not node-locked to your hardware, so you can easily use and
transfer licenses as needed.
To use Smart Licensing, you must first set up a Smart Account on Cisco Software Central (software.cisco.com).
For a more detailed overview on Cisco Licensing, go to cisco.com/go/licensingguide
Scalable for a large number of products Best for a small number of devices
Automated licensing management, usage and asset Limited usage and asset management visibility
management visibility
No incremental operational costs to add devices Linear operational costs over time to add devices
Flexible, easier to use, less overhead Significant administrative and manual overhead for
moves, adds, and changes
Out-of-compliance status is allowed initially and at Out-of-compliance status impacts system functioning
various expiration states
For more information, see Register the Management For more information, see Configure Specific License
Center with the Smart Software Manager On-Prem, Reservation (SLR), on page 268
on page 259
Evaluation Mode
Before the management center registers with the Smart Software Manager, it operates for 90 days in evaluation
mode. You can assign feature licenses to managed devices, and they will remain in compliance for the duration
of evaluation mode. When this period ends, the management center becomes unregistered.
If you register the management center with the Smart Software Manager, the evaluation mode ends. If you
later deregister the management center, you cannot resume evaluation mode, even if you did not initially use
all 90 days.
For more information about the unregistered state, see Unregistered State, on page 238.
Note You cannot receive an evaluation license for Strong Encryption (3DES/AES); you must register with the
Smart Software Manager to receive the export-compliance token that enables the Strong Encryption
(3DES/AES) license.
Out-of-Compliance State
The management center can become out of compliance in the following situations:
• Over-utilization—When the managed devices or the management center virtual uses unavailable licenses.
• License expiration—When a managed device term-based license expires.
After you resolve the licensing problem, the management center will show that it is now in compliance after
its regularly scheduled authorization with the Smart Software Manager. To force an authorization, click
Re-Authorize on the System ( ) > Licenses > Smart Licenses page.
Unregistered State
The management center can become unregistered in the following situations:
• Evaluation mode expiration—Evaluation mode expires after 90 days.
• Manual deregistration of the management center
• Lack of communication with the Smart Software Manager—The management center does not communicate
with the Smart Software Manager for 1 year. Note: After 90 days, the management center authorization
expires, but it can successfully resume communication within one year to automatically re-authorize.
After a year, the ID certificate expires, and the management center is removed from your account so you
will have to manually re-register the management center.
In an unregistered state, the management center cannot deploy any configuration changes to devices for
features that require licenses.
Management Center • Regular Smart Licensing— The platform license determines the number of
Virtual Perpetual devices the management center virtual can
manage.
• Specific License
Reservation—Subscription For details, see Management Center Virtual
Licenses, on page 240.
Remote Access VPN: Subscription or perpetual Remote access VPN configuration. Your
account must allow export-controlled
• Secure Client
functionality to configure remote access VPN.
Premier
You select whether you meet export
• Secure Client requirements when you register the device. The
Advantage threat defense can use any valid Secure Client
license. The available features do not differ
• Secure Client based on license type.
VPN Only
For more information, see Secure Client
Licenses, on page 244 and VPN Licensing in the
Cisco Secure Firewall Management Center
Device Configuration Guide.
Note For the add-on license requirements of your new devices on FMCv, it is recommended to migrate to a higher
management center virtual model that supports additional devices.
Essentials Licenses
The Essentials license allows you to:
• Configure your devices to perform switching and routing (including DHCP relay and NAT)
• Configure devices as a high availability pair
• Configure clustering
• Implement user and application control by adding user and application conditions to access control rules
• Update the Vulnerability database (VDB) and geolocation database (GeoDB).
• Download intrusion rules such as SRU/LSP. However, you cannot deploy access control policy or rules
that have intrusion policy to the device unless IPS license is enabled.
Other Models
Except in deployments using Specific License Reservation, a Essentials license is automatically added to your
account when you register a device to the management center. For Specific License Reservation, you need to
add the Essentials license to your account.
Note Managed devices with Malware defense licenses enabled periodically attempt to connect to the Secure Malware
Analytics Cloud even if you have not configured dynamic analysis. Because of this, the device’s Interface
Traffic dashboard widget shows transmitted traffic; this is expected behavior.
You configure malware defense as part of a file policy, which you then associate with one or more access
control rules. File policies can detect your users uploading or downloading files of specific types over specific
application protocols. Malware defense allows you to use local malware analysis and file preclassification to
inspect a restricted set of those file types for malware. You can also download and submit specific file types
to the Secure Malware Analytics Cloud for dynamic and Spero analysis to determine whether they contain
malware. For these files, you can view the network file trajectory, which details the path the file has taken
through your network. The Malware Defense license also allows you to add specific files to a file list and
enable the file list within a file policy, allowing those files to be automatically allowed or blocked on detection.
Note that a Malware defense license is required only if you deploy malware defense and Secure Malware
Analytics. Without a Malware defense license, the management center can receive Secure Endpoint malware
events and indications of compromise (IOC) from the Secure Malware Analytics Cloud.
See also important information at License Requirements for File and Malware Policies in the Cisco Secure
Firewall Management Center Device Configuration Guide.
When you disable this license:
• The system stops querying the Secure Malware Analytics Cloud, and also stops acknowledging
retrospective events sent from the Secure Malware Analytics Cloud.
• You cannot re-deploy existing access control policies if they include malware defense configurations.
• For a very brief time after a Malware defense license is disabled, the system can use existing cached file
dispositions. After the time window expires, the system assigns a disposition of Unavailable to those
files.
If the license expires, your entitlement for the above capabilities ceases and the management center moves to
the out-of-compliance state.
IPS Licenses
A IPS license allows you to perform intrusion detection and prevention, file control, and Security Intelligence
filtering:
• Intrusion detection and prevention allows you to analyze network traffic for intrusions and exploits and,
optionally, drop offending packets.
• File control allows you to detect and, optionally, block users from uploading (sending) or downloading
(receiving) files of specific types over specific application protocols. Malware defense, which requires
a Malware defense license, allows you to inspect and block a restricted set of those file types based on
their dispositions.
• Security Intelligence filtering allows you to block —deny traffic to and from—specific IP addresses,
URLs, and DNS domain names, before the traffic is subjected to analysis by access control rules. Dynamic
feeds allow you to immediately block connections based on the latest intelligence. Optionally, you can
use a “monitor-only” setting for Security Intelligence filtering.
You can purchase a IPS license as a stand-alone subscription (T) or in combination with URL (TC), Malware
defense (TM), or both (TMC).
When you disable this license:
• The management center stops acknowledging intrusion and file events from the affected devices. As a
consequence, correlation rules that use those events as a trigger criteria stop firing.
• The management center does not contact the internet for either Cisco-provided or third-party Security
Intelligence information.
• You cannot re-deploy existing intrusion policies until you re-enable IPS.
If the license expires, your entitlement for the above capabilities ceases and the management center moves to
the out-of-compliance state.
Carrier License
The Carrier license enables the inspection of the following protocols:
• Diameter—Diameter is an Authentication, Authorization, and Accounting (AAA) protocol used in
next-generation mobile and fixed telecom networks such as EPS (Evolved Packet System) for LTE (Long
Term Evolution) and IMS (IP Multimedia Subsystem). It replaces RADIUS and TACACS in these
networks.
• GTP/GPRS—GPRS Tunneling Protocol (GTP) is used in GSM, UMTS, and LTE networks for general
packet radio service (GPRS) traffic. GTP provides a tunnel control and management protocol to provide
GPRS network access for a mobile station by creating, modifying, and deleting tunnels. GTP also uses
a tunneling mechanism for carrying user data packets.
• M3UA—MTP3 User Adaptation (M3UA) is a client/server protocol that provides a gateway to the
Signaling System 7 (SS7) network for IP-based applications that interface with the SS7 Message Transfer
Part 3 (MTP3) layer. M3UA makes it possible to run the SS7 User Parts (such as ISUP) over an IP
network.
• SCTP—Stream Control Transmission Protocol (SCTP) is a transport-layer protocol that supports the
SS7 protocol over IP networks. It supports the 4G LTE mobile network architecture. SCTP can handle
multiple simultaneous streams, multiplexed streams, and provides more security features.
Note After you enable this license on a device, use a FlexConfig policy to enable the protocol inspection.
The Carrier license PIDs are available per family and not per device model. You can enable this license for
each device either in the evaluation mode or with a Smart License.
The Carrier license for Firepower 4100/9300, Secure Firewall 3100/4200, and Threat Defense Virtual is
term-based. This license also supports Specific License Reservation.
Supported Devices
The devices that support the Carrier License are:
• Secure Firewall 3110
• Secure Firewall 3120
URL Licenses
The URL license allows you to write access control rules that determine the traffic that can traverse your
network based on URLs requested by monitored hosts, correlated with information about those URLs. To
support this feature license, you can purchase the URL service subscription as a stand-alone subscription or
in combination with IPS (TC) or Threat and Malware defense (TMC) subscriptions. IPS license is a prerequisite
for this license.
Tip Without a URL license, you can specify individual URLs or groups of URLs to allow or block. This option
gives you granular, custom control over web traffic, but does not allow you to use URL category and reputation
data to filter network traffic.
Although you can add category and reputation-based URL conditions to access control rules without a URL
license, the management center will not download URL information. You cannot deploy the access control
policy until you first add a URL license to the management center, then enable it on the devices targeted by
the policy.
When you disable this license:
• You may lose access to URL filtering.
• Access control rules with URL conditions immediately stop filtering URLs.
• Your management center can no longer download updates to URL data.
• You cannot re-deploy existing access control policies if they include rules with category and
reputation-based URL conditions.
If the license expires, your entitlement for the above capabilities ceases and the management center moves to
the out-of-compliance state.
How to determine whether export-controlled functionality is currently enabled for your system
To determine whether export-controlled functionality is currently enabled for your system: Go to System >
Licenses > Smart Licenses and see if Export-Controlled Features displays Enabled.
When approved by Cisco, you can manually add a strong encryption license to your account so you can
use export-controlled features. For more information, see Enable the Export Control Feature for Accounts
Without Global Permission, on page 260
• If the option “Allow export-controlled functionality on the products registered with this token” appears
when you generate a new Product Instance Registration Token in the Smart Software Manager, make
sure you check it before generating the token.
If you did not enable export-controlled functionality for the Product Instance Registration Token that
you used to register the management center, then you must deregister and then re-register the management
center using a new Product Instance Registration Token with export-controlled functionality enabled.
If you registered devices to the management center in evaluation mode or before you enabled strong encryption
on the management center, reboot each managed device to make strong encryption available. In a high
availability deployment, the active and standby devices must be rebooted together to avoid an Active-Active
condition.
The entitlement is perpetual and does not require a subscription.
More Information
For general information about export controls, see https://www.cisco.com/c/en/us/about/legal/
global-export-trade.html.
Table 11: Threat Defense Virtual Licensed Feature Limits Based on Entitlement
Note Make sure your Smart Licensing account contains the available licenses you need.
It’s important to choose the tier that matches the license you have in your account.
If you are upgrading your threat defense virtual to Version 7.0, you can choose
FTDv - Variable to maintain your current license compliance. Your threat defense
virtual continues to perform with session limits based on your device capabilities
(number of cores/RAM).
• The default performance tier is FTDv50 when deploying a new threat defense virtual device, or when
provisioning the threat defense virtual using the REST API.
• Essentials licenses are subscription-based and mapped to performance tiers. Your virtual account needs
to have the Essentials license entitlements for the threat defense virtual devices, as well as for IPS,
Malware Defense, and URL licenses.
• Each HA peer consumes one entitlement, and the entitlements on each HA peer must match, including
Essentials license.
• A change in performance tier for an HA pair should be applied to the primary peer.
• You assign feature licenses to the cluster as a whole, not to individual nodes. However, each node of the
cluster consumes a separate license for each feature. The clustering feature itself does not require any
licenses.
• Universal PLR licensing is applied to each device in an HA pair separately. The secondary device will
not automatically mirror the performance tier of the primary device. It must be updated manually.
License PIDs
When you bought your device from Cisco or a reseller, your licenses should have been linked to your Smart
Software License account. However, if you need to add licenses yourself, use the Find Products and Solutions
search field on the Cisco Commerce Workspace. Search for the following license Product IDs (PIDs).
• KVM:
• SF-FMC-KVM-2-K9—2 devices
• SF-FMC-KVM-10-K9—10 devices
• SF-FMC-KVM-K9—25 devices
• PAK-based VMware:
• FS-VMW-2-SW-K9—2 devices
• FS-VMW-10-SW-K9—10 devices
• FS-VMW-SW-K9—25 devices
• FTD-V-5S-TMC
• FTD-V-10S-TMC
• FTD-V-20S-TMC
• FTD-V-30S-TMC
• FTD-V-50S-TMC
• FTD-V-100S-TMC
• Carrier—FTDV_CARRIER
• Cisco Secure Client—See the Cisco Secure Client Ordering Guide.
When you add the above PID to your order, you can then choose a term-based subscription corresponding
with one of the following PIDs:
• L-FPR1010T-TMC-1Y
• L-FPR1010T-TMC-3Y
• L-FPR1010T-TMC-5Y
When you add one of the above PIDs to your order, you can then choose a term-based subscription
corresponding with one of the following PIDs:
• L-FPR1120T-TMC-1Y
• L-FPR1120T-TMC-3Y
• L-FPR1120T-TMC-5Y
• L-FPR1140T-TMC-1Y
• L-FPR1140T-TMC-3Y
• L-FPR1140T-TMC-5Y
• L-FPR1150T-TMC-1Y
• L-FPR1150T-TMC-3Y
• L-FPR1150T-TMC-5Y
When you add one of the above PIDs to your order, you can then choose a term-based subscription
corresponding with one of the following PIDs:
• L-FPR2110T-TMC-1Y
• L-FPR2110T-TMC-3Y
• L-FPR2110T-TMC-5Y
• L-FPR2120T-TMC-1Y
• L-FPR2120T-TMC-3Y
• L-FPR2120T-TMC-5Y
• L-FPR2130T-TMC-1Y
• L-FPR2130T-TMC-3Y
• L-FPR2130T-TMC-5Y
• L-FPR2140T-TMC-1Y
• L-FPR2140T-TMC-3Y
• L-FPR2140T-TMC-5Y
When you add one of the above PIDs to your order, you can then choose a term-based subscription
corresponding with one of the following PIDs:
• L-FPR3105T-TMC-1Y
• L-FPR3105T-TMC-3Y
• L-FPR3105T-TMC-5Y
• L-FPR3110T-TMC-1Y
• L-FPR3110T-TMC-3Y
• L-FPR3110T-TMC-5Y
• L-FPR3120T-TMC-1Y
• L-FPR3120T-TMC-3Y
• L-FPR3120T-TMC-5Y
• L-FPR3130T-TMC-1Y
• L-FPR3130T-TMC-3Y
• L-FPR3130T-TMC-5Y
• L-FPR3140T-TMC-1Y
• L-FPR3140T-TMC-3Y
• L-FPR3140T-TMC-5Y
• Carrier:
• L-FPR3K-FTD-CAR=
When you add one of the above PIDs to your order, you can then choose a term-based subscription
corresponding with one of the following PIDs:
• L-FPR4112T-TMC-1Y
• L-FPR4112T-TMC-3Y
• L-FPR4112T-TMC-5Y
• L-FPR4115T-TMC-1Y
• L-FPR4115T-TMC-3Y
• L-FPR4115T-TMC-5Y
• L-FPR4125T-TMC-1Y
• L-FPR4125T-TMC-3Y
• L-FPR4125T-TMC-5Y
• L-FPR4145T-TMC-1Y
• L-FPR4145T-TMC-3Y
• L-FPR4145T-TMC-5Y
• Carrier:
• L-FPR4K-FTD-CAR=
When you add one of the above PIDs to your order, you can then choose a term-based subscription
corresponding with one of the following PIDs:
• L-FPR4215T-TMC-1Y
• L-FPR4215T-TMC-3Y
• L-FPR4215T-TMC-5Y
• L-FPR4225T-TMC-1Y
• L-FPR4225T-TMC-3Y
• L-FPR4225T-TMC-5Y
• L-FPR4245T-TMC-1Y
• L-FPR4245T-TMC-3Y
• L-FPR4245T-TMC-5Y
• Carrier:
• L-FPR4200-FTD-CAR=
When you add one of the above PIDs to your order, you can then choose a term-based subscription
corresponding with one of the following PIDs:
• L-FPR9K-40T-TMC-1Y
• L-FPR9K-40T-TMC-3Y
• L-FPR9K-40T-TMC-5Y
• L-FPR9K-48T-TMC-1Y
• L-FPR9K-48T-TMC-3Y
• L-FPR9K-48T-TMC-5Y
• L-FPR9K-56T-TMC-1Y
• L-FPR9K-56T-TMC-3Y
• L-FPR9K-56T-TMC-5Y
• Carrier:
• L-FPR9K-FTD-CAR=
• L-ISA3000T-TMC=
When you add the above PID to your order, you can then choose a term-based subscription corresponding
with one of the following PIDs:
• L-ISA3000T-TMC-1Y
• L-ISA3000T-TMC-3Y
• L-ISA3000T-TMC-5Y
General Prerequisites
• Make sure NTP is configured on the management center and managed devices. Time must be synchronized
for registration to succeed.
For a Firepower 4100/9300, you must configure NTP on the chassis using the same NTP server for the
chassis as for the management center.
Supported Domains
Global, except where indicated.
User Roles
• Admin
Only the active management center is registered with the Smart Software Manager. When failover occurs,
the system communicates with Smart Software Manager to release the license entitlements from the
originally-active management center and assign them to the newly-active management center.
In Specific License Reservation deployments, only the primary management center requires a Specific License
Reservation.
If you break the high availability pair, the management center virtual entitlements associated with the secondary
management center virtual are released. (In the example, you would then have two standalone management
center virtual 10s.)
Note If you add the cluster before the management center is licensed (and running in Evaluation mode), then when
you license the management center, you can experience traffic disruption when you deploy policy changes
to the cluster. Changing to licensed mode causes all data units to leave the cluster and then rejoin.
For example:
Table 12: Sample License Usage for Container Instances on a Firepower 9300
3 2 3 2
Procedure
Step 2 Wait for an email telling you that your Smart Account is ready to set up. When it arrives, click the link it
contains, as directed.
Step 3 Set up your Smart Account:
Go here: https://software.cisco.com/software/company/smartaccounts/home?route=module/accountcreation.
For instructions, see https://community.cisco.com/t5/licensing-enterprise-agreements/
complete-smart-account-setup-for-customers/ta-p/3636631?attachment-id=132604.
Step 4 Verify that you can access the account in the Smart Software Manager.
Go to https://software.cisco.com/#module/SmartLicensing and sign in.
Step 5 Make sure your Smart Licensing account contains the available licenses you need.
When you bought your device from Cisco or a reseller, your licenses should have been linked to your Smart
Account. However, if you need to add licenses yourself, see Cisco Commerce Workspace. For license PIDs,
see License PIDs, on page 246.
Procedure
Step 1 In the Smart Software Manager, request and copy a registration token for the virtual account to which you
want to add this device.
a) Click Inventory.
c) On the Create Registration Token dialog box enter the following settings, and then click Create Token:
• Description
• Expire After—Cisco recommends 30 days.
• Allow export-controlled functionality on the products registered with this token—Enables the
export-compliance flag if you are in a country that allows for strong encryption. You must select this
option now if you plan to use this functionality. If you enable this functionality later, you will need
to re-register your device with a new product key and reload the device. If you do not see this option,
your account does not support export-controlled functionality.
Step 2 In the management center, choose System ( ) > Licenses > Smart Licenses.
Step 3 Click Register.
Step 4 Paste the token you generated from Smart Software Manager into the Product Instance Registration Token
field.
Make sure there are no empty spaces or blank lines at the beginning or end of the text.
What to do next
• Add a Device to the management center; see Add a Device to the Management Center in the Cisco Secure
Firewall Management Center Device Configuration Guide.
• Assign licenses to your devices; see Assign Licenses to Multiple Managed Devices, on page 263.
Register the Management Center with the Smart Software Manager On-Prem
As described in Periodic Communication with the Smart Software Manager, on page 237, the management
center must communicate regularly with Cisco to maintain your license entitlement. If you have one of the
following situations, you might want to use a Smart Software Manager On-Prem (formerly known as "Smart
Software Satellite Server") as a proxy for connections to the Smart Software Manager:
• Your management center is offline or otherwise has limited or no connectivity (in other words, is deployed
in an air-gapped network.)
(For an alternate solution for air-gapped networks, see Licensing Options for Air-Gapped Deployments,
on page 236.)
• Your management center has permanent connectivity, but you want to manage your Smart Licenses via
a single connection from your network.
The Smart Software Manager On-Prem allows you to schedule synchronization or manually synchronize
Smart License authorization with the Smart Software Manager.
For more information about the Smart Software Manager On-Prem, see https://www.cisco.com/c/en/us/buy/
smart-accounts/software-manager.html#~on-prem
Procedure
Step 2 Register the management center with the Smart Software Manager On-Prem.
a) Choose Integration > Other Integrations.
b) Click Smart Software Satellite.
c) Select Connect to Cisco Smart Software Satellite Server.
d) Enter the URL of your Smart Software Manager On-Prem, using the CN value you collected in the
prerequisites of this procedure, in the following format:
https://FQDN_or_hostname_of_your_SSM_On-Prem/SmartTransport
The FQDN or hostname must match the CN value of the certificate presented by your Smart Software
Manager On-Prem.
e) Add a new SSL Certificate and paste the certificate text that you copied earlier.
f) Click Apply.
g) Select System > Licenses > Smart Licenses and click Register.
h) Create a new token on Smart Software Manager On-Prem.
i) Copy the token.
j) Paste the token into the form on the management center page.
k) Click Apply Changes.
The management center is now registered to Smart Software Manager On-Prem.
Step 3 After you assign licenses to devices, synchronize Smart Software Manager On-Prem to the Smart Software
Manager.
See the Smart Software Manager On-Prem documentation, above.
Enable the Export Control Feature for Accounts Without Global Permission
If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed
to use strong encryption, you can manually add a stong encryption license to your account.
Cisco Virtual FMC Series Strong Encryption All management center virtuals
(3DES/AES)
Procedure
What to do next
You can now deploy configurations or policies that use the export-controlled features.
Remember The new export-controlled licenses and all features enabled by it do not take effect on the threat defense
devices until the devices are rebooted. Until then, only the features supported by the older license will be
active.
In High Availability deployments both the threat defense devices need to be rebooted simultaneously, to avoid
an Active-Active condition.
Note For container instances on the same security module/engine, you apply the license to each instance; note that
the security module/engine consumes only one license per feature for all instances on the security
module/engine.
Note For the threat defense cluster, you apply the licenses to the cluster as a whole; note that each unit in the cluster
consumes a separate license per feature.
Procedure
Step 7 Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
What to do next
Verify license status: Go to System ( ) > Licenses > Smart Licenses, enter the hostname or IP address of
the device into the filter at the top of the Smart Licenses table, and verify that only a green circle with a Check
Mark ( ) appears for each device, for each license type. If you see any other icon, hover over the icon for
more information.
Note For container instances on the same security module/engine, you apply the license to each instance; note that
the security module/engine consumes only one license per feature for all instances on the security
module/engine.
Note For the threat defense cluster, you apply the licenses to the cluster as a whole; note that each unit in the cluster
consumes a separate license per feature.
Procedure
Step 1 Choose System ( ) > Licenses > Smart Licenses or Specific Licenses.
Step 2 Click Edit Licenses.
Step 3 For each type of license you want to add to a device:
a) Click the tab for that type of license.
b) Click a device in the list on the left.
c) Click Add to move that device to the list on the right.
d) Repeat for each device to receive that type of license.
For now, don't worry about whether you have licenses for all of the devices you want to add.
e) Repeat this subprocedure for each type of license you want to add.
f) To remove a license, click the Delete ( ) next to the device.
g) Click Apply.
You can select a cluster and assign any license to all nodes of a cluster.
What to do next
Verify that your licenses are correctly installed. Follow the procedure in Monitoring Smart Licenses, on page
265.
Procedure
Procedure
Usage Authorization
Possible status values are:
• In-compliance ( ) — All licenses assigned to managed devices are in compliance and the management
center is communicating successfully with the Smart Software Manager.
• License is in compliance but communication with licensing authority has failed— Device licenses
are in compliance, but the management center is not able to communicate with the Cisco licensing
authority.
• Out-of-compliance icon or unable to communicate with License Authority— One or more managed
devices is using a license that is out of compliance, or the management center has not communicated
with the Smart Software Manager in more than 90 days.
Product Registration
Specifies the last date when the management center contacted the Smart Software Manager and registered.
Export-Controlled Features
If this option is enabled, you can deploy restricted features. For details, see Licensing for Export-Controlled
Functionality, on page 244.
• The Smart License Monitor health module communicates license status when used in a health policy.
Procedure
Step 3 In each folder, verify that each device has a green circle with a Check Mark ( ) in the License Status
column.
Note If you see duplicate management center virtual licenses, each represents one managed device.
If all devices show a green circle with a Check Mark ( ), your devices are properly licensed and ready to
use.
If you see any License Status other than a green circle with a Check Mark ( ), hover over the status icon
to view the message.
What to do next
• If you had any devices that did not have a green circle with a Check Mark ( ), you may need to
purchase more licenses.
Note You cannot undo this process. You cannot convert a Smart License to a Classic license, even if the license
was originally a Classic license.
Procedure
Step 1 The conversion process you follow depends on whether or not the license has been consumed:
• If the PAK that you want to convert has never been used, follow instructions for converting a PAK.
• If the PAK you want to convert has already been assigned to a device, follow instructions for converting
a Classic license.
Make sure your existing classic license is still registered to your device.
Step 2 See instructions for your type of conversion (PAK or installed Classic license) in the following documentation:
• To convert PAKs or licenses using the License Registration Portal:
• To view a video that steps you through the License Registration Portal part of the conversion process,
click https://salesconnect.cisco.com/#/content-detail/7da52358-0fc1-4d85-8920-14a1b7721780.
• Search for "Convert" in the following document: https://cisco.app.box.com/s/
mds3ab3fctk6pzonq5meukvcpjizt7wu.
There are three conversion procedures. Choose the conversion procedure applicable to your situation.
• Sign in to the License Registration Portal at https://tools.cisco.com/SWIFT/LicensingUI/Home and
follow the instructions in the documentation above.
Step 4 If you will use the device manager to manage this device as a standalone device:
See information about licensing the device in the device manager configuration guide at https://www.cisco.com/
c/en/us/support/security/firepower-ngfw/products-installation-and-configuration-guides-list.html.
Skip the rest of this procedure.
Step 5 If you have already deployed Smart Licensing on your management center:
a) Set up Smart Licensing on your new threat defense.
See Assign Licenses to Multiple Managed Devices, on page 263.
b) Verify that the new Smart License has been successfully applied to the device.
See Monitoring Smart Licenses, on page 265.
Step 6 If you have not yet deployed Smart Licensing on your management center:
See Configure Smart Licensing, on page 256. (Skip any steps that do not apply or that you have already
completed.)
Note Various names are used at Cisco for Specific License Reservation, including SLR, SPLR, PLR, and Permanent
License Reservation. These terms may also be used at Cisco to refer to similar but not necessarily identical
licensing models.
When Specific License Reservation is enabled, the management center reserves licenses from your virtual
account for a specified duration without accessing the Smart Software Manager or using Smart Software
Manager On-Prem.
Features that require access to the internet, such as URL Lookups or contextual cross-launch to public web
sites, will not work.
Cisco does not collect web analytics or telemetry data for deployments that use Specific License Reservation.
Verify that your Smart Account is Ready to Deploy Specific License Reservation
To prevent problems when deploying your Specific License Reservation, complete this procedure before you
make any changes in your management center.
Procedure
Step 2 If applicable, select the correct account from the top right corner of the page.
Step 3 If necessary, click Inventory.
Step 4 Click Licenses.
Step 5 Verify the following:
• There is a License Reservation button.
• There are enough platform and feature licenses for the devices and features you will deploy, including
management center virtual entitlements for your devices, if applicable.
Step 6 If any of these items is missing or incorrect, contact your account representative to resolve the problem.
Note Do not continue with this process until any problems are corrected.
Procedure
Step 1 Access the management center console using a USB keyboard and VGA monitor, or use SSH to access the
management interface.
Step 2 Log into the management center CLI admin account.
Step 3 Enter the expert command to access the Linux shell.
Step 4 Execute the following command to access the Specific License Reservation options:
sudo manage_slr.pl
Example:
**************************************************************
Enter choice:
k) Click Next.
l) Click Generate Authorization Code.
At this point, the license is now in use according to the Smart Software Manager.
m) Download the Authorization Code in preparation for entering it into the management center.
Step 3 Enter the authorization code in the management center.
a) In the management center, click Browse to upload the text file with the authorization code that you
generated from the Smart Software Manager.
b) Click Install.
c) Verify that the Specific License Reservation page shows the Usage Authorization status as authorized.
d)
Step 4 Click the Reserved License tab to verify the licenses selected while generating the Authorization Code.
If you do not see the licenses you require, then add the necessary licenses. For more info, see Update a Specific
License Reservation.
Procedure
Use this procedure if you need to renew your licenses after they expire. If you do not have the required licenses,
the following actions are restricted:
• Device registration
• Policy deployment
Procedure
Step 1 In the management center, obtain the unique product instance identifier of this management center:
a) Select System > Licenses > Specific Licenses.
b) Make a note of the Product Instance value.
You will need this value several times during this process.
Step 2 In the Smart Software Manager, identify the management center to update:
a) Go to the Smart Software Manager:
https://software.cisco.com/#SmartLicensing-Inventory
b) If necessary, click Inventory.
c) Click Product Instances.
d) Look for a product instance that has FP in the Type column and a generic SKU (not a hostname) in the
Name column. You may also be able to use the values in other table columns to help determine which
management center is the correct management center. Click the name.
e) Look at the UUID and see if it is the UUID of the management center that you are trying to modify.
If not, you must repeat these steps until you find the correct management center.
Step 3 When you have located the correct management center in the Smart Software Manager, update the reserved
licenses and generate a new authorization code:
a) On the page that shows the correct UUID, choose Actions > Update Reserved Licenses.
b) Update the reserved licenses as needed.
Note • You must explicitly include a Essentials license for each managed device, or, for
multi-instance deployments, for each container.
• If you are using the management center virtual, you must include a platform entitlement
for each container (in multi-instance deployments) or each managed device (all other
deployments).
• If you use strong encryption functionality:
• If your entire Smart Account is enabled for export-controlled functionality, you do
not need to do anything here.
• If your organization's entitlement is per-management center, you must select the
appropriate license.
For the correct license name to choose for your management center, see the
prerequisites in Enable the Export Control Feature for Accounts Without Global
Permission, on page 260.
c) Enter the confirmation code that you generated from the management center.
Step 6 In the management center, verify that your licenses are reserved as you expect them, and that each feature for
each managed device shows a green circle with a Check Mark ( ).
If necessary, see Monitoring Specific License Reservation Status, on page 277 for more information.
Step 7 Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
Important If you do not follow all of the steps in this procedure, the license remains in an in-use state and cannot be
re-used.
This procedure releases all license entitlements associated with the management center back to your virtual
account. After you de-register, no updates or changes on licensed features are allowed.
Procedure
Step 1 In the management center Web interface, select System > Licenses > Specific Licenses.
Step 2 Make a note of the Product Instance identifier for this management center.
Step 3 Generate a return code from the management center.
a) Click Return SLR.
The following figure shows Return SLR.
Devices become unlicensed and the management center moves to the de-registered state.
b) Make a note of the Return Code.
Step 4 In the Smart Software Manager, identify the management center to deregister:
Step 5 When you have identified the correct management center, return the licenses to your Smart Account:
a) On the page that shows the correct UUID, choose Actions > Remove.
b) Enter the reservation return code that you generated from the management center into the Remove Product
Instance dialog box.
c) Click Remove Product Instance.
The specific reserved licenses are returned to the available pool in your Smart Account and this management
center is removed from the Smart Software Manager Product Instances list.
Step 6 Disable the Specific License in the management center Linux shell:
a) Access the management center console using a USB keyboard and VGA monitor, or use SSH to access
the management interface.
b) Log in to the management center CLI admin account. This gives you access to the command line interface.
c) Enter the expert command to access the Linux shell.
d) Execute the following command:
sudo manage_slr.pl
Example:
**************************************************************
Enter choice:
Usage Authorization
Possible status values are:
• Authorized — The management center is in compliance and registered successfully with the License
Authority, which has authorized the license entitlements for the appliance.
• Out-of-compliance — If licenses are expired or if the management center has overused licenses even
though they are not reserved, status shows as Out-of-Compliance. License entitlements are enforced in
Specific License Reservation, so you must take action.
Product Registration
Specifies registration status and the date that an authorization code was last installed or renewed on the
management center.
Export-Controlled Features
Specifies whether you have enabled export-controlled functionality for the management center.
For more information about Export-Controlled Features, see Licensing for Export-Controlled Functionality,
on page 244.
Product Instance
The Universally Unique Identifier (UUID) of this management center. This value identifies this device in the
Smart Software Manager.
Confirmation Code
The Confirmation Code is needed if you update or deactivate and return Specific Licenses.
How do I identify a particular management center in the Product Instance list in Smart Software Manager?
On the Product Instances page in Smart Software Manager, if you cannot identify the product instance based
on a value in one of the columns in the table, you must click the name of each generic product instance of
type FP to view the product instance details page. The UUID value on this page uniquely identifies one
management center.
In the management center web interface, the UUID for the management center is the Product Instance value
displayed on the System > Licenses > Specific Licenses page.
I was interrupted in the middle of the licensing process. How can I pick up where I left off?
If you have generated but not yet downloaded an Authorization code from the Smart Software Manager, you
can go to the Product Instance page in the Smart Software Manager, click the product instance, then click
Download Reservation Authorization Code.
I have enabled Specific Licensing, but now I do not see a Smart License page.
This is the expected behavior. When you enable Specific Licensing, Smart Licensing is disabled. You can
use the Specific License page to perform licensing operations.
If you want to use Smart Licensing, you must return the Specific License. For more information see, Deactivate
and Return the Specific License Reservation, on page 275.
What if I do not see a Specific License page in the management center virtual?
You need to enable Specific License to view the Specific License page. For more information see, Enable the
Specific Licensing Menu Option, on page 270.
I have disabled Specific Licensing, but forgot to copy the Return Code. What should I do?
The Return Code is saved in the management center virtual. You must re-enable the Specific License from
the Linux shell (see Enable the Specific Licensing Menu Option, on page 270), then refresh the management
center virtual web interface. Your Return Code will be displayed.
Procedure
Step 1 The license key uniquely identifies the management center in the Smart Software Manager. It is composed
of a product code (for example, 66) and the MAC address of the management port (eth0) of the management
center; for example, 66:00:00:77:FF:CC:88.
a) Choose System ( ) > Licenses > Classic Licenses.
b) Click Add New License.
c) Note the value in the License Key field at the top of the Add Feature License dialog.
Step 6 Generate a license from the PAK in the License Registration Portal: https://cisco.com/go/license.
This step requires the PAK you received during the purchase process, as well as the license key for the
management center.
For more information on using this portal, see:
https://slexui.cloudapps.cisco.com/SWIFT/LicensingUI/Quickstart
You will need your account credentials in order to access these links.
Step 7 Copy the license text from either the License Registration Portal display, or the email the License Registration
Portal sends you.
Important The licensing text block in the portal or email message may include more than one license. Each
license is bounded by a BEGIN LICENSE line and an END LICENSE line. Make sure that you
copy and paste only one license at a time.
Step 8 Return to the Add Feature License page in the management center virtual’s web interface.
Smart Licensing 7.3 We changed the following license names in the management center GUI:
Standardization
• Base is now Essentials
• Threat is now IPS
• Malware is now Malware Defense
• RA VPN/AnyConnect License is now Cisco Secure Client
• AnyConnect Plus is now Secure Client Advantage
• AnyConnect Apex is now Secure Client Premier
• AnyConnect Apex and Plus is now Secure Client Premier and Advantage
• AnyConnect VPN Only is now Secure Client VPN Only
Support for Carrier license 7.3 The Carrier license enables inspection of Diameter, GTP/GPRS, SCTP, and M3UA
protocols.
New/Modified screens: System > Smart Licenses
Performance tier licensing 7.0 Performance-tiered licensing provides different throughput levels and VPN connection
for the threat defense virtual limits based on deployment requirements. License tiers map to new threat defense virtual
models.
Licensing for multi-instance 6.3 You can now deploy multiple threat defense container instances on a Firepower
capability for the threat 4100/9300. You only need a single license per feature per security module/engine. The
defense on the Firepower base license is automatically assigned to each instance.
4100/9300
New/Modified screens: System > Licenses > Smart Licenses
Supported platforms: threat defense on the Firepower 4100/9300
Specific License 6.3 Customers whose deployments cannot connect to the internet to communicate with the
Reservation for air-gapped Cisco License Authority can use a Specific License Reservation.
deployments
New/Modified screens: System > Licenses > Specific Licenses (This option is not
available by default.)
Supported platforms: management center, threat defense
Export-controlled 6.3 Certain customers whose Smart Accounts are not otherwise eligible to use restricted
functionality for restricted functionality can purchase term-based licenses, with approval.
customers
Supported platforms: management center, threat defense
Note that management centers configured as a high availability pair do not need to be on the same trusted
management network, nor do they have to be in the same geographic location.
Caution Because the system restricts some functionality to the active management center, if that appliance fails, you
must promote the standby management center to active.
Note Triggering a switchover on management center immediately after a successful change deployment can lead
to preview configuration not working on the new active management center. This does not impact policy
deploy functionality. It is recommended to trigger a switchover on the management center after the necessary
sync is completed.
Similarly, when management center HA synchronization is in degraded state, triggering a switchover or
changing roles could make management center HA to damage the database and it can become catastrophic.
We recommend that you immediately contact Cisco Technical Assistance Center (TAC) for further assistance
to resolve this issue.
This HA synchronization can end up in degraded state due to various reasons. The Replacing Management
Centers in a High Availability Pair, on page 298 section in this chapter covers some of the failure scenarios
and the subsequent procedure to fix the issue. If the reason or scenario of degraded state matches to the
scenarios explained, follow the steps to fix the issue. For other resons, we recommend that you contact TAC.
Active/Standby Status
The main differences between the two Secure Firewall Management Centers in a high availability pair are
related to which peer is active and which peer is standby. The active Secure Firewall Management Center
remains fully functional, where you can manage devices and policies. On the standby Secure Firewall
Management Center, functionality is hidden; you cannot make any configuration changes.
This is applicable conversely also in case the secondary (FMC2) fails. For more information, see Switching
Peers in the Management Center High Availability Pair, on page 296.
For restoring a failed management center, refer to Replacing Management Centers in a High Availability Pair,
on page 298.
Related Topics
Configure SAML Single Sign-On, on page 132
Note Whichever appliance you use as the secondary loses all of its device registrations and policy configurations
when you resolve split-brain. For example, you would lose modifications to any policies that existed on the
secondary but not on the primary. If the management center is in a high availability split-brain scenario where
both appliances are active, and you register managed devices and deploy policies before you resolve split-brain,
you must export any policies and unregister any managed devices from the intended standby management
center before re-establishing high availability. You may then register the managed devices and import the
policies to the intended active management center.
Warning Make sure that there is at least one operational management center during an upgrade.
Procedure
Step 1 Access the web interface of the active management center and pause data synchronization; see Pausing
Communication Between Paired Management Centers, on page 296.
Step 2 Upgrade the standby management center.
When the upgrade completes, the standby unit becomes active. When both peers are active, the high availability
pair is in a degraded state (split-brain).
Step 3 Upgrade the other management center.
Step 4 Decide which management center you want to use as the standby. Any additional devices or policies added
to the standby after pausing synchronization are not synced to the active management center. Unregister only
those additional devices and export any configurations you want to preserve.
When you choose a new active management center, the management center you designate as secondary will
lose device registrations and deployed policy configurations, which are not synced.
Step 5 Resolve split-brain by choosing the new active management center which has all the latest required
configurations for policies and devices.
You must reset your You attempted to log into the standby As the database is read-only for a standby
password on the management center when a force password management center, reset the password on
active management reset is enabled for your account. the login page of the active management
center before you center.
can log into the
standby
500 Internal May appear when attempting to access the Wait until the operation completes before
web interface while performing critical using the web interface.
management center high availability
operations, including switching peer roles
or pausing and resuming synchronization.
System processes May appear when the management center 1. Access the management center shell
are starting, please reboots (manually or while recovering and use the manage_hadc.pl command
wait from a power down) during a high to access the management center high
availability or data synchronization availability configuration utility.
Also, the web
operation.
interface does not Note Run the utility as a root
respond. user, using sudo.
Device Registration During the initial configuration of a threat 1. Delete the threat defense from primary
Status:Host defense, if the management center IP management center. See Delete a
<string> is not address and NAT ID are specified, the Device from the Management Center
reachable Host field can be left blank. However, in in Cisco Secure Firewall Management
an HA environment with both the Center Device Configuration Guide.
management centers behind a NAT, this
error occurs when you add the threat 2. Remove managers from threat defense
defense on the secondary management using the configure manager delete
center. command. See Cisco Secure Firewall
Threat Defense Command Reference.
3. Add threat defense to the management
center with the IP address or name of
the threat defense device in the Host
field. See Add a Device to the
Management Center in Cisco Secure
Firewall Management Center Device
Configuration Guide.
Supported Domains
Global
User Roles
Admin
Hardware Requirements
• All management center hardware supports high availability. The peers must be the same model.
• The peers may be physically and geographically separated from each other in different data centers.
• Bandwidth requirement for high availability configuration depends on various factors such as the size
of the network, the number of managed devices, the volume of events and logs, and the size and frequency
of configuration updates. For a typical management center high availability deployment, a minimum of
5 Mbps network bandwidth between the peers is recommended.
Software Requirements
Access the Appliance Information widget to verify the software version, the intrusion rule update version
and the vulnerability database update. By default, the widget appears on the Status tab of the Detailed
Dashboard and theSummary Dashboard. For more information, see The Appliance Information Widget,
on page 318
• The two management centers in a high availability configuration must have the same major (first number),
minor (second number), and maintenance (third number) software version.
• The two management centers in a high availability configuration must have the same version of the
intrusion rule update installed.
• The two management centers in a high availability configuration must have the same version of the
vulnerability database update installed.
• The two management centers in a high availability configuration must have the same version of the LSP
(Lightweight Security Package) installed.
Warning If the software versions, intrusion rule update versions and vulnerability database update versions are not
identical on both management centers, you cannot establish high availability.
LicenseRequirementsforManagementCenterHighAvailabilityConfigurations
Each device requires the same licenses whether managed by a single management center or by management
centers in a high availability pair (hardware or virtual).
Example: If you want to enable advanced malware protection for two devices managed by a management
center pair, buy two Malware Defense licenses and two TM subscriptions, register the active management
center with the Smart Software Manager, then assign the licenses to the two devices on the active management
center.
Only the active management center is registered with the Smart Software Manager. When failover occurs,
the system communicates with Smart Software Manager to release the license entitlements from the
originally-active management center and assign them to the newly-active management center.
In Specific License Reservation deployments, only the primary management center requires a Specific License
Reservation.
If you break the high availability pair, the management center virtual entitlements associated with the secondary
management center virtual are released. (In the example, you would then have two standalone management
center virtual 10s.)
You can now proceed to establish high availability. For more information, see Establishing Management
Center High Availability, on page 292.
Procedure
Step 1 Log into the management center that you want to designate as the secondary.
Step 2 Choose Integration > Other Integrations.
Step 3 Choose High Availability.
Step 4 Under Role for this management center, choose Secondary.
Step 5 Enter the hostname or IP address of the primary management center in the Primary Firepower Management
Center Host text box.
You can leave this empty if the primary management center does not have an IP address reachable from the
peer management center (which can be public or private IP address). In this case, use both the Registration
Key and the Unique NAT ID fields. You need to specify the IP address of at least one management center
to enable HA connection.
Step 6 Enter a one-time-use registration key in the Registration Key text box.
The registration key is any user-defined alphanumeric value up to 37 characters in length. This registration
key will be used to register both -the secondary and the primary management centers.
Step 7 If you did not specify the primary IP address, or if you do not plan to specify the secondary IP address on the
primary management center, then in the Unique NAT ID field, enter a unique alphanumeric ID. See NAT
Environments, on page 71 for more information.
Step 8 Click Register.
Step 9 Using an account with Admin access, log into the management center that you want to designate as the primary.
Step 10 Choose Integration > Other Integrations.
Step 11 Choose High Availability.
Step 12 Under Role for this management center, choose Primary.
Step 13 Enter the hostname or IP address of the secondary management center in the Secondary Firepower
Management Center Host text box.
You can leave this empty if the secondary management center does not have an IP address reachable from
the peer management center (which can be public or private IP address). In this case, use both the Registration
Key and the Unique NAT ID fields. You need to specify the IP address of at least one management center
to enable HA connection.
Step 14 Enter the same one-time-use registration key in the Registration Key text box you used in step 6.
Step 15 If required, enter the same NAT ID that you used in step 7 in the Unique NAT ID text box.
Step 16 Click Register.
What to do next
After establishing the management center high availability pair, devices registered to the active management
center are automatically registered to the standby management center.
Note When a registered device has a NAT IP address, automatic device registration fails and the secondary
management center High Availablity page lists the device as local, pending. You can then assign a different
NAT IP address to the device on the standby management center High Availability page. If automatic
registration otherwise fails on the standby management center, but the device appears to be registered to the
active Firepower Management Center, see Using CLI to Resolve Device Registration in Management Center
High Availability, on page 295.
Note In this context, Local Peer refers to the appliance where you are viewing the system status. Remote Peer refers
to the other appliance, regardless of active or standby status.
Procedure
Step 1 Log into one of the management centers that you paired using high availability.
Step 2 Choose Integration > Other Integrations.
Step 3 Choose High Availability.
You can view:
Summary Information
• The health status of the high availability pair. The status of a correctly functioning system will oscillate
between "Healthy" and "Synchronization task is in progress" as the standby unit receives configuration
changes from the active unit.
• The current synchronization status of the high availability pair
• The IP address of the active peer and the last time it was synchronized
• The IP address of the standby peer and the last time it was synchronized
System Status
• The IP addresses for both peers
• The operating system for both peers
• The software version for both peers
• The appliance model of both peers
Note You can view export control and compliance status only on the active management center.
Warning If you do an RMA of secondary management center or add a secondary management center, the managed
devices are unregistered, and their configuration can get deleted as a result.
Procedure
Step 1 Delete the device from the active management center. See Delete (Unregister) a Device from the management
center in Cisco Secure Firewall Management Center Device Configuration Guide.
Step 2 Log in to the CLI for the affected device.
Step 3 Run the CLI command: configure manager delete.
This command disables and removes the current management center.
Step 5 Log in to the active management center and register the device.
Procedure
Step 1 Log into one of the management centers that you paired using high availability.
Step 2 Choose Integration > Other Integrations.
Step 3 Choose High Availability.
Step 4 Choose Switch Peer Roles to change the local role from Active to Standby, or Standby to Active. With the
Primary or Secondary designation unchanged, the roles are switched between the two peers.
Procedure
Step 1 Log into one of the management centers that you paired using high availability.
Step 2 Choose Integration > Other Integrations.
Step 3 Choose High Availability.
Step 4 Choose Pause Synchronization.
Procedure
Step 1 Log into one of the management centers that you paired using high availability.
Step 2 Choose Integration > Other Integrations.
Step 3 Choose High Availability.
Step 4 Choose Resume Synchronization.
Procedure
Step 1 Log into one of the management centers that you paired using high availability.
Step 2 Choose Integration > Other Integrations.
Step 3 Choose High Availability.
Step 4 Choose Peer Manager.
Step 5 Choose Edit ( ).
Step 6 Enter the display name of the appliance, which is used only within the context of the system.
Entering a different display name does not change the host name for the appliance.
Step 7 Enter the fully qualified domain name or the name that resolves through the local DNS to a valid IP address
(that is, the host name), or the host IP address.
Step 8 Click Save.
Step 1 Log into one of the management centers in the high availability pair.
Step 2 Choose Integration > Other Integrations.
Step 3 Choose High Availability.
Step 4 Choose Break High Availability.
Step 5 Choose one of the following options for handling managed devices:
• To control all managed devices with this management center, choose Manage registered devices from
this console. All devices will be unregistered from the peer.
• To control all managed devices with the other management center, choose Manage registered devices
from peer console. All devices will be unregistered from this management center.
• To stop managing devices altogether, choose Stop managing registered devices from both consoles.
All devices will be unregistered from both management centers.
Note If you choose to manage the registered devices from the secondary management center, the
devices will be unregistered from the primary management center. The devices are now registered
to be managed by the secondary management center. However the licenses that were applied to
these devices are deregistered on account of the high availability break operation. You must now
proceed to re-register (enable) the licenses on the devices from the secondary management center.
For more information see Assign Licenses to Devices, on page 262.
Primary Data backup successful Replace a Failed Primary Management Center (Successful
management Backup), on page 298
center failed
Data backup not successful Replace a Failed Primary Management Center
(Unsuccessful Backup), on page 299
Procedure
Step 1 Contact Support to request a replacement for a failed management center - FMC1.
Step 2 When the primary management center - FMC1 fails, access the web interface of the secondary management
center - FMC2 and switch peers. For more information, see Switching Peers in the Management Center High
Availability Pair, on page 296.
This promotes the secondary management center - FMC2 to active.
You can use FMC2 as the active management center until the primary management center - FMC1 is replaced.
Caution Do not break management center high availability from FMC2, since licenses that were synced
to FMC2 from FMC1 (before failure ), will be removed from FMC2 and you will be unable to
perform any deploy actions from FMC2.
Step 3 Reimage the replacement management center with the same software version as FMC1.
Step 4 Restore the data backup retrieved from FMC1 to the new management center.
Step 5 Install required management center patches, geolocation database (GeoDB) updates, vulnerability database
(VDB) updates and system software updates to match FMC2.
The new management center and FMC2 will now both be active peers, resulting in a high availability split-brain.
Step 6 When the management center web interface prompts you to choose an active appliance, select FMC2 as active.
This syncs the latest configuration from FMC2 to the new management center - FMC1.
Step 7 When the configuration syncs successfully, access the web interface of the secondary management center -
FMC2 and switch roles to make the primary management center - FMC1 active. For more information, see
Switching Peers in the Management Center High Availability Pair, on page 296.
What to do next
High availability has now been re-established and the primary and the secondary management centers will
now work as expected.
Procedure
Step 1 Contact Support to request a replacement for a failed management center - FMC1.
Step 2 When the primary management center - FMC1 fails, access the web interface of the secondary management
center - FMC2 and switch peers. For more information, see Switching Peers in the Management Center High
Availability Pair, on page 296.
This promotes the secondary management center - FMC2 to active.
You can use FMC2 as the active management center until the primary management center - FMC1 is replaced.
Caution Do not break management center High Availability from FMC2, since licenses that were synced
to FMC2 from FMC1 (before failure ), will be removed from FMC2 and you will be unable to
perform any deploy actions from FMC2.
Step 3 Reimage the replacement management center with the same software version as FMC1.
Step 4 Install required management center patches, geolocation database (GeoDB) updates, vulnerability database
(VDB) updates and system software updates to match FMC2.
Step 5 Deregister one of the management centers - FMC2 from the Cisco Smart Software Manager. For more
information, see Deregister the Management Center, on page 264.
Deregistering management center from the Cisco Smart Software Manager removes the Management Center
from your virtual account. All license entitlements associated with the management center release back to
your virtual account. After deregistration, the management center enters Enforcement mode where no update
or changes on licensed features are allowed.
Step 6 Access the web interface of the secondary management center - FMC2 and break management center high
availability. For more information, see Disabling Management Center High Availability, on page 297. When
prompted to select an option for handling managed devices, choose Manage registered devices from this
console.
As a result, licenses that were synced to the secondary management center- FMC2, will be removed and you
cannot perform deployment activities from FMC2.
Step 7 Re-establish management center high availability, by setting up the management center - FMC2 as the primary
and management center - FMC1 as the secondary. For more information , see Establishing Management
Center High Availability, on page 292.
Step 8 Register a Smart License to the primary management center - FMC2. For more information see Register the
Management Center with the Smart Software Manager, on page 256.
What to do next
High availability has now been re-established and the primary and the secondary management centers will
now work as expected.
Procedure
Step 1 Contact Support to request a replacement for a failed management center - FMC2.
Step 2 Continue to use the primary management center - FMC1 as the active management center.
Step 3 Reimage the replacement management center with the same software version as FMC2.
Step 4 Restore the data backup from FMC2 to the new management center.
Step 5 Install required management center patches, geolocation database (GeoDB) updates, vulnerability database
(VDB) updates and system software updates to match FMC1.
Step 6 Resume data synchronization (if paused) from the web interface of the new management center - FMC2, to
synchronize the latest configuration from the primary management center - FMC1. For more information, see
Restarting Communication Between Paired Management Centers, on page 296.
Classic and Smart Licenses work seamlessly.
What to do next
High availability has now been re-established and the primary and the secondary management centers will
now work as expected.
Procedure
Step 1 Contact Support to request a replacement for a failed management center - FMC2.
Step 2 Continue to use the primary management center - FMC1 as the active management center.
Step 3 Reimage the replacement management center with the same software version as FMC2.
Step 4 Install required management center patches, geolocation database (GeoDB) updates, vulnerability database
(VDB) updates and system software updates to match FMC1.
Step 5 Access the web interface of the primary management center - FMC1 and break management center high
availability. For more information, see Disabling Management Center High Availability, on page 297. When
prompted to select an option for handling managed devices, choose Manage registered devices from this
console.
Step 6 Re-establish management center high availability, by setting up the management center - FMC1 as the primary
and management center - FMC2 as the secondary. For more information , see Establishing Management
Center High Availability, on page 292.
• When high availability is successfully established, the latest configuration from the primary management
center - FMC1 is synchronized to the secondary management center - FMC2.
• Classic and Smart Licenses work seamlessly.
What to do next
High availability has now been re-established and the primary and the secondary management centers will
now work as expected.
Procedure
Step 1 Verify if backup of the primary management center is available—either a local storage in /var/sf/backup/, or
a remote network volume.
Step 2 Pause synchronization on the primary management center. Choose Integration > Other Integrations, and
then go to the High Availability tab to pause synchronization.
Step 3 Restore the backup on the primary management center. The management center reboots when the restoration
is complete.
Step 4 Once the primary management center is active and its user interface is reachable, resume synchronization on
the secondary management center. Choose Integration > Other Integrations, and then go to the High
Availability tab to resume synchronization.
Procedure
Step 1 Verify if backup of the secondary management center is available—either a local storage in /var/sf/backup/,
or a remote network volume.
Step 2 Pause synchronization on the primary management center. Choose Integration > Other Integrations, and
then go to the High Availability tab to pause synchronization.
Step 3 Restore the backup on the secondary management center. The management center reboots when the restoration
is complete.
Step 4 Once the secondary management center is active and its user interface is reachable, resume synchronization
on the primary management center. Choose Integration > Other Integrations, and then go to the High
Availability tab to resume synchronization.
Support for high 7.3 We now support high availability on management center virtual for
availability on Azure Azure and KVM.
and KVM.
For more information, see Virtual Platform Requirements, on page 290
and License Requirements for Management Center High Availability
Configurations, on page 290.
Support for high 7.1 We now support high availability on management center virtual for
availability on AWS AWS and OCI.
and OCI.
For more information, see Virtual Platform Requirements, on page 290
and License Requirements for Management Center High Availability
Configurations, on page 290.
Support for high 7.0 We now support high availability on management center virtual for
availability on HyperFlex.
HyperFlex.
For more information, see Virtual Platform Requirements, on page 290
and License Requirements for Management Center High Availability
Configurations, on page 290.
Support for high 6.7 We now support high availability on management center virtual for
availability on VMware.
VMware.
For more information, see Virtual Platform Requirements, on page 290
and License Requirements for Management Center High Availability
Configurations, on page 290.
Single Sign-On 6.7 When configuring one or both members of a high availability pair for
single sign-on, you must take into account special considerations.
Note The U.S. Government has changed the name of the Unified Capabilities Approved
Products List (UCAPL) to the Department of Defense Information Network
Approved Products List (DODIN APL). References to UCAPL in this
documentation and the Secure Firewall Management Center web interface can
be interpreted as references to DODIN APL.
• Federal Information Processing Standards (FIPS) 140: a requirements specification for encryption modules
You can enable security certifications compliance in CC mode or UCAPL mode. Enabling security certifications
compliance does not guarantee strict compliance with all requirements of the security mode selected. For
more information on hardening procedures, refer to the guidelines for this product provided by the certifying
entity.
Caution After you enable this setting, you cannot disable it. If you need to take an appliance out of CC or UCAPL
mode, you must reimage.
The system does not allow remote storage for Yes Yes — — — —
backups or reports.
The minimum required password length for the local No No No No Yes Yes
admin user can be configured using the local device
CLI.
The system locks out users other than admin after No Yes No Yes No No
three failed login attempts in a row. In this case, the
password must be reset by an administrator.
The admin user can be locked out after a maximum Yes Yes Yes Yes — —
number of failed login attempts configurable through
the web interface.
The admin user can be locked out after a maximum No No Yes, Yes, Yes Yes
number of failed login attempts configurable through regardless regardless
the local appliance CLI. of security of security
certifications certifications
compliance compliance
enablement. enablement.
The system automtically rekeys an SSH session with Yes Yes Yes Yes Yes Yes
an appliance:
• After a key has been in use for one hour of
session activity
• After a key has been used to transmit 1 GB of
data over the connection
The system performs a file system integrity check Yes Yes Yes Yes Yes Yes
(FSIC) at boot-time. If the FSIC fails, Firepower
software does not start, remote SSH access is
disabled, and you can access the appliance only via
local console. If this happens, contact Cisco TAC.
Caution The Secure Firewall Management Center will not receive event data from a
managed device unless both are operating in the same security certifications
compliance mode.
• For all users, enable password strength checking and set the minimum password length to the value
required by the certifying agency.
• If you are using Secure Firewall Management Centers in a high-availability configuration, configure
them both to use the same security certifications compliance mode.
• When you configure Secure Firewall Threat Defense on a Firepower 4100/9300 to operate in CC or
UCAPL mode, you should also configure the Firepower 4100/9300 to operate in CC mode. For more
information, see the Cisco Firepower 4100/9300 FXOS Firepower Chassis Manager Configuration
Guide.
• Do not configure the system to use any of the following features:
• Email reports, alerts, or data pruning notifications.
• Nmap Scan, Cisco IOS Null Route, Set Attribute Value, or ISE EPS remediations.
• Remote storage for backups or reports.
• Third-party client access to the system database.
• External notifications or alerts transmitted via email (SMTP), SNMP trap, or syslog.
• Audit log messages transmitted to an HTTP server or to a syslog server without using SSL certificates
to secure the channel between the appliance and the server.
• Do not enable external authentication using LDAP or RADIUS in deployments using CC mode.
• Do not enable CACs in deployments using CC mode.
• Disable access to the Secure Firewall Management Center and managed devices via the Firepower REST
API in deployments using CC or UCAPL mode.
• Enable CACs in deployments using UCAPL mode.
• Do not configure SSO in deployments using CC mode.
• Do not configure Secure Firewall Threat Defense devices into a high availability pair unless they are
both using the same security certifications compliance mode.
Appliance Hardening
For information about features you can use to further harden your system, see the latest versions of the Cisco
Firepower Mangement Center Hardening Guide and the Cisco Secure Firewall Threat Defense Hardening
Guide, as well as the following topics within this document:
• Licenses, on page 235
• Users, on page 107
• Logging into the Management Center, on page 27
• Audit Log, on page 42
• Audit Log Certificate, on page 46
• Getting Started with Intrusion Policies in the Cisco Secure Firewall Management Center Device
Configuration Guide
• Tuning Intrusion Policies Using Rules in the Cisco Secure Firewall Management Center Device
Configuration Guide
• Custom Intrusion Rules in the Cisco Secure Firewall Management Center Device Configuration Guide
• Update Intrusion Rules, on page 215
• Global Limit for Intrusion Event Logging in the Cisco Secure Firewall Management Center Device
Configuration Guide
• Transport and Network Layer Preprocessors in the Cisco Secure Firewall Management Center Device
Configuration Guide
• Specific Threat Detection in the Cisco Secure Firewall Management Center Device Configuration Guide
• Application Layer Preprocessors in the Cisco Secure Firewall Management Center Device Configuration
Guide
• Audit and Syslog, on page 381
• Intrusion Events, on page 741
• Event Search, on page 663
• Workflows, on page 625
• Device Management in the Cisco Secure Firewall Management Center Device Configuration Guide
• Login Banner, on page 68
• Updates, on page 209
In either case, the configuration does not take effect until you save your system configuration changes or
deploy the shared platform settings policy.
Caution After you enable this setting, you cannot disable it. If you need to take the appliance out of CC or UCAPL
mode, you must reimage.
• Secure Firewall Threat Defense devices cannot use an evaluation license; your Smart Software Manager
account must be enabled for export-controlled features.
• Secure Firewall Threat Defense devices must be deployed in routed mode.
• You must be an Admin user to perform this task.
Procedure
Step 1 Depending on whether you are configuring a management center or a managed device:
Step 3 To permanently enable security certifications compliance on the appliance, you have two choices:
• To enable security certifications compliance in Common Criteria mode, choose CC from the drop-down
list.
• To enable security certifications compliance in Unified Capabilities Approved Products List mode, choose
UCAPL from the drop-down list.
What to do next
• Establish additional configuration changes as described in the guidelines for this product provided by
the certifying entity.
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
About Dashboards
Dashboards provide you with at-a-glance views of current system status, including data about the events
collected and generated by the system. You can also use dashboards to see information about the status and
overall health of the appliances in your deployment. Keep in mind that the information the dashboard provides
depends on how you license, configure, and deploy the system.
Note Ensure that you have enabled REST API (Settings > Configuration > REST API Preferences) to view the
correlated device metrics on the dashboard.
Tip The dashboard is a complex, highly customizable monitoring feature that provides exhaustive data. For a
broad, brief, and colorful picture of your monitored network, use the Context Explorer.
A dashboard uses tabs to display widgets: small, self-contained components that provide insight into different
aspects of the system. For example, the predefined Appliance Information widget tells you the appliance
name, model, and currently running software version. The system constrains widgets by the dashboard time
range, which you can change to reflect a period as short as the last hour or as long as the last year.
The system is delivered with several predefined dashboards, which you can use and modify. If your user role
has access to dashboards (Administrator, Maintenance User, Security Analyst, Security Analyst [Read Only],
and custom roles with the Dashboards permission), by default your home page is the predefined Summary
Dashboard. However, you can configure a different default home page, including non-dashboards. You can
also change the default dashboard. Note that if your user role cannot access dashboards, your default home
page is relevant to the role; for example, a Discovery Admin sees the Network Discovery page.
You can also use predefined dashboards as the base for custom dashboards, which you can either share or
restrict as private. Unless you have Administrator access, you cannot view or modify private dashboards
created by other users.
Note Some drill-down pages and table views of events include a Dashboard toolbar link that you can click to view
a relevant predefined dashboard. If you delete a predefined dashboard or tab, the associated toolbar links do
not function.
In a multidomain deployment, you cannot view dashboards from ancestor domains; however, you can create
new dashboards that are copies of the higher-level dashboards.
Dashboard Widgets
A dashboard has one or more tabs, each of which can display one or more widgets in a three-column layout.
The system is delivered with many predefined dashboard widgets, each of which provides insight into a
different aspect of the system. Widgets are grouped into three categories:
• Analysis & Reporting widgets display data about the events collected and generated by the system.
• Miscellaneous widgets display neither event data nor operations data. Currently, the only widget in this
category displays an RSS feed.
• Operations widgets display information about the status and overall health of the system.
In addition, each dashboard has a set of preferences that determines its behavior.
You can minimize and maximize widgets, add and remove widgets from tabs, as well as rearrange the widgets
on a tab.
Note For widgets that display event counts over a time range, the total number of events may not reflect the number
of events for which detailed data is available in the tables on pages under the Analysis menu. This occurs
because the system sometimes prunes older event details to manage disk space usage. To minimize the
occurrence of event detail pruning, you can fine-tune event logging to log only those events most important
to your deployment.
Widget Availability
The dashboard widgets that you can view depend on the type of appliance you are using, your user role, and
your current domain (in a multidomain deployment).
In a multidomain deployment, if you do not see a widget that you expect to see, switch to the Global domain.
See Switching Domains on the Secure Firewall Management Center, on page 20.
Note that:
• An invalid widget is one that you cannot view because you are using the wrong type of appliance.
• An unauthorized widget is one that you cannot view because your user account does not have the necessary
privileges.
For example, the Appliance Status widget is available only on the management center for users with
Administrator, Maintenance User, Security Analyst, or Security Analyst (Read Only) account privileges.
Although you cannot add an unauthorized or invalid widget to a dashboard, an imported dashboard may
contain unauthorized or invalid widgets. For example, such widgets can be present if the imported dashboard:
• Was created by a user with different access privileges, or
• Belongs to an ancestor domain.
Unavailable widgets are disabled and display error messages that indicate why you cannot view them.
Individual widgets also display error messages when those widgets have timed out or are otherwise experiencing
problems.
Note You can delete or minimize unauthorized and invalid widgets, as well as widgets that display no data, keeping
in mind that modifying a widget on a shared dashboard modifies it for all users of the appliance.
Note The dashboard widgets you can view depend on the type of appliance you are using, your user role, and your
current domain in a multidomain deployment.
You can configure the widget to display more or less information by modifying the widget preferences to
display a simple or an advanced view; the preferences also control how often the widget updates.
The color of the ball representing link state indicates the current status, as follows:
• green: link is up and at full speed
• yellow: link is up but not at full speed
• red: link is not up
• gray: link is administratively disabled
Note A red-shaded Custom Analysis widget indicates that its use is harming system performance. If the widget
continues to stay red over time, remove the widget. You can also disable all Custom Analysis widgets from
the Dashboard settings in your system configuration (System > Configuration > Dashboard)
Next to each event, the widget can display one of three icons to indicate any changes from the most recent
results:
• The new event icon Add ( ) signifies that the event is new to the results.
• The Up Arrow icon indicates that the event has moved up in the standings since the last time the widget
updated. A number indicating how many places the event has moved up appears next to the icon.
• The Down Arrow icon indicates that the event has moved down in the standings since the last time the
widget updated. A number indicating how many places the event has moved down appears next to the
icon.
Note In a multidomain deployment, the system builds a separate network map for each leaf domain. As a result, a
leaf domain can contain an IP address that is unique within its network, but identical to an IP address in another
leaf domain. When you view Custom Analysis widgets in an ancestor domain, multiple instances of that
repeated IP address can be displayed. At first glance, they might appear to be duplicate entries. However, if
you drill down to the host profile information for each IP address, the system shows that they belong to
different leaf domains.
Note You must provide exact text match as there is no drop-down listing the deployed device names.
2. Go to Overview > Dashboards > Add Widgets to create a Custom Analysis widget.
3. Return to Overview > Dashboards and modify the new widget to customize with the scope of search.
Related Topics
Modifying Dashboard Time Settings, on page 332
Preference Details
Title If you do not specify a title for the widget, the system uses the configured event type as the title.
Preset Custom Analysis presets provide quick access to information about your deployment. The predefined
dashboards make extensive use of these presets. You can use these presets or you can create a custom
configuration.
Table (required) The table of events or assets that contains the data the widget displays.
Field (required) The specific field of the event type you want to display. To show data over time (line graphs), choose
Time. To show relative occurrences of events (bar graphs), choose another option.
Aggregate (required) The aggregation method configures how the widget groups the data it displays. For most event types,
the default option is Count.
Filter You can use application filters to constrain data from the Application Statistics and Intrusion Event
Statistics by Application tables.
Preference Details
Search You can use a saved search to constrain the data that the widget displays. You do not have to specify a
search, although some presets use predefined searches.
Only you can access searches that you have saved as private. If you configure the widget on a shared
dashboard and constrain its events using a private search, the widget resets to not using the search when
another user logs in. This affects your view of the widget as well. If you want to make sure that this does
not happen, save the dashboard as private.
Only fields that constrain connection summaries can constrain Custom Analysis dashboard widgets based
on connection events. Invalid saved searches are dimmed.
If you constrain a Custom Analysis widget using a saved search, then edit the search, the widget does
not reflect your changes until the next time it updates.
Show Choose whether you want to display the most (Top) or the least (Bottom) frequently occurring events.
Show Movers Choose whether you want to display the icons that indicate changes from the most recent results.
Time Zone Choose the time zone you want to use to display results.
Color You can change the color of the bars in the widget's bar graph.
Related Topics
Configuring Widget Preferences, on page 330
Procedure
• On a Custom Analysis widget showing relative occurrences of events (bar graph), click any event to
view associated events constrained by the widget preferences, as well as by that event.
Updates all files related to updates, such as rule updates and system updates
You can hover your pointer over a disk usage category in the By Category stacked bar to view the percentage
of available disk space used by that category, the actual storage space on the disk, and the total disk space
available for that category. Note that if you have a malware storage pack installed, the total disk space available
for the Files category is the available disk space on the malware storage pack.
You can configure the widget to display only the By Category stacked bar, or you can show the stacked bar
plus the admin (/), /Volume, and /boot partition usage, as well as the /var/storage partition if the malware
storage pack is installed, by modifying the widget preferences.
The widget preferences also control how often the widget updates, as well as whether it displays the current
disk usage or collected disk usage statistics over the dashboard time range.
Table 17: Inline Result Field Contents in Workflow and Table Views
IPS would have dropped the packet if you enabled the Drop when Inline
intrusion policy option (in an inline deployment), or if a Drop and Generate
rule generated the event while the system was pruning.
IPS may have transmitted or delivered the packet to the destination, but the
connection that contained this packet is now blocked.
No icon (blank) The triggered rule was not set to Drop and Generate Events
In a passive deployment, the system does not drop packets, including when an inline interface is in tap
mode, regardless of the rule state or the inline drop behavior of the intrusion policy.
• Show to specify Average Events Per Second (EPS) or Total Events.
• Vertical Scale to specify Linear (incremental) or Logarithmic (factor of ten) scale.
• How often the widget updates.
The resulting event view is constrained by the dashboard time range; accessing intrusion events via the
dashboard changes the events (or global) time window for the appliance. Note that packets in a passive
deployment are not dropped, regardless of intrusion rule state or the inline drop behavior of the intrusion
policy.
You can configure the widget to hide the latest versions by modifying the widget preferences. The preferences
also control how often the widget updates.
The widget also provides you with links to pages where you can update the software. You can:
• Manually update an appliance by clicking the current version.
• Create a scheduled task to download an update by clicking the latest version.
Managing Dashboards
Procedure
Step 1 Choose Overview > Dashboards, and then choose the dashboard you want to modify from the menu.
Step 2 Manage your dashboards:
• Create Dashboards — Create a custom dashboard; see Creating Custom Dashboards, on page 330.
• Delete Dashboards — To delete a dashboard, click Delete ( ) next to the dashboard you want to delete.
If you delete your default dashboard, you must define a new default or the appliance prompts you to
choose a dashboard every time you attempt to view a dashboard.
• Edit Options — Edit custom dashboard options; see Editing Dashboards Options, on page 332.
• Modify Time Constraints — Modify the time display or pause/unpause the dashboard as described in
Modifying Dashboard Time Settings, on page 332.
Step 3 Add (see Adding a Dashboard, on page 329), Delete (click Close ( )), and Rename (see Renaming a
Dashboard, on page 333) dashboards.
Note You cannot change the order of dashboards.
Tip Every configuration of the Custom Analysis widget in the Cisco predefined dashboards corresponds
to a system preset for that widget. If you change or delete one of these widgets, you can restore
it by creating a new Custom Analysis widget based on the appropriate preset.
Adding a Dashboard
Procedure
Step 1 View the dashboard you want to modify; see Viewing Dashboards, on page 334.
Tip After you add widgets, you can move them to any location on the tab. You cannot, however, move widgets
from tab to tab.
The dashboard widgets you can view depend on the type of appliance you are using, your user role, and your
current domain (in a multidomain deployment). Keep in mind that because not all user roles have access to
all dashboard widgets, users with fewer permissions viewing a dashboard created by a user with more
permissions may not be able to use all of the widgets on the dashboard. Although the unauthorized widgets
still appear on the dashboard, they are disabled.
Procedure
Step 1 View the dashboard where you want to add a widget; see Viewing Dashboards, on page 334.
Step 2 Click the tab where you want to add the widget.
Step 3 Click Add Widgets. You can view the widgets in each category by clicking on the category name, or you
can view all widgets by clicking All Categories.
Step 4 Click Add next to the widgets you want to add. The Add Widgets page indicates how many widgets of each
type are on the tab, including the widget you want to add.
Tip To add multiple widgets of the same type (for example, you may want to add multiple RSS Feed
widgets, or multiple Custom Analysis widgets), click Add again.
Step 5 When you are finished adding widgets, click Done to return to the dashboard.
What to do next
• If you added a Custom Analysis widget, configure the widget preferences; see Configuring Widget
Preferences, on page 330.
Related Topics
Widget Availability, on page 316
Procedure
Step 1 On the title bar of the widget whose preferences you want to change, click Show Preferences ( ).
Step 2 Make changes as needed.
Step 3 On the widget title bar, click Hide Preferences ( ) to hide the preferences section.
Tip Instead of creating a new dashboard, you can export a dashboard from another appliance, then import it onto
your appliance. You can then edit the imported dashboard to suit your needs.
Procedure
Option Description
Copy Dashboard When you create a custom dashboard, you can choose to base it on any existing dashboard,
whether user-created or system-defined. This option makes a copy of the preexisting dashboard,
which you can modify to suit your needs. Optionally, you can create a blank new dashboard
by choosing None. This option is available only when you create a new dashboard.
In a multidomain deployment, you can copy any non-private dashboards from ancestor domains.
Change Tabs Every Specifies (in minutes) how often the dashboard should cycle through its tabs. Unless you pause
the dashboard or your dashboard has only one tab, this setting advances your view to the next
tab at the interval you specify. To disable tab cycling, enter 0 in the Change Tabs Every field.
Refresh Page Every Determines how often the entire dashboard page automatically refreshes.
Refreshing the entire dashboard allows you to see any preference or layout changes that were
made to a shared dashboard by another user, or that you made to a private dashboard on another
computer, since the last time the dashboard refreshed. A frequent refresh can be useful, for
example, in a networks operations center (NOC) where a dashboard is displayed at all times.
If you make changes to the dashboard at a local computer, the dashboard in the NOC
automatically refreshes at the interval you specify, and no manual refresh is required.
This refresh does not update the data, and you do not need to refresh the entire dashboard to
see data updates; individual widgets update according to their preferences.
This value must be greater than the Change Tabs Every setting. Unless you pause the
dashboard, this setting will refresh the entire dashboard at the interval you specify. To disable
the periodic page refresh, enter 0 in the Refresh Page Every field.
Note This setting is separate from the update interval available on many individual
widgets; although refreshing the dashboard page resets the update interval on
individual widgets, widgets will update according to their individual preferences
even if you disable the Refresh Page Every setting.
Save As Private Determines whether the custom dashboard can be viewed and modified by all users of the
appliance or is associated with your user account and reserved solely for your own use. Keep
in mind that any user with dashboard access, regardless of role, can modify shared dashboards.
If you want to make sure that only you can modify a particular dashboard, save it as private.
Procedure
Step 1 View the dashboard you want to edit; see Viewing Dashboards, on page 334.
Step 2 Click Edit ( ).
Step 3 Change the options as described in Custom Dashboard Options, on page 330.
Step 4 Click Save.
Note that not all widgets can be constrained by time. For example, the dashboard time range has no effect on
the Appliance Information widget, which provides information that includes the appliance name, model, and
current version of the software.
Keep in mind that for enterprise deployments of the Firepower System, changing the time range to a long
period may not be useful for widgets like the Custom Analysis widget, depending on how often newer events
replace older events.
You can also pause a dashboard, which allows you to examine the data provided by the widgets without the
display changing and interrupting your analysis. Pausing a dashboard has the following effects:
• Individual widgets stop updating, regardless of any Update Every widget preference.
• Dashboard tabs stop cycling, regardless of the Cycle Tabs Every setting in the dashboard properties.
• Dashboard pages stop refreshing, regardless of the Refresh Page Every setting in the dashboard properties.
• Changing the time range has no effect.
When you are finished with your analysis, you can unpause the dashboard. Unpausing the dashboard causes
all appropriate widgets on the page to update to reflect the current time range. In addition, dashboard tabs
resume cycling and the dashboard page resumes refreshing according to the settings you specified in the
dashboard properties.
If you experience connectivity problems or other issues that interrupt the flow of system information to the
dashboard, the dashboard automatically pauses and an error notice appears until the problem is resolved.
Note Your session normally logs you out after 1 hour of inactivity (or another configured interval), regardless of
whether the dashboard is paused. If you plan to passively monitor the dashboard for long periods of time,
consider exempting some users from session timeout, or changing the system timeout settings.
Procedure
Step 1 View the dashboard where you want to add a widget; see Viewing Dashboards, on page 334.
Step 2 Optionally, to change the dashboard time range, choose a time range from the Show the Last drop-down list.
Step 3 Optionally, pause or unpause the dashboard on the time range control, using Pause ( ) or Play ( ).
Renaming a Dashboard
Procedure
Step 1 View the dashboard you want to modify; see Viewing Dashboards, on page 334.
Step 2 Click the dasboard title you want to rename.
Step 3 Type a name.
Viewing Dashboards
By default, the home page for your appliance displays the default dashboard. If you do not have a default
dashboard defined, the home page shows the Dashboard Management page, where you can choose a dashboard
to view.
Procedure
Supported Domains
Any
User Roles
Admin
Maintenance User
and its health modules. The device monitor reports these metrics in several predefined health monitor dashboards
by default. The metric data is collected for analysis and hence no alerting is associated with it.
You can use the health monitor to create a collection of tests, referred to as a health policy, and apply the
health policy to one or more appliances. The tests, referred to as health modules, are scripts that test for criteria
you specify. You can modify a health policy by enabling or disabling tests or by changing test settings, and
you can delete health policies that you no longer need. You can also suppress messages from selected appliances
by excluding them.
The tests in a health policy run automatically at the interval you configure. You can also run all tests, or a
specific test, on demand. The health monitor collects health events based on the test conditions configured.
Note All appliances automatically report their hardware status via the Hardware Alarms health module. The
management center also automatically reports status using the modules configured in the default health policy.
Some health modules, such as the Appliance Heartbeat module, run on the management center and report the
status of the management center's managed devices. For the health modules to provide managed device status,
you must deploy all health policies to the device.
You can use the health monitor to access health status information for the entire system, for a particular
appliance, or, in a multidomain deployment, a particular domain. Hexagon charts and status tables on the
Health Monitor page provide a visual summary of the status of all appliances on your network, including the
management center. Individual appliance health monitors let you drill down into health details for a specific
appliance.
Fully customizable event views allow you to quickly and easily analyze the health status events gathered by
the health monitor. These event views allow you to search and view event data and to access other information
that may be related to the events you are investigating. For example, if you want to see all the occurrences of
CPU usage with a certain percentage, you can search for the CPU usage module and enter the percentage
value.
You can also configure email, SNMP, or syslog alerting in response to health events. A health alert is an
association between a standard alert and a health status level. For example, if you need to make sure an
appliance never fails due to hardware overload, you can set up an email alert. You can then create a health
alert that triggers that email alert whenever CPU, disk, or memory usage reaches the Warning level you
configure in the health policy applied to that appliance. You can set alerting thresholds to minimize the number
of repeating alerts you receive.
Note The health monitoring can take 5-6 minutes from the occurrence of the health event to generate a health alert.
You can also generate troubleshooting files for an appliance if you are asked to do so by Support.
Because health monitoring is an administrative activity, only users with administrator user role privileges can
access system health data.
Health Modules
Health modules, or health tests, test for the criteria you specify in a health policy.
Module Description
CPU Usage (per core) This module checks that the CPU usage on all of the cores is not overloaded and alerts when CPU
usage exceeds the percentages configured for the module. The Warning Threshold % default value
is 80. The Critical Threshold % default value is 90.
Disk Status This module examines performance of the hard disk and malware storage pack (if installed) on the
appliance.
This module generates a Warning (yellow) health alert when the hard disk and RAID controller (if
installed) are in danger of failing, or if an additional hard drive is installed that is not a malware
storage pack. This module generates an Alert (red) health alert when an installed malware storage
pack cannot be detected.
Disk Usage This module compares disk usage on the appliance’s hard drive and malware storage pack to the
limits configured for the module and alerts when usage exceeds the percentages configured for the
module. This module also alerts when the system excessively deletes files in monitored disk usage
categories, or when disk usage excluding those categories reaches excessive levels, based on module
thresholds. See Disk Usage and Drain of Events Health Monitor Alerts, on page 409 for information
about troubleshooting scenarios for Disk Usage alerts.
Use the Disk Usage health status module to monitor disk usage for the / and /volume partitions on
the appliance and track draining frequency. Although the disk usage module lists the /boot partition
as a monitored partition, the size of the partition is static so the module does not alert on the boot
partition.
File System Integrity Check This module performs a file system integrity check and runs if the system has CC mode or UCAPL
mode enabled, or if the system runs an image signed with a DEV key. This module is enabled by
default.
Health Monitor Process This module monitors the status of the health monitor itself and alerts if the number of minutes since
the last health event received by the management center exceeds the Warning or Critical limits.
Health Monitor Process This module monitors the status of the health monitor itself and alerts if the number of minutes since
the last health event received by the management center exceeds the Warning or Critical limits.
Module Description
Interface Status This module determines if the device currently collects traffic and alerts based on the traffic status
of physical interfaces and aggregate interfaces. For physical interfaces, the information includes
interface name, link state, and bandwidth. For aggregate interfaces, the information includes interface
name, number of active links, and total aggregate bandwidth.
Note This module also monitors the HA standby device traffic flow. Though it is known
that the standby device would not be receiving any traffic, yet, the management center
alerts that the interface is not receiving any traffic. The same alerting principle is applied
when traffic is not received by some of the subinterfaces on a port channel.
If you use show interface CLI command to know the interface statistics of your device,
the input and output rates in the CLI command result can be different from the traffic
rates that appear in the interface module.
This module displays the traffic rates according to the values from Snort performance
monitoring. The sampling intervals of snort performance monitoring and the
management center interface statistics are different. Due to the difference in sampling
interval, throughput values in the management center GUI can be different from the
throughput values appears in the threat defense CLI result.
Local Malware Analysis This module monitors ClamAV updates for Local Malware Analysis.
Memory Usage This module compares memory usage on the appliance to the limits configured for the module and
alerts when usage exceeds the levels configured for the module.
For appliances with more than 4 GB of memory, the preset alert thresholds are based on a formula
that accounts for proportions of available memory likely to cause system problems. On >4 GB
appliances, because the interval between Warning and Critical thresholds may be very narrow, Cisco
recommends that you manually set the Warning Threshold % value to 50. This will further ensure
that you receive memory alerts for your appliance in time to address the issue. See Memory Usage
Thresholds for Health Monitor Alerts, on page 408 for additional information about how thresholds
are calculated.
Beginning with Version 6.6.0, the minimum required RAM for management center virtual upgrades
to Version 6.6.0+ is 28 GB, and the recommended RAM for management center virtual deployments
is 32 GB. We recommend you do not decrease the default settings: 32 GB RAM for most management
center virtual instances, 64 GB for the management center virtual 300 (VMware only).
Attention A critical alert is generated by the health monitor when insufficient RAM is allocated
to a management center virtual deployment.
Complex access control policies and rules can command significant resources and negatively affect
performance.
Process Status This module determines if processes on the appliance exit or terminate outside of the process manager.
If a process is deliberately exited outside of the process manager, the module status changes to
Warning and the health event message indicates which process exited, until the module runs again
and the process has restarted. If a process terminates abnormally or crashes outside of the process
manager, the module status changes to Critical and the health event message indicates the terminated
process, until the module runs again and the process has restarted.
Module Description
Threat Data Updates on Certain intelligence data and configurations that devices use to detect threats are updated on the
Devices management center from the cloud every 30 minutes.
This module alerts you if this information has not been updated on the devices within the time period
you have specified.
Monitored updates include:
• Local URL category and reputation data
• Security Intelligence URL lists and feeds, including global Block and Do Not Block lists and
URLs from Threat Intelligence Director
• Security Intelligence network lists and feeds (IP addresses), including global Block and Do
Not Block lists and IP addresses from Threat Intelligence Director
• Security Intelligence DNS lists and feeds, including global Block and Do Not Block lists and
domains from Threat Intelligence Director
• Local malware analysis signatures (from ClamAV)
• SHA lists from Threat Intelligence Director, as listed on the Objects > Object Management
> Security Intelligence > Network Lists and Feeds page
• Dynamic analysis settings configured on the Integration > AMP > Dynamic Analysis
Connections page
• Threat Configuration settings related to expiration of cached URLs, including the Cached URLs
Expire setting on the Integration > Other Integrations > Cloud Services page. (Updates to
the URL cache are not monitored by this module.)
• Communication issues with the Cisco cloud for sending events. See the Cisco Cloud box on
the Integration > Other Integrations> Cloud Services page.
Note Threat Intelligence Director updates are included only if TID is configured on your
system and you have feeds.
By default, this module sends a warning after 1 hour and a critical alert after 24 hours.
If this module indicates failure on the management center or on any devices, verify that the
management center can reach the devices.
Module Description
AMP for Endpoints Status The module alerts if the management center cannot connect to the AMP cloud or Cisco AMP Private
Cloud after an initial successful connection, or if the private cloud cannot contact the public AMP
cloud. It also alerts if you deregister an AMP cloud connection using the Secure Endpoint management
console.
Module Description
If your management center loses connectivity to the Internet, the system may take up to 30 minutes
to generate a health alert.
Appliance Heartbeat This module determines if an appliance heartbeat is being heard from the appliance and alerts based
on the appliance heartbeat status.
Database Size This module checks the size of the configuration database and alerts when the size exceeds the values
(in gigabytes) configured for the module.
Discovery Host Limit This module determines if the number of hosts the management center can monitor is approaching
the limit and alerts based on the warning level configured for the module. For more information,
see Host Limit.
Event Backlog Status This module alerts if the backlog of event data awaiting transmission from the device to the
management center has grown continuously for more than 30 minutes.
To reduce the backlog, evaluate your bandwidth and consider logging fewer events.
Event Monitor This module monitors overall incoming event rate to management center.
Event Stream Status This module monitors connections to third-party client applications that use the Event Streamer on
the management center.
Hardware Statistics This module monitors the status of the management center hardware entities, namely, fan speed,
temperature, and power supply. This module alerts when the threshold value exceeds the configured
Warning or Critical limits.
ISE Connection Monitor This module monitors the status of the server connections between the Cisco Identity Services Engine
(ISE) and the management center. ISE provides additional user data, device type data, device location
data, SGTs (Security Group Tags), and SXP (Security Exchange Protocol) services.
Management Center Access This module monitors access configuration changes made on the management center directly using
Configuration Changes the configure network management-data-interface command.
Management Center HA Status This module monitors and alerts on the high availability status of the management center. If you
have not established management center high availability, the HA Status is Not in HA.
Note This module replaces the HA Status module, which previously provided HA status for
the management center. In Version 7.0, we added HA status for managed devices.
Module Description
MySQL Statistics This module monitors the status of the MySQL database, including the database size, number of
active connections, and memory use. Disabled by default.
Power Supply This module determines if power supplies on the appliance require replacement and alerts based on
the power supply status.
RRD Server Process This module determines if the round robin data server that stores time series data is running properly.
The module alerts if the RRD server has restarted since the last time it updated; it enters Critical or
Warning status if the number of consecutive updates with an RRD server restart reaches the numbers
specified in the module configuration.
Security Intelligence This module alerts if Security Intelligence is in use and the management center cannot update a feed,
or feed data is corrupt or contains no recognizable IP addresses.
See also the Threat Data Updates on Devices module.
Sybase Statistics This module monitors the status of the Sybase database on the management center, including the
database size, number of active connections, and memory use.
Time Series Data (RRD) This module tracks the presence of corrupt files in the directory where time series data (such as
Monitor correlation event counts) are stored and alerts when files are flagged as corrupt and removed.
Time Synchronization Status This module tracks the synchronization of a device clock that obtains time using NTP with the clock
on the NTP server and alerts if the difference in the clocks is more than ten seconds.
URL Filtering Monitor This module alerts if the management center fails to:
• Register with the Cisco cloud.
• Download URL threat data updates from the Cisco cloud.
• Complete URL lookups.
VPN Statistics This module monitors Site to Site and RA VPN tunnels between Firepower devices.
Module Description
VPN Status This module alerts when one or more VPN tunnels between Firepower devices are down.
This module tracks:
• Site-to-site VPN for Secure Firewall Threat Defense
• Remote access VPN for Secure Firewall Threat Defense
Module Description
AMP Connection Status The module alerts if the threat defense cannot connect to the AMP cloud or Cisco AMP Private
Cloud after an initial successful connection, or if the private cloud cannot contact the public AMP
cloud. Disabled by default.
AMP Threat Grid Connectivity The module alerts if the threat defense cannot connect to the AMP Threat Grid cloud after an initial
successful connection.
ASP Drop This module monitors the connections dropped by the data plane accelerated security path.
Cluster/HA Failover Status This module monitors the status of device clusters. The module alerts if:
• A new primary unit is elected to a cluster.
• A new secondary unit joins a cluster.
• A primary or secondary unit leaves a cluster.
Configuration Resource This module alerts if the size of your deployed configurations puts a device at risk of running out
Utilization of memory.
The alert shows you how much memory your configurations require, and by how much this exceeds
the available memory. If this happens, re-evaluate your configurations. Most often you can reduce
the number or complexity of access control rules or intrusion policies.
Snort Memory Allocation
• Total Snort Memory indicates the memory allotted for the Snort 2 instances running on the
threat defense device.
• Available Memory indicates the memory allotted by the system for a Snort 2 instance. Note
that this value is not just the difference between the Total Snort Memory and the combined
memory reserved for other modules. This value is derived after few other computations and
then divided by the number of Snort 2 processes.
A negative Available Memory value indicates that Snort 2 instance does not have enough
memory for the deployed configuration. For support, contact Cisco Technical Assistance Center
(TAC).
Connection Statistics This module monitors the connection statistics and NAT translation counts.
Module Description
CPU Usage Data Plane This module checks that the average CPU usage of all data plane processes on the device is not
overloaded and alerts when CPU usage exceeds the percentages configured for the module. The
Warning Threshold % default value is 80. The Critical Threshold % default value is 90.
CPU Usage Snort This module checks that the average CPU usage of the Snort processes on the device is not overloaded
and alerts when CPU usage exceeds the percentages configured for the module. The Warning
Threshold % default value is 80. The Critical Threshold % default value is 90.
CPU Usage System This module checks that the average CPU usage of all system processes on the device is not
overloaded and alerts when CPU usage exceeds the percentages configured for the module. The
Warning Threshold % default value is 80. The Critical Threshold % default value is 90.
Critical Process Statistics This module monitors the state of critical processes, their resource consumption, and the restart
counts.
Deployed Configuration This module monitors statistics about the deployed configuration, such as the number of ACEs and
Statistics IPS rules.
Firepower Platform Faults This module generates an alert for platforms faults for Firepower 1000, 2100, and 3000 series devices,
a fault is a mutable object that is managed by the management center. Each fault represents a failure
in the Firepower 1000, 2100, and 3000 instance or an alarm threshold that has been raised. During
the lifecycle of a fault, it can change from one state or severity to another.
Each fault includes information about the operational state of the affected object at the time the fault
was raised. If the fault is transitional and the failure is resolved, then the object transitions to a
functional state.
For more information, see the Cisco Firepower 1000/2100 FXOS Faults and Error Messages Guide.
Flow Offload Statistics This module monitors hardware flow offload statistics for a managed device.
Hardware Alarms This module determines if hardware needs to be replaced on a physical managed device and alerts
based on the hardware status. The module also reports on the status of hardware-related daemons.
Inline Link Mismatch Alarms This module monitors the ports associated with inline sets and alerts if the two interfaces of an inline
pair negotiate different speeds.
Module Description
Intrusion and File Event Rate This module compares the number of intrusion events per second to the limits configured for this
module and alerts if the limits are exceeded. If the Intrusion and File Event Rate is zero, the intrusion
process may be down or the managed device may not be sending events. Select Analysis >
Intrusions > Events to check if events are being received from the device.
Typically, the event rate for a network segment averages 20 events per second. For a network segment
with this average rate, Events per second (Critical) should be set to 50 and Events per second
(Warning) should be set to 30. To determine limits for your system, find the Events/Sec value on
the Statistics page for your device (System ( ) > Monitoring > Statistics), then calculate the limits
using these formulas:
• Events per second (Critical) = Events/Sec * 2.5
• Events per second (Warning) = Events/Sec * 1.5
The maximum number of events you can set for either limit is 999, and the Critical limit must be
higher than the Warning limit.
Memory Usage Data Plane This module checks the percentage of allocated memory used by the Data Plane processes and alerts
when memory usage exceeds the percentages configured for the module. The Warning Threshold
% default value is 80. The Critical Threshold % default value is 90.
Memory Usage Snort This module checks the percentage of allocated memory used by the Snort process and alerts when
memory usage exceeds the percentages configured for the module. The Warning Threshold %
default value is 80. The Critical Threshold % default value is 90.
Network Card Reset This module checks for network cards which have restarted due to hardware failure and alerts when
a reset occurs.
NTP Statistics This module monitors the NTP clock synchronization status of the managed device. Disabled by
default.
Module Description
Realm Enables you to set a warning threshold for realm or user mismatches, which are:
• User mismatch: A user is reported to the management centerwithout being downloaded.
A typical reason for a user mismatch is that the user belongs to a group you have excluded from
being downloaded to the management center. Review the information discussed in Cisco Secure
Firewall Management Center Device Configuration Guide.
• Realm mismatch: A user logs into a domain that corresponds to a realm not known to the
management center.
For more information, Cisco Secure Firewall Management Center Device Configuration Guide.
This module also displays health alerts when you try to download more users than the maximum
number of downloaded users supported per realm. The maximum number of downloaded users for
a single realm depends on your management center model.
For more information, see User Limit in the Cisco Secure Firewall Management Center Device
Configuration Guide
Routing Statistics This module monitors the current state of routing table.
Snort3 Statistics This module collects and monitors the Snort 3 statistics for events, flows, and packets.
Snort Identity Memory Usage Enables you to set a warning threshold for Snort identity processing and alerts when memory usage
exceeds the level configured for the module. The Critical Threshold % default value is 80.
This health module specifically keeps track of the total space used for the user identity information
in Snort. It displays the current memory usage details, the total number of user-to-IP bindings, and
user-group mapping details. Snort records these details in a file. If the memory usage file is not
available, the Health Alert for this module displays Waiting for data. This could happen during a
Snort restart due to a new install or a major update, switch from Snort2 to Snort3 or back, or major
policy deployment. Depending on the health monitoring cycle, and when the file is available, the
warning disappears, and the health monitor displays the details for this module with its status turned
Green.
Snort Reconfiguring Detection This module alerts if a device reconfiguration has failed.
Snort Statistics This module monitors the Snort statistics for events, flows, and packets.
SSE Connection Status The module alerts if the threat defense cannot connect to the SSE cloud after an initial successful
connection. Disabled by default.
Threat Defense HA This module monitors and alerts on the high availability status of the threat defense and provides a
(Split-brain check) health alert for a split brain scenario. If you have not established threat defense high availability, the
HA Status is Not in HA.
XTLS Counters This module monitors XTLS/SSL flows, memory and cache effectiveness. Disabled by default.
Step 1 Determine which health modules you want to monitor as discussed in Health Modules, on page 337.
You can set up specific policies for each kind of appliance, enabling only the appropriate tests for that appliance.
Tip To quickly enable health monitoring without customizing the monitoring behavior, you can apply
the default policy provided for that purpose.
Step 2 Apply a health policy to each appliance where you want to track health status as discussed in Creating Health
Policies, on page 347.
Step 3 (Optional.) Configure health monitor alerts as discussed in Creating Health Monitor Alerts, on page 358.
You can set up email, syslog, or SNMP alerts that trigger when the health status level reaches a particular
severity level for specific health modules.
Health Policies
A health policy contains configured health test criteria for several modules. You can control which health
modules run against each of your appliances and configure the specific limits used in the tests run by each
module.
When you configure a health policy, you decide whether to enable each health module for that policy. You
also select the criteria that control which health status each enabled module reports each time it assesses the
health of a process.
You can create one health policy that can be applied to every appliance in your system, customize each health
policy to the specific appliance where you plan to apply it, or use the default health policy provided for you.
In a multidomain deployment, administrators in ancestor domains can apply health policies to devices in
descendant domains, which descendant domains can use or replace with customized local policies.
Note For a new health module to begin monitoring and alerting, reapply health policies after upgrade.
Procedure
What to do next
• Apply the health policy on devices as described in Applying Health Policies, on page 347.
• Edit the policy to specify the module-level policy settings as described in Editing Health Policies, on
page 348.
When you apply a different policy to an appliance that already has a policy applied, expect some latency in
the display of new data based on the newly applied tests.
In a multidomain deployment, the system displays policies created in the current domain, which you can edit.
It also displays policies created in ancestor domains, which you cannot edit. To view and edit policies created
in a lower domain, switch to that domain. Administrators in ancestor domains can apply health policies to
devices in descendant domains, which descendant domains can use or replace with customized local policies.
Procedure
Step 4 Click Apply to apply the policy to the appliances you chose.
What to do next
• Optionally, monitor the task status; see Viewing Task Messages, on page 407.
Monitoring of the appliance starts as soon as the policy is successfully applied.
Procedure
provided against the module and its attributes—turn on ( ) or turn off ( ) to enable or disable testing
of health status respectively. To execute a bulk enable or disable testing on the health modules, click the Select
All toggle button. For information on the modules, see Health Modules, on page 337.
Note • The modules and attributes are flagged with the supporting appliances—threat defense,
management center, or both.
• You cannot choose to include or exclude the individual attributes of CPU and Memory
modules.
Step 5 Where appropriate, set the Critical and Warning threshold percentages.
Step 6 In the Settings tab, enter the relevant values in the fields:
• Health Module Run Time Interval—The frequency for running the health modules. The minimum
interval is 5 minutes.
• Metric Collection Interval—The frequency of collecting the time series data on the device and its health
modules. The device monitor reports these metrics in several predefined health monitor dashboards by
default. For detailed information on the dashboard, see About Dashboards, on page 315. The metric data
is collected for analysis and hence no alerting is associated with it.
• OpenConfig Streaming Telemetry—Configure a health metrics telemetry stream from the threat defense
devices to an external data collection system which uses the vendor neutral, OpenConfig model. See
Configure OpenConfig Streaming Telemetry for details.
Tip To stop health monitoring for an appliance, create a health policy with all modules disabled and apply it to
the appliance.
Procedure
Step 2 Click Delete ( ) next to the policy you want to delete, and then click Delete health policy to delete it.
The threat defense server generates SubscribeResponse RPC messages according to the type of subscription
that is created, at the frequency requested by the data collectors.
Dial-Out mode is ideal to use when the data collectors are hosted on the cloud or outside the trusted
network.
In both dial-in and dial-out mode, all the communication between gNMI server and gNMI client uses TLS
encryption and this requires to generate a set of certificates with private keys for the TLS encryption. Dial-out
mode requires extra keys for the tunnel infrastructure. See How to Generate Certificate with Private Key for
more information.
Note To ensure that you generate certificates using the same CA, run the following commands together and from
the same endpoint. If you want to retry the commands, you must retry all commands.
Procedure
Step 1 Make a folder, for example keys, in the endpoint where you want to run the following commands.
Example:
mkdir keys
The subject information includes the provided Country (C), State (ST), Locality (L), Organization (O),
Organizational Unit (OU), Common Name (CN), and email address.
The private key is saved as ca-key.pem file, and the certificate is saved as ca-cert.pem file in the keys folder.
Step 3 Create a self-signed server certificate with the specified Common Name (CN) and Subject Alternative Name
(SAN):
Example:
Following sample command generates a new RSA private key and uses it to create a self-signed X.509
certificate with provided subject information. In this example, 192.168.0.200 is the IP address of the threat
defense device and 192.168.0.202 is the IP address of the client.
Note Client IP is not required if you want to use this certificate and key sets in dial-in mode.
CN="192.168.0.200"
SAN="IP:192.168.0.200,IP:192.168.0.202"
The openssl req command generates a new RSA private key and a Certificate Signing Request (CSR). The
private key is saved as server-key.pem file, and the CSR is saved as server-req.pem file in the keys folder.
The openssl x509 command processes the CSR and generates a server certificate. The server certificate is
saved as server-cert.pem file in the keys folder.
The cat command combines the server key, server certificate, and the CA certificate into a single file named
server-combined.pem and saves the file in the keys folder.
You have to upload the server-combined.pem while configuring OpenConfig Streaming telemetry from
the management center. The gNMI server that runs on the threat defense and the tunnel server (dial-out mode)
uses this certificate for TLS communication. If you encrypt the private key with a passphrase, ensure that you
specify the passphrase while uploading the certificate to the management center.
Step 4 Create client certificate with the specified Common Name (CN) and Subject Alternative Name (SAN).
Example:
Following sample command generates a new RSA private key and uses it to create a self-signed X.509
certificate with provided subject information. In this example, 192.168.0.202 is the IP address of the client.
CN="192.168.0.202"
SAN="IP:192.168.0.202"
openssl req -newkey rsa:4096 -nodes -keyout keys/client-key.pem -out keys/client-req.pem
-subj "/C=XX/ST=YY/L=ZZZ/O=example/OU=EN/CN=${CN}/[email protected]"
openssl x509 -req -extfile <(printf "subjectAltName=${SAN}") -in keys/client-req.pem -days
60 -CA keys/ca-cert.pem -CAkey keys/ca-key.pem -CAcreateserial -out keys/client-cert.pem
The gNMI client uses the client certificate client-cert.pem and the private key for TLS communication.
Step 5 (Optional) For dial-out mode, create the tunnel server certificate with the specified Common Name (CN) and
Subject Alternative Name (SAN).
Example:
Following sample command generates a new RSA private key and uses it to create a self-signed X.509
certificate with provided subject information. In this example, 192.168.0.202 is the IP address of the client.
CN="192.168.0.202"
SAN="IP:192.168.0.202"
openssl req -newkey rsa:4096 -nodes -keyout keys/tunnel-server-key.pem -out
keys/tunnel-server-req.pem -subj "
/C=XX/ST=YY/L=ZZZ/O=Example/OU=EN/CN=${CN}/[email protected]}"
openssl x509 -req -extfile <(printf "subjectAltName=${SAN}") -in keys/tunnel-server-req.pem
-days 60 -CA keys/ca-cert.pem -CAkey keys/ca-key.pem -CAcreateserial -out
keys/tunnel-server-cert.pem
• Ensure that you configure a gNMI client that supports the OpenConfig streaming telemetry implementation,
from which you can make the gRPC requests to the gNMI server on the threat defense.
• To use dial-out mode and configure OpenConfig streaming telemetry, ensure that you configure a gRPC
tunnel server and client on the management system. This tunnel configuration enables communication
between the gNMI client and the threat defense device.
• You must be an admin user to perform the following task.
Procedure
Step 6 (Optional) Specify the Passphrase if the private key files are encrypted.
Step 7 Choose the deployment mode to use for streaming telemetry over gNMI protocol.
For DIAL-IN mode:
a. Assign a port number for the gNMI service.
The gNMI server opens the port and waits for gRPC requests from the collector.
b. Specify the IPv4/IPv6 address of the gNMI collectors that can connect to the threat defense device.
c. Click Add Collector to add more gNMI collectors. You can add a maximum of five collectors.
Step 8 Specify the username and password to validate the gNMI collector.
The threat defense server uses this credential to authenticate the gNMI collector when receiving the
SubscribeRequest RPC message. Each telemetry message is not authenticated using the username and
password. The system uses the previously authenticated encrypted streaming channel to carry telemetry
messages.
What to do next
Deploy the health policy to your threat defense device, for the configuration changes to take effect.
Wait for the gNMI input plug-in to restart and retry your request.
Restart telegraph
When telegraph is not responding, restart the process using the following command on the threat defense CLI
console:
pmtool restartbyid hmdaemon
Note On management center, Health Monitor exclusion settings are local configuration settings. Therefore, if you
exclude a device, then delete it and later re-register it with the management center, the exclusion settings
remain persistent. The newly re-registered device remains excluded.
In a multidomain deployment, administrators in ancestor domains can exclude an appliance or health module
in descendant domains. However, administrators in the descendant domains can override the ancestor
configuration and clear the exclusion for devices in their domain.
Procedure
Step 5 To remove the device from the exclusion list, click Delete ( ).
Step 6 Click Apply.
What to do next
To exclude individual health policy modules on appliances, see Excluding Health Policy Modules, on page
356.
Tip Make sure that you keep track of individually excluded modules so you can reactivate them when you need
them. You may miss necessary warning or critical messages if you accidentally leave a module disabled.
In a multidomain deployment, administrators in ancestor domains can exclude health modules in descendant
domains. However, administrators in descendant domains can override this ancestor configuration and clear
the exclusion for policies applied in their domains. You can only exclude management center health modules
at the Global level.
Procedure
Step 6 If you select an Exclude Period other than Permanent, for your exclusion configuration, you can choose to
automatically delete the configuration when it expires. To enable this setting, check the Auto-delete expired
configurations check box.
Step 7 Click OK.
Step 8 In the device exclusion main page, click Apply.
Procedure
The Warning ( ) icon is displayed against the device indicating the expiry of the duration of exclusion of
the device or the modules from alerting.
Step 2 To renew the exclusion of the device, click Edit ( ) next to the appliance. In the Exclude Health Modules
dialog box, click the Renew link. The exclusion period of the device is extended with the current value.
Step 3 To clear the device from being excluded, click Delete ( ) next to the appliance, click Remove the device
from exclusion, and then click Apply.
Step 4 To renew or clear the modules from exclusion, click Edit ( ) next to the appliance. In the Exclude Health
Modules dialog box, click the Enable Module Level Exclusion link, and then click the Renew or Clear link
against the modules. When you click Renew, the exclusion period is extended on the module with the current
value.
Severity Description
Critical The health test results met the criteria to trigger a Critical alert status.
Warning The health test results met the criteria to trigger a Warning alert status.
Normal The health test results met the criteria to trigger a Normal alert status.
Recovered The health test results met the criteria to return to a normal alert status, following a Critical or
Warning alert status.
In a multidomain deployment, you can view and modify health monitor alerts created in the current domain
only.
Procedure
Procedure
Procedure
Step 2 Click Delete ( ) next to the health alert you want to delete, and then click Delete health alert to delete it.
What to do next
• Disable or delete the underlying alert response to ensure that alerting does not continue; see Secure
Firewall Management Center Alert Responses, on page 523.
• The Monitoring navigation pane ― Allows you to navigate the device hierarchy. You can view health
monitors for individual devices from the navigation pane.
In a multidomain deployment, the health monitor in an ancestor domain displays data from all descendant
domains. In the descendant domains, it displays data from the current domain only.
Procedure
Step 3 Use the Monitoring navigation pane to access device-specific health monitors. When you use the Monitoring
navigation pane:
a) Click Home to return Health Status summary page.
b) Click Firewall Management Center to view the health monitor for the Secure Firewall Management
Center itself.
c) In the device list, click Expand ( ) and Collapse ( ) to expand and collapse the list of managed
devices.
When you expand the row, all of the devices are listed.
d) Click on a device to view a device-specific health monitor.
What to do next
• See Device Health Monitors, on page 364 for information about the compiled health status and metrics
for any device managed by the management center.
• See Using Management Center Health Monitor, on page 361 for information about the health status of
the management center.
To return to the Health Status landing page at any time, click Home.
• Event Capacity―The Event Capacity panel shows the current consumption by event categories, including
the retention time of events, the current vs. maximum event capacity, and a capacity overflow mechanism
where you are alerted when events are stored beyond the configured maximum capacity of the management
center.
• Process Health―The Process Health panel has an at-a-glace view of the critical processes as well as a
tab that lets you see state of all processed, including the CPU and memory usage for each process.
• CPU―The CPU panel lets you toggle between the average CPU usage (default) and the CPU usage of
all cores.
• Memory―The Memory panel shows the overall memory usage on the management center.
• Interface―The Interface panel shows average input and output rate of all interfaces.
• Disk Usage―The Disk Usage panel shows the use of entire disk, and the use of the critical partitions
where management center data is stored.
• Hardware Statistics―The hardware statistics shows the fan speed, power supply, and temperature of the
management center chassis. For more information, see Hardware Statistics on Management Center, on
page 364.
Tip Your session normally logs you out after 1 hour of inactivity (or another configured interval). If you plan to
passively monitor health status for long periods of time, consider exempting some users from session timeout,
or changing the system timeout settings. See Add an Internal User, on page 113 and Configure Session Timeouts,
on page 92 for more information.
Procedure
Health module tests run automatically at the policy run time interval you configure when you create a health
policy. However, you can also run all health module tests on demand to collect up-to-date health information
for the appliance.
In a multidomain deployment, you can run health module tests for appliances in the current domain and in
any descendant domains.
Procedure
Procedure
Procedure
You can view the power supply status under the firewall management center in the Health Monitoring >
Home page.
• System Details ― Displays information about the managed device, including the installed Firepower
version and other deployment details.
• Troubleshooting & Links ― Provides convenient links to frequently used troubleshooting topics and
procedures.
• Health alerts ― A health alert monitor provides an at-a-glance view of the health of the device.
• Time range ― An adjustable time window to constrain the information that appears in the various device
metrics windows.
• Device metrics ― An array of key Firepower device health metrics categorized across predefined
dashboards, including:
• CPU ― CPU utilization, including the CPU usage by process and by physical cores.
• Memory ― Device memory utilization, including data plane and Snort memory usage.
• Interfaces ― Interface status and aggregate traffic statistics.
• Connections ― Connection statistics (such as elephant flows, active connections, peak connections,
and so on) and NAT translation counts.
• Snort ― Statistics related to the Snort process.
• Disk Usage ― Device disk usage, including the disk size and disk utilization per partition.
• Critical Processes ― Statistics related to managed processes, including process restarts and other
select health monitors such as CPU and memory utilization.
See Cisco Secure Firewall Threat Defense Health Metrics for a comprehensive list of the supported
device metrics.
Procedure
Step 2 In the device list, click Expand ( ) and Collapse ( ) to expand and collapse the list of managed devices.
Step 3 Click on a device to view a device-specific health monitor.
Step 4 Click the link for View System & Troubleshoot Details …
This panel is collapsed by default. Clicking on the link expands the collapsed section to see System Details
and Troubleshooting & Links for the device. The system details include:
• Version: The Firepower software version.
Procedure
Step 2 In the device list, click Expand ( ) and Collapse ( ) to expand and collapse the list of managed devices.
Step 3 View the Health Alerts for the device in the alert notification at the top of page, directly to the right of the
device name.
Hover your pointer over the Health Alerts to view the health summary of the device. The popup window
shows a truncated summary of the top five health alerts. Click on the popup to open a detailed view of the
health alert summary.
Step 4 You can configure the time range from the drop-down in the upper-right corner. The time range can reflect a
period as short as the last hour (the default) or as long as two weeks. Select Custom from the drop-down to
configure a custom start and end date.
Click the refresh icon to set auto refresh to 5 minutes or to toggle off auto refresh.
Step 5 Click the Show the deployment details on top of the graph ( ) icon for a deployment overlay on the trend
graph, with respect to the selected time range.
The Show the deployment details on top of the graph ( ) icon indicates the number of deployments during
the selected time-range. A vertical band indicates the deployment start and end time. In the case of multiple
deployments, multiple bands/lines can appear. Click the icon on top of the dotted line to view the deployment
details.
Step 6 The device monitor reports health and performance metrics in several predefined dashboards by default. The
metrics dashboards include:
• Overview ― Highlights key metrics from the other predefined dashboards, including CPU, memory,
interfaces, connection statistics; plus disk usage and critical process information.
• CPU ― CPU utilization, including the CPU usage by process and by physical cores.
• Memory ― Device memory utilization, including data plane and Snort memory usage.
• Interfaces ― Interface status and aggregate traffic statistics.
• Connections ― Connection statistics (such as elephant flows, active connections, peak connections, and
so on) and NAT translation counts.
• Snort ― Statistics related to the Snort process.
• ASP Drops ― Statistics related to the Accelerated Security Path (ASP) performance and behavior.
You can navigate through the various metrics dashboards by clicking on the labels. See Cisco Secure Firewall
Threat Defense Health Metrics for a comprehensive list of the supported device metrics.
Step 7 Click the Add New Dashboard (+) to create a custom correlation dashboard by building your own variable
set from the available metric groups; see Correlating Device Metrics, on page 367.
You can add custom dashboards to correlate metrics that are interrelated. Select from predefined correlation
groups, such as CPU and Snort; or create a custom correlation dashboard by building your own variable set
from the available metric groups. See Cisco Secure Firewall Threat Defense Health Metrics for a comprehensive
list of the supported device metrics.
Note Correlating device metrics is available only for threat defense 6.7 and later versions. Hence, for threat defense
versions earlier than 6.7, the health monitor dashboard does not display these metrics even if you enable REST
API.
Procedure
Step 2 In the Devices list, click Expand ( ) and Collapse ( ) to expand and collapse the list of managed devices.
Step 3 Choose the device for which you want to modify the dashboard.
Step 4 Click the Add New Dashboard (+) icon to add a new dashboard.
Step 5 Specify a name to identity the dashboard.
Step 6 To create a dashboard from a predefined correlation group, click Add from Predefined Correlations
drop-down, choose the group, and click Add Dashboard.
Step 7 To create a custom correlation dashboard, choose a group from the Select Metric Group drop-down, then
choose corresponding metrics from the Select Metrics drop-down.
See Cisco Secure Firewall Threat Defense Health Metrics for a comprehensive list of the supported device
metrics.
Step 8 Click Add Metrics to add and select metrics from another group.
Step 9 To remove an individual metric, click the x icon on the right side of the item. Click the delete icon to remove
the entire group.
Step 10 Click Add Dashboard to add the dashboard to the health monitor.
Step 11 You can Edit or Delete the predefined dashboards and the custom correlation dashboards.
• Overview dashboard―Displays information about the cluster topology, cluster statistics, and metric
charts:
• The topology section displays a cluster's live status, the health of individual threat defense, threat
defense node type (control node or data node), and the status of the device. The status of the device
could be Disabled (when the device leaves the cluster), Added out of box (in a public cloud cluster,
the additional nodes that do not belong to the management center), or Normal (ideal state of the
node).
• The cluster statistics section displays current metrics of the cluster with respect to the CPU usage,
memory usage, input rate, output rate, active connections, and NAT translations.
Note The CPU and memory metrics display the individual average of the data plane
and snort usage.
• The metric charts, namely, CPU Usage, Memory Usage, Throughput, and Connections,
diagrammatically display the statistics of the cluster over the specified time period.
• Load Distribution dashboard―Displays load distribution across the cluster nodes in two widgets:
• The Distribution widget displays the average packet and connection distribution over the time range
across the cluster nodes. This data depicts how the load is being distributed by the nodes. Using this
widget, you can easily identify any abnormalities in the load distribution and rectify it.
• The Node Statistics widget displays the node level metrics in table format. It displays metric data
on CPU usage, memory usage, input rate, output rate, active connections, and NAT translations
across the cluster nodes. This table view enables you to correlate data and easily identify any
discrepancies.
• Member Performance dashboard―Displays current metrics of the cluster nodes. You can use the selector
to filter the nodes and view the details of a specific node. The metric data include CPU usage, memory
usage, input rate, output rate, active connections, and NAT translations.
• CCL dashboard―Displays, graphically, the cluster control link data namely, the input, and output rate.
• Troubleshooting and Links ― Provides convenient links to frequently used troubleshooting topics and
procedures.
• Time range―An adjustable time window to constrain the information that appears in the various cluster
metrics dashboards and widgets.
• Custom Dashboard―Displays data on both cluster-wide metrics and node-level metrics. However, node
selection only applies for the threat defense metrics and not for the entire cluster to which the node
belongs.
Procedure
Step 2 In the device list, click Expand ( ) and Collapse ( ) to expand and collapse the list of managed cluster
devices.
Step 3 To view the cluster health statistics, click on the cluster name. The cluster monitor reports health and
performance metrics in several predefined dashboards by default. The metrics dashboards include:
• Overview ― Highlights key metrics from the other predefined dashboards, including its nodes, CPU,
memory, input and output rates, connection statistics, and NAT translation information.
• Load Distribution ― Traffic and packet distribution across the cluster nodes.
• Member Performance ― Node-level statistics on CPU usage, memory usage, input throughput, output
throughput, active connection, and NAT translation.
• CCL ― Interface status and aggregate traffic statistics.
You can navigate through the various metrics dashboards by clicking on the labels. For a comprehensive list
of the supported cluster metrics, see Cisco Secure Firewall Threat Defense Health Metrics.
Step 4 You can configure the time range from the drop-down in the upper-right corner. The time range can reflect a
period as short as the last hour (the default) or as long as two weeks. Select Custom from the drop-down to
configure a custom start and end date.
Click the refresh icon to set auto refresh to 5 minutes or to toggle off auto refresh.
Step 5 Click on deployment icon for a deployment overlay on the trend graph, with respect to the selected time range.
The deployment icon indicates the number of deployments during the selected time-range. A vertical band
indicates the deployment start and end time. For multiple deployments, multiple bands/lines appear. Click on
the icon on top of the dotted line to view the deployment details.
Step 6 (For node-specific health monitor) View the Health Alerts for the node in the alert notification at the top of
page, directly to the right of the device name.
Hover your pointer over the Health Alerts to view the health summary of the node. The popup window shows
a truncated summary of the top five health alerts. Click on the popup to open a detailed view of the health
alert summary.
Step 7 (For node-specific health monitor) The device monitor reports health and performance metrics in several
predefined dashboards by default. The metrics dashboards include:
• Overview ― Highlights key metrics from the other predefined dashboards, including CPU, memory,
interfaces, connection statistics; plus disk usage and critical process information.
• CPU ― CPU utilization, including the CPU usage by process and by physical cores.
• Memory ― Device memory utilization, including data plane and Snort memory usage.
• Interfaces ― Interface status and aggregate traffic statistics.
• Connections ― Connection statistics (such as elephant flows, active connections, peak connections, and
so on) and NAT translation counts.
• Snort ― Statistics that are related to the Snort process.
• ASP drops ― Statistics related to the dropped packets against various reasons.
You can navigate through the various metrics dashboards by clicking on the labels. See Cisco Secure Firewall
Threat Defense Health Metrics for a comprehensive list of the supported device metrics.
Step 8 Click the plus sign (+) in the upper right corner of the health monitor to create a custom dashboard by building
your own variable set from the available metric groups.
For cluster-wide dashboard, choose Cluster metric group, and then choose the metric.
Error Error ( ) Black Indicates that at least one health monitoring module
has failed on the appliance and has not been
successfully re-run since the failure occurred.
Contact your technical support representative to
obtain an update to the health monitoring module.
Critical Red Indicates that the critical limits have been exceeded
Critical ( )
for at least one health module on the appliance and
the problem has not been corrected.
Tip You can bookmark this view to allow you to return to the page in the health events workflow containing the
Health Events table of events. The bookmarked view retrieves events within the time range you are currently
viewing, but you can then modify the time range to update the table with more recent information if needed.
Procedure
Note If no events appear, you may need to adjust the time range.
Step 1 View the health monitor for the appliance; see Viewing the Device Health Monitor, on page 366.
Step 2 In the Module Status Summary graph, click the color for the event status category you want to view.
The Alert Detail list toggles the display to show or hide events.
Step 3 In the Alert Detail row for the alert for which you want to view a list of events, click Events.
The Health Events page appears, containing results for a query with the name of the appliance and the name
of the specified health alert module as constraints. If no events appear, you may need to adjust the time range.
Step 4 If you want to view all health events for the specified appliance, expand Search Constraints, and click the
Module Name constraint to remove it.
Procedure
Field Description
Module Name Specify the name of the module which generated the health events you want to view.
For example, to view events that measure CPU performance, type CPU. The search
should retrieve applicable CPU Usage and CPU temperature events.
Test Name The name of the health module that generated the event.
(Search only)
Description The description of the health module that generated the event. For example, health
events generated when a process was unable to execute are labeled Unable to
Execute.
Value The value (number of units) of the result obtained by the health test that generated
the event.
For example, if the management center generates a health event whenever a device
it is monitoring is using 80 percent or more of its CPU resources, the value could
be a number from 80 to 100.
Units The units descriptor for the result. You can use the asterisk (*) to create wildcard
searches.
For example, if the management center generates a health event when a device it is
monitoring is using 80 percent or more of its CPU resources, the units descriptor is
a percentage sign (%).
Field Description
Status The status (Critical, Yellow, Green, or Disabled) reported for the appliance.
Domain For health events reported by managed devices, the domain of the device that reported
the health event. For health events reported by the management center, Global. This
field is only present in a multidomain deployment.
Stream telemetry to an 7.4 You can now send metrics and health monitoring information from your threat defense devices
external server using to an external server (gNMI collector) using OpenConfig. You can configure either threat
OpenConfig. defense or the collector to initiate the connection, which is encrypted by TLS.
New/modified screens: System ( ) > Health > Policy > Firewall Threat Defense Policies >
Settings > OpenConfig Streaming Telemetry
Minimum threat defense: 7.4
Health monitor usability 7.4 Improved Add New Dashboard dialog box which helps to create the custom dashboards with
enhancements. ease. Included option to edit or delete the predefined device health monitor dashboards.
New/modified screens: System ( ) > Health > Monitor > Devices > Add New Dashboard.
Minimum threat defense: Any
New cluster health monitor 7.3 A new dashboard to view the cluster health monitor metrics was introduced with the following
dashboard. components:
• Overview―Displays information about the cluster topology, cluster statistics, and metric
charts.
• Load Distribution―Displays load distribution across the cluster nodes.
• Member Performance―Displays current metrics of all the member nodes of the cluster.
• CCL―Displays, graphically, the cluster control link data namely, the input, and output
rate.
Note These features are applicable only for a cluster. Hence, you must select the cluster
under the Devices list on the Monitoring pane to view and use the cluster
dashboard.
New hardware statistics 7.3 The management center hardware and environment status statistics were added to the health
module. monitor dashboard:
• A new policy module, Hardware Statistics, was introduced to enable monitoring of
hardware daemons on the management center hardware. The metrics included fan speed,
temperature, and power supply.
• A custom metric group, Hardware Statistics, was also added to view graphical
representation of the hardware health metrics on the monitoring dashboard.
• The power supply status is captured in Health Alerts of the management center.
Note These features are applicable only for the management center. Hence, they are
available only on the management center dashboard.
New/modified screens:
New hardware and 7.3 The threat defense hardware and environment status statistics were added to the health monitor
environment status metric dashboard:
group,
• A custom metric group, Hardware / Environment Status, was introduced to view
hardware-related statistics on the threat defense. The metrics included fan speed, chassis
temperature, SSD status, and power supply.
• The device Health Alerts was enhanced to include the power supply status of the threat
defense hardware—Critical alert is displayed for abnormal thermal status, and Normal
alert is displayed for normal thermal status.
Note These features are applicable only for threat defense. Hence, you must select the
appropriate device under the Devices list on the Monitoring pane.
Health monitor usability 7.1 Following UI page were improved for better usability and presentation of data:
enhancements.
• Policy
• Exclude
• Monitor Alerts
New/modified screens: .
Elephant flow detection. 7.1 The health monitor includes the following enhancements:
• The Connection statistics includes active elephant flows.
• The Connection Group Metrics includes the number of active elephant flows.
The Elephant Flow Detection feature is not supported on the Cisco Firepower 2100 series.
Discontinued high 7.0.6 The Disk Usage health module no longer alerts with high unmanaged disk usage.
unmanaged disk After upgrade, you may continue to see these alerts until you either deploy health policies to
usage alerts. managed devices (stops the display of alerts) or upgrade the devices (stops the sending of
alerts).
Note Versions 7.0–7.0.5, 7.1.x, 7.2.0–7.2.3, and 7.3.x continue to support these alerts.
If your management center is running any of these versions, you may also
continue to see alerts.
Health monitor 7.0 The health monitor adds the following enhancements:
enhancements.
• Enhanced management center dashboard with summary views of:
• High Availability
• Event Rate & Capacity
• Process Health
• CPU thresholds
• Memory
• Interface rates
• Disk Usage
New health modules. 6.7 The CPU Usage module is no longer used. Instead, see the following modules for CPU usage:
• CPU Usage (per core): Monitors the CPU usage on all of the cores.
• CPU Usage Data Plane: Monitors the average CPU usage of all data plane processes on
the device.
• CPU Usage Snort: Monitors the average CPU usage of the Snort processes on the device.
• CPU Usage System: Monitors the average CPU usage of all system processes on the
device.
Health monitor 6.7 The health monitor adds the following enhancements:
enhancements.
• Health Status summary page that provides an at-a-glance view of the health of the
Firepower Management Center and all of the devices that the management center manages.
• The Monitoring navigation pane allows you to navigate the device hierarchy.
• Managed devices are listed individually, or grouped according to their geolocation, high
availability, or cluster status where applicable.
• You can view health monitors for individual devices from the navigation pane.
• Custom dashboards to correlate interrelated metrics. Select from predefined correlation
groups, such as CPU and Snort; or create a custom correlation dashboard by building
your own variable set from the available metric groups.
Functionality moved to the 6.7 The Local Malware Analysis module is no longer used. Instead, see the Threat Data Updates
Threat Data Updates on on Devices module for this information.
Devices module.
Some information formerly provided by the Security Intelligence module and the URL Filtering
Module is now provided by the Threat Data Updates on Devices module.
New health module: 7.0 Version 6.6.3 improves device memory management and introduces a new health module:
Configuration Memory Configuration Memory Allocation.
6.6.3
Allocation.
This module alerts when the size of your deployed configurations puts a device at risk of
running out of memory. The alert shows you how much memory your configurations require,
and by how much this exceeds the available memory. If this happens, re-evaluate your
configurations. Most often you can reduce the number or complexity of access control rules
or intrusion policies.
URL Filtering Monitor 6.5 The URL Filtering Monitor module now alerts if the management center fails to register to
improvements. the Cisco cloud.
URL Filtering Monitor 6.4 You can now configure time thresholds for URL Filtering Monitor alerts.
improvements.
New health module: Threat 6.3 A new module, Threat Data Updates on Devices, was added.
Data Updates on Devices.
This module alerts you if certain intelligence data and configurations that devices use to detect
threats has not been updated on the devices within the time period you specify.
Procedure
b) To make your search case-sensitive, select Case-sensitive. (By default, filters are not case-sensitive.)
c) To search for all system log messages that do not meet the criteria you entered, select Exclusion.
d) Click Go.
. Matches any character or white space Admi. matches Admin, AdmiN, Admi1, and Admi&
[[:alpha:]] Matches any alphabetic character [[:alpha:]]dmin matches Admin, bdmin, and C
[[:upper:]] Matches any uppercase alphabetic character [[:upper:]]dmin matches Admin, Bdmin, and C
[[:lower:]] Matches any lowercase alphabetic character [[:lower:]]dmin matches admin, bdmin, and c
[[:digit:]] Matches any numeric character [[:digit:]]dmin matches 0dmin, 1dmin, and 2
[[:alnum:]] Matches any alphanumeric character [[:alnum:]]dmin matches 1dmin, admin, 2dmin,
[[:space:]] Matches any white space, including tabs Feb[[:space:]]29 matches logs from Februar
* Matches zero or more instances of the character ab* matches a, ab, abb, ca, cab, and cabb
or expression it follows
[ab]* matches anything
Audit Records
Secure Firewall Management Centers log read-only auditing information for user activity. Audit logs are
presented in a standard event view that allows you to view, sort, and filter audit log messages based on any
item in the audit view. You can easily delete and report on audit information and can view detailed reports of
the changes that users make.
The audit log stores a maximum of 100,000 entries. When the number of audit log entries exceeds 100,000,
the appliance prunes the oldest records from the database to reduce the number to 100,000.
The audit logs do not display the user or the source IP for login errors:
• When wrong password is used, the source IP is not displayed.
• When the user account does not exist, both source IP and the user are not displayed.
• If the attempt for an LDAP user fails, no audit log is triggered.
Related Topics
SSO Guidelines for the Management Center, on page 133
Procedure
Step 1 Access the audit log workflow using System ( ) > Monitoring > Audit.
Step 2 If no events appear, you may need to adjust the time range. For more information, see Event Time Constraints,
on page 650.
Note Events that were generated outside the appliance's configured time window (whether global or
event-specific) may appear in an event view if you constrain the event view by time. This may
occur even if you configured a sliding time window for the appliance.
• To delete audit records, check the check boxes next to events you want to delete, then click Delete, or
click Delete All to delete all events in the current constrained view.
• To bookmark the current page so you can quickly return to it, click Bookmark This Page. For more
information, see Bookmarks, on page 660.
• To navigate to the bookmark management page, click View Bookmarks. For more information, see
Bookmarks, on page 660.
• To generate a report based on the data in the current view, click Report Designer. For more information,
see Creating a Report Template from an Event View, on page 501.
• To view a summary of a change recorded in the audit log, click Compare next to applicable events in
the Message column. For more information, see Using the Audit Log to Examine Changes, on page 385.
Related Topics
Event View Constraints, on page 656
Field Description
Time Time and date that the appliance generated the audit record.
User User name of the user that triggered the audit event.
Subsystem The full menu path the user followed to generate the audit record. For example, System
( ) > Monitoring > Audit is the menu path to view the audit log.
In a few cases where a menu path is not relevant, the Subsystem field displays only the
event type. For example, Login classifies user login attempts.
Field Description
Message The action the user performed or the button the user clicked on the page.
For example, Page View signifies that the user simply viewed the page indicated in the
Subsystem, while Save means that the user clicked the Save button on the page.
Changes made to the system appear with a Compare icon that you can click to see a
summary of the changes.
Domain The current domain of the user when the audit event was triggered. This field is only present
if you have ever configured the management center for multitenancy.
Configuration Specifies whether to view audit records of configuration changes in the search results. (yes
Change or no)
(search only)
Count The number of events that match the information that appears in each row. Note that the
Count field appears only after you apply a constraint that creates two or more identical
rows. This field is not searchable.
Related Topics
Event Searches, on page 663
Tip Table views always include “Table View” in the page name.
Related Topics
Using Workflows, on page 634
The Compare Configurations page displays the differences between the system configuration before changes
and the running configuration in a side-by-side format. The audit event type, time of last modification, and
name of the user who made the change are displayed in the title bar above each configuration.
Differences between the two configurations are highlighted:
• Blue indicates that the highlighted setting is different in the two configurations, and the difference is
noted in red text.
• Green indicates that the highlighted setting appears in one configuration but not the other.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Procedure
Caution Make sure that only authorized personnel have access to the appliance and to its admin account.
Procedure
In the /etc/sf directory, create one or more AuditBlock files in the following form, where type is one of the
types described in Audit Block Types, on page 387:
AuditBlock.type
Note If you create an AuditBlock.type file for a specific type of audit message, but later decide that
you no longer want to suppress them, you must delete the contents of the AuditBlock.type file
but leave the file itself on the system.
Type Description
Address Create a file named AuditBlock.address and include, one per line, each IP address
that you want to suppress from the audit log. You can use partial IP addresses provided
that they map from the beginning of the address. For example, the partial address 10.1.1
matches addresses from 10.1.1.0 through 10.1.1.255.
Message Create a file named AuditBlock.message and include, one per line, the message
substrings that you want to suppress.
Note that substrings are matched so that if you include backup in your file, all messages
that include the word backup are suppressed.
Subsystem Create a file named AuditBlock.subsystem and include, one per line, each subsystem
that you want to suppress.
Note that substrings are not matched. You must use exact strings. See Audited
Subsystems, on page 387 for a list of subsystems that are audited.
User Create a file named AuditBlock.user and include, one per line, each user account that
you want to suppress. You can use partial string matching provided that they map from
the beginning of the username. For example, the partial username IPSAnalyst matches
the user names IPSAnalyst1 and IPSAnalyst2.
Audited Subsystems
The following table lists audited subsystems.
Admin Administrative features such as system and access configuration, time synchr
backup and restore, device management, user account management, and sche
contextual cross-launch External resources added to the system or accessed from dashboards and event vi
High Availability Establishing and handling management centers in high availability pairs
Configuration export > config_type Importing configurations of a specific type and name
> config_name
Preferences User preferences, such as the time zone for a user account and individual even
Rules Intrusion rules, including the intrusion rules editor and the rule importation pr
Rule Update Import Log Viewing the rule update import log
Category Description
Uptime The number of days (if applicable), hours, and minutes since the system was last started.
Load Average The average number of processes in the CPU queue for the past 1 minute, 5 minutes, and
15 minutes.
Disk Usage The percentage of the disk that is being used. Click the arrow to view more detailed host
statistics.
Tip You can also use the Disk Usage health monitor to monitor disk usage and alert on low disk space conditions.
Cpu(s)
Lists the following CPU usage information:
• user process usage percentage
• system process usage percentage
• nice usage percentage (CPU usage of processes that have a negative nice value, indicating a higher
priority). Nice values indicate the scheduled priority for system processes and can range between -20
(highest priority) and 19 (lowest priority).
• idle usage percentage
Mem
Lists the following memory usage information:
• total number of kilobytes in memory
• total number of used kilobytes in memory
• total number of free kilobytes in memory
• total number of buffered kilobytes in memory
Swap
Lists the following swap usage information:
• total number of kilobytes in swap
• total number of used kilobytes in swap
• total number of free kilobytes in swap
• total number of cached kilobytes in swap
The following table describes each column that appears in the Processes section.
Column Description
Nice The nice value, which is a value that indicates the scheduling priority of a process. Values
range between -20 (highest priority) and 19 (lowest priority)
Size The memory size used by the process (in kilobytes unless the value is followed by m, which
indicates megabytes)
Res The amount of resident paging files in memory (in kilobytes unless the value is followed by
m, which indicates megabytes)
Time The amount of time (in hours:minutes:seconds) that the process has been running
Related Topics
System Daemons, on page 394
Executables and System Utilities, on page 395
System Daemons
Daemons continually run on an appliance. They ensure that services are available and spawn processes when
required. The following table lists daemons that you may see on the Process Status page and provides a brief
description of their functionality.
Note The table below is not an exhaustive list of all processes that may run on an appliance.
Daemon Description
httpsd Manages the HTTPS (Apache web server with SSL) service, and checks for working SSL
certificate authentication; runs in the background to provide secure web access to the appl
kupdated Manages the Linux kernel update process, which performs disk synchronization
pm Manages all system processes, starts required processes, restarts any process that fails une
safe_mysqld Manages safe mode operation of the database; restarts the database daemon if an error occ
logs runtime information to a file
sfestreamer (management Manages connections to third-party client applications that use the Event Streamer
center only)
Daemon Description
sfmgr Provides the RPC service for remotely managing and configuring an appliance using a
connection to the appliance
sfmbservice Provides access to the sfmb message broker process running on a remote appliance, usin
connection to the appliance. Currently used only by health monitoring to send health eve
from a managed device to the management center.
sftroughd Listens for connections on incoming sockets and then invokes the correct executable (
Cisco message broker, sfmb) to handle the request
sftunnel Provides the secure communication channel for all processes requiring communication
appliance
sshd Manages the Secure Shell (SSH) process; runs in the background to provide SSH acce
appliance
Executable Description
awk Utility that executes programs written in the awk programming language
cat Utility that reads files and writes content to standard output
SFDataCorrelator Analyzes binary files created by the system to generate events, connection data,
(management center only) and network maps
Executable Description
egrep Utility that searches files and folders for specified input; supports extended set
of regular expressions not supported in standard grep
grep Utility that searches files and directories for specified input
ifconfig Indicates the network configuration executable. Ensures that the MAC address
stays constant
iptables Handles access restriction based on changes made to the Access Configuration
page.
killall Utility that can be used to end all sessions and processes
logger Utility that provides a way to access the syslog daemon from the command line
md5sum Utility that prints checksums and block counts for specified files
sfheartbeat Identifies a heartbeat broadcast, indicating that the appliance is active; heartbeat
used to maintain contact between a device and management center.
Executable Description
smtpclient Mail client that handles email transmission when email event notification
functionality is enabled
snmptrap Forwards SNMP trap data to the SNMP trap server specified when SNMP
notification functionality is enabled
sudo Indicates a sudo process, which allows users other than admin to run executables
top Utility that displays information about the top CPU processes
Note The CPU usage output of this utility is a split-up of different types
of usages of the CPU core. You must add both user and system
processes usage to know the actual total CPU usage.
For example, if the output of top command is: %Cpu(s):
76.6
us, 22.1 sy, 0.0 ni, 0.0 id, 0.0 wa, 0.0 hi, 1.3 si,
0.0 st
touch Utility that can be used to change the access and modification times of specified
files
wc Utility that performs line, word, and byte counts on specified files
Related Topics
Configure an Access List, on page 41
files that are processed by the Data Correlator running on the management center. The Data Correlator analyzes
the information from the binary files, generates events, and creates network maps.
The statistics that appear for network discovery and the Data Correlator are averages for the current day, using
statistics gathered between 12:00 AM and 11:59 PM for each device.
The following table describes the statistics displayed for the Data Correlator process.
Category Description
Events/Sec Number of discovery events that the Data Correlator receives and processes
per second
Connections/Sec Number of connections that the Data Correlator receives and processes per
second
CPU Usage — User (%) Average percentage of CPU time spent on user processes for the current day
CPU Usage — System (%) Average percentage of CPU time spent on system processes for the current
day
VmSize (KB) Average size of memory allocated to the Data Correlator for the current day,
in kilobytes
VmRSS (KB) Average amount of memory used by the Data Correlator for the current day,
in kilobytes
Note The information in the Intrusion Event Information section of the Statistics page is based on intrusion events
stored on the managed device rather than those sent to the management center. No intrusion event information
is listed on this page if the managed device cannot (or is configured not to) store intrusion events locally.
The following table describes the statistics displayed in the Intrusion Event Information section of the Statistics
page.
Statistic Description
Last Alert Was The date and time that the last event occurred
Total Events Last Hour The total number of events that occurred in the past hour
Statistic Description
Total Events Last Day The total number of events that occurred in the past twenty-four hours
Total Events in Database The total number of events in the events database
Procedure
• Click the arrow next to By Partition to expand it. If you have a malware storage pack installed, the
/var/storage partition usage is displayed.
Step 5 (Optional) Click the arrow next to Processes to view the information described in Viewing System Statistics,
on page 399.
System Messages
When you need to track down problems occurring in the system, the Message Center is the place to start your
investigation. This feature allows you to view the messages that the system continually generates about system
activities and status.
To open the Message Center, click on the System Status icon, located next to the Deploy menu in the main
menu. This icon can take one of the following forms, depending on the system status:
• — Indicates one or more errors and any number of warnings are present on the system.
• — Indicates one or more warnings and no errors are present on the system.
If a number is displayed with the icon, it indicates the total current number of error or warning messages.
To close the Message Center, click anywhere outside of it within the web interface.
In addition to the Message Center, the web interface displays pop-up notifications in immediate response to
your activities and ongoing system activities. Some pop-up notifications automatically disappear after five
seconds, while others are "sticky," meaning they display until you explicitly dismiss them by clicking Dismiss
( ). Click the Dismiss link at the top of the notifications list to dismiss all notifications at once.
Tip Hovering your cursor over a non-sticky pop-up notification causes it to be sticky.
The system determines which messages it displays to users in pop-up notifications and the Message Center
based on their licenses, domains, and access roles.
Message Types
The Message Center displays messages reporting system activities and status organized into three different
tabs:
Deployments
This tab displays current status related to configuration deployment for each appliance in your system,
grouped by domain. The system reports the following deployment status values on this tab. You can get
additional detail about the deployment jobs by clicking Show History.
• Running (Spinning) — The configuration is in the process of deploying.
• Success — The configuration has successfully been deployed.
• Warning ( ) — Warning deployment statuses contribute to the message count displayed with the
Warning System Status icon.
• Failure — The configuration has failed to deploy; see Out-of-Date Policies. Failed deployments
contribute to the message count displayed with the Error System Status icon.
Upgrades
This tab displays the current status related to software upgrade tasks for the managed devices. The system
reports the following upgrade status values on this tab:
• In progress—Indicates that the upgrade task is in progress.
• Completed—Indicates that the software upgrade task is completed successful.
• Failed—Indicates that the software upgrade task has failed to complete.
Health
This tab displays current health status information for each appliance in your system, grouped by domain.
Health status is generated by health modules as described in About Health Monitoring, on page 335. The
system reports the following health status values on this tab:
• Warning ( ) — Indicates that warning limits have been exceeded for a health module on an
appliance and the problem has not been corrected. The Health Monitoring page indicates these
conditions with a Yellow Triangle ( ). Warning statuses contribute to the message count displayed
with the Warning System Status icon.
• Critical ( ) — Indicates that critical limits have been exceeded for a health module on an appliance
and the problem has not been corrected. The Health Monitoring page indicates these conditions
with a Critical ( ) icon. Critical statuses contribute to the message count displayed with the Error
System Status icon.
• Error ( ) — Indicates that a health monitoring module has failed on an appliance and has not
been successfully re-run since the failure occurred. The Health Monitoring page indicates these
conditions with a Error icon. Error statuses contribute to the message count displayed with the
Error System Status icon.
You can click on links in the Health tab to view related detailed information on the Health Monitoring
page. If there are no current health status conditions, the Health tab displays no messages.
Tasks
Certain tasks (such as configuration backups or update installation) can require some time to complete.
This tab displays the status of these long-running tasks, and can include tasks initiated by you or, if you
have appropriate access, other users of the system. The tab presents messages in reverse chronological
order based on the most recent update time for each message. Some task status messages include links
to more detailed information about the task in question. The system reports the following task status
values on this tab:
• Waiting() — Indicates a task that is waiting to run until another in-progress task is complete. This
message type displays an updating progress bar.
• Running — Indicates a task that is in-progress. This message type displays an updating progress
bar.
• Retrying — Indicates a task that is automatically retrying. Note that not all tasks are permitted to
try again. This message type displays an updating progress bar.
• Success — Indicates a task that has completed successfully.
• Failure — Indicates a task that did not complete successfully. Failed tasks contribute to the message
count displayed with the Error System Status icon.
• Stopped or Suspended — Indicates a task that was interrupted due to a system update. Stopped
tasks cannot be resumed. After normal operations are restored, start the task again.
• Skipped — A process in progress prevented the task from starting. Try again to start the task.
New messages appear in this tab as new tasks are started. As tasks complete (status success, failure, or
stopped), this tab continues to display messages with final status indicated until you remove them. Cisco
recommends you remove messages to reduce clutter in the Tasks tab as well as the message database.
Message Management
From the Message Center you can:
• Choose to display pop-up notifications.
• Display more task status messages from the system database (if any are available that have not been
removed).
• Download a report of all the task manager notifications.
• Remove individual task status messages. (This affects all users who can view the removed messages.)
• Remove task status messages in bulk. (This affects all users who can view the removed messages.)
Tip Cisco recommends that you periodically remove accumulated task status messages from the Task tab to reduce
clutter in the display as well the database. When the number of messages in the database approaches 100,000,
the system automatically deletes task status messages that you have removed.
Procedure
Procedure
Step 4 Click show deployment history to view more detailed information about the deployment jobs.
The Deployment History table lists the deployment jobs in the left column in reverse chronological order.
a) Select a deployment job.
The table in the right column shows each device that was included in the job, and the deployment status
per device.
b) To view responses from the device, and commands sent to the device during deployment, click download
in the Transcript column for the device.
The transcript includes the following sections:
• Snort Apply—If there are any failures or responses from Snort-related policies, messages appear
in this section. Normally, the section is empty.
• CLI Apply—This section covers features that are configured using commands sent to the Lina
process.
• Infrastructure Messages—This section shows the status of different deployment modules.
In the CLI Apply section, the deployment transcript includes commands sent to the device, and any
responses returned from the device. These response can be informative messages or error messages. For
failed deployments, look for messages that indicate errors with the commands. Examining these errors
can be particularly helpful if you are using FlexConfig policies to configure customized features. These
errors can help you correct the script in the FlexConfig object that is trying to configure the commands.
Note There is no distinction made in the transcript between commands sent for managed features
and those generated from FlexConfig policies.
For example, the following sequence shows that the management center sent commands to configure
GigabitEthernet0/0 with the logical name outside. The device responded that it automatically set the
security level to 0. The threat defense does not use the security level for anything.
Procedure
Procedure
Related Topics
About Health Monitoring, on page 335
Procedure
• Hover your cursor over the relative time indicator for a message (e.g., 3 day(s) ago) to view the time of
the most recent update for that message.
• Click any link within a message to view more information about the task.
• If more task status messages are available for display, click Fetch more messages at the bottom of the
message list to retrieve them.
Procedure
memory threshold for the user-configured threshold input can result in a Health Event where the “Value”
column of the event does not match the value that was entered to determine the exceeded threshold.
The following table shows examples of user-input thresholds and the enforced thresholds, depending on the
installed system memory.
Note The values in this table are examples. You can use this information to extrapolate thresholds for devices that
do not match the installed RAM shown here, or you can contact Cisco TAC for more precise threshold
calculations.
4 GB 6 GB 32 GB 48 GB
The disk manager process manages the disk usage of a device. Each type of file monitored by the disk manager
is assigned a silo. Based on the amount of disk space available on the system the disk manager computes a
High Water Mark (HWM) and a Low Water Mark (LWM) for each silo.
To display detailed disk usage information for each part of the system, including silos, LWMs, and HWMs,
use the show disk-manager command.
Examples
Following is an example of the disk manager information.
For example,
• Frequent drain of Low Priority Events
• Drain of unprocessed events from Low Priority Events
It’s possible for any silo to generate a Frequent drain of <SILO NAME> health alert. However, the most
commonly seen are the alerts related to events. Among the event silos, the Low Priority Events are often seen
because these type of events are generated by the device more frequently.
A Frequent drain of <SILO NAME> event has a Warning severity level when seen in relation to an
event-related silo, because events will be queued to be sent to the management center. For a non-event related
silo, such as the Backups silo, the alert has a Critical severity level because this information is lost.
Important Only event silos generate a Drain of unprocessed events from <SILO NAME> health alert. This alert always
has Critical severity level.
Excessive Logging
One of the most common causes for the health alerts of this type is excessive input. The difference between
the Low Water Mark (LWM) and High Water Mark (HWM) gathered from the show disk-manager command
shows how much space there is available to take on that silo to go from LWM (freshly drained) to the HWM
value. If there are frequent drain of events (with or without unprocessed events) the first thing to review is
the logging configuration.
• Check for double logging ― Double logging scenarios can be identified if you look at the correlator
perfstats on the management center:
admin@FMC:~$ sudo perfstats -Cq < /var/sf/rna/correlator-stats/now
• Check logging settings for the ACP ― Review the logging settings of the Access Control Policy (ACP).
If logging both "Beginning" and "End" of connection, log only the end as it will include everything
included when the beginning is logged as well as reduce the amount of events.
Ensure that you follow the best practices described in Best Practices for Connection Logging, on page
699.
Each time the disk manager process runs it generates an entry for each of the different silos on its own log
file, which is located under [/ngfw]/var/log/diskmanager.log. Information gathered from the diskmanager.log
(in CSV format) can be used to help narrow the search for a cause.
Additional troubleshooting steps:
• The command stats_unified.pl can help you to determine if the managed device does have some data
which needs to be sent to management center. This condition can happen when the managed device and
the management center experience a connectivity issue. The managed device stores the log data onto a
hard drive.
admin@FMC:~$ sudo stats_unified.pl
• The manage_proc.pl command can reconfigure the correlator on the management center side.
root@FMC:~# manage_procs.pl
• Information about any recent changes done to the policies (if applicable).
The output of the stats_unified.pl command as described in the Communications Bottleneck ―
SFDataCorrelator, on page 412.
Snort Performance and Configuration data and configuration settings related to Snort on the appliance
Hardware Performance and Logs data and logs related to the performance of the appliance hardware
System Configuration, Policy, and Logs configuration settings, data, and logs related to the current system configuration
of the appliance
Detection Configuration, Policy, and Logs configuration settings, data, and logs related to detection on the appliance
Interface and Network Related Data configuration settings, data, and logs related to inline sets and network
configuration of the appliance
Discovery, Awareness, VDB Data, and Logs configuration settings, data, and logs related to the current discovery and
awareness configuration on the appliance
Upgrade Data and Logs data and logs related to prior upgrades of the appliance
All Database Data all database-related data that is included in a troubleshoot report
Procedure
Step 1 Perform the steps in Viewing the Device Health Monitor, on page 366.
Step 2 Choose System ( ) > Health > Monitor, click the device in the left panel, then View System & Troubleshoot
Details, and then click Generate Troubleshooting Files.
Note • When you generate management center troubleshooting files from the Management Center
web interface, the file is stored in the management center. Note that only the latest
troubleshooting file will be stored in the management center.
• When you generate threat defense troubleshooting files from the Management Center web
interface, the file is generated in threat defense and copied to the management center. Note
that only the latest threat defense troubleshooting file will be stored in the management
center.
• When the troubleshooting files for management center and threat defense are generated from
the CLI, all the versions of the troubleshooting files are maintained in management center
and threat defense respectively.
Step 3 Choose All Data to generate all possible troubleshooting data, or check individual boxes as described in
Viewing Task Messages, on page 407.
Step 4 Click Generate.
Step 5 View task messages in the Message Center; see Viewing Task Messages, on page 407.
Step 6 Find the task that corresponds to the troubleshooting files you generated.
Step 7 After the appliance generated the troubleshooting files and the task status changes to Completed, click Click
to retrieve generated files.
Step 8 Follow your browser's prompts to download the file. (The troubleshooting files are downloaded in a single
.tar.gz file.)
Step 9 Follow the directions from Support to send the troubleshooting files to Cisco.
Procedure
Step 1 View the health monitor for the appliance; see Viewing the Device Health Monitor, on page 366.
Step 2 Choose System ( ) > Health > Monitor, click the device in the left panel, then View System & Troubleshoot
Details, and then click Advanced Troubleshooting.
Step 3 In File Download, enter the file name supplied by Support.
Step 4 Click Download.
Step 5 Follow your browser's prompts to download the file.
Note For managed devices, the system renames the file by prepending the device name to the file name.
Step 6 Follow the directions from Support to send the troubleshooting files to Cisco.
General Troubleshooting
An internal power failure (hardware failure, power surge, and so on) or an external power failure (unplugged
cord) can result in an ungraceful shutdown or reboot of the system. This can result in data corruption.
Connection-based Troubleshooting
Connection-based troubleshooting or debugging provides uniform debugging across modules to collect
appropriate logs for a specific connection. It also supports level-based debugging up to seven levels and
enables uniform log collection mechanism across modules. Connection-based debugging supports the following:
• A common connection-based debugging subsystem to troubleshoot issues in threat defense
• Uniform format for debug messages across modules
• Persistent debug messages across reboots
• End-to-end debugging across modules based on an existing connection
• Debugging ongoing connections
For more information about the troubleshooting connections, see Troubleshoot a Connection , on page 416.
Troubleshoot a Connection
Procedure
Step 1 Configure a filter to identify a connection using the debug packet-condition command.
Example:
Debug packet-condition match tcp 192.168.100.177 255.255.255.255 192.168.102.177
255.255.255.255
Step 2 Enable debugs for the interested modules and the corresponding levels. Enter the debug packet command.
Example:
Debug packet acl 5
Step 4 Fetch the debug messages from database to analyze the debug messages using the following command:
show packet-debugs
Using the Threat Defense Diagnostic CLI from the Web Interface
You can execute selected threat defense diagnostic command line interface (diagnostic CLI) commands from
the management center. These commands run in the diagnostic CLI rather than the regular CLI. These
commands are ping (except ping system), traceroute, and select show commands.
For the show commands, if you get the message “Unable to execute the command properly. Please see logs
for more details,” it means that the command is not valid in the diagnostic CLI. For example, show access-list
works, but you will get this message if you enter show access-control-policy. If you need to use
non-diagnostic-CLI commands, you must SSH to the device outside of management center.
For more information on the threat defense CLI, see the Cisco Secure Firewall Threat Defense Command
Reference.
Procedure
You can also get to the CLI tool through the health monitor for the device (System ( ) > Health > Monitor).
From there, you can select the device, click the View System and Troubleshoot Details link, click Advanced
Troubleshooting, then click Threat Defense CLI on that page.
Step 2 From the Device list, select the device on which to execute the diagnostic command.
Step 3 From the Command list, select the command you want to execute.
Step 4 Enter the command parameters in the Parameters text box.
See the command reference for the valid parameters.
For example, to execute show access-list, you need to select show in the Command list, then type access-list
into the Parameters box.
Do not type the full command into the Parameters box.
routing, access policies and rate limiting policies, to check if the packet would be permitted or denied. The
packet flow is simulated based on interfaces, source address, destination address, ports and protocols. By
testing packets this way, you can see the results of your policies and test whether the types of traffic you want
to allow or deny are handled as desired. Besides verifying your configuration, you can use the tracer to debug
unexpected behavior, such as packets being denied when they should be allowed. To simulate the packet fully,
packet tracer traces the data path; slow-path and fast-path modules. Processing is transacted based on per-session
and per-packet basis. Tracing packets and capture with trace log the tracing data on per packet basis when the
Next-Generation Firewall (NGFW) processes packets per-session or per-packet.
You can now initiate a packet-tracer using a PCAP file that has complete flow. Currently, PCAP with a single
TCP/UDP based flow with a maximum of 100 packets only is supported. PCAP replay is not supported for
features that dynamically modify the packet during replay, such as IPsec, VPN, SSL or HTTPs decryption,
NAT, and so on.
The packet tracer tool reads the PCAP file, initializes the state for client and server replay entities. The tool
starts replaying the packets in a synchronized manner by collecting and storing the trace output of each packet
within the PCAP for subsequent processing and display.
Packet replay is executed by the sequence of the packet in the PCAP file and any interference to the replay
activity terminates it and concludes the replay.
The trace output is generated for all the packets in PCAP on specified ingress interface and egress interface,
thereby providing a complete context of flow evaluation.
Procedure
c) In the Upload PCAP box, you can either drag a PCAP file or click in the box to browse and upload the
file. On selecting the file, the upload process starts automatically.
d) Go to this Step 13.
Step 5 To define the trace parameters, from the Protocol drop-down menu, select the packet type for the trace, and
specify the protocol characteristics:
• ICMP—Enter the ICMP type, ICMP code (0-255), and optionally, the ICMP identifier.
• TCP/UDP/SCTP—Enter the source and destination port numbers.
• GRE/IPIP—Enter the protocol number, 0-255.
• ESP—Enter the SPI value for Source, 0-4294967295.
• RAWIP—Enter the port number, 0-255.
Step 6 Select the Source Type for the packet trace, and enter the source IP address.
Source and destination types include IPv4, IPv6, and fully-qualified domain names (FQDN). You can specify
IPv4 or IPv6 addresses and FQDN, if you use Cisco TrustSec.
Step 13 (Optional) If you want the packet-tracer to ignore the security checks on the simulated packet, click Bypass
all security checks for simulated packet. This enables packet-tracer to continue with tracing of packet
through the system which, otherwise would have been dropped.
Step 14 (Optional) To allow the packet to be sent out through the egress interface from the device, click Allow
simulated packet to transmit from device.
Step 15 (Optional) If you want the packet-tracer to consider the injected packet as an IPsec/SSL VPN decrypted packet,
click Treat simulated packet as IPsec/SSL VPN decrypt.
Step 16 Click Trace.
The Trace Result displays the results for each phase that the PCAP packets has traveled through the system.
Click on the individual packet to view the traces results for the packet. You can do the following:
The time elapsed information that is useful to gauge the processing efforts are displayed for each phase. The
total time that is taken for the entire flow of packets flowing from an ingress to an egress interface is also
displayed in the results section.
The Trace History pane displays the stored trace details for each PCAP trace. It can store up to 100 packet
traces. You can select a saved trace and run the packet trace activity again. You can do the following:
• Search for a trace using any of the trace parameters.
Verdict Description
Ignore Flow was blocked; occurs only for sessions with flows
blocked on passive interfaces.
Based on the Snort verdict, the packets are dropped or allowed. For example, the packet is dropped if the
Snort verdict is BlockFlow, and the subsequent packets in the session are dropped before reaching Snort.
When the Snort verdict is Block or BlockFlow, the Drop Reason can be one of the following:
the SSL preprocessed There is a block/reset rule in SSL policy to match the
traffic.
the captive portal preprocessed There is a block/reset rule using the identity policy to
match the traffic.
the safe search preprocessed There is a block/reset rule using the safe-search feature
in firewall policy to match the traffic.
the session preprocessed This session was already blocked earlier by some
other module, so session preprocessed is blocking
further packets of the same session.
the snort response preprocessed There is a react snort rule, erg., sending a response
page on a particular HTTP traffic.
the snort response preprocessed There is a snort rule to send custom response on
packets matching conditions.
the file process preprocessed There is file policy that blocks a file, erg., enamelware
blocking.
the IPS preprocessed There is a snort rule using IPS, erg., rate filtering.
The packet capture feature allows you to capture and download packets that are stored in the system memory.
However, the buffer size is limited to 32 MB due to memory constraint. Systems capable of handling very
high volume of packet captures exceed the maximum buffer size quickly and thereby the necessity of increasing
the packet capture limit is required. It is achieved by using the secondary memory (by creating a file to write
the capture data). The maximum supported file size is 10 GB.
When the file-size is configured, the captured data gets stored to the file and the file name is assigned based
on the capture name recapture .
The file-size option is used when you need to capture packets with the size limit more than 32 MB.
For information, see the Cisco Secure Firewall Threat Defense Command Reference.
Note Capturing packet data requires packet copy. This operation may cause delays while processing packets and
may also degrade the packet throughput. Cisco recommends that you use packet filters to capture specific
traffic data.
Procedure
d) Check the check box of Trace, if you want to capture the details for each packet.
e) Enter the value in Trace Countfield. Default value is 128. You can enter values in the range of 1-1000.
Step 8 Click Save.
The packet capture screen displays the packet capture details and its status. To have the packet capture page
auto refreshed, check the Enable Auto Refresh check box and enter the auto refresh interval in seconds.
You can do the following on the packet capture:
• Clear ( ) to erase all the captured packets from a Packet Capture. To erase the captured packets from
all of the existing packet captures, click Clear All Packets.
• Save ( ) to save a copy of captured packets on a local machine in ASCII or PCAP format. Chosse the
required format option, and click Save. The saved packet capture is downloaded to your local machine.
• To view the details of the packets being captured, click the required capture row.
Feature-Specific Troubleshooting
See the following table for feature-specific troubleshooting tips and techniques.
Application control Best Practices for Application Control in the Cisco Secure Firewall Management
Center Device Configuration Guide
Management Center high availability Troubleshooting Management Center High Availability, on page 288
User rule conditions Troubleshoot User Control in the Cisco Secure Firewall Management Center
Device Configuration Guide
User identity sources For troubleshooting information on ISE/ISE-PIC, TS Agent Identity Source,
Captive Portal Identity Source, and Remote Access VPN Identity Source, see
the corresponding sections in the Cisco Secure Firewall Management Center
Device Configuration Guide
Troubleshooting LDAP Authentication Connections, on page 188
URL filtering Troubleshoot URL Filtering in the Cisco Secure Firewall Management Center
Device Configuration Guide
Realms and user data downloads Troubleshoot Realms and User Downloads in the Cisco Secure Firewall
Management Center Device Configuration Guide
Network discovery Troubleshooting Your Network Discovery Strategy in the Cisco Secure Firewall
Management Center Device Configuration Guide
Custom Security Group Tag (SGT) rule conditions Custom SGT Rule Conditions in the Cisco Secure Firewall Management Center
Device Configuration Guide
SSL rules Chapter on SSL rules in the Cisco Secure Firewall Device Manager
Configuration Guide
Cisco Threat Intelligence Director (TID) Troubleshoot Secure Firewall threat intelligence director in the Cisco Secure
Firewall Management Center Device Configuration Guide
Secure Firewall Threat Defense syslog About Configuring Syslog in the Cisco Secure Firewall Management Center
Device Configuration Guide
Intrusion performance statistics Intrusion Performance Statistic Logging Configuration in the Cisco Secure
Firewall Management Center Device Configuration Guide
On-Demand Backups
You can perform on-demand backups for the management center and many threat defense devices from the
management center.
For more information, see Backing Up Management Centers or Managed Devices, on page 435.
Scheduled Backups
You can use the scheduler on management center to automate backups. You can also schedule remote device
backups from the management center.
The management center setup process schedules weekly configuration-only backups, to be stored locally.
This is not a substitute for full off-site backups—after initial setup finishes, you should review your scheduled
tasks and adjust them to fit your organization's needs.
For more information, see Scheduled Backups, on page 461.
For more information, see Remote Storage Device, on page 86 and Manage Backups and Remote Storage,
on page 454.
What Is Restored?
Restoring configurations overwrites all backed-up configurations, with very few exceptions. On the management
center, restoring events and TID data overwrites all existing events and TID data, with the exception of
intrusion events.
Make sure you understand and plan for the following:
• You cannot restore what is not backed up.
Management Center configuration backups do not include remote storage and audit log server certificate
settings, so you must reconfigure these after restore. Also, because management center event backups
do not include intrusion event review status, restored intrusion events do not appear on Reviewed Events
pages.
• Restoring fails VPN certificates.
The threat defense restore process removes VPN certificates and all VPN configurations from threat
defense devices, including certificates added after the backup was taken. After you restore the threat
defense device, you must re-add/re-enroll all VPN certificates, and redeploy the device.
• Restoring to a configured management center — instead of factory-fresh or reimaged — merges intrusion
events and file lists.
The management center event restore process does not overwrite intrusion events. Instead, the intrusion
events in the backup are added to the database. To avoid duplicates, delete existing intrusion events
before you restore.
The management center configuration restore process does not overwrite clean and custom detection file
lists used by malware defense. Instead, it merges existing file lists with the file lists in the backup. To
replace file lists, delete existing file lists before you restore.
If you need to replace a device where backup and restore is not supported, you must manually recreate
device-specific configurations. However, backing up the management center does back up policies and other
configurations that you deploy to managed devices, as well as events already transmitted from the devices to
the management center.
Version Requirements
As the first step in any backup, note the patch level. To restore a backup, the old and the new appliance must
be running the same software version, including patches.
Additionally, to restore software on a Firepower 4100/9300 chassis, the chassis must be running a compatible
FXOS version.
For management center backups, you are not required to have the same VDB or SRU. Note, however, that
restoring a backup will replace existing VDB with the VDB in the backup file.
License Requirements
Address licensing or orphan entitlements concerns as described in the best practices and procedures. If you
notice licensing conflicts, contact Cisco TAC.
Domain Requirements
To:
• Back up or restore the management center: Global only.
• Back up a device from the management center: Global only.
• Restore a device: None. Restore devices locally at the CLI.
In a multidomain deployment you cannot back up only events/TID data. You must also back up configurations.
Note You must backup the logicl APP separately as the FXOS import/export will backup only the FXOS
configuration. The FXOS configuration import will cause logical device reboot and it rebuilds the device with
the factory default configuration.
When to Back Up
We recommend backing up during a maintenance window or other time of low use.
While the system collects backup data, there may be a temporary pause in data correlation (management center
only), and you may be prevented from changing configurations related to the backup. If you include event
data, event-related features such as eStreamer are not available.
You should back up in the following situations:
• Regular scheduled backups.
As part of your disaster recovery plan, we recommend that you perform periodic backups.
The management center setup process schedules weekly configuration-only backups, to be stored locally.
This is not a substitute for full off-site backups—after initial setup finishes, you should review your
scheduled tasks and adjust them to fit your organization's needs. For more information, see Scheduled
Backups, on page 461.
• After SLR changes.
Back up the management center after you make changes to Specific Licensing Reservations (SLRs). If
you make changes and then restore an older backup, you will have issues with your Specific Licensing
return code and can accrue orphan entitlements.
• Before upgrade or reimage.
If an upgrade fails catastrophically, you may have to reimage and restore. Reimaging returns most settings
to factory defaults, including the system password. If you have a recent backup, you can return to normal
operations more quickly.
• After upgrade.
Back up after you upgrade, so you have a snapshot of your freshly upgraded deployment. We recommend
you back up the management center after you upgrade its managed devices, so your new management
center backup file 'knows' that its devices have been upgraded.
Note We recommend you back up management centers and devices to a secure remote location and verify transfer
success. Backups left locally may be deleted, either manually or by the upgrade process, which purges locally
stored backups.
Especially because backup files are unencrypted, do not allow unauthorized access. If backup files are modified,
the restore process will fail. Keep in mind that anyone with the Admin/Maint role can access the Backup
Management page, where they can move and delete files from remote storage.
In the management center's system configuration, you can mount an NFS, SMB, or SSHFS network volume
as remote storage. After you do this, all subsequent backups are copied to that volume, but you can still use
the management center to manage them. For more information, see Remote Storage Device, on page 86 and
Manage Backups and Remote Storage, on page 454.
Note that only the management center mounts the network volume. Managed device backup files are routed
through the management center. Make sure you have the bandwidth to perform a large data transfer between
the management center and its devices. For more information, see Guidelines for Downloading Data from
the Firepower Management Center to Managed Devices (Troubleshooting TechNote).
Note that you can replace the threat defense High Availability device without a successful backup.
You cannot back up individual nodes. If a data node fails to back up, the management center will still
back up all other nodes. If the control node fails to back up, the backup is canceled.
• Do not suspend or break clustering before you restore.
Maintaining the cluster configuration ensures replacement devices can easily reconnect after restore.
• Do not run the restore CLI command on multiple nodes at the same time. We recommend that you
restore the control node first and wait until it rejoins the cluster before you restore any data nodes.
Assuming you have successful backups, you can replace multiple nodes in the cluster. Any physical
replacement tasks you can perform simultaneously: unracking, reracking, and so on. However, do not
run the restore command on an additional node until the restore process completes for the previous node,
including the reboot.
Before Backup
Before you back up, you should:
• Update the VDB and SRU on the management center.
We always recommend you use the latest vulnerability database (VDB) and intrusion rules (SRU). Before
you back up the management center, check the Cisco Support & Download site for newer versions.
• Check Disk Space.
Before you begin a backup, make sure you have enough disk space on the appliance or on your remote
storage server. The space available is displayed on the Backup Management page.
Backups can fail if there is not enough space. Especially if you schedule backups, make sure you regularly
prune backup files or allocate more disk space to the remote storage location.
Before Restore
Before restore, you should:
• Revert licensing changes.
Revert any licensing changes made since you took the backup.
Otherwise, you may have license conflicts or orphan entitlements after the restore. However, do not
unregister from Cisco Smart Software Manager (CSSM). If you unregister from CSSM, you must
unregister again after you restore, then re-register.
After the restore completes, reconfigure licensing. If you notice licensing conflicts or orphan entitlements,
contact Cisco TAC.
• Disconnect faulty appliances.
Disconnect the management interface, and for devices, the data interfaces.
Restoring threat defense devices sets the management IP address of the replacement device to the
management IP address of the old device. To avoid IP conflicts, disconnect the old device from the
management network before you restore the backup on its replacement.
Note that restoring the management center does not change the management IP address. You must set
that manually on the replacement — just make sure you disconnect the old appliance from the network
before you do.
• Do not unregister managed devices.
Whether you are restoring the management center or managed device, do not unregister devices from
the management center, even if you physically disconnect an appliance from the network.
If you unregister, you will need to redo some device configurations, such as security zone to interface
mappings. After you restore, the management center and devices should begin communicating normally.
• Reimage.
In an RMA scenario, the replacement appliance will arrive configured with factory defaults. However,
if the replacement appliance is already configured, we recommend you reimage. Reimaging returns most
settings to factory defaults, including the system password. You can only reimage to major versions, so
you may need to patch after you reimage.
If you do not reimage, keep in mind that management center intrusion events and file lists are merged
rather than overwritten.
After Restore
After restore, you should:
• Reconfigure anything that was not restored.
This can include reconfiguring licensing, remote storage, and audit log server certificate settings. You
also must re-add/re-enroll failed threat defense VPN certificates.
• Update the VDB and SRU on the management center.
We always recommend you use the latest vulnerability database (VDB) and intrusion rules (SRU). This
is especially important for the VDB, because the VDB in the backup will overwrite the VDB on the
replacement management center.
• Deploy.
After you restore the management center, deploy to all managed devices. After you restore a device, you
must force deploy from the Device Management page: see Redeploy Existing Configurations to a Device
in the Cisco Secure Firewall Management Center Device Configuration Guide. Whether you are restoring
the management center or the device you must deploy.
Procedure
In a multidomain deployment, you must back up configurations. You cannot back up events or TID data only.
For details on what is and what is not backed up for each of these choices, see About Backup and Restore,
on page 427.
Step 4 Note the Storage Location for management center backup files.
This will either be local storage in /var/sf/backup/, or a remote network volume. For more information,
see Manage Backups and Remote Storage, on page 454.
Step 5 (Optional) Enable Copy when complete to copy completed management center backups to a remote server.
Provide a hostname or IP address, the path to the remote directory, and a username and password. To use an
SSH public key instead of a password, copy the contents of the SSH Public Key field to the specified user's
authorized_keys file on the remote server.
Note This option is useful if you want to store backups locally and also SCP them to a remote location.
If you configured SSH remote storage, do not copy backup files to the same directory using Copy
when complete.
Step 6 (Optional) Enable Email and enter an email address to be notified when the backup completes.
To receive email notifications, you must configure the management center to connect to a mail server:
Configuring a Mail Relay Host and Notification Address, on page 57.
What to do next
If you configured remote storage or enabled Copy when complete, verify transfer success of the backup file.
Backup and restore is not supported for any other platforms or configurations.
If you are backing up a Firepower 4100/9300 chassis, it is especially important that you also back up FXOS
configurations: Exporting an FXOS Configuration File, on page 438.
Procedure
Step 1 Select System ( ) > Tools > Backup/Restore, then click Managed Device Backup.
Step 2 Select one or more Managed Devices.
For clustering, choose the cluster. You cannot perform backups on individual nodes.
Step 4 If you did not configure remote storage, choose whether you want to Retrieve to Management Center.
• Enabled (default): Saves the backup to the management center in /var/sf/remote-backup/.
For clusters, this option is always checked. The individual node backup files are copied to the management
center and then bundled into a single compressed tar file before it is copied to any remote storage.
• Disabled: Saves the backup to the device in /var/sf/backup.
What to do next
If you configured remote storage, verify if the transfer of the backup file was successful.
Note This procedure explains how to use Secure Firewall chassis manager to export FXOS configurations when
you back up threat defense. For the CLI procedure, see the appropriate version of the Cisco Firepower
4100/9300 FXOS CLI Configuration Guide.
Procedure
Step 1 Choose System > Configuration > Export on the Secure Firewall chassis manager.
Step 2 To export a configuration file to your local computer:
a) Click Local.
b) Click Export.
The configuration file is created and, depending on your browser, the file might be automatically
downloaded to your default download location or you might be prompted to save the file.
Step 3 To export the configuration file to a remote server:
a) Click Remote.
b) Choose the protocol to use when communicating with the remote server. This can be one of the following:
FTP, TFTP, SCP, or SFTP.
c) Enter the hostname or IP address of the location where the backup file should be stored. This can be a
server, storage array, local drive, or any read/write media that the Firepower 4100/9300 chassis can access
through the network.
If you use a hostname rather than an IP address, you must configure a DNS server.
d) If you are using a non-default port, enter the port number in the Port field.
e) Enter the username the system should use to log in to the remote server. This field does not apply if the
protocol is TFTP.
f) Enter the password for the remote server username. This field does not apply if the protocol is TFTP.
g) In the Location field, enter the full path to where you want the configuration file exported including the
filename.
h) Click Export.
The configuration file is created and exported to the specified location.
Procedure
Step 1 Select System ( ) > Tools > Backup/Restore, then click Backup Profiles.
Step 2 Click Create Profile and enter a Name.
Step 3 Choose what to back up.
• Back Up Configuration
• Back Up Events
• Back Up Threat Intelligence Director
In a multidomain deployment, you must back up configurations. You cannot back up events or TID data only.
For details on what is and what is not backed up for each of these choices, see About Backup and Restore,
on page 427.
Step 5 (Optional) Enable Copy when complete to copy completed management center backups to a remote server.
Provide a hostname or IP address, the path to the remote directory, and a username and password. To use an
SSH public key instead of a password, copy the contents of the SSH Public Key field to the specified user's
authorized_keys file on the remote server.
Note This option is useful if you want to store backups locally and also SCP them to a remote location.
If you configured SSHFS remote storage, do not copy backup files to the same directory using
Copy when complete.
Step 6 (Optional) Enable Email and enter an email address to be notified when the backup completes.
To receive email notifications, you must configure the management center to connect to a mail server:
Configuring a Mail Relay Host and Notification Address, on page 57.
Note Restoring configurations overwrites all configurations, with very few exceptions. It also reboots the management
center. Restoring events and TID data overwrites all existing events and TID data, with the exception of
intrusion events. Make sure you are ready.
Use this procedure to restore the management center from backup. For more information on backup and restore
in management center HA deployments, see Replacing Management Centers in a High Availability Pair, on
page 298.
Procedure
Step 3 Select the backup file you want to restore and click Restore.
Step 4 Select from the available components to restore, then click Restore again to begin.
Step 5 Monitor progress in the Message Center.
If you are restoring configurations, you can log back in after the management center reboots.
What to do next
• If necessary, reconfigure any licensing settings that you reverted before the restore. If you notice licensing
conflicts or orphan entitlements, contact Cisco TAC.
• If necessary, reconfigure remote storage and audit log server certificate settings. These settings are not
included in backups.
• (Optional) Update the SRU and VDB. If the SRU or the VDB available on the Cisco Support & Download
site is newer than the version currently running, we recommend you install the newer version.
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
assumes you have access to a successful backup of the device or devices you are replacing; see Back up a
Device from the Management Center, on page 437. For zero-touch restore on the ISA 3000 using an SD card,
see Zero-Touch Restore Threat Defense from Backup: ISA 3000, on page 445.
In threat defense High Availability and clustering deployments, you can use this procedure to replace all peers.
To replace all, perform all steps on all devices simultaneously, except the restore CLI command itself.
Note Do not unregister from the management center, even when disconnecting a device from the network. In threat
defense High Availability or clustering deployments, do not suspend or break High Availability or clustering
. Maintaining these links ensures replacement devices can automatically reconnect after restore.
Procedure
In threat defense High Availability deployments, you back up the pair as a unit but the backup process produces
unique backup files. The device's role is noted in the backup file name.
If the only copy of the backup is on the faulty device, copy it somewhere else now. If you reimage the device,
the backup will be erased. If something else goes wrong, you may not be able to recover the backup. For more
information, see Manage Backups and Remote Storage, on page 454.
The replacement device will need the backup, but can retrieve it with SCP during the restore process. We
recommend you put the backup somewhere SCP-accessible to the replacement device. Or, you can copy the
backup to the replacement device itself.
Step 4 Install the replacement device and connect it to the management network.
Connect the device to power and the management interface to the management network. In threat defense
High Availability deployments, connect the failover link. For clustering, connect the cluster control link.
However, do not connect the data interfaces.
See the hardware installation guide for your model: Cisco Secure Firewall Threat Defense: Install and Upgrade
Guides.
Step 7 Make sure the replacement device is running the same software version, including patches, as the faulty
device.
Ensure that the existing device should not be deleted from the management center. The replacement device
should be unmanaged from the physical network and the new hardware as well as the replacing threat defense
patch should have the same version. The threat defense CLI does not have an upgrade command. To patch:
a) From the management center web interface, complete the device registration process.
Create a new AC policy and use the default action "Network Discovery". Leave this policy as is; do not
add any features or modifications. This is being used to register the device and deploy a policy with no
features so that you do not require licenses, and you will then be able to patch the device. Once backup
is restored, it should restore the licensing and policy into the expected state.
b) Patch the device: Cisco Firepower Management Center Upgrade Guide.
c) Unregister the freshly patched device from the management center.
If you do not unregister, you will have a ghost device registered to the management center after the restore
process brings your "old" device back up.
Step 8 Make sure the replacement device has access to the backup file.
The restore process can retrieve the backup with SCP, so we recommend you put the backup somewhere
accessible. Or, you can manually copy the backup to the replacement device itself, to /var/sf/backup.
For clustering, make sure you extracted the individual node backup file from the main cluster bundle.
In threat defense High Availability and clustering deployments, make sure you choose the appropriate backup
file: primary vs secondary, or control vs. data. The role is noted in the backup file name. If you are restoring
all devices, do this sequentially. Do not run the restore command on the next device until the restore process
completes for the first device, including the reboot.
Step 10 Log into the management center and wait for the replacement device to connect.
When the restore is done, the device logs you out of the CLI, reboots, and automatically connects to the
management center. At this time, the device should appear out of date.
Step 11 Before you deploy, perform any post-restore tasks and resolve any post-restore issues:
• Resolve licensing conflicts or orphan entitlements. Contact Cisco TAC.
• Resume High Availability synchronization. From the threat defense CLI, enter configure
high-availability resume. See Suspend and Resumbe High Availability in the Cisco Secure Firewall
Management Center Device Configuration Guide.
• Re-add/re-enroll all VPN certificates. The restore process removes VPN certificates from threat defense
devices, including certificates added after the backup was taken. See Managing VPN Certificates in the
Cisco Secure Firewall Management Center Device Configuration Guide.
What to do next
Verify that the restore succeeded and the replacement device is passing traffic as expected.
Note Do not unregister from the management center, even when disconnecting a device from the network. In threat
defense High Availability or clustering deployments, do not suspend or break High Availability or clustering
. Maintaining these links ensures replacement devices can automatically reconnect after restore.
Procedure
Step 3 Rerack the replacement device, and connect it to the management network. In threat defense HA deployments,
connect the failover link. However, do not connect the data interfaces.
If you need to reimage the device or apply a software patch, connect the power connector.
Step 5 (May be required) Make sure the replacement device is running the same Firepower software version, including
the same patch version, as the faulty device. If you need to patch the device, you can connect to Secure Firewall
device manager (device manager) to install the patch.
The following procedure assumes you have a factory default configuration. If you already configured the
device, you can log into device manager and go directly to the Device > Upgrades page to install the patch.
In either case, obtain the patch package from https://www.cisco.com/go/isa3000-software.
a) Connect your computer directly to the inside (Ethernet 1/2) interface, and access device manager on the
default IP address: https://192.168.95.1.
b) Enter the admin username and the default password Admin123, then click Login.
c) Complete the setup wizard. Keep in mind that you are not going to retain anything you configure in device
manager; you only want to get past any initial configuration so you can apply the patches, so it doesn't
matter what you enter in the setup wizard.
d) Go to the Device > Upgrades page.
The System Upgrade section shows the currently running software version.
e) Upload the patch file by clicking Browse.
f) Click Install to start the installation process.
Information next to the icon indicates whether the device will reboot during installation. You are
automatically logged out of the system. Installation might take 30 minutes or more.
Wait before logging into the system again. The Device Summary, or System monitoring dashboard, should
show the new version.
Note Do not simply refresh the browser window. Instead, delete any path from the URL, and
reconnect to the home page. This ensures that cached information gets refreshed with the
latest code.
Step 8 Log into the management center and wait for the replacement device to connect.
Step 9 Before you deploy, perform any post-restore tasks and resolve any post-restore issues:
• Resolve licensing conflicts or orphan entitlements. Contact Cisco TAC.
• Resume High Availability synchronization. From the threat defense CLI, enter configure
high-availability resume. See Suspend and Resumbe High Availability in the Cisco Secure Firewall
Management Center Device Configuration Guide.
• Re-add/re-enroll all VPN certificates. The restore process removes VPN certificates from threat defense
devices, including certificates added after the backup was taken. See Managing VPN Certificates in the
Cisco Secure Firewall Management Center Device Configuration Guide.
What to do next
Verify that the restore succeeded and the replacement device is passing traffic as expected.
In threat defense High Availability and clustering deployments, you can use this procedure to replace all peers.
To replace all, perform all steps on all devices simultaneously, except the restore CLI command itself.
Note Do not unregister from the management center, even when disconnecting a device from the network. In threat
defense High Availability or clustering deployments, do not suspend or break High Availability or clustering
. Maintaining these links ensures replacement devices can automatically reconnect after restore.
Procedure
In threat defense High Availability deployments, you back up the pair as a unit but the backup process produces
unique backup files. The device's role is noted in the backup file name.
If the only copy of the backup is on the faulty device, copy it somewhere else now. If you reimage the device,
the backup will be erased. If something else goes wrong, you may not be able to recover the backup. For more
information, see Manage Backups and Remote Storage, on page 454.
The replacement device will need the backup, but can retrieve it with SCP during the restore process. We
recommend you put the backup somewhere SCP-accessible to the replacement device. Or, you can copy the
backup to the replacement device itself.
Step 5 Install the replacement device and connect it to the management network.
Connect the device to power and the management interface to the management network. In threat defense
High Availability deployments, connect the failover link. For clustering, connect the cluster control link.
However, do not connect the data interfaces.
See the hardware installation guide for your model: Cisco Secure Firewall Threat Defense: Install and Upgrade
Guides.
Step 8 Use chassis manager to add logical devices and perform initial configurations.
Do not set the same management IP addresses as the logical device or devices on the faulty chassis. This can
cause problems if you need to register a logical device in order to patch it. The restore process will correctly
reset the management IP address.
See the management center deployment chapter in the getting started guide for your model: Cisco Secure
Firewall Threat Defense: Install and Upgrade Guides.
Note If you need to patch a logical device, register to the management center as described in the getting
started guide. If you do not need to patch, do not register.
Step 9 Make sure the replacement device is running the same software version, including patches, as the faulty
device.
Ensure that the existing device should not be deleted from the management center. The replacement device
should be unmanaged from the physical network and the new hardware as well as the replacing threat defense
patch should have the same version. The threat defense CLI does not have an upgrade command. To patch:
a) From the management center web interface, complete the device registration process.
Create a new AC policy and use the default action "Network Discovery". Leave this policy as is; do not
add any features or modifications. This is being used to register the device and deploy a policy with no
features so that you do not require licenses, and you will then be able to patch the device. Once backup
is restored, it should restore the licensing and policy into the expected state.
b) Patch the device: Cisco Firepower Management Center Upgrade Guide.
c) Unregister the freshly patched device from the management center.
If you do not unregister, you will have a ghost device registered to the management center after the restore
process brings your "old" device back up.
Step 10 Make sure the replacement device has access to the backup file.
The restore process can retrieve the backup with SCP, so we recommend you put the backup somewhere
accessible. Or, you can manually copy the backup to the replacement device itself, to /var/sf/backup.
For clustering, make sure you extracted the individual node backup file from the main cluster bundle.
In threat defense High Availability and clustering deployments, make sure you choose the appropriate backup
file: primary vs secondary, or control vs. data. The role is noted in the backup file name. If you are restoring
all devices, do this sequentially. Do not run the restore command on the next device until the restore process
completes for the first device, including the reboot.
Step 12 Log into the management center and wait for the replacement device to connect.
When the restore is done, the device logs you out of the CLI, reboots, and automatically connects to the
management center. At this time, the device should appear out of date.
Step 13 Before you deploy, perform any post-restore tasks and resolve any post-restore issues:
• Resolve licensing conflicts or orphan entitlements. Contact Cisco TAC.
• Re-add/re-enroll all VPN certificates. The restore process removes VPN certificates from threat defense
devices, including certificates added after the backup was taken. See Managing VPN Certificates in the
Cisco Secure Firewall Management Center Device Configuration Guide.
What to do next
Verify that the restore succeeded and the replacement device is passing traffic as expected.
Note This procedure explains how to use chassis manager to import FXOS configurations before you restore the
software. For the CLI procedure, see the appropriate version of the Cisco Firepower 4100/9300 FXOS CLI
Configuration Guide.
Procedure
Step 1 Choose System > Tools > Import/Export on the chassis manager.
Step 2 To import from a local configuration file:
a) Click Local.
b) Click Choose File to navigate to and select the configuration file that you want to import.
c) Click Import.
A confirmation dialog box opens asking you to confirm that you want to proceed and warning you that
the chassis might need to restart.
d) Click Yes to confirm that you want to import the specified configuration file.
The existing configuration is deleted and the configuration specified in the import file is applied to the
Firepower 4100/9300 chassis. If there is a breakout port configuration change during the import, the
Firepower 4100/9300 chassis will need to restart.
Step 3 To import from a configuration file on a remote server:
a) Click Remote.
b) Choose the protocol to use when communicating with the remote server. This can be one of the following:
FTP, TFTP, SCP, or SFTP.
c) If you are using a non-default port, enter the port number in the Port field.
d) Enter the hostname or IP address of the location where the backup file is stored. This can be a server,
storage array, local drive, or any read/write media that the Firepower 4100/9300 chassis can access through
the network.
If you use a hostname rather than an IP address, you must configure a DNS server.
e) Enter the username the system should use to log in to the remote server. This field does not apply if the
protocol is TFTP.
f) Enter the password for the remote server username. This field does not apply if the protocol is TFTP.
g) In the File Path field, enter the full path to the configuration file including the file name.
h) Click Import.
A confirmation dialog box opens asking you to confirm that you want to proceed and warning you that
the chassis might need to restart.
i) Click Yes to confirm that you want to import the specified configuration file.
The existing configuration is deleted and the configuration specified in the import file is applied to the
Firepower 4100/9300 chassis. If there is a breakout port configuration change during the import, the
Firepower 4100/9300 chassis will need to restart.
Note Do not unregister from the management center, even when disconnecting a device from the network. In threat
defense High Availability or clustering deployments, do not suspend or break High Availability or clustering
. Maintaining these links ensures replacement devices can automatically reconnect after restore.
Procedure
In threat defense High Availability deployments, you back up the pair as a unit but the backup process produces
unique backup files. The device's role is noted in the backup file name.
If the only copy of the backup is on the faulty device, copy it somewhere else now. If you reimage the device,
the backup will be erased. If something else goes wrong, you may not be able to recover the backup. For more
information, see Manage Backups and Remote Storage, on page 454.
The replacement device will need the backup, but can retrieve it with SCP during the restore process. We
recommend you put the backup somewhere SCP-accessible to the replacement device. Or, you can copy the
backup to the replacement device itself.
Shut down, power off, and delete the virtual machine. For procedures, see the documentation for your virtual
environment.
Step 5 Make sure the replacement device is running the same software version, including patches, as the faulty
device.
Ensure that the existing device should not be deleted from the management center. The replacement device
should be unmanaged from the physical network and the new hardware as well as the replacing threat defense
patch should have the same version. The threat defense CLI does not have an upgrade command. To patch:
a) From the management center web interface, complete the device registration process.
Create a new AC policy and use the default action "Network Discovery". Leave this policy as is; do not
add any features or modifications. This is being used to register the device and deploy a policy with no
features so that you do not require licenses, and you will then be able to patch the device. Once backup
is restored, it should restore the licensing and policy into the expected state.
b) Patch the device: Cisco Firepower Management Center Upgrade Guide.
c) Unregister the freshly patched device from the management center.
If you do not unregister, you will have a ghost device registered to the management center after the restore
process brings your "old" device back up.
Step 6 Make sure the replacement device has access to the backup file.
The restore process can retrieve the backup with SCP, so we recommend you put the backup somewhere
accessible. Or, you can manually copy the backup to the replacement device itself, to /var/sf/backup.
For clustering, make sure you extracted the individual node backup file from the main cluster bundle.
In threat defense High Availability and clustering deployments, make sure you choose the appropriate backup
file: primary vs secondary, or control vs. data. The role is noted in the backup file name. If you are restoring
all devices, do this sequentially. Do not run the restore command on the next device until the restore process
completes for the first device, including the reboot.
Step 8 Log into the management center and wait for the replacement device to connect.
When the restore is done, the device logs you out of the CLI, reboots, and automatically connects to the
management center. At this time, the device should appear out of date.
Step 9 Before you deploy, perform any post-restore tasks and resolve any post-restore issues:
• Resolve licensing conflicts or orphan entitlements. Contact Cisco TAC.
• Re-add/re-enroll all VPN certificates. The restore process removes VPN certificates from threat defense
devices, including certificates added after the backup was taken. See Managing VPN Certificates in the
Cisco Secure Firewall Management Center Device Configuration Guide.
What to do next
Verify that the restore succeeded and the replacement device is passing traffic as expected.
We recommend you back up appliances to a secure remote location and verify transfer success. Backups left
on an appliance may be deleted, either manually or by the upgrade process; upgrades purge locally stored
backups. For more information on your options, see Backup Storage Locations, on page 456.
Caution Especially because backup files are unencrypted, do not allow unauthorized access. If backup files are modified,
the restore process will fail. Keep in mind that anyone with the Admin/Maint role can access the Backup
Management page, where they can move and delete files from remote storage.
Procedure
The Backup Management page lists available backups. It also lists how much disk space you have available
to store backups. Backups can fail if there is not enough space.
To Do This
Enable or disable remote storage Click Enable Remote Storage for Backups.
for backups without having to edit
This option appears only after you configure remote storage. Toggling
the management center system
it here also toggles it in the system configuration (System >
configuration.
Configuration > Remote Storage Device).
Tip To quickly access your remote storage configuration, click
Remote Storage at the upper right of the Backup
Management page.
Note To store backup on the remote storage location, you must
also enable the Retrieve to Management Center option
(see Back up a Device from the Management Center, on
page 437).
Upload a backup file from your Click Upload Backup, choose a backup file, and click Upload Backup
computer. again.
Location Details
Remote, by mounting a Note Backup is stored on a remote storage location only when you
network volume (NFS, SMB, have configured remote storage and enabled the Retrieve to
SSHFS). Management Center option (see Back up a Device from the
Management Center, on page 437).
Remote, by copying (SCP). Note Backup is stored on a remote storage location only when you
have configured remote storage and enabled the Retrieve to
Management Center option (see Back up a Device from the
Management Center, on page 437).
For the management center, you can use a Copy when complete option to
securely copy (SCP) completed backups to a remote server.
Compared with remote storage by mounting a network volume, Copy when
complete cannot copy to NFS or SMB volumes. You cannot provide CLI
options or set a disk space threshold, and it does not affect remote storage of
reports. You also cannot manage backup files after they are copied out.
This option is useful if you want to store backups locally and SCP them to a
remote location.
Note If you configure SSHFS remote storage in the management
center system configuration, do not copy backup files to the
same directory using Copy when complete.
Location Details
Local, on the management If you do not configure remote storage by mounting a network volume, you
center. can save backup files on the management center:
• management center backups are saved to /var/sf/backup.
• Device backups are saved to /var/sf/remote-backup on the
management center if you enable the Retrieve to Management Center
option when you perform the backup.
Local, on the device internal Device backup files are saved to /var/sf/backup on the device if you:
flash memory.
• Do not configure remote storage by mounting a network volume.
• Do not enable Retrieve to Management Center.
Local, on the device SD card. For the ISA 3000, when you back up the device to the local
/var/sf/backup internal flash memory location, if you have an SD card
installed, the backup is automatically copied to the SD card at
/mnt/disk3/backup/ for use with zero-touch restore.
Support for backup and 7.3 You can now use the management center to perform backups of clusters.
restore of clusters To restore the cluster nodes, you must use the device CLI.
New/Modified screens: System > Tools > Backup/Restore > Managed
Device Backup
New/Modified commands: restore remote-manager-backup
Note For virtual firewalls, backup and restore of clusters are
supported on VMware only.
Zero-touch restore for 7.0 When you perform a local backup, the backup file is copied to the SD
the ISA 3000 using the card if present. To restore the configuration on a replacement device,
SD card simply install the SD card in the new device, and depress the Reset
button for 3 to 15 seconds during the device bootup.
Support for backup and 6.7 You can now use the management center to perform on-demand remote
restore of threat backups of threat defense container instances on the Firepower
defense container 4100/9300.
instances
VDB requirements for 6.6 Restoring the management center from backup now replaces the existing
restore VDB with the VDB in the backup file. You no longer need to match
VDB versions before you restore.
Automatically 6.5 For new or reimaged management centers, the setup process creates a
scheduled backups weekly scheduled task to back up management center configurations
and store them locally.
On-demand remote 6.3 You can now use the management center to perform on-demand remote
backups of managed backups of certain managed devices.
devices
For supported platforms, see Requirements for Backup and Restore, on
page 429.
New/modified screens: System > Tools > Backup/Restore > Managed
Device Backup
New/modified threat defense CLI commands: restore
You should review the weekly tasks and adjust if necessary. Optionally, schedule new recurring tasks to
actually update the VDB and/or software, and deploy configurations.
Important We strongly recommend you review scheduled tasks to be sure they occur when you intend. Some tasks (such
as those involving automated software updates or that require pushing updates to managed devices) may place
a significant load on networks with low bandwidths. You should schedule tasks like these to run during periods
of low network use. Other tasks, such as deploying configurations, can cause traffic interruptions. You should
schedule tasks like these during maintenance windows.
Supported Domains
Any
User Roles
• Admin
• Maintenance User
Procedure
You can either type a number or click Up ( ) and Down ( ) to specify the interval. For example, type 2
and click Days to run the task every two days.
Step 7 In the Run At field, specify the time when you want to start your recurring task.
Step 8 For a task to be run on a weekly or monthly basis, select the days when you want to run the task in the Repeat
On field.
Step 9 Select the remaining options for the type of task you are creating:
• Backup - Schedule backup jobs as described in Schedule Management Center Backups, on page 461.
• Download CRL - Schedule certificate revocation list downloads as described in Configuring Certificate
Revocation List Downloads, on page 463.
• Deploy Policies - Schedule policy deployment as described in Automating Policy Deployment, on page
464.
• Nmap Scan - Schedule Nmap scans as described in Scheduling an Nmap Scan, on page 465.
• Report - Schedule report generation as described in Automating Report Generation, on page 466
• Cisco Recommended Rules - Schedule automatic update of Cisco recommended rules as described in
Automating Cisco Recommendations, on page 468
• Download Latest Update - Schedule software or VDB update downloads as described in Automating
Software Downloads, on page 469 or Automating VDB Update Downloads, on page 472.
• Install Latest Update - Schedule installation of software or VDB updates on a Secure Firewall Management
Center or managed device as described in Automating Software Installs, on page 471 or Automating VDB
Update Installs, on page 473
• Push Latest Update - Schedule push of software updates to managed devices as described in Automating
Software Pushes, on page 470.
• Update URL Filtering Database - Scheduling automatic update of URL filtering data as described in
Automating URL Filtering Updates Using a Scheduled Task, on page 473
Scheduled Backups
You can use the scheduler on a Secure Firewall Management Center to automate its own backups. You can
also schedule remote device backups from the management center. For more information on backups, see
Backup/Restore, on page 427.
Note that not all devices support remote backups.
Note As a part of initial configuration, the system schedules weekly configuration-only management center backups
(locally stored). We recommend you review this task and adjust if necessary, as described in this topic.
Procedure
Step 8 (Optional) Enter an email address, or a comma-separated list of email addresses, in the Email Status To:
field.
For information on setting up an email relay server to send task status messages, see Configuring a Mail Relay
Host and Notification Address, on page 57.
Procedure
Step 7 If you did not configure remote storage for backups, choose whether you want to Retrieve to Management
Center.
• Enabled (default): Saves the backup to the management center in /var/sf/remote-backup/.
• Disabled: Saves the backup to the device in /var/sf/backup/.
If you configured remote backup storage, backup files are saved remotely and this option has no effect. For
more information, see Manage Backups and Remote Storage, on page 454.
Step 9 (Optional) Enter an email address, or a comma-separated list of email addresses, in the Email Status To:
field.
For information on setting up an email relay server to send task status messages, see Configuring a Mail Relay
Host and Notification Address, on page 57.
Procedure
The comment field appears in the Task Details section of the schedule calendar page; keep comments brief.
Step 7 If you want to email task status messages, type an email address (or multiple email addresses separated by
commas) in the Email Status To: field. You must have a valid email relay server configured on the management
center to send status messages.
Step 8 Click Save.
Related Topics
Configuring a Mail Relay Host and Notification Address, on page 57
Caution When you deploy, resource demands may result in a small number of packets dropping without inspection.
Additionally, deploying some configurations restarts the Snort process, which interrupts traffic inspection.
Whether traffic drops during this interruption or passes without further inspection depends on how the target
device handles traffic. See Snort Restart Traffic Behavior and Configurations that Restart the Snort Process
When Deployed or Activated.
Procedure
Step 8 If you want to comment on the task, type a comment in the Comment field.
The comment field displays in the Tasks Details section of the schedule calendar page; keep comments brief.
Step 9 If you want to email task status messages, type an email address (or multiple email addresses separated by
commas) in the Email Status To: field. You must have a valid email relay server configured to send status
messages.
Step 10 Click Save.
Related Topics
Configuring a Mail Relay Host and Notification Address, on page 57
Out-of-Date Policies
Procedure
Step 10 If you want to email task status messages, type an email address (or multiple email addresses separated by
commas) in the Email Status To: field. You must have a valid email relay server configured to send status
messages.
Step 11 Click Save.
Related Topics
Configuring a Mail Relay Host and Notification Address, on page 57
Procedure
Step 8 If you want to email task status messages, type an email address (or multiple email addresses separated by
commas) in the Email Status To: field. You must have a valid email relay server configured to send status
messages.
Note Configuring this option does not distribute the reports.
Step 9 If you do not want to receive report email attachments when reports have no data (for example, when no
events of a certain type occurred during the report period), select the If report is empty, still attach to email
check box.
Step 10 Click Save.
Procedure
Note If you want to change report generation settings without generating the report now, you must
click Generate from the template configuration page. Changes will not be saved if you click
Generate from the template list view unless you generate the report.
Note If the system automatically generates scheduled recommendations for an intrusion policy with unsaved changes,
you must discard your changes in that policy and commit the policy if you want the policy to reflect the
automatically generated recommendations.
When the task runs, the system automatically generates recommended rule states, and modifies the states of
intrusion rules based on the configuration of your policy. Modified rule states take effect the next time you
deploy your intrusion policy.
In a multidomain deployment, you can automate recommendations for intrusion policies at the current domain
level. The system builds a separate network map for each leaf domain. In a multidomain deployment, if you
enable this feature in an intrusion policy in an ancestor domain, the system generates recommendations using
data from all descendant leaf domains. This can enable intrusion rules tailored to assets that may not exist in
all leaf domains, which can affect performance.
Procedure
• For one-time tasks, use the drop-down lists to specify the start date and time.
• For recurring tasks, see Configuring a Recurring Task, on page 460 for details.
Step 8 (Optional) To email task status messages, type an email address (or multiple email addresses separated by
commas) in the Email Status To: field.
Step 9 Click Save.
Related Topics
Conflicts and Changes: Network Analysis and Intrusion Policies
About Cisco Recommended Rules
Configuring a Mail Relay Host and Notification Address, on page 57
Note As a part of initial configuration, the system schedules weekly downloads of newly available upgrades, as
well as of the latest VDB. We recommend you review this task and adjust if necessary, as described in
Automating Software Downloads, on page 469. This task downloads updates only. It is your responsibility to
install any updates this task downloads.
Related Topics
Management Interfaces, on page 68
Updates, on page 209
Procedure
Step 8 If you want to email task status messages, type an email address (or multiple email addresses separated by
commas) in the Email Status To: field. You must have a valid email relay server configured to send status
messages.
Step 9 Click Save.
Related Topics
Configuring a Mail Relay Host and Notification Address, on page 57
Procedure
Step 7 If you want to comment on the task, type a comment in the Comment field.
The comment field appears in the Task Details section of the schedule calendar page; keep comments brief.
Step 8 If you want to email task status messages, type an email address (or multiple email addresses separated by
commas) in the Email Status To: field. You must have a valid email relay server configured to send status
messages.
Step 9 Click Save.
Related Topics
Configuring a Mail Relay Host and Notification Address, on page 57
Caution Depending on the update being installed, the appliance may reboot after the software is installed.
Procedure
Step 9 If you want to email task status messages, type an email address (or multiple email addresses separated by
commas) in the Email Status To: field. You must have a valid email relay server configured to send status
messages.
Step 10 Click Save.
Related Topics
Configuring a Mail Relay Host and Notification Address, on page 57
Note The initial setup on the management center automatically downloads and installs the latest VDB from Cisco
as a one-time operation. It also schedules a weekly task to download the latest available software updates,
which includes the latest VDB. We recommend you review this weekly task and adjust if necessary. Optionally,
schedule a new weekly task to actually update the VDB and deploy configurations.
Related Topics
Management Interfaces, on page 68
Procedure
Related Topics
Configuring a Mail Relay Host and Notification Address, on page 57
Caution In most cases, the first deploy after a VDB update restarts the Snort process, interrupting traffic inspection.
The system warns you when this will happen (updated application detectors and operating system fingerprints
require a restart; vulnerability information does not). Whether traffic drops or passes without further inspection
during this interruption depends on how the targeted device handles traffic. For more information, see Snort
Restart Traffic Behavior.
Procedure
Related Topics
Configuring a Mail Relay Host and Notification Address, on page 57
Procedure
Step 7 If you want to email task status messages, type an email address (or multiple email addresses separated by
commas) in the Email Status To: field. You must have a valid email relay server configured to send status
messages.
Step 8 Click Save.
Related Topics
Configuring a Mail Relay Host and Notification Address, on page 57
There are two types of deletions you can perform from the Schedule View page. You can delete a specific
one-time task that has not yet run or you can delete every instance of a recurring task. If you delete an instance
of a recurring task, all instances of the task are deleted. If you delete a task that is scheduled to run once, only
that task is deleted.
Column Description
Name Displays the name of the scheduled task and the comment associated with it.
Last Run Time Displays the actual start date and time.
For a recurring task, this applies to the most recent execution.
Last Run Status Describes the current status for a scheduled task:
• A question mark icon (Question Mark ( ) ) indicates that the task is in an unknown
state.
Next Run Time Displays the next execution time for a recurring task.
Displays N/A for a one-time task.
Creator Displays the name of the user that created the scheduled task.
Procedure
Step 2 You can perform the following tasks using the calendar view:
Procedure
Procedure
Step 3 In the Task Details table, click Delete ( ), then confirm your choice.
Automatic VDB 7.3 The initial setup on the management center schedules a weekly task to
downloads. download the latest available software updates, which now includes the
latest VDB. We recommend you review this weekly task and adjust if
necessary, as well as schedule a new weekly task to actually update the
VDB. You must deploy configurations for new application detectors
and operating system fingerprints to take effect.
New/modified screens: The Vulnerability Database check box is now
enabled by default in the system-created Weekly Software Download
scheduled task.
Automatic intrusion 6.6 The initial setup on the management center now enables daily intrusion
rule updates for rule updates. We recommend you review this task and adjust if necessary.
devices. For the updated rules to take effect you must deploy configurations.
Automatic software 6.5 The initial setup on the management center now schedules weekly tasks
downloads and to:
configuration backups.
• Download the latest available software updates for the management
center and its managed devices.
• Perform a locally stored configuration-only backup.
Ability to schedule 6.4 You can now use the management center to schedule remote backups
remote backups of of all managed devices that support on-demand backup; see
many managed Requirements for Backup and Restore, on page 429.
devices.
New/modified screens: When configuring a recurring backup, you can
now choose a Backup Type: management center vs device.
Note The importing and exporting appliances must be running the same software version. For access control and
its subpolicies (including intrusion policies), the intrusion rule update version must also match. If the versions
do not match, the import fails. You cannot use the Import/Export feature to update intrusion rules. Instead,
download and apply the latest rule update version.
• FlexConfig policies. However, the contents of any secret key variables are cleared when you export the
policy. You must manually edit the values of all secret keys after importing a FlexConfig policy that
uses secret keys.
• Platform settings
• Health policies
• Alert responses
• Application detectors (both user-defined and those provided by Cisco Professional Services)
• Dashboards
• Custom tables
• Custom workflows
• Saved searches
• Custom user roles
• Report templates
• Third-party product and vulnerability mappings
• Users and groups for user control
Therefore, an imported intrusion policy may behave differently than expected if the importing management
center has differently configured default variables.
• Custom user objects—If you have created custom user groups or objects in your management center and
if such a custom user object is a part of any rule in your access control policy, note that the export file
(.sfo) does not carry the user object information and therefore while importing such a policy, any reference
to such custom user objects will be removed and will not be imported to the destination management
center. To avoid detection issues due to the missing user group, add the customized user objects manually
to the new management center and re-configure the access control policy after import.
Supported Domains
Any
User Roles
• Admin
Exporting Configurations
Depending on the number of configurations being exported and the number of objects those configurations
reference, the export process may take several minutes.
Tip
Many list pages include an YouTube EDU ( ) next to list items. Where this icon is present, you can use it
as a quick alternative to the export procedure that follows.
Procedure
Step 2 Click Collapse ( ) and Expand ( ) to collapse and expand the list of available configurations.
Step 3 Check the configurations you want to export and click Export.
Step 4 Follow your web browser’s prompts to save the exported package to your computer.
Importing Configurations
Depending on the number of configurations being imported and the number of objects those configurations
reference, the import process may take several minutes.
Note If you log out of the system, if you change to a different domain, or if your user session expires after you click
Import, the import process continues in the background until it is complete. We recommend that you wait
for the import process to complete before creating any new objects or policies. Attempting to create them
while the import process is still running might result in failures.
Procedure
Step 1 On the importing appliance, choose System ( ) > Tools > Import/Export.
Step 2 Click Upload Package.
Step 3 Enter the path to the exported package or browse to its location, then click Upload.
Step 4 If there are no version mismatches or other issues, choose the configurations you want to import, then click
Import.
If you do not need to perform any conflict resolution or interface object mapping, the import completes and
a success message appears. Skip the rest of this procedure.
Step 5 If prompted, on the Import Conflict Resolution page, map interface objects used in the imported configurations
to zones and groups with matching interface types managed by the importing management center.
Interface object type (security zone or interface group) and interface type (passive, inline, routed, and so on)
of source and destination objects must match. For information, see Interface.
If the configurations you are importing reference security zones or interface groups that do not already exist,
you can map them to existing interface objects, or create new ones.
Note For individual access control policies, you have the option of replacing an existing policy with
the imported ones. However, for nested access control policies, you can only import them as new
policies.
Step 10 Wait for all feed updates to complete before deploying the policies to devices.
What to do next
Note If you import a configuration that contains Microsoft Active Directory users and groups we strongly recommend
you download all users and groups after the import to avoid issues in decryption policies, access control
policies, and possibly other policies. (Integration > Other Integrations > Realms, then click (Download
Now).
• Optionally, view a report summarizing the imported configurations; see Viewing Task Messages, on
page 407.
The system overwrites the current configuration with the configuration selected for import.
• Keep newest
The system imports the selected configuration only if its timestamp is more recent than the timestamp
on the current configuration on the appliance.
Note If you import a configuration that contains Microsoft Active Directory users and
groups we strongly recommend you download all users and groups after the
import to avoid issues in decryption policies, access control policies, and possibly
other policies. (Integration > Other Integrations > Realms, then click
(Download Now).
• Import as new
The system imports the selected duplicate configuration, appending a system-generated number to the
name to make it unique. (You can change this name before completing the import process.) The original
configuration on the appliance remains unchanged.
The resolution options the system offers depends on whether your deployment uses domains, and whether
the imported configuration is a duplicate of a configuration defined in the current domain, or a configuration
defined in an ancestor or descendant of the current domain. The following table lists when the system does
or does not present a resolution option.
When you import an access control policy with a file policy that uses clean or custom detection file lists and
a file list presents a duplicate name conflict, the system offers conflict resolution options as described in the
table above, but the action the system performs on the policies and file lists varies as described in the table
below:
Access control policy and its Existing access control policy and its
associated file policy are associated file policy and file lists remain
imported as new and the file unchanged
lists are merged
Access control policy and its Existing access control policy and its
associated file policy are associated file policy and file lists remain
imported as new and the file unchanged
lists are merged
If you modify an imported configuration on an appliance, and later re-import that configuration to the same
appliance, you must choose which version of the configuration to keep.
General information about data storage on the The Disk Usage Widget, on page 324
management center
Purging old data Purging Data from the Management Center Database,
on page 488
Allowing external access to the data on the External Database Access, on page 57
management center (this is an advanced feature)
For See
Users and user activity The Users Database in the Cisco Secure Firewall
Management Center Device Configuration Guide
The User Activity Database in the Cisco Secure
Firewall Management Center Device Configuration
Guide
Caution Purging a database removes the data you specify from the management center. After the data is deleted, it
cannot be recovered.
Procedure
• Check the Connection Summary Events check box to remove all connection summary data from the
database.
• Check the Security Intelligence Events check box to remove all Security Intelligence data from the
database.
Note Checking the Connection Events check box does not remove Security Intelligence events.
Connections with Security Intelligence data will still appear in the Security Intelligence event
page (available under the Analysis > Connections menu). Correspondingly, checking the Security
Intelligence Events check box does not remove connection events with associated Security
Intelligence data.
For See
Backups Manage Backups and Remote Storage, on page 454 and subtopics
Remote Storage Device, on page 86 and subtopics
Events Information about syslog and other resources in Event Analysis Using External Tools,
on page 589
Remote Data Storage in Cisco Secure Cloud Analytics, on page 490
Remote Data Storage on a Secure Network Analytics Appliance, on page 491
If you store connection events remotely, consider disabling storage of connection
events on your management center. For information, see Database, on page 53 and
subtopics.
Important If you will use syslog or store events externally, avoid special characters in object names such as policy and
rule names. Object names should not contain special characters, such as commas, that the receiving application
may use as separators.
On Premises SaaS
You purchase, license, and set up the storage system You purchase licenses and a data storage plan and
behind your firewall. send your data to the Cisco cloud.
Supports both syslog and direct integration. Supports both syslog and direct integration.
• View all events on the Secure Network Analytics View events in CDO or Secure Network Analytics,
Manager. depending on your license. Cross-launch from FMC
event viewer.
• Cross-launch from FMC event viewer to view
events on the Secure Network Analytics
Manager.
• View remotely stored connection and Security
Intelligence events in FMC
For more information, see the links in Remote Data For more information, see the links in Remote Data
Storage on a Secure Network Analytics Appliance, Storage in Cisco Secure Cloud Analytics, on page 490.
on page 491.
Important If you will use syslog or store events externally, avoid special characters in object names such as policy and
rule names. Object names should not contain special characters, such as commas, that the receiving application
may use as separators.
Important If you will use syslog or store events externally, avoid special characters in object names such as policy and
rule names. Object names should not contain special characters, such as commas, that the receiving application
may use as separators.
Exempt low priority 7.0 If you choose not to store connection events on the management center because you are storing them
connection events from on a remote volume, those events do not count towards the flow rate limits for your management cente
event rate limits hardware device.
If you send events to Security Analytics and Logging (On Premises) using the new 7.0 configurations
you configure this setting as part of that integration.
Otherwise, see information about the Connection Database in Database Event Limits, on page 54.
New/Modified pages: None. Behavior change only.
Improved process for 7.0 A new wizard streamlines sending events directly to a Secure Network Analytics appliance using
sending events to a Secure Security Analytics and Logging (On Premises).
Network Analytics
The wizard also allows you to see remotely stored connection events while viewing event pages on
appliance
your management center, and to cross-launch from management center to view events on your Secur
Network Analytics appliance.
If you have already configured your system to send events using syslog, events will continue to be sen
using syslog unless you disable those configurations.
For details, see the documentation referenced in Remote Data Storage on a Secure Network Analytic
Appliance, on page 491.
New/Modified pages: The System > Logging > Security Analytics & Logging page now displays
the wizard instead of the configuration for creating cross-launch options.
Remote data storage on a 6.7 You can now store large volumes of Firepower event data remotely, using Security Analytics and
Secure Network Analytics Logging (On Premises). When viewing events in management center, you can quickly cross-launch to
appliance view events in your remote data storage location.
Supported events: Connection, Security Intelligence, intrusion, file, and malware. Events are sent using
syslog.
This solution depends on availability of Stealthwatch Management Console (SMC) Virtual Edition
running Stealthwatch Enterprise (SWE) version 7.3.
See Remote Data Storage on a Secure Network Analytics Appliance, on page 491.
Remote data storage in 6.4 Use syslog to send select Firepower data using Security Analytics and Logging (SaaS). Supported
Cisco Secure Cloud events: Connection, Security Intelligence, intrusion, file, and malware.
Analytics
For details, see the Firepower Management Center and Cisco Security Analytics and Logging (SaaS)
Integration Guide at https://cisco.com/go/firepower-sal-saas-integration-docs.
Supported Domains
Any
User Roles
• Admin
• Maintenance User (risk reports only)
• Security Analyst
Introduction to Reports
The system offers two types of reports:
• Risk Reports, on page 496 — High-level summaries of risks found on your network.
• Standard Reports, on page 497 — Detailed, customizable reports about all aspects of your system.
Risk Reports
Risk reports are portable, high-level, easy-to-interpret summaries of risks found in your organization. You
can use these reports to share information about areas of risk, and recommendations for addressing these risks,
with people who do not have access to your system and who may not be network security experts. These
reports are intended to facilitate discussion about areas for investment in the security of your network.
Procedure
What to do next
• To view, download, move, or delete a risk report, see About Working with Generated Reports, on page
518.
• You can print to PDF any risk report from most supported browsers. For best results, enable background
colors, images, and optionally headers and footers, in the print or print preview settings of your browser.
Supported page sizes are A4 and US letter.
Standard Reports
The system provides a flexible reporting system that allows you to quickly and easily generate multi-section
reports with the event views or dashboards that appear on your management center. You can also design your
own custom reports from scratch.
A report is a document file formatted in PDF, HTML, or CSV with the content you want to communicate. A
report template specifies the data searches and formats for the report and its sections. The system includes a
powerful report designer that automates the design of report templates. You can replicate the content of any
event view table or dashboard graphic displayed in the web interface.
You can build as many report templates as you need. Each report template defines the individual sections in
the report and specifies the database search that creates the report’s content, as well as the presentation format
(table, chart, detail view, and so on) and the time frame. Your template also specifies document attributes,
such as the cover page and table of contents and whether the document pages have headers and footers
(available only for reports in PDF format). You can export a report template in a single configuration package
file and import it for reuse on another management center.
You can include input parameters in a template to expand its usefulness. Input parameters allow you to produce
tailored variations of the same report. When you generate a report with input parameters, the generation
process prompts you to enter a value for each input parameter. The values you type constrain the report
contents on a one-time basis. For example, you can place an input parameter in the destination IP field of the
search that produces an intrusion event report; at report generation time, you can specify a department’s
network segment when prompted for the destination IP address. The generated report then contains only
information concerning that particular department.
Note In a multidomain deployment, you can view but not edit report templates belonging to ancestor domains. To
generate reports from these templates, you must copy them to your current domain.
Line chart ( ): Shows trends/changes over time of a selected variable. Available only for
time-based tables.
Pie chart ( ): Shows each selected variable as a percentage of the whole. Variables with
quantities of zero are dropped from the chart. Very small quantities are clustered into a category
labeled Other.
Table view ( ): Shows values of attributes for each record. Not available for summary or
statistical data.
Detail view ( ): Shows complex object data associated with certain events, such as packets
(for intrusion events) and host profiles (for host events). This format is available only for
certain event types that involve such objects. Output may degrade performance if large numbers
are requested.
Table All Choose the table from which the section data is extracted.
Preset All Predefined searches. Select an appropriate preset to initialize the search criteria when you
define a new search.
Search or Filter All For most tables, you can constrain a report using a predefined or saved Search. You can also
create a new search by clicking Edit ( ).
For the Application Statistics table, you use a user-defined application Filter to constrain a
report.
X-Axis Bar chart Available data for the X-axis of the selected chart.
Line chart For line charts, the X-axis value is always Time. For bar and pie charts, you cannot select
Time as the X-axis value.
Pie chart
Y-Axis Bar chart Available data for the Y-axis of the selected chart.
Line chart
Pie chart
Section All Descriptive text that precedes the search data in the section.
Description
Enter a combination of text and input parameters. The default for a new section is $<Time
Window> and $<Constraints>.
Time Window All The time window for the data that appears in the section.
If the section searches time-based tables, you can select the check box to inherit the report’s
global time window. Alternatively, you can set a specific time window for the section.
Data Source All If you used the wizard to configure remote (external) data storage using Security Analytics
and Logging (On Premises), you can choose the data source to use for connection and Security
Intelligence events.
Options are:
• Auto: Show data stored on the management center if available. If data on the management
center is not available for the entire selected time window, show only remotely stored
data.
• Local: Show only data that is stored on the management center, regardless of the time
window selected.
Choose this option to include data that is not available on the remote volume, such as
events generated from devices that are not configured to send events to the remote volume.
• Extended: Show only data that is stored on the remote volume.
Results Bar chart Choose either Top or Bottom and enter the number of matching records you want to use to
build the chart.
Pie chart
Note Use the section preview utility to check the column selection and output characteristics such as pie chart
colors. It is not a reliable indicator of the correctness of your configured search.
The report you generate from the template has several document attributes that span all sections and control
features, such as the cover page, headers and footers, page numbering, and so on.
Note that if you selected CSV as your document format, you have no document attributes to set.
If you identify a good model among your existing templates, you can copy the template and edit its attributes
to create a new report template. Cisco also provides a set of predefined report templates, visible on the Reports
Tab in the list of templates.
From an event view, you can create a report template and modify it to meet your needs. You can add additional
sections, modify automatically included sections, and delete sections.
You can quickly create a new report by importing dashboards, workflows, and statistics summaries. The
import creates a section for each widget graphic in your dashboard and each event view in your workflow.
You can delete any unnecessary sections to focus on the most important information.
Procedure
Step 5 To add an input parameter to the report title, place your cursor in the title where the parameter value should
appear, then click insert Input Parameter ( ).
Step 6 Use the set of add under the Report Sections title bar to insert sections as necessary.
Step 7 Configure section content as described in Report Template Configuration, on page 503.
Tip You can click Preview at the bottom of the section window to view the column layout or graphic
format you chose.
Step 8 Click Advanced to set attributes for PDF and HTML reports as described in Document Attributes in a Report
Template, on page 511.
Step 9 Click Save.
If you see an error, look for a yellow triangle beside the results value in each section. If you see any such
triangles, do one of the following:
• For each field that displays a yellow triangle, mouse over the triangle and reduce the number of results
to the number indicated.
• Click Generate and include an output format other than PDF.
Procedure
Step 3 Click Copy ( ) next to the report template you want to copy.
Step 4 In the Report Title field, enter a name.
Step 5 Make changes to the template as needed.
Step 6 Click Save.
Procedure
Step 1 Populate an event view with the events you want in the report:
• Use an event search to define the events you want to view.
• Drill down through a workflow until you have the appropriate events in your event view.
Step 3 Optionally, enter a new name in the Report Title field and click Save.
• Exclude template sections from the report — Click Delete ( ) in the section’s title bar, and confirm
the deletion.
Note The last report section in some workflows contains detail views that show packets, host
profiles, or vulnerabilities, depending on the workflow. Retrieving large numbers of events
with these detail views when generating your report may affect performance of the
management center.
Procedure
Step 1 Identify the dashboard, workflow, or summary you want to replicate in your report.
Step 2 Choose Overview > Reporting.
Step 3 Click Report Templates.
Step 4 Click Create Report Template.
Step 5 Enter a name for your new report template in the Report Title field.
Step 6 Click Save.
Step 7 Click Import Section ( ). You can choose any of the data sources described in Data Source Options on
Import Report Sections, on page 503.
Step 8 Choose a dashboard, workflow, or summary from the drop-down menus.
Step 9 For the data sources you want to add, click Import.
For dashboards, each widget graphic will have its own section; for workflows, each event view will have its
own section.
Note The last report section in some workflows contains detail views that show packets, host profiles,
or vulnerabilities, depending on the workflow. Retrieving large numbers of events with these
detail views when generating your report may affect performance of the management center.
For example, Connection Events - Traffic by Port imports the views in the
Traffic by Port workflow generated from the Connection Events table.
• Saved event searches include all public event searches that you or others have created, plus all your saved
private event searches.
• Saved searches for the current report template are accessible only in the report template itself. The search
names of saved report template searches end with the string “Custom Search.” Users create these searches
while designing reports.
For the Application Statistics table, you use a user-defined application filter to constrain a report.
If you include table data in a section, you can choose which fields in the data record to show. All fields in the
table are available for inclusion or exclusion. You select fields that accomplish the purpose of the report, then
order and sort them accordingly.
You can add text sections to your templates to provide custom text, such as an introduction, for the whole
report or for individual sections.
You can add page breaks before or after any section in the template. This feature is particularly helpful for
multi-section reports with text pages that introduce the various sections.
A report template’s time window defines the template’s reporting period.
Note Security Analysts can edit only report templates they created. In multidomain deployments, you cannot edit
report templates from ancestor domains, but you can copy them to create descendant versions.
Setting the Table and Data Format for a Report Template Section
Procedure
Step 1 In the report template section, use the Table drop-down menu to choose the table to query.
The Format field represents each of the output formats available for the table you chose.
Step 5 For table output, choose the columns, order of appearance, and sort order in your output.
Step 6 Click Save.
Related Topics
Report Template Fields, on page 498
Procedure
Step 1 In the report template section, choose the database table to query from the Table drop-down menu:
• For most tables, the Search drop-down list appears.
• For the Application Statistics table, the Filter drop-down list appears.
Step 2 Choose the search or filter you want to use to constrain the report.
You can view the search criteria or create a new search by clicking Edit ( ).
Procedure
Step 1 For table format report sections, click Edit ( ) next to the Fields parameter.
Step 2 If you want to modify the section, you must add and delete fields, and drag field into the column order you
want.
Step 3 If you want to change the sort order of any column, you must use the drop-down lists on each field to set the
sort order and priority.
Step 4 Click OK.
Tip Text sections are useful for introductions to your report or your report sections.
Procedure
Related Topics
Input Parameters, on page 508
Procedure
Step 2 Drag the page break to its intended location, before or after a section.
Step 3 Click Save.
Note Global time window inheritance applies only to report sections with data from time-based tables, such as
intrusion events and discovery events. For sections that report on network assets (hosts and devices) and
related information (such as vulnerabilities), you must set each time window individually.
Setting the Global Time Window for a Report Template and Its Sections
Tip Your report can have different time ranges per section. For example, your first section could be a summary
for the month, and the remaining sections could drill down into details at the week level. In such cases, you
set the section-level time windows individually.
Procedure
Procedure
Step 1 On the Report Sections page of a template, clear the Inherit Time Window check box for the section if it is
present.
Step 2 To change the section’s local time window, click Time Window ( ).
Note Sections with data from statistics tables can have only sliding time windows.
Procedure
Step 1 In the report template editor, click the current section name in the section header.
Step 2 Enter a new name for the section.
Step 3 Click OK.
Procedure
Step 1 At any time while editing a report template section, click Preview for the section.
Step 2 Close the preview by clicking OK.
Procedure
Step 1 From the relevant section in the report template, click Edit ( ) next to the Search field.
Step 2 If you want to base a custom search on a predefined search, you must choose a predefined search from the
Saved Searches drop-down list.
This list includes all available predefined searches for this table, including system-wide and report-specific
predefined searches.
Step 4 If you want to insert an input parameter from the drop-down menu instead of entering a constraint value, you
must click Input Parameter ( ).
Note When you edit the constraints of a reporting search, the system saves your edited search under
the following name: section custom search, where section is the name in the section title bar
followed by the string custom search. To have meaningful names for your saved custom searches,
be sure you change the section name before you save the edited search. You cannot rename a
saved reporting search.
Input Parameters
You can use input parameters in a report template that the report can dynamically update at generation time.
The Input Parameter ( ) indicates the fields that can process them. There are two kinds of input parameters:
• Predefined input parameters are resolved by internal system functions or configuration information. For
example, at report generation time, the system replaces the $<Time> parameter with the current date and
time.
• User-defined input parameters supply constraints in section searches. Constraining a search with an
input parameter instructs the system to collect a value at generation time from the person who requests
the report. In this way, you can dynamically tailor a report at generation time to show a particular subset
of data without changing the template. For example, you can provide an input parameter for the
Destination IP field of a report section’s search. Then, when you generate the report, you can enter the
IP network segment for a particular department to get data for that department only.
You can also define string-type input parameters to add dynamic text in certain fields of your report,
such as in emails (subject or body), report file names, and text sections. You can personalize reports for
different departments, with customized report file names, email addresses, and email messages, using
the same template for all.
$<Time> The date and time of day the report ran, with one-second granularity
$<Time Window> The time window currently applied to the report section
Parameter Report Template Report Template Report Template Report Template Generate Report Generate Report
Cover Page Report Title Section Text Section File Name Email Subject,
Description Body
$<Logo> yes no no no no no
$<Constraints> no no yes no no no
on security events at a department level. When you generate the report, you can type the IP network segment
for a particular department to get data for that department only.
An input parameter’s type determines the search fields where you can use it. You can use a given type only
in appropriate fields. For example, a user parameter you define as a string type is available for insertion in
text fields but not in fields that take an IP address.
Each input parameter you define has a name and a type.
Number (VLAN ID, Snort ID, any VLAN ID, Snort ID, or vulnerability ID
Vuln ID)
Procedure
Procedure
Step 6 If you want to delete an input parameter, click Delete ( ) next to the input parameter and confirm.
Step 7 Click OK to return to the report template editor.
Procedure
Step 1 In the report template editor, click Edit ( ) next to the Search field within the section.
Fields that can take an input parameter are marked with Input Parameter ( ).
Step 2 Click Input Parameter ( ) next to the field, then choose the input parameter from the drop-down menu.
Cover page yes, with optional logo yes, with optional logo no
and custom appearance and custom appearance
Procedure
Procedure
You can change the logo in a report to any JPG image uploaded to your management center. For example, if
you reuse a template, you can associate a logo for a different organization with the report.
You can delete any uploaded logos. Deleting a logo removes it from all templates where it is used. The deletion
cannot be undone. Note that you cannot delete the predefined Cisco logo.
Procedure
Procedure
Procedure
Deleting a Logo
Procedure
Procedure
• Delete — Next to the template you want to delete, click Delete ( ) and confirm.
You cannot delete system-provided report templates. Security Analysts can delete only report templates
they created. In a multidomain deployment, you can delete report templates belonging to the current
domain only.
• Edit — To edit report templates; see Editing Report Templates, on page 514.
• Export — To export report templates, see Exporting Report Templates, on page 515.
Tip You can also export report templates using the standard configuration export process; see
Exporting Configurations, on page 481.
Procedure
Procedure
Step 3 For the template you want to export, click YouTube EDU ( ).
Step 4 Click Save file and OK to save the file to your local computer.
If the report template includes user input parameters in its search specification, the generation process prompts
you to enter values, which tailor this run of the report to a subset of the data.
If you have a DNS server configured and IP address resolution enabled, reports contain host names if resolution
was successful.
In a multidomain deployment, when you generate a report in an ancestor domain, it can include results from
all descendant domains. To generate a report for a specific leaf domain, switch to that domain.
Procedure
Step 5 Choose the output format for the report by clicking: HTML, PDF, or CSV.
If the PDF option is dimmed, the configured number of results in one or more report sections may be too high.
For specific limits, look for yellow triangles in the report template and hover your mouse over any that you
find.
Step 6 If you want to change the global time window, click Time Window ( ).
Note Setting the global time window affects the content of individual report sections only if they are
configured to inherit the global setting.
Step 7 Enter values for any fields that appear in the Input Parameters section.
Tip You can ignore user parameters by typing the * wildcard character in the field. This eliminates
the user parameter’s constraint on the search.
Note The system builds a separate network map for each leaf domain. In a multidomain deployment,
using literal IP addresses or VLAN tags to constrain report results can have unexpected results.
Step 8 If you enabled an email relay host in the management center configuration, click Email to automate email
delivery of the report when it generates.
Step 9 Click Generate and confirm when prompted.
Clicking Generate saves Generate settings with the report template.
If you click Close, your selections are saved only for the duration of your session.
Note If you store remotely and then switch back to local storage, the reports in remote
storage do not appear on the Reports tab list. Similarly, if you switch from one
remote storage location to another, the reports in the previous location do not
appear in the list.
Procedure
Related Topics
Configuring a Mail Relay Host and Notification Address, on page 57
Viewing Reports
The Reports lists all previously generated reports, with report name, date and time of generation, generating
user, and whether the report is stored locally or remotely. A status column indicates whether the report is
already generated, is in the generation queue (for example, for scheduled tasks), or failed to generate (for
example, due to lack of disk space).
Note that users with Administrator access can view all reports; other users can view only the reports they
generated.
In a multidomain deployment, you can view reports generated in the current domain only.
The Reports page shows all locally stored reports. It shows remotely stored reports as well, if remote storage
is currently configured. The Location column data for remotely-stored reports is Remote.
Note If you store remotely and then switch back to local storage, the reports in remote storage do not appear on the
Reports tab list. Similarly, if you switch from one remote storage location to another, the reports in the previous
location do not appear in the list.
Procedure
Downloading Reports
You can download any report file to your local computer. From there, you can email it or distribute it
electronically by other available means.
In a multidomain deployment, you can download reports generated in the current domain only.
Procedure
Step 4 Follow your browser’s prompts to download the reports. If you chose multiple reports, they are downloaded
in a single .zip file.
Note If you store remotely and then switch back to local storage, the reports in remote storage do not appear on the
Reports tab list. Similarly, if you switch from one remote storage location to another, the reports in the previous
location do not appear in the list.
Procedure
What to do next
• Move reports from local storage to remote storage; see Moving Reports to Remote Storage, on page 520.
Related Topics
Remote Storage Device, on page 86
Moving Reports to Remote Storage, on page 520
Note If you store remotely and then switch back to local storage, the reports in remote storage do not appear on the
Reports tab list. Similarly, if you switch from one remote storage location to another, the reports in the previous
location do not appear in the list.
Procedure
Deleting Reports
You can delete your report files at any time. The procedure completely removes the files, and no recovery is
possible. Although you still have the report template that generated the report, it may be difficult to regenerate
a particular report file if the time window was expanding or sliding. Regeneration may also be difficult if your
template uses input parameters.
In a multidomain deployment, you can delete reports generated in the current domain only.
Procedure
Choose a data source for 7.0 If you use the wizard to configure remote data storage
connection events in report using Security Analytics and Logging (On Premises),
templates you can choose to include data stored on that volume
in reports.
Modified page: Report template
Changes to Vulnerabilities reports 6.7 Report output has been adjusted for the lack of
availability of Bugtraq data.
Note Depending on your device and Firepower version, alert responses may not be the best way to send syslog
messages. See the About Syslog chapter in the Cisco Secure Firewall Management Center Device Configuration
Guide and Best Practices for Configuring Security Event Syslog Messaging, on page 602..
Note Alerts that use alert responses are sent by the Secure Firewall Management Center. Intrusion email alerts,
which do not use alert responses, are also sent by the Secure Firewall Management Center. By contrast, SNMP
and syslog alerts that are based on individual intrusion rules triggering are sent directly by managed devices.
For more information, see External Alerting for Intrusion Events, on page 533.
In most cases, the information in an external alert is the same as the information in any associated event you
logged to the database. However, for correlation event alerts where the correlation rule contains a connection
tracker, the information you receive is the same as for an alert on a traffic profile change, regardless of the
base event type.
You create and manage alert responses on the Alerts page (Policies > Actions > Alerts). New alert responses
are automatically enabled. To temporarily stop alert generation, you can disable alert responses rather than
deleting them.
Changes to alert responses take effect immediately, except when sending connection logs to an SNMP trap
or syslog server.
In a multidomain deployment, when you create an alert response it belongs to the current domain. This alert
response can also be used by descendant domains.
Intrusion events, by impact flag Configuring Impact Flag Alerting, on page 529
Malware and retrospective malware events detected Configuring Malware defense Alerting, on page 530
by malware defense ("network-based")
Correlation events, by correlation policy violation Adding Responses to Rules and Allow Lists, on page
933
Connection events, by the logging rule or default Other Connections You Can Log, on page 692
action (email alerts not supported)
Health events, by health module and severity level Creating Health Monitor Alerts, on page 358
Supported Domains
Any
User Roles
• Admin
Note When selecting SNMP versions for the SNMP protocol, note that SNMPv2 only supports read-only communities
and SNMPv3 only supports read-only users. SNMPv3 also supports encryption with AES128.
If you want to monitor 64-bit values with SNMP, you must use SNMPv2 or SNMPv3. SNMPv1 does not
support 64-bit monitoring.
Procedure
c) Version―Choose the SNMP version you want to use from the drop-down list. SNMPv3 is the default.
Choose from:
• SNMPv1 or SNMPv2: Enter a read-only SNMP community name in the Community String field,
then skip to the end of the procedure.
Note Do not include special characters (< > / % # & ? ', etc.) in the SNMP community string
name.
• For SNMPv3: Enter the name of the user that you want to authenticate with the SNMP server in the
User Name field and continue to the next step.
d) Authentication Protocol―Choose the protocol you want to use to encrypt authentication from the
drop-down list.
Choose from:
• MD5—Message Digest 5 (MD5) hash function.
• SHA—Secure Hash Algorithm (SHA) hash function.
g) Privacy Password―Enter the privacy password required by the SNMP server. If you specify a private
password, privacy is enabled, and you must also specify an authentication password.
h) Engine ID―Enter an identifier for the SNMP engine, in hexadecimal notation, using an even number of
digits.
When you use SNMPv3, the system uses an Engine ID value to encode the message. Your SNMP server
requires this value to decode the message.
Cisco recommends that you use the hexadecimal version of the Secure Firewall Management Center’s IP
address. For example, if the Secure Firewall Management Center has an IP address of 10.1.1.77, use
0a01014D0.
What to do next
Changes take effect immediately, EXCEPT:
If you are using alert responses to send connection logs, you must deploy configuration changes after you
edit those alert responses.
Tip For more detailed information about how syslog works and how to configure it, refer to the documentation
for your system. On UNIX systems, the man pages for syslog and syslog.conf provide conceptual information
and configuration instructions.
Although you can choose any type of facility when creating a syslog alert response, you should choose one
that makes sense based on your syslog server; not all syslog servers support all facilities. For UNIX syslog
servers, the syslog.conf file should indicate which facilities are saved to which log files on the server.
Procedure
Step 5 In the Port field, enter the port the server uses for syslog messages. By default, this value is 514.
Step 6 From the Facility list, choose a facility described in Syslog Alert Facilities, on page 527.
Step 7 From the Severity list, choose a severity described in Syslog Severity Levels, on page 528.
Step 8 In the Tag field, enter the tag name that you want to appear with the syslog message.
For example, if you wanted all messages sent to the syslog to be preceded with FromMC, enter FromMC in the
field.
What to do next
Changes take effect immediately, EXCEPT:
If you are using alert responses to send connection logs to a syslog server, you must deploy configuration
changes after you edit those alert responses.
If you will use this alert response for security events, you MUST specify the alert response in a policy. See
Configuration Locations for Security Event Syslogs, on page 606.
Facility Description
Facility Description
AUTHPRIV A restricted access message associated with security and authorization. On many
systems, these messages are forwarded to a secure file.
KERN A message generated by the kernel. On many systems, these messages are printed
to the console when they appear.
Level Description
Level Description
NOTICE Conditions that are not error conditions, but require attention.
Procedure
Procedure
Step 4 In the Impact Configuration section, check the appropriate check boxes to specify the alerts you want to
receive for each impact flag.
For definitions of the impact flags, see Intrusion Event Impact Levels, on page 755.
Procedure
Step 4 In the Events Configuration section, check the check boxes that correspond to the alerts you want to receive
for each discovery event type.
Step 5 Click Save.
Procedure
Step 4 In the Event Configuration section, check the check boxes that correspond to the alerts you want to receive
for each malware event type.
Keep in mind that All network-based malware events includes Retrospective Events.
(By definition, network-based malware events do not include events generated by AMP for Endpoints.)
Keep in mind that if you configured intrusion event suppression or thresholding, the system may not generate
intrusion events (and thus may not send alerts) every time a rule triggers.
In a multidomain deployment, you can configure external alerting in any domain. In ancestor domains, the
system generates notifications for intrusion events in descendant domains.
Note The Secure Firewall Management Center also uses SNMP, syslog, and email alert responses to send different
types of external alerts; see Secure Firewall Management Center Alert Responses, on page 523. The system
does not use alert responses to send alerts based on individual intrusion events.
Related Topics
Intrusion Event Notification Filters in an Intrusion Policy
Classic License
Protection
Supported Domains
Any
User Roles
• Admin
• Intrusion Admin
Procedure
Step 1 In the intrusion policy editor's navigation pane, click Advanced Settings.
Step 2 Make sure SNMP Alerting is Enabled, then click Edit.
A message at the bottom of the page identifies the intrusion policy layer that contains the configuration.
Step 3 Choose an SNMP Version, then specify configuration options as described in Intrusion SNMP Alert Options,
on page 535.
Step 4 In the navigation pane, click Rules.
Step 5 In the rules pane, choose the rules where you want to set SNMP alerts, then choose Alerting > Add SNMP
Alert.
Step 6 To save changes you made in this policy since the last policy commit, choose Policy Information, then click
Commit Changes.
If you leave the policy without committing changes, changes since the last commit are discarded if you edit
a different policy.
What to do next
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
SNMP v2 Options
Option Description
Trap Type The trap type to use for IP addresses that appear in the alerts.
If your network management system correctly renders the INET_IPV4 address
type, choose as Binary. Otherwise, choose as String. For example, HP OpenView
requires as String.
Trap Server The server that will receive SNMP traps notification.
You can specify a single IP address or hostname.
SNMP v3 Options
Managed devices encode SNMPv3 alerts with an Engine ID value. To decode the alerts, your SNMP server
requires this value, which is the hexadecimal version of the sending device's management interface IP address,
appended with "01."
For example, if the device sending the SNMP alert has a management interface IP address of 172.16.1.50,
the Engine ID value is 0xAC10013201.
Option Description
Trap Type The trap type to use for IP addresses that appear in the alerts.
If your network management system correctly renders the INET_IPV4 address
type, choose as Binary. Otherwise, choose as String. For example, HP OpenView
requires as String.
Trap Server The server that will receive SNMP traps notification.
You can specify a single IP address or hostname.
Option Description
Authentication Password The password required for authentication. SNMP v3 uses either the Message
Digest 5 (MD5) hash function or the Secure Hash Algorithm (SHA) hash function
to encrypt this password, depending on configuration.
If you specify an authentication password, authentication is enabled.
Private Password The SNMP key for privacy. SNMP v3 uses the Data Encryption Standard (DES)
block cipher to encrypt this password. When you enter an SNMP v3 password,
the password displays in plain text during initial configuration but is saved in
encrypted format.
If you specify a private password, privacy is enabled, and you must also specify
an authentication password.
Procedure
Step 1 In the intrusion policy editor's navigation pane, click Advanced Settings.
Step 2 Make sure Syslog Alerting is Enabled, then click Edit.
A message at the bottom of the page identifies the intrusion policy layer that contains the configuration. The
Syslog Alerting page is added under Advanced Settings.
Step 3 Enter the IP addresses of the Logging Hosts where you want to send syslog alerts.
If you leave the Logging Hosts field blank, the logging hosts details are taken from Logging in the associated
Access Control Policy.
The system builds a separate network map for each leaf domain. In a multidomain deployment, using literal
IP addresses to constrain this configuration can have unexpected results. Using override-enabled objects
allows descendant domain administrators to tailor Global configurations to their local environments.
Step 4 Choose Facility and Severity levels as described in Facilities and Severities for Intrusion Syslog Alerts, on
page 537.
Step 5 To save changes you made in this policy since the last policy commit, choose Policy Information, then click
Commit Changes.
If you leave the policy without committing changes, changes since the last commit are discarded if you edit
a different policy.
What to do next
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
Facility Description
AUTHPRIV A restricted access message associated with security and authorization. On many
systems, these messages are forwarded to a secure file.
KERN A message generated by the kernel. On many systems, these messages are printed
to the console when they appear.
Level Description
Level Description
NOTICE Conditions that are not error conditions, but require attention
Procedure
Note Enabling it will enable alerting for all rules unless individual rules are selected.
From/To Addresses
The email sender and recipients. You can specify a comma-separated list of recipients.
Coalesce Alerts
Reduces the number of alerts sent by grouping alerts that have the same source IP and rule ID.
Summary Output
Enables brief alerts, suitable for text-limited devices. Brief alerts contain:
• Timestamp
• Protocol
• Source and destination IPs and ports
• Message
• The number of intrusion events generated against the same source IP
Time Zone
The time zone for alert timestamps.
The data displayed depends on such factors as how you license and deploy your managed devices, and whether
you configure features that provide the data. You can also apply filters to constrain the data that appears in
all Context Explorer sections.
In a multidomain deployment, the Context Explorer displays aggregated data from all subdomains when you
view it in an ancestor domain. In a leaf domain, you can view data specific to that domain only.
Displayable data Anything monitored by the system Applications, application statistics, geolocation,
host indications of compromise, intrusion events,
files (including malware files), hosts, Security
Intelligence events, servers, users, and URLs
Data filtering Possible for some widgets (must edit widget Possible for all parts of the explorer, with support
preferences) for multiple filters
Graphical context Some widgets (particularly Custom Analysis) can Extensive graphical context for all data, including
display data in graph form uniquely detailed donut graphs
Related Topics
About Dashboards, on page 315
specified in the filters. For example, filtering on the OS Name of Windows causes the time graph to display
only traffic and events associated with hosts using Windows operating systems.
If you filter the Context Explorer on intrusion event data (such as a Priority of High), the blue Traffic line is
hidden to allow greater focus on intrusion events alone.
You can hover your pointer over any point on the graph lines to view exact information about traffic and event
counts. Hovering your pointer over one of the colored lines also brings that line to the forefront of the graph,
providing clearer context.
This section draws data primarily from the Intrusion Events and Connection Events tables.
Windows Server 2003) are grouped together. Very scarce or unrecognized operating systems are grouped
under Other.
Note that this graph reflects all available data regardless of date and time constraints. If you change the explorer
time range, the graph does not change.
Hover your pointer over any part of the graph to view more detailed information. Click any part of the graph
to filter or drill down on that information.
This graph draws data primarily from the Hosts table.
Note If you filter on intrusion event information, the Traffic by Source IP graph is hidden.
This graph draws data primarily from the Connection Events table.
Note If you filter on intrusion event information, the Traffic by Source User graph is hidden.
This graph draws data primarily from the Connection Events table. It displays authoritative user data.
Note If you filter on intrusion event information, the Traffic by Source User graph is hidden.
This graph draws data primarily from the Connection Events table.
Note If you filter on intrusion event information, the Traffic by Destination IP graph is hidden.
This graph draws data primarily from the Connection Events table.
Tip To constrain the graph so it displays only traffic by egress security zone, hover your pointer over the graph,
then click Egress on the toggle button that appears. Click Ingress to return to the default view. Note that
navigating away from the Context Explorer also returns the graph to the default Ingress view.
Note If you filter on intrusion event information, the Traffic by Ingress/Egress Security Zone graph is hidden.
This graph draws data primarily from the Connection Events table.
Procedure
Note that this graph reflects all available data regardless of date and time constraints. If you change the explorer
time range, the graph does not change.
Hover your pointer over any part of the graph to view more detailed information. Click any part of the graph
to filter or drill down on that information.
Tip To constrain the graph so it displays traffic by business relevance and application, hover your pointer over
the graph, then click Business Relevance on the toggle button that appears. Click Risk to return to the default
view. Note that navigating away from the Context Explorer also returns the graph to the default Risk view.
Note If you filter on intrusion event information, the Traffic by Risk/Business and Application graph is hidden.
This graph draws data primarily from the Connection Events and Application Statistics tables.
Hover your pointer over any part of the donut graph to view more detailed information. Click any part of the
graph to filter or drill down on that information, or (where applicable) to view application information.
Tip To constrain the graph so it displays intrusion events by business relevance and application, hover your pointer
over the graph, then click Business Relevance on the toggle button that appears. Click Risk to return to the
default view. Note that navigating away from the Context Explorer also returns the graph to the default Risk
view.
This graph draws data primarily from the Intrusion Events and Application Statistics tables.
Tip To constrain the graph so it displays hosts by business relevance and application, hover your pointer over the
graph, then click Business Relevance on the toggle button that appears. Click Risk to return to the default
view. Note that navigating away from the Context Explorer also returns the graph to the default Risk view.
Note If you filter on intrusion event information, the Security Intelligence Traffic by Category graph is hidden.
This graph draws data primarily from the Security Intelligence Events table.
Note If you filter on intrusion event information, the Security Intelligence Traffic by Source IP graph is hidden.
This graph draws data primarily from the Security Intelligence Events table.
Note If you filter on intrusion event information, the Security Intelligence Traffic by Destination IP graph is hidden.
This graph draws data primarily from the Security Intelligence Events table.
Tip To constrain the graph so it displays only traffic by egress security zone, hover your pointer over the graph,
then click Egress on the toggle button that appears. Click Ingress to return to the default view. Note that
navigating away from the Context Explorer also returns the graph to the default Ingress view.
This graph draws data primarily from the Intrusion Events table.
You can configure this graph to display either ingress (the default) or egress security zone information,
according to your needs.
Note If you filter on intrusion information, the entire Files Information Section is hidden.
This graph draws data primarily from the File Events table.
Tip To constrain the graph so it displays only hosts sending malware, hover your pointer over the graph, then
click Malware on the toggle button that appears. Click Files to return to the default files view. Note that
navigating away from the Context Explorer also returns the graph to the default files view.
Note that you must have a Malware Defense license to for this graph to display malware defense data.
This graph draws data primarily from the File Events table.
Tip To constrain the graph so it displays only hosts receiving malware, hover your pointer over the graph, then
click Malware on the toggle button that appears. Click Files to return to the default files view. Note that
navigating away from the Context Explorer also returns the graph to the default files view.
Note that you must have a Malware Defense license to for this graph to display malware defense data.
This graph draws data primarily from the File Events table.
Tip To constrain the graph so it displays only countries acting as the responder in connections, hover your pointer
over the graph, then click Responder on the toggle button that appears. Click Initiator to return to the default
view. Note that navigating away from the Context Explorer also returns the graph to the default Initiator view.
This graph draws data primarily from the Connection Summary Data table.
Tip To constrain the graph so it displays only countries acting as the destinations of intrusion events, hover your
pointer over the graph, then click Destination on the toggle button that appears. Click Source to return to the
default view. Note that navigating away from the Context Explorer also returns the graph to the default Source
view.
This graph draws data primarily from the Intrusion Events table.
Tip To constrain the graph so it displays only countries receiving files, hover your pointer over the graph, then
click Receiver on the toggle button that appears. Click Sender to return to the default view. Note that navigating
away from the Context Explorer also returns the graph to the default Sender view.
This graph draws data primarily from the File Events table.
Note If you filter on intrusion event information, the entire URL Information Section is hidden.
Note that you must have a URL license for this graph to include URL category and reputation data.
Note If you filter on intrusion event information, the Traffic by URL graph is hidden.
Note that you must have a URL license for this graph to include URL category and reputation data.
This graph draws data primarily from the Connection Events table.
Hover your pointer over any part of the graph to view more detailed information. Click any part of the graph
to drill down on that information.
Note If you filter on intrusion event information, the Traffic by URL Category graph is hidden.
Note that you must have a URL license for this graph to include URL category and reputation data.
This graph draws data primarily from the URL Statistics and Connection Events tables.
Note If you filter on intrusion event information, the Traffic by URL Reputation graph is hidden.
Note that you must have a URL license for this graph to include URL category and reputation data.
This graph draws data primarily from the URL Statistics and Connection Events tables.
Supported Domains
Any
User Roles
• Admin
• Security Analyst
Note that, although reloading the Context Explorer itself (by refreshing the browser program or navigating
away from, then back to, the Context Explorer) refreshes all displayed information, this does not preserve
any changes you made to section configuration (such as the Ingress/Egress graphs and the Application
Information section) and may cause delays in loading.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Procedure
Procedure
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Procedure
Step 3 To maximize a section, click maximize Expand Arrow ( ) in a minimized section’s title bar.
Procedure
• If you chose a data point associated with a specific intrusion event message and want more information
about the associated intrusion rule, choose View Rule Documentation; optionally, then click Rule
Documentation to view more-specific rule details
• If you chose a data point associated with a specific IP address and want to add that IP address to the
Security Intelligence global Block or Do Not Block list, choose the appropriate option.
Some filter types are incompatible with others: for example, filters that relate to intrusion events (such as
Device and Inline Result) cannot be applied at the same time as connection event-related filters (such as
Access Control Action) because the system cannot sort connection event data by intrusion event data. The
system automatically prevents incompatible filters from simultaneously applying; when one filter type is more
recently activated, filters of the incompatible type are hidden as long as the incompatibility exists.
When multiple filters are active, values for the same data type are treated as OR search criteria: all data that
matches at least one of the values appears. Values for different data types are treated as AND search criteria:
to appear, data must match at least one value for each filtered data type. For example, data that appears for
the filter set of Application: 2channel, Application: Reddit, and User: edickinson must be associated
with the user edickinson AND either the application 2channel OR the application Reddit.
In a multidomain deployment, you can filter by multiple descendant domains when viewing the Context
Explorer in an ancestor domain. In such cases, use caution when also adding IP Address filters. The system
builds a separate network map for each leaf domain. Using literal IP addresses to constrain this configuration
can have unexpected results.
Note that the data displayed depends on such factors as how you license and deploy your managed devices
and whether you configure features that provide the data.
Note Filters function as a simple, agile tool to get the precise data context you need at any given time. They are not
intended as permanent configuration settings, and disappear when you navigate away from the Context Explorer
or end your session. To preserve filter settings for later use, see Saving Filtered Context Explorer Views, on
page 563.
Access Control Action Allow, Block Action taken by your access control policy to allow or block
traffic.
Application Category web browser, email General classification of an application’s most essential
function.
Application Tag encrypts communications, sends Additional information about an application; applications
mail can have any number of tags, including none.
Application Type Client, Web Application Type of an application: application protocol, client, or web
application.
Business Relevance Very Low, High Estimated relevance of an application to business activity
(as opposed to recreation).
Continent North America, Asia Continent associated with a routable IP address detected on
your monitored network.
Domain Asia Division, Europe Division The domain of the device whose network activity you want
to graph. This data type is only present in a multidomain
deployment.
Event Classification Potential Corporate Policy Capsule description of an intrusion event, determined by the
Violation, Attempted Denial of classification of the rule, decoder, or preprocessor that
Service triggered it.
Event Message dns response, P2P Message generated by an event, determined by the rule,
decoder, or preprocessor that triggered it.
File Disposition Malware, Clean Disposition of a file for which the Secure Firewall
Management Center performed a malware cloud lookup.
File SHA256 any 32-bit string SHA-256 hash value of a file for which the Secure Firewall
Management Center performed a malware cloud lookup.
File Type GZ, SWF, MOV File type detected in network traffic.
File Type Category Archive, Multimedia, Executables General category of file type detected in network traffic.
Impact Level Impact Level 1, Impact Level 2 Estimated impact of an event on your monitored network.
Inline Result dropped, would have dropped Whether traffic was dropped, would have been dropped, or
was not acted upon by the system.
IOC Category High Impact Attack, Malware Category for a triggered Indication of Compromise (IOC)
Detected event.
IOC Event Type exploit-kit, malware-backdoor Identifier associated with a specific Indication of
Compromise (IOC), referring to the event that triggers it.
Security Intelligence Category Malware, Spam Category of risky traffic, as determined by Security
Intelligence.
Security Zone My Security Zone, Security Zone A set of interfaces through which traffic is analyzed and, in
X an inline deployment, passes.
The Add Filter window, which you access by clicking Plus ( ) under Filters at the top left of the Context
Explorer, contains only two fields:
• The Data Type drop-down list contains many different types of data you can use to constrain the Context
Explorer. After you select a data type, you then enter a specific value for that type in the Filter field (for
example, a value of Asia for the type Continent). To assist you, the Filter field presents several grayed-out
example values for the data type you select. (These are erased when you enter data in the field.)
• In the Filter field, you can input special search parameters such as * and ! essentially as you can in event
searches. You can create exclusionary filters by prefixing filter parameters with the ! symbol.
Note Filters that you add are not automatically applied; you must click Apply Filters to see the filtering in the
Context Explorer.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Procedure
Related Topics
Data Type Field Options, on page 560
Search Constraints, on page 663
Procedure
• To add an exclusion filter for this data, click Add Exclude Filter. The filter, when applied, displays all
data not associated with the excluded value. Exclude filters display an exclamation point (!) before the
filter value.
Procedure
Create a browser bookmark of the Context Explorer with your preferred filters applied.
Procedure
Deleting a Filter
Procedure
Step 2 Under Filters at the top left, click Close ( ) to delete the filter widget individually.
Tip If you want to delete all filters at once, you can click Clear.
Supported Domains
Any.
User Roles
• Admin
• Security Analyst
Procedure
To Do This
• Reorder columns:
Drag and drop the column heading.
• Pin (freeze) columns to the left or right side of the table so they do not scroll:
Drag a column all the way to either left or right side of the table.
Or, drag and drop a column heading into the pinned area.
To unpin a column, drag the column out of the pinned area.
• Resize columns.
• Revert columns to the default setting.
• Save column sets. For more information, see Save a Column Set in the Unified
Event Viewer topic.
Data is always sorted by time, with the most recent events on top.
Identify related events Click a row to highlight other events that are related to this event.
If needed, filter the events to display a small enough set of events.
Note The initiator of a connection is not necessarily the same as the sender
of a malware file. Search for the file or malware event associated
with a connection event by filtering the Unified Event Viewer with
Source or Destination IP filter.
View event details Click the > (Expand) icon at the left end of the row. Event details do not include
the field which has no data to display.
Tip Double click an event to view the Event Details pane. When the
Event Details pane is open, click any event in the table to load the
details of that event.
View events in real time Click Go Live. For more information, see Live View of Events in the Unified
Event Viewer.
If events stream too quickly, enter filter criteria.
See options available for Click the Options icon right-side end of the cell.
a cell value
To Do This
Cross-launch to external Click the dots in a table cell to see other options relevant to that data, if any.
resources
For more information, see Event Investigation Using Web-Based Resources, on
page 598.
Open multiple unified You can display different views of the unified event viewer using multiple browser
event viewer tabs or windows.
tabs/windows
Each new tab or window has the characteristics of the most recently modified
tab/window.
To make any open tab/window the template, make a minor change to it.
Queries in multiple tabs get processed sequentially.
Depending on the view (complex queries, or viewing in live view mode when the
incoming event rate is high, for example), you may experience slower performance
if more than about 4 tabs are open simultaneously.
Save searches Save custom searches as your favorites and quickly load them later. For more
information, see Save a Search in the Unified Event Viewer topic.
Important If your time window extends back beyond the retention period for connection events, look for Security-Related
Connection events in the tables under Analysis > Connections > Security-Related Connection Events.
Procedure
By default, the unified event viewer displays events from the past hour.
• If you want to configure a sliding default time window of the length you specify, click Sliding Time
Range.
The appliance displays all the events generated from a specific start time; for example, 1 hour ago, to
the present. As you refresh event views, the time window slides so that you always see events from the
last hour.
Procedure
What to do next
To exit the live view mode, click Live.
Procedure
• Refine your filter criteria. For important information about wildcards and search behavior, see Event
Search
• Include operators (such as <, >, !, and so on) in the value field, preceding the value. For example, enter
!Allow in the Action field to find all events with an action other than Allow.
Unlike other event viewer tables, events in the unified event viewer are not aggregated when the displayed
columns all hold identical values. Every event matching your filter criteria is listed individually.
What to do next
To save a custom filter, see Save a Search in the Unified Event Viewer topic.
Procedure
What to do next
To load a saved search, see Load a Saved Search in the Unified Event Viewer topic.
Procedure
Procedure
• To overwrite a favorite column set, click EditMore ( ) on the column set that you want to overwrite, and
click Overwrite.
What to do next
To load a saved column set, see Load a Saved Column Set in the Unified Event Viewer topic.
Procedure
Unified Event Connection or Intrusion Event Field File Event Field Malware Event Field
Viewer Field Name Security Name Name Name
Intelligence Event
Field Name
Source Port/ICMP Source Port Source Port Sending Port Sending Port
Type
Destination Port/ Destination Port Destination Port Receiving Port Receiving Port
ICMP Type
Web Application Web Application Web Application Web Application Web Application
Rule Access Control Rule Access Control Rule (Not applicable) (Not applicable)
NAT Source IP NAT Source IP (Not applicable) (Not applicable) (Not applicable)
NAT Destination NAT Destination IP (Not applicable) (Not applicable) (Not applicable)
IP
NAT Source Port NAT Source Port (Not applicable) (Not applicable) (Not applicable)
NAT Destination NAT Destination (Not applicable) (Not applicable) (Not applicable)
Port Port
Rule Group (Not applicable) Rule Group (Not applicable) (Not applicable)
See also A Note About Initiator/Responder, Source/Destination, and Sender/Receiver Fields, on page 725.
Note Even if you have not enabled logging at the beginning of the connection, the system has and uses this value
as the time field in the unified event viewer. To determine whether a connection event was logged at the
beginning and end of the connection, expand the event's row to view details. If both ends of the connection
were logged, you see a Last Packet field.
Unified event viewer 7.4 Improvements to the save favorite column sets and searches functions.
improvements
Save your favorite searches 7.3 Save column sets and searches as your favorites and later launch them quickly.
Unified event viewer 7.0 View and work in a single table with multiple event types: Connection (including Security Intelligence),
intrusion, file, and malware.
New/Modified pages: New page under Analysis > Unified Events.
Supported platforms: management center
Supported Domains
Leaf
User Roles
• Admin
• Discovery Admin
• Actively scan hosts using the open-source scanner, Nmap™, and add the scan results to your network
map.
• Manually add host data from a third-party application using the host input feature.
The network map displays your network topology in terms of detected hosts and network devices.
You can use the network map to:
• Obtain a quick, overall view of your network.
• Select different views to suit the analysis you want to perform. Each view of the network map has the
same format: a hierarchical tree with expandable categories and sub-categories. When you click a category,
it expands to show you the sub-categories beneath it.
• Organize and identify subnets via the custom topology feature. For example, if each department in your
organization uses a different subnet, you can assign familiar labels to those subnets using the custom
topology feature.
• View detailed information by drilling down to any monitored host's host profile.
• Delete an asset if you are no longer interested in investigating it.
Note If the system detects activity associated with a host you deleted from a network map, it re-adds the host to the
network map. Similarly, deleted applications are re-added to the network map if the system detects a change
in the application (for example, if an Apache web server is upgraded to a new version). Vulnerabilities are
reactivated on specific hosts if the system detects a change that makes the host vulnerable.
Tip If you want to permanently exclude a host or subnet from the network map, modify the network discovery
policy. You may wish to exclude load balancers and NAT devices from monitoring if you find that they are
generating excessive or irrelevant events.
system afterwards detects activity associated with the deleted host, it re-adds the host to the network map. If
you want to permanently exclude a host or subnet from the network map, modify the network discovery policy.
Caution Do not delete network devices from the network map. The system uses them to determine network topology.
On the hosts network map page, you can search only for primary MAC addresses, and the Hosts [MAC]
counter includes only primary MAC addresses. For descriptions of primary and secondary MAC addresses,
see Basic Host Information in the Host Profile, on page 823.
If a network device communicates using CDP, it may have one or more IP addresses. If it communicates using
STP, it may only have a MAC address.
You cannot delete network devices from the network map, because the system uses their locations to determine
network topology.
The host profile for a network device has a Systems section rather than an Operating Systems section, which
includes a Hardware column that reflects the hardware platform for any mobile devices detected behind the
network device. If a value for a hardware platform is listed under Systems, that system represents a mobile
device or devices detected behind the network device. Note that mobile devices may or may not have hardware
platform information, but hardware platform information is never detected for systems that are not mobile
devices.
Each address or partial address is a link to the next level. You can also delete a subnet or IP address; if the
system rediscovers the device, it re-adds the device to the network map.
You can also drill down to view the host profiles for the mobile devices.
To identify mobile devices, the system:
• analyzes User-Agent strings in HTTP traffic from the mobile device’s mobile browser
• monitors the HTTP traffic of specific mobile applications
If you create a custom topology for your network, the labels you assign to your subnets appear in the mobile
devices network map.
For example, if you delete http, all applications identified as http are removed from all host profiles and
http no longer appears in the applications view of the network map.
• Specific Application, Vendor, or Version — Deleting removes the affected application from the network
map and from any host profiles that contain it.
For example, if you expand the http category and delete Apache, all applications listed as Apache with
any version listed beneath Apache are removed from any host profiles that contain them. Similarly, if
instead of deleting Apache, you delete a specific version (1.3.17, for example), only the version you
selected will be deleted from affected host profiles.
• Specific IP Address — Deleting the IP address removes it from the application list and removes the
application itself from the host profile of the IP address you selected.
For example, if you expand http, Apache, 1.3.17 (Win32), and then delete 172.16.1.50:80/tcp, the
Apache 1.3.17 (Win32) application is deleted from the host profile of IP address 172.16.1.50.
Deactivating a vulnerability renders it inactive only for the hosts you designate. You can deactivate a
vulnerability for all hosts that have been judged vulnerable or for a specified individual vulnerable host. After
a vulnerability is deactivated, the applicable hosts’ IP addresses appear in gray italics in the network map. In
addition, host profiles for those hosts show deactivated vulnerabilities as invalid.
If the system subsequently detects the vulnerability on a host where it has not been deactivated (for example,
on a new host in the network map), the system activates the vulnerability for that host. You have to explicitly
deactivate the newly discovered vulnerability. Also, if the system detects an operating system or application
change for a host, it may reactivate associated deactivated vulnerabilities.
Procedure
• Specify Vulnerabilities Class — On Vulnerabilities, choose the class of vulnerabilities you want to view
from the Vulnerabilities drop-down list.
• Specify Organizing Attribute — On Host Attributes, choose an attribute from the Attribute drop-down
list.
Related Topics
Custom Network Topologies, on page 581
Host Profiles, on page 822
You can specify a custom topology’s networks using any or all of the following strategies:
• You can import networks from the network discovery policy to add the networks that you configured
the system to monitor.
• You can add networks to your topology manually.
The Custom Topology page lists your custom topologies and their status. If the light bulb icon next to the
policy name is lit, the topology is active and affects your network map. If it is dimmed, the topology is inactive.
Related Topics
The Hosts Network Map, on page 576
The Network Devices Network Map, on page 577
What to do next
• Activate the topology as described in Activating and Deactivating Custom Topologies, on page 583.
Procedure
Step 1 Access the custom topology to which you want to import the network:
• Create a custom topology; see Creating Custom Topologies, on page 581.
• Edit an existing custom topology; see Editing Custom Topologies, on page 583.
• Rename a network in the topology by clicking Edit ( ) next to the network, typing a name, and clicking
Rename.
• Remove a network from the topology by clicking Delete ( ) and then clicking OK to confirm.
What to do next
• Activate the topology as described in Activating and Deactivating Custom Topologies, on page 583.
Procedure
Step 1 Access the custom topology where you want to add the network:
• Create a custom topology; see Creating Custom Topologies, on page 581.
• Edit an existing custom topology; see Editing Custom Topologies, on page 583.
What to do next
• Activate the topology as described in Activating and Deactivating Custom Topologies, on page 583.
Related Topics
IP Address Conventions, on page 26
Note Only one custom topology can be active at any time. If you have created multiple topologies, activating one
automatically deactivates the currently active topology.
Procedure
Procedure
Introduction to Lookups
If your management center is connected to the Internet, you can use manual lookup features to find the
following information:
• Regional Information Registries (RIR) information (whois) for any IP address.
• URL category and reputation as classified by the URL Filtering feature.
• Geolocation information for any IP address: country name, country code, and continent name. (To ensure
that you are using up-to-date geolocation information, Cisco strongly recommends that you regularly
update the Geolocation Database (GeoDB) on your management center.)
Related Topics
Update the Geolocation Database (GeoDB), on page 214
Procedure
Related Topics
The Context Menu, on page 21
Procedure
What to do next
If you want to view lists of possible categories and reputations, go to Policies > Access Control > Access
Control, click a policy or add a new one, click Add Rule, then click URLs.
Procedure
Step 3 Optionally, click the column titles to sort the data. You can sort by any field except IP Address.
Step 4 (Optional) To save the results as a CSV file, click Export CSV.
Related Topics
Update the Geolocation Database (GeoDB), on page 214
Procedure
d) After the management center integrates with SecureX, you see a success message. Click Save.
Configure the Management Center Devices to Send Events to the Cisco Cloud
Configure your management center to have the managed threat defense devices send events directly to the
cloud. The cloud region and event types that you configure in this page can be used for multiple integrations
when applicable and enabled.
• Make sure you have your cloud credentials and can sign in to the SecureX regional cloud on which your
account was created.
For more information on SecureX regional cloud URLs and supported device versions, see Cisco Secure
Firewall Management Center and SecureX Integration Guide.
• If you are currently sending events to the cloud using syslog, disable these sends to avoid duplication.
Procedure
Step 1 Determine the Cisco regional cloud you want to use for sending firewall events. For more information for
choosing a regional cloud, see Cisco Secure Firewall Management Center and SecureX Integration Guide.
Note If SecureX is enabled and the management center is registered to the selected regional cloud,
changing the regional cloud disables SecureX. You can enable the SecureX again after changing
the regional cloud.
a. Check the Send events to the cloud check box to enable the configuration.
b. Select the event types that you want to send to the cloud.
Note Events you send to the cloud can be used for multiple integrations. See the following table:
Cisco SecureX and Depending on your version: If you send all connection events, Cisco SecureX and
Cisco SecureX threat Cisco SecureX threat response support only Security
• Some connection
response events.
events
• Intrusion
• File and malware
events
Note • If you enable Intrusion Events, the management center device send events along with the
impact flag.
• If you enable File and Malware Events, in addition to the events sent from the threat defense
devices, the management center devices send retrospective events.
To know more about the telemetry data that Cisco collects, see Cisco Success Network Telemetry Data
Collected from Cisco Secure Firewall Management Center Devices.
The management center establishes and maintains a secure connection with the Cisco cloud at all times when
you enable either Cisco Support Diagnostics or Cisco Success Network. You can turn off this connection at
any time by disabling both Cisco Success Network and Cisco Support Diagnostics, which disconnect the
management center from the Cisco cloud. However, when you enable Cisco Support Diagnostics, both the
management center and the threat defense establish and maintain secure connections with the Cisco cloud.
You enable Cisco Success Network when you register the management center with the Smart Software
Manager. Use the following procedure to view or change the enrollment status.
Note The Cisco Success Network feature is disabled if the management center has a valid Smart Software Manager
On-Prem (formerly known as Smart Software Satellite Server) configuration, or uses Specific License
Reservation.
Procedure
What to do next
If you have enabled Cisco Support Diagnostics, click Integration > SecureX and verify the regional cloud
setting under Cloud Region.
When you enable either Cisco Support Diagnostics or Cisco Success Network, the management center
establishes and maintains a secure connection with the Cisco cloud. You can turn off this connection at any
time by disabling both Cisco Success Network and Cisco Support Diagnostics, which disconnect these features
from the Cisco cloud. However, when you enable Cisco Support Diagnostics, both threat defense and the
management center establish and maintain secure connections with the Cisco cloud.
Administrators can view a sample data set collected from the management center by following the steps in
Producing Troubleshooting Files for Specific System Functions.
The management center sends the collected data to the regional cloud selected under the Current Region
drop-down on Integration > SecureX page.
You enable Cisco Support Diagnostics when you register the management center with the Smart Software
Manager. Use the following procedure to view or change Cisco Support Diagnostics enrollment status.
Procedure
What to do next
If you have enabled Cisco Support Diagnostics, click Integration > SecureX and verify the regional cloud
setting under Cloud Region.
Procedure
Step 1 In management center, click the ribbon at the bottom of any management center page.
Step 2 Click Get SecureX.
Step 3 Sign in to SecureX.
What to do next
For information about ribbon features and how to use them, see the online help in SecureX.
Procedure
When investigating an event, you can click directly from an event in the event viewer or dashboard in the
Secure Firewall Management Center to the relevant information in the external resource. This lets you quickly
gather context around a specific event based on its IP addresses, ports, protocol, domain, and/or SHA 256
hash.
For example, suppose you are looking at the Top Attackers dashboard widget and you want to find out more
information about one of the source IP addresses listed. You want to see what information Talos publishes
about this IP address, so you choose the "Talos IP" resource. The Talos web site opens to a page with
information about this specific IP address.
You can choose from a set of pre-defined links to commonly used Cisco and third-party threat intelligence
services, and add custom links to other web-based services, and to SIEMs or other products that have a web
interface. Note that some resources may require an account or a product purchase.
• Encoding of variables in URLs is not supported. While IPv6 addresses may require colon separators to
be encoded, most services do not require this encoding.
• Up to 100 resources can be configured, including pre-defined resources.
• You must be an Admin or Security Analyst user to create a cross launch, but you can also be a read-only
Security Analyst to use them.
Procedure
When the contextual cross-launch link is used, the {ip} variable in the URL will be replaced by the IP address
that the user right-clicks on in the event viewer or dashboard.
For a description of each variable, hover over the variable.
You can create multiple contextual cross-launch links for a single tool or service, using different variables
for each.
Step 6 Click Test with example data ( ) to test your link with example data.
Step 7 Fix any problems.
Step 8 Click Save.
Procedure
Step 1 Navigate to one of the following pages in the Secure Firewall Management Center that shows events:
• A dashboard (Overview > Dashboards), or
• An event viewer page (any menu option under the Analysis menu that includes a table of events.)
Step 2 Right-click the event of interest and choose the contextual cross-launch resource to use.
If necessary, scroll down in the context menu to see all available options.
The data type you right-click on determines the options you see; for example, if you right-click an IP address,
you will only see contextual cross-launch options that are relevant to IP addresses.
So, for example, to get threat intelligence from Cisco Talos about a source IP address in the Top Attackers
dashboard widget, choose Talos SrcIP or Talos IP.
If a resource includes multiple variables, the option to choose that resource is available only for events that
have a single possible value for each included variable.
The contextual cross-launch resource opens in a separate browser window.
It may take some time for the query to be processed, depending on the amount of data to be queried, speed
of and demand on the resource, and so on.
Note • If you need to make changes to these links later, return to this procedure; you cannot make changes
directly on the contextual cross-launch listing page.
• You can manually create additional links to cross-launch into your Secure Network Analytics appliance
using the procedure in Add Contextual Cross-Launch Resources, on page 599, but those links would be
independent of the auto-created resources and would thus need to be manually managed (deleted, updated,
etc.)
Procedure
Step 1 Select System > Logging > Security Analytics & Logging.
Step 2 Enable the feature.
Step 3 Enter the hostname or IP address, and port, of your Secure Network Analytics appliance.
The default port is 443.
What to do next
To cross-launch from an event into the Secure Network Analytics event viewer, you will need your Secure
Network Analytics credentials.
To cross launch from an event in the management center event viewer or dashboard, right-click a relevant
event's table cell and choose the appropriate option.
It may take some time for the query to be processsed, depending on the amount of data to be queried, speed
of and demand on the Secure Network Analytics Manager, etc.
All If you will use syslog or store events externally, avoid special characters
in object names such as policy and rule names. Object names should
not contain special characters, such as commas, that the receiving
application may use as separators.
Secure Firewall Threat Defense 1. Configure threat defense platform settings (Devices > Platform
Settings > Threat Defense Settings > Syslog.)
See also Threat Defense Platform Settings That Apply to Security
Event Syslog Messages in the Cisco Secure Firewall Management
Center Device Configuration Guide.
2. In your access control policy Logging tab, opt to use the threat
defense platform settings.
3. (For intrusion events) Configure intrusion policies to use the settings
in your access control policy Logging tab. (This is the default.)
For complete details, see Send Security Event Syslog Messages from
Classic Devices, on page 605.
Note Many threat defense syslog settings are not applicable to security events. Configure only the options described
in this procedure.
Procedure
c) Click Save.
Step 4 Enable syslog logging for each rule in the access control policy:
a) In the same access control policy, click the Access Control > Add Rule.
b) Select a rule to edit.
c) Click the Logging tab in the rule.
d) Choose whether to log the beginning or end of connections, or both.
(Connection logging generates a lot of data; logging both beginning and end generates roughly double
that much data. Not every connection can be logged both at beginning and end.)
e) If you want to log file events, select Log Files.
f) Enable Syslog Server.
g) Verify that the rule is "Using default syslog configuration in Access Control Logging."
h) Click Confirm.
i) Repeat for each rule in the policy.
Step 5 If you send intrusion events:
a) Navigate to the intrusion policy associated with your access control policy.
b) In your intrusion policy, click Advanced Settings > Syslog Alerting > Enabled.
c) If necessary, click Edit
d) Enter options:
Option Value
Logging Host Unless you will send intrusion event syslog messages to a different syslog
server than you will send other syslog messages, leave this blank to use the
settings you have configured above.
Facility This setting is applicable only if you specify a Logging Host on this page.
For descriptions, see Syslog Alert Facilities, on page 527.
Severity This setting is applicable only if you specify a Logging Host on this page.
For descriptions, see Syslog Severity Levels, on page 528.
e) Click Back.
f) Click Policy Information in the left navigation pane.
g) Click Commit Changes.
What to do next
• (Optional) Configure different logging settings for individual policies and rules.
See the applicable table rows in Configuration Locations for Syslogs for Connection and Security
Intelligence Events (All Devices), on page 607.
These settings will require syslog alert responses, which are configured as described in Creating a Syslog
Alert Response, on page 526. They do not use the platform settings you configured in this procedure.
• To configure security event syslog logging for Classic devices, see Send Security Event Syslog Messages
from Classic Devices, on page 605.
• If you are done making changes, deploy your changes to managed devices.
Procedure
Option Value
Logging Host Unless you will send intrusion event syslog messages to a different syslog
server than you will send other syslog messages, leave this blank to use the
settings you have configured above.
Facility This setting is applicable only if you specify a Logging Host on this page.
See Syslog Alert Facilities, on page 527.
Severity This setting is applicable only if you specify a Logging Host on this page.
See Syslog Severity Levels, on page 528.
e) Click Back.
f) Click Policy Information in the left navigation pane.
g) Click Commit Changes.
What to do next
• (Optional) Configure different logging settings for individual access control rules. See the applicable
table rows in Configuration Locations for Syslogs for Connection and Security Intelligence Events (All
Devices), on page 607. These settings will require syslog alert responses, which are configured as described
in Creating a Syslog Alert Response, on page 526. They do not use the settings you configured above.
• To configure security event syslog logging for threat defense devices, see Send Security Event Syslog
Messages from Threat Defense Devices, on page 603.
• Configuration Locations for Syslogs for Intrusion Events (Threat Defense Devices), on page 608
• Configuration Locations for Syslogs for Intrusion Events (Devices Other than Threat Defense), on page
609
• Configuration Locations for Syslogs for File and Malware Events, on page 609
Configuration Locations for Syslogs for Connection and Security Intelligence Events (All Devices)
There are many places to configure logging settings. Use the table below to ensure that you set the options
you need.
Important • Pay careful attention when configuring syslog settings, especially when using inherited defaults from
other configurations. Some options may NOT be available to all managed device models and software
versions, as noted in the table below.
• For important information when configuring connection logging, see the chapter on Connection Logging,
on page 691.
Devices > Platform Settings, Threat This option applies only to threat defense devices.
Defense Settings policy, Syslog
Settings you configure here can be specified in the Logging settings
for an Access Control policy and then used or overridden in the
remaining policies and rules in this table.
See Cisco Secure Firewall Management Center Device Configuration
Guide.
Policies > Access Control, <each Settings you configure here are the default settings for syslogs for all
policy>, Logging connection and security intelligence events, unless you override the
defaults in descendant policies and rules at the locations specified in
the remaining rows of this table.
Recommended setting for threat defense devices: Use Threat Defense
Platform Settings. For information, see Cisco Secure Firewall
Management Center Device Configuration Guide.
Required setting for all other devices: Use a syslog alert.
If you specify a syslog alert, see Creating a Syslog Alert Response,
on page 526.
For more information about the settings on the Logging tab, see Cisco
Secure Firewall Management Center Device Configuration Guide.
Policies > Access Control, <each Logging settings for the default action associated with an access
policy>, Rules, Default Action row, control policy.
Logging ( ) See information about logging in Cisco Secure Firewall Management
Center Device Configuration Guide and Logging Connections with
a Policy Default Action, on page 705.
Policies > Access Control, <each Logging settings for a particular rule in an access control policy.
policy>, Rules, <each rule>, Logging
See information about logging in Cisco Secure Firewall Management
Center Device Configuration Guide.
Policies > Access Control, <each Logging settings for Security Intelligence Block lists.
policy>, Security Intelligence,
Click these buttons to configure:
Logging ( )
• DNS Block List Logging Options
• URL Block List Logging Options
• Network Block List Logging Options (for IP addresses on the
blocked list)
Policies > SSL, <each policy>, Logging settings for the default action associated with an SSL policy.
Default Action row, Logging ( ) See Logging Connections with a Policy Default Action, on page 705.
Policies > SSL, <each policy>, <each Logging settings for SSL rules.
rule>, Logging
See Cisco Secure Firewall Management Center Device Configuration
Guide.
Policies > Prefilter, <each policy>, Logging settings for the default action associated with a prefilter
policy.
Default Action row, Logging ( )
See Logging Connections with a Policy Default Action, on page 705.
Policies > Prefilter, <each policy>, Logging settings for each prefilter rule in a prefilter policy.
<each prefilter rule>, Logging
See Cisco Secure Firewall Management Center Device Configuration
Guide
Policies > Prefilter, <each policy>, Logging settings for each tunnel rule in a prefilter policy.
<each tunnel rule> , Logging
See Cisco Secure Firewall Management Center Device Configuration
Guide
Additional syslog settings for threat The Cisco Secure Firewall Management Center Device Configuration
defense cluster configurations: Guide has multiple references to syslog; search the chapter for
"syslog."
Configuration Locations for Syslogs for Intrusion Events (Threat Defense Devices)
You can specify syslog settings for intrusion policies in various places and, optionally, inherit settings from
the access control policy or the Threat Defense Platform Settings or both.
Devices > Platform Settings, Threat Defense Settings Syslog destinations that you configure here can be
policy, Syslog specified in the Logging tab of an access control
policy which can be the default for an intrusion policy.
See Cisco Secure Firewall Management Center Device
Configuration Guide.
Policies > Access Control, <each policy>, Logging Default setting for syslog destination for intrusion
events, if the intrusion policy does not specify other
logging hosts.
See Cisco Secure Firewall Management Center Device
Configuration Guide.
Policies > Intrusion, <each policy>, Advanced To specify syslog collectors other than the destinations
Settings, enable Syslog Alerting, click Edit specified in the access control policy Logging tab,
and to specify facility and severity, see Configuring
Syslog Alerting for Intrusion Events, on page 536.
If you want to use the Severity or Facility or both as
configured in the intrusion policy, you must also
configure the logging hosts in the policy. If you use
the logging hosts specified in the access control
policy, the severity and facility specified in the
intrusion policy will not be used.
Policies > Access Control > Logging > IPS settings If you want to send Syslog messages for IPS events.
Default syslog settings configured are used for syslog
destinations for IPS events.
Configuration Locations for Syslogs for Intrusion Events (Devices Other than Threat Defense)
• (Default) Access control policy Cisco Secure Firewall Management Center Device Configuration Guide,
IF you specify a syslog alert (See Creating a Syslog Alert Response, on page 526.)
• Or see Configuring Syslog Alerting for Intrusion Events, on page 536.
By default, the intrusion policy uses the settings in the Logging tab of the access control policy. If settings
applicable to devices other than threat defense are not configured there, syslogs will not be sent for devices
other than threat defense and no warning appears.
In an access control policy: This is the main location for configuring the system
to send syslogs for file and malware events.
Policies > Access Control, <each policy>, Logging
If you do not use the syslog settings in Threat Defense
Platform Settings, you must also create an alert
response. See Creating a Syslog Alert Response, on
page 526.
In Threat Defense Platform Settings: These settings apply only to threat defense devices
running supported versions, and only if you configure
Devices > Platform Settings, Threat Defense Settings
the Logging tab in the access control policy to use
policy, Syslog
threat defense platform settings.
See Cisco Secure Firewall Management Center Device
Configuration Guide.
In an access control rule: If you do not use the syslog settings in Threat Defense
Platform Settings, you must also create an alert
Policies > Access Control, <each policy>, <each
response. See Creating a Syslog Alert Response, on
rule>, Logging
page 526.
0 PRI The priority value that represents both Facility and Severity of the
alert. The value appears in the syslog messages only when you enable
logging in EMBLEM format using management center platform
settings. If you enable logging of intrusion events through access
control policy Logging tab, the PRI value is automatically displayed
in the syslog messages. For information on how to enable the
EMBLEM format, see Cisco Secure Firewall Management Center
Device Configuration Guide. For information on PRI, see RFC5424.
1 Timestamp Date and time the syslog message was sent from the device.
• (Syslogs sent from threat defense devices) For syslogs sent using
settings in the access control policy and its descendants, or if
specified to use this format in the Threat Defense Platform
Settings, the date format is the format defined in the ISO 8601
timestamp format as specified in RFC 5424
(yyyy-MM-ddTHH:mm:ssZ), where the letter Z indicates the
UTC time zone.
• (Syslogs sent from all other devices) For syslogs sent using
settings in the access control policy and its descendants, the
date format is the format defined in the ISO 8601 timestamp
format as specified in RFC 5424 (yyyy-MM-ddTHH:mm:ssZ),
where the letter Z indicates the UTC time zone.
• Otherwise, it is the month, day, and time in UTC time zone,
though the time zone is not indicated.
2 Device or interface from (For syslogs sent from threat defense devices)
which the message was
If the syslog message was sent using the Threat Defense Platform
sent.
Settings, this is the value configured in Syslog Settings for the
This can be: Enable Syslog Device ID option, if specified.
• IP address of the Otherwise, this element is not present in the header.
interface
To configure this setting in Threat Defense Platform Settings, see
• Device hostname Cisco Secure Firewall Management Center Device Configuration
Guide.
• Custom device
identifier
3 Custom value If the message was sent using an alert response, this is the Tag value
configured in the alert response that sent the message, if configured.
(See Creating a Syslog Alert Response, on page 526.)
Otherwise, this element is not present in the header.
4 %FTD Type of device that sent the message. %FTD is Secure Firewall
Threat Defense
5 Severity The severity specified in the syslog settings for the policy that
triggered the message.
For severity descriptions, see Severity Levels in the Cisco Secure
Firewall Management Center Device Configuration Guide or Syslog
Severity Levels, on page 528.
Threat Use the EMBLEM option Use the EMBLEM option in Facility does not appear in the
Defense in Threat Defense Platform Threat Defense Platform message header, but the syslog
Settings. Settings or configure logging collector can derive the value
using the syslog settings in the based on RFC 5424, section 6.2.1.
Facility is always ALERT
intrusion policy. If you use the
for connection events when
intrusion policy, you must also
sending syslog messages
specify the logging host in the
using Threat Defense
intrusion policy settings.
Platform Settings.
Enable syslog alerting and
configure facility and severity
on the intrusion policy. See
Configuring Syslog Alerting
for Intrusion Events, on page
536.
For more information, see Facilities and Severities for Intrusion Syslog Alerts, on page 537 and Creating a
Syslog Alert Response, on page 526.
Audit logs from management center Stream Audit Logs to Syslog, on page 43 and the Audit and Syslog,
on page 381 chapter
Device health and network-related logs Cisco Secure Firewall Management Center Device Configuration
from threat defense devices Guide
Connection, security intelligence, and About Configuring the System to Send Security Event Data to
intrusion event logs from threat defense Syslog, on page 602.
devices
Connection, security intelligence, and About Configuring the System to Send Security Event Data to
intrusion event logs from Classic Syslog, on page 602
devices
Logs for file and malware events About Configuring the System to Send Security Event Data to
Syslog, on page 602
IPS Settings Send Syslog messages for IPS events. Configuration Locations for
Syslogs for Intrusion Events (Threat Defense Devices), on page 608
Intrusion Event Extra Data additional data associated with an intrusion event such as the
originating IP addresses of a client connecting to a web server through
an HTTP proxy or load balancer
Correlation and Allow List Events correlation and compliance allow list events
Connection Events information about the session traffic between your monitored hosts
and all other hosts.
Syslog eStreamer
Standard Proprietary
Syslog standard does not protect against data loss, Protection against data loss
especially when using UDP
Sends directly from devices Sends from management center, adding processing
overhead
Support for file and malware events, connection Support for all event types listed in eStreamer Server
events (including security intelligence events) and Streaming, on page 614.
intrusion events.
Some event data can be sent only from management Includes data that cannot be sent via syslog directly
center. See Data Sent Only via eStreamer, Not via from devices. See Data Sent Only via eStreamer, Not
Syslog, on page 615. via Syslog, on page 615.
• Correlation events
• For malware events:
• retrospective verdicts
• ThreatName and Disposition, unless information about the relevant SHAs has already been
synchronized to the device
Some metadata messages also include extra information about the objects.
• Geolocation information
Procedure
Procedure
Step 5 If you want to encrypt the certificate file, enter a password in the Password field.
Step 6 Click Save.
The eStreamer server now allows the host to access port 8302 on the eStreamer server and creates an
authentication certificate to use during client-server authentication.
Step 7 Click Download ( ) next to the client hostname to download the certificate file.
Step 8 Save the certificate file to the appropriate directory used by your client for SSL authentication.
Step 9 To revoke access for a client, click Delete ( ) next to the host you want to remove.
Note that you do not need to restart the eStreamer service; access is revoked immediately.
SecureX ribbon 7.0 The SecureX ribbon pivots into SecureX for instant visibility into the threat landscape across your
Cisco security products.
To display the SecureX ribbon in management center, see the Firepower and SecureX Integration
Guide at https://cisco.com/go/firepower-securex-documentation.
New/Modified screens: New page: System > SecureX
Send all connection events 7.0 You can now send all connection events to the Cisco cloud, rather than just sending high-priority
to the Cisco cloud connection events.
New/Modified screens: New option on the System > Integration > Cloud Services page
Cross-launch to view data 6.7 This feature introduces a quick way to create multiple entries for your Secure Network Analytics
in Secure Network appliance on the Analysis > Contextual Cross-Launch page.
Analytics
These entries allow you to right-click a relevant event to cross-launch Secure Network Analytics and
display information related to the data point from which you cross-launched.
New menu item: System > Logging > Security Analytics and Logging
New page to configure sending events to Secure Network Analytics.
Contextual cross-launch 6.7 You can now cross-launch into an external application using the following additional types of event
from additional field types data:
• Access control policy
• Intrusion policy
• Application protocol
• Client application
• Web application
• Username (including realm)
New menu options: Contextual-cross launch options are now available when right-clicking the abov
data types for events in Dashboard widgets and event tables on pages under the Analysis menu.
Supported platforms: Secure Firewall Management Center
Integration with IBM 6.0 and IBM QRadar users can use a new Firepower-specific app to analyze their event data.
QRadar later
Available functionality is affected by your Firepower version.
See Event Analysis in IBM QRadar, on page 618.
Modified screens: New options on System > Integration > Cloud Services.
Supported Platforms: All devices supported in this release, either via direct integration or syslog.
Syslog 6.5 The AccessControlRuleName field is now available in intrusion event syslog messages.
Integration with Cisco 6.5 Support for this feature was removed.
Security Packet Analyzer
Integration with SecureX 6.3 (via Integrate Firepower intrusion event data with data from other sources for a unified view of threats on
threat response syslog, your network using the powerful analysis tools in SecureX threat response.
using a
Modified screens (version 6.4): New options on System > Integration > Cloud Services.
proxy
collector) Supported Platforms: Secure Firewall Threat Defense devices running version 6.3 (via syslog) or 6.4.
6.4
(direct)
Syslog support for File and 6.4 Fully-qualified file and malware event data can now be sent from managed devices via syslog.
Malware events
Modified screens: Policies > Access Control > Access Control > Logging.
Supported Platforms: All managed devices running version 6.4.
Integration with Splunk Supports Splunk users can use a new, separate Splunk app, Cisco Secure Firewall (f.k.a. Firepower) app for
all 6.x Splunk, to analyze events.
versions
Available functionality is affected by your Firepower version.
See Event Analysis in Splunk, on page 618.
Integration with Cisco 6.3 Feature introduced: Instantly query Cisco Security Packet Analyzer for packets related to an event,
Security Packet Analyzer then click to examine the results in Cisco Security Packet Analyzer or download them for analysis in
another external tool.
New screens:
System > Integration > Packet Analyzer
Analysis > Advanced > Packet Analyzer Queries
New menu options: Query Packet Analyzer menu item when right-clicking on an event on Dashboard
pages and event tables on pages under the Analysis menu.
Supported platforms: Secure Firewall Management Center
Contextual cross-launch 6.3 Feature introduced: Right-click an event to look up related information in predefined or custom
URL-based external resources.
New screens: Analysis > Advanced > Contextual Cross-Launch
New menu options: Multiple options when right-clicking on an event on Dashboard pages and event
tables on pages under the Analysis menu.
Supported platforms: Secure Firewall Management Center
Syslog messages for 6.3 Ability to send fully-qualified connection and intrusion events to external storage and tools via syslog
connection and intrusion using new unified and simplified configurations. Message headers are now standardized and include
events event type identifiers, and messages are smaller because fields with unknown and empty values are
omitted.
Supported Platforms:
• All new functionality: threat defense devices running version 6.3.
• Some new functionality: Non-threat defense devices running version 6.3.
• Less new functionality: All devices running versions older than 6.3.
For more information, see the topics under About Sending Syslog Messages for Security Events, on
page 602 and subtopics.
eStreamer 6.3 Moved eStreamer content from the Host Identity Sources chapter to this chapter and added a summar
comparing eStreamer to syslog.
Overview: Workflows
A workflow is a tailored series of data pages on the management center web interface that analysts can use
to evaluate events generated by the system.
The following types of workflows are available on the management center:
Predefined Workflows
Preset workflows delivered with the system. You cannot edit or delete a predefined workflow. You can,
however, copy a predefined workflow and use it as the basis for a custom workflow.
Saved Custom Workflows
Custom workflows based on saved custom tables delivered with the management center. You can edit,
delete, and copy these workflows.
Custom Workflows
Workflows that you create and customize for your specific needs, or that the system generates
automatically when you create custom tables. You can edit, delete, and copy these workflows.
The data displayed in a workflow often depends on such factors as how you license and deploy your managed
devices, and whether you configure features that provide the data.
Predefined Workflows
The predefined workflows described in the following sections are delivered with the system. You cannot edit
or delete a predefined workflow, but you can copy a predefined workflow and use it as the basis for a custom
workflow.
Destination Port Because destination ports are usually tied to an application, this workflow can help you detect applications
that are experiencing an uncommonly high volume of alerts. The Destination Port column can also help
you identify applications that should not be present on your network.
Event-Specific This workflow provides two useful features. Events that occur frequently may indicate:
• false positives
• a worm
• a badly misconfigured network
Events that occur infrequently are most likely evidence of a targeted attack and warrant special attention.
Events by Priority and This workflow lists events and their type in order of event priority, along with a count showing how many
Classification times each event has occurred.
Events to Destinations This workflow provides a high-level view of which host IP addresses are being attacked and the nature of
the attack; where available, you can also see information about the countries involved in attacks.
IP-Specific This workflow shows which host IP addresses are generating the most alerts. Hosts with the greatest number
of events are either public-facing and receiving worm-type traffic (indicating a good place to look for
tuning) or require further investigation to determine the cause of the alerts. Hosts with the lowest counts
also warrant investigation as they could be the subject of a targeted attack. Low counts may also indicate
that a host may not belong on the network.
Impact and Priority This workflow lets you find high-impact recurring events quickly. The reported impact level is shown with
the number of times the event has occurred. Using this information, you can identify the high-impact events
that recur most often, which might be an indicator of a widespread attack on your network.
Impact and Source This workflow can help you identify the source of an attack in progress. The reported impact level is shown
with the associated source IP address for the event. If, for example, events with a level 1 impact are coming
from the same source IP address repeatedly, they may indicate an attacker who has identified vulnerable
systems and is targeting them.
Impact to Destination You can use this workflow to identify events repeatedly occurring on vulnerable computers, so you can
address the vulnerabilities on those systems and stop any attacks in progress.
Source Port This workflow indicates which servers are generating the most alerts. You can use this information to
identify areas that require tuning, and to decide which servers require attention.
Source and Destination This workflow identifies host IP addresses sharing high levels of alerts. Pairs at the top of the list could be
false positives, and may identify areas that require tuning. You can check pairs at the bottom of the list for
targeted attacks, for users accessing resources they should not be accessing, or for hosts that do not belong
on the network.
Malware Summary This workflow provides a list of the malware detected in network traffic or by AMP for Endpoints
Connectors, grouped by individual threat.
Malware Event Summary This workflow provides a quick breakdown of the different malware event types and subtypes.
Hosts Receiving Malware This workflow provides a list of host IP addresses that have received malware, grouped by the malware
files’ associated dispositions.
Hosts Sending Malware This workflow provides a list of host IP addresses that have sent malware, grouped by the malware
files’ associated dispositions.
Applications Introducing This workflow provides a list of host IP addresses that have received files, grouped by the associated
Malware malware dispositions for those files.
File Summary This workflow provides a quick breakdown of the different file event categories and types, along
with any associated malware dispositions.
Hosts Receiving Files This workflow provides a list of host IP addresses that have received files, grouped by the associated
malware dispositions for those files.
Hosts Sending Files This workflow provides a list of host IP addresses that have sent files, grouped by the associated
malware dispositions for those files.
Captured File Summary This workflow provides a breakdown of captured files based on type, category, and threat score.
Dynamic Analysis Status This workflow provides a count of captured files based on whether they have been submitted for
dynamic analysis.
Connection Events This workflow provides a summary view of basic connection and detected application information,
which you can then use to drill down to the table view of events.
Connections by Application This workflow contains a graph of the 10 most active applications on the monitored network segment,
based on the number of detected connections.
Connections by Initiator This workflow contains a graph of the 10 most active host IP addresses on the monitored network
segment, based on the number of connections where the host initiated the connection transaction.
Connections by Port This workflow contains a graph of the 10 most active ports on the monitored network segment, based
on the number of detected connections.
Connections by Responder This workflow contains a graph of the 10 most active host IP addresses on the monitored network
segment, based on the number of connections where the host IP was the responder in the connection
transaction.
Connections over Time This workflow contains a graph of the total number of connections on the monitored network segment
over time.
Traffic by Application This workflow contains a graph of the 10 most active applications on the monitored network segment,
based on the number of kilobytes transmitted.
Application counts reflect each detector that matched against an application connection. The same
application session may be represented more than once in the list depending on whether an application
protocol, web application, client detector, or internal detector matched the traffic, as well as whether
the traffic originated from a mobile device or was part of an encrypted session. If the application was
seen in a client flow and no specific client detector exists, a generic client may be reported.
For example, you may see the same session of YouTube traffic reported as YouTube (because it
matched a YouTube web application detector) and as YouTube client (because an internal YouTube
detector matched against characteristics typically seen in a client session).
Use the information in the connection events and network map for your network to determine more
context for specific application connections.
Traffic by Initiator This workflow contains a graph of the 10 most active host IP addresses on the monitored network
segment, based on the total number of kilobytes transmitted from each address.
Traffic by Port This workflow contains a graph of the 10 most active ports on the monitored network segment, based
on the number of kilobytes transmitted.
Traffic by Responder This workflow contains a graph of the 10 most active host IP addresses on the monitored network
segment, based on the total number of kilobytes received by each address.
Traffic over Time This workflow contains a graph of the total kilobytes transmitted on the monitored network segment
over time.
Unique Initiators by This workflow contains a graph of the 10 most active responding host IP addresses on the monitored
Responder network segment, based on the number of unique initiators that contacted each address.
Unique Responders by This workflow contains a graph of the 10 most active initiating host IP addresses on the monitored
Initiator network segment, based on the number of unique responders that the addresses contacted.
Security Intelligence Events This workflow provides a summary view of basic Security Intelligence and detected application
information, which you can then use to drill down to the table view of events.
Security Intelligence This workflow is identical to the Security Intelligence Events workflow, but begins with the Security
Summary Intelligence Summary page, which lists security intelligence events by category and count only.
Security Intelligence with This workflow is identical to the Security Intelligence Events workflow, but begins with the Security
DNS Details Intelligence with DNS Details page, which lists Security Intelligence events by category and
DNS-related characteristics.
Hosts This workflow contains a table view of hosts followed by the host view. Workflow views based on
the Hosts table allow you to easily view data on all IP addresses associated with a host.
Operating System Summary You can use this workflow to analyze the operating systems in use on your network.
Host Indications of This workflow begins with a summary view of IOC data grouped by count and category, and provides
Compromise a detail view that further subdivides the summary data by event type.
Access this workflow via the Analysis > Hosts menu.
Indications of Compromise You can use this workflow to gauge which hosts on your network are most likely to be compromised
by Host (based on IOC data).
Access this workflow via the Analysis > Hosts menu.
User Indications of This workflow begins with a summary view of IOC data grouped by count and category, and provides
Compromise a detail view that further subdivides the summary data by event type.
Access this workflow via the Analysis > Users menu.
Indications of Compromise Use this workflow to gauge which users on your network are most likely to be involved in potential
by User compromises (based on IOC data.)
Access this workflow via the Analysis > Users menu.
Application Business You can use this workflow to analyze running applications of each estimated business relevance level
Relevance on your network, so you can monitor appropriate use of your network resources.
Application Category You can use this workflow to analyze running applications of each category (such as email, search
engine, or social networking) on your network, so you can monitor appropriate use of your network
resources.
Application Risk You can use this workflow to analyze running applications of each estimated security risk level on
your network, so you can estimate the potential risk of users’ activity and take appropriate action.
Application Summary You can use this workflow to obtain detailed information about the applications and associated hosts
on your network, so you can closely examine host application activity.
Applications You can use this workflow to analyze running applications on your network, so you can gain an
overview of how the network is being used.
Application Details You can use this workflow to analyze the client applications on your network in more detail. The
workflow then provides a table view of client applications, followed by the host view.
Clients This workflow contains a table view of client applications, followed by the host view.
Network Applications by You can use this workflow to analyze the most frequently used applications on your network.
Count
Network Applications by Hit You can use this workflow to analyze the most active applications on your network.
Server Details You can use this workflow to analyze the vendors and versions of detected server application protocols
in detail.
Servers This workflow contains a table view of applications followed by the host view.
Attributes You can use this workflow to monitor IP addresses of hosts on your network and the hosts’ status.
Discovery Events This workflow provides a detailed list, in table view form, of discovery events, followed by the host
view.
Active Sessions This workflow provides a list of active sessions collected by user identity sources.
Users This workflow provides a list of user information collected by user identity sources.
Vulnerabilities You can use this workflow to review vulnerabilities in the database, including a table view of only
those active vulnerabilities that apply to the detected hosts on your network.The workflow provides
a vulnerability detail view, which contains a detailed description for every vulnerability that meets
your constraints.
Vulnerabilities by IP Address You can use this workflow to quickly see how many third-party vulnerabilities you have detected
per host IP address on your monitored network.
Vulnerabilities by Source You can use this workflow to quickly see how many third-party vulnerabilities you have detected
per third-party vulnerability source, such as the QualysGuard Scanner.
Allow List Events This workflow contains a table view of allow list events.
Host Violation Count This workflow provides a series of pages that list all the host IP addresses that violate at least one
allow list.
Allow List Violations This workflow includes a table view of allow list violations that lists all violations with the most
recently detected violation at the top of the list. Each row in the table contains a single detected
violation.
Status This workflow contains a table view of remediation status, which includes the name of the policy
that was violated and the name and status of the remediation that was applied.
Audit Log This workflow contains a table view of the audit log that lists audit events.
Health Events This workflow displays events triggered by the health monitoring policy.
Rule Update Import Log This workflow contains a table view listing information about both successful and
failed rule update imports.
Scan Results This workflow contains a table view listing each completed scan.
Using Workflows
Procedure
Step 1 Choose the appropriate menu path and option as described in Workflow Selection, on page 636.
Step 2 Navigate within the current workflow:
• To view all of the columns available in your chosen event data type, use table view pages; see Using
Table View Pages, on page 642.
• To view a subset of the columns available in your chosen event data type, use drill-down pages; see
Using Drill-Down Pages, on page 642.
• To display the corresponding row in the next page of the workflow, click Down-Arrow ( ).
• To move among the pages of a multipage workflow, use the tools at the bottom of each page; see Workflow
Page Traversal Tools, on page 639.
• To view the same constraints applied within a workflow for a different type of event, click Jump to and
choose the event view from the drop-down list.
• Constrain the columns in the display by clicking Close ( ) in the column heading that you want to
hide. In the pop-up window that appears, click Apply
Tip To hide or show other columns, check or clear the appropriate check boxes before you click
Apply. To add a disabled column back to the view, click the expand arrow to expand the
search constraints, then click the column name under Disabled Columns.
• Constrain the data view by selected values for selected fields. For information, see Event View Constraints,
on page 656 and Compound Event View Constraints, on page 657.
• Change the time constraints on the event view. The date range located in the upper right corner of the
page sets a time range for events to include in the workflow; for information, see Event Time Constraints,
on page 650.
Note Events that were generated outside the appliance's configured time window (whether global
or event-specific) may appear in an event view if you constrain the event view by time. This
may occur even if you configured a sliding time window for the appliance.
• To sort data by columns, click the name of a column. To reverse the sort order, click the column name
again. The direction indicates which column the data is sorted by, and whether the sort is Ascending or
Descending.
• Click a workflow page link to display that page using any active constraints. Workflow page links appear
in the upper left corner of predefined workflow table views and drill-down pages, above events and below
the workflow name.
• To view vulnerability details for third-party vulnerabilities, click Vulnerability in any third-party
vulnerability ID column.
• When viewing aggregated data points, hover your pointer over the flag to view the country name.
• When viewing individual data points, click flag to view further geolocation details described in
Geolocation, on page 644.
Administrator Can access any workflow, and are the only users who
can access the audit log, scan results, and the rule
update import log.
Security Analyst and Security Analyst (Read Only) Can access intrusion, malware, file, connection,
discovery, vulnerability, correlation, and health
workflows.
Workflow Selection
The system provides predefined workflows for the types of data listed in the following table.
When you view any of the kinds of data described in the above table, events appear on the first page of the
default workflow for that data. You can specify a different default workflow by configuring your event view
settings. Note that workflow access depends on your user role.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Related Topics
Configuring Event View Settings, on page 192
Workflow Pages
Although the data in each type of workflow is different, all workflows share a common set of features.
Workflows can include several types of pages. The actions you can perform on a workflow page depend on
the type of page.
Drill-down and table view pages in workflows allow you to quickly narrow your view of the data so you can
zero in on events that are significant to your analysis. Table view pages and drill-down pages both support
many features you can use to constrain the set of events you want to view or to navigate the workflow. When
viewing data on drill-down pages or in the table view in a workflow, you can sort the data in ascending or
descending order based on any available column. If the database contains more events than can be displayed
on a single workflow page, you can click the links at the bottom of the page to display more events. When
you click one of these links, the time window automatically pauses so that you do not see the same events
twice; you can unpause the time window when you are ready.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Table Views
Table views include a column for each of the fields in the database on which your workflow is based if the
page is enabled by default.
For best performance, display only the columns you need. The more columns are displayed, the more resources
are required to display the data.
Note that when you disable a column on a table view, the system adds the Count column to the event view if
disabling the column could create two or more identical rows, if no more than 6 columns are displayed
(excluding the Count column).
When you click on a value in a table view page, you constrain by that value.
When you create a custom workflow, you add a table view to it by clicking Add Table View.
Drill-Down Pages
Generally, drill-down pages are intermediate pages that you use to narrow your investigation to a few events
before moving to a table view page. Drill-down pages contain a subset of columns that are available in the
database.
For example, a drill-down page for discovery events might include only the IP Address, MAC Address, and
Time columns. A drill-down page for intrusion events, on the other hand, might include the Priority, Impact
Flag, Inline Result, and Message columns.
Drill-down pages allow you to narrow the scope of events you are viewing and to move forward in the
workflow. If you click on a value in a drill-down page, for example, you constrain by that value and move to
the next page in the workflow, focusing more closely on events that match your selected values. Clicking a
value in a drill-down page does not disable the column where the value is, even if the page you advance to is
a table view. Note that drill-down pages for predefined workflows always have a Count column. When you
create a custom workflow, you add a drill-down page to it by clicking Add Page.
Graphs
Workflows based on connection data can include graph pages, also called connection graphs.
For example, a connection graph might display a line graph that shows the number of connections detected
by the system over time. Generally, connection graphs are, like drill-down pages, intermediate pages that you
use to narrow your investigation.
Final Pages
The final page of a workflow depends on the type of event on which the workflow is based:
• The host view is the final page for workflows based on applications, application details, discovery events,
hosts, indications of compromise (IOC), servers, allow list violations, host attributes, or third-party
vulnerabilities. Viewing host profiles from this page allows you to easily view data on all IP addresses
associated with hosts that have multiple addresses.
• The user detail view is the final page for workflows based on users, user activity, and user indications
of compromise.
• The vulnerability detail view is the final page for workflows based on Cisco vulnerabilities.
• The packet view is the final page for workflows based on intrusion events.
Workflows based on other kinds of events (for example, audit log events or malware events) do not have final
pages.
On the final page of a workflow, you can expand detail sections to view specific information about each object
in the set you focused on over the course of the workflow. Although the web interface does not list the
constraints on the final page of a workflow, previously set constraints are retained and applied to the set of
data.
Clean Clean
Malware Malware
Unknown Unknown
Unavailable Unavailable
Added to Block List (Appears only if you are performing traffic filtering based on
Security Intelligence data.)
Added to Block List, set to monitor (Appears only if you are performing traffic
filtering based on Security Intelligence data.)
Low Low
Medium Medium
High High
User Icons
When a workflow page provides the opportunity to view the user identity associated with a username in a
pop-up window, a user icon appears.
Feature Description
Bookmark This Page Bookmarks the current page so you can return to it later. Bookmarking captures the constraints in
effect on the page you are viewing so you can return to the same data (assuming the data still exists)
at a later time.
Report Designer Opens the report designer with the currently constrained workflow as the selection criteria.
Dashboard Opens a dashboard relevant to your current workflow. For example, Connection Events workflows
link to the Connection Summary dashboard.
View Bookmarks Displays a list of saved bookmarks from which you can select.
Search Displays a Search page where you can perform advanced searches on data in the workflow. You can
also click the down arrow icon to select and use a saved search.
Related Topics
Creating a Report Template from an Event View, on page 501
About Dashboards, on page 315
Event Searches, on page 663
Bookmarks, on page 660
Creating Bookmarks, on page 660
Viewing Bookmarks, on page 660
Step 1 Access a workflow by choosing the appropriate menu path and option as described in Features Using
Workflows.
Step 2 In any workflow, you have the following options:
• To drill down to the next workflow page constraining on a specific value, click a value within a row.
Note that this works only on drill-down pages. Clicking a value within a row in a table view only constrains
the table view and does not drill down to the next page.
• To drill down to the next workflow page constraining on some events, check the check boxes next to the
events you want to view on the next workflow page, then click View.
• To drill down to the next workflow page keeping the current constraints, click View All.
Tip Table views always include “Table View” in the page name.
Procedure
Step 1 Access a workflow by choosing the appropriate menu path and option as described in Workflow Selection,
on page 636.
Step 2 Choose a table view from the workflow path displayed beneath the workflow name.
Step 3 If event data is stored remotely, you may see an option to choose whether to display local or remote data.
See Work in Secure Firewall Management Center with Connection Events Stored on a Secure Network
Analytics Appliance, on page 643.
Step 4 Use the features listed below to arrange and navigate within the table view as needed:
• To display the list of disabled columns, click the Search Constraints Expand Arrow ( ).
• To hide the list of disabled columns, click the Search Constraints Collapse Arrow ( ).
• To add a disabled column back to the event view, click the Search Constraints Expand Arrow ( ) to
expand the search constraints, then click the column name under Disabled Columns.
• To show or hide (disable) a column, click Clear ( ) next to any column name. In the pop-up window
that appears, check or clear the appropriate check boxes to indicate which columns you want to display,
then click Apply.
Important When you change the data source, your selection persists across all of the relevant analytics features that rely
on the event data source, including reports, until you change it, even after you sign out. Your selection does
not apply to other management center users.
The selected data source is used for low-priority connection events only. All other event types (intrusion, file,
and malware events; connection events associated with those events; and Security Intelligence events) are
displayed regardless of data source.
Procedure
Step 1 In the management center web interface, navigate to a page that displays connection event data, such as
Analysis > Connections > Events.
Step 2 Click the data source displayed here and select an option:
Caution If you select Local, the system displays only the data available on the management center, even
if local data is not available for the entire time range selected. You will not be notified that this
situation is occurring.
Step 3 (Optional) To view related data directly in your Secure Network Analytics appliance, right-click (in the unified
event viewer, click) a value such as an IP address or domain and choose a cross-launch option.
Geolocation
You can view and filter traffic based on country and continent by leveraging a geolocation database (GeoDB).
Note that for mobile devices and other hosts detected moving from country to country, the system may report
a continent instead of a specific country.
The system comes with an initial GeoDB country code package that maps IP addresses to countries/continents,
so that information should always be available. If you update the GeoDB, the system also downloads an IP
package with contextual data. This can include:
• Region (state, province, or other country subregion), city, and postal code.
• Latitude/longitude, time zone, and clickable maps.
• Autonomous System Number (ASN) and additional information about the ASN.
• Internet service provider (ISP), connection type, and proxy type.
• Home/business, organization, and domain name information.
To view this information, click the small country flag icons and ISO country codes wherever they appear: in
events, asset profiles, the Context Explorer, dashboard, and other analysis tools. You cannot view geolocation
details for aggregate geolocation information, such as on the Connection Summary dashboard.
Note We issue periodic updates to the GeoDB. You must regularly update the GeoDB to have accurate geolocation
information; see Update the Geolocation Database (GeoDB), on page 214.
Related Topics
Network Conditions
Geolocation
Introduction to Correlation Policies and Rules, on page 931
Traffic Profile Conditions, on page 969
Update the Geolocation Database (GeoDB), on page 214
Tip You cannot graph Security Intelligence events separately from their associated connection events. For a
graphical overview of Security Intelligence filtering activity, use dashboards and the Context Explorer.
Note The system displays traffic profiles as line graphs, which you can manipulate in the same way as you would
any other connection graph, with some restrictions. To view traffic profiles, you must have Administrator
access.
Like workflow tables, you can drill down and constrain workflow graphs to focus your analysis.
Both bar graphs and line graphs can display multiple datasets; that is, they can display several values on the
y-axis for each x-axis data point. For example, you could display the total number of unique initiators and
responders. Pie charts can only display one dataset.
You can display different data and datasets on a connection graph by changing either the x-axis, the y-axis,
or both. On a pie chart, changing the x-axis changes the independent variable and changing the y-axis changes
the dependent variable.
Related Topics
Connection Summaries (Aggregated Data for Graphs), on page 708
Procedure
• Field Names — To learn more about the data you can graph, see Connection and Security-Related
Connection Event Fields, on page 709.
• Host Profile — To view the host profile for an IP address, on a graph displaying connection data by
initiator or responder, click either a bar on a bar graph or a wedge on a pie chart and choose View Host
Profile.
• User Profile — To view user profile information, on a graph displaying connection data by initiator user,
click either a bar on a bar graph or a wedge on a pie chart and choose View User Profile.
• Other Information — To learn more information about the graphed data, position your cursor over a
point on a line graph, a bar in a bar graph, or a wedge in a pie chart.
• Constrain — To constrain a connection graph by any x-axis (independent variable) criterion without
advancing the workflow to the next page, click a point on a line graph, a bar on a bar graph, or a wedge
on a pie chart, and choose a View by... option.
• Data Selection — To change the data displayed on the graph, click X-Axis or Y-Axis and choose the
new data to graph. Note that changing the x-axis to or from Time also changes the graph type; changing
the y-axis affects the displayed datasets.
• Datasets — To change the graph’s dataset, click Datasets and choose a new dataset.
• Detach — To detach a connection graph so you can perform further analysis without affecting the default
time range, click Detach.
Tip Click New Window in a detached graph to create a copy. You can then perform different
analyses on each of the detached graphs. Note that traffic profiles are detached graphs.
• Drill Down — To drill down to the next page in the workflow, click a point on a line graph, a bar on a
bar graph, or a wedge on a pie chart, then choose Drill-down. Clicking a point on a line graph changes
the time range on the next page to a 10-minute span, centered on the point you clicked. Clicking a bar
on a bar graph or a wedge on a pie chart constrains the next page based on the criterion represented by
the bar or wedge.
• Export — To export the connection data for a graph as a CSV (comma-separated values) file, Export
Data. Then, click Download CSV File and save the file.
• Graph Type: Line — To switch between a standard and velocity (rate of change) line graph, click Velocity,
then choose Standard or Velocity.
• Graph Type: Bar and Pie — To switch between a bar graph and pie chart, click Switch to Bar or Switch
to Pie. Because you cannot display multiple datasets on a pie char, if you switch to a pie chart from a
bar graph that has multiple datasets, the pie chart shows only one dataset, which is selected automatically.
When choosing which dataset to display, the management center favors total statistics over initiator and
responder statistics, and favors initiator statistics over responder statistics.
• Navigate Between Pages — To navigate between pages in the current workflow, keeping the current
constraints, click the appropriate page link at the top left of the workflow page.
• Navigate Between Event Views — To navigate to other event views to view associated events, click
Jump to and choose the event view from the drop-down list.
• Recenter — To recenter a line graph around a point in time without changing the length of the time range,
click that point, then choose Recenter.
• Zoom -— To recenter a line graph around a point in time while zooming in or out, click that point, choose
Zoom, then choose a new time span.
Note Unless you are working with a detached graph, constraining, recentering, and zooming changes
the default time range for the management center.
Related Topics
Using Workflows, on page 634
Configuring Event View Settings, on page 192
Source Device bar or pie by the 10 most active NetFlow data exporters, plus a source device
named Firepower for all connections detected by Firepower System
managed devices.
Note You cannot display multiple datasets on a pie chart. If you switch to a pie chart from a bar graph that has
multiple datasets, the pie chart shows only one dataset, which is selected automatically. When selecting which
dataset to display, the management center favors total statistics over initiator and responder statistics, and
favors initiator statistics over responder statistics.
On line graphs, multiple datasets appear as multiple lines, each with a different color. For example, the
following graphic displays the total number of unique initiators and the total number of unique responders
detected on a monitored network over a one hour interval.
On bar graphs, multiple datasets appear as a set of colored bars for each x-axis data point. For example, the
following bar graph displays the total packets transmitted on a monitored network, packets transmitted by
initiators, and packets transmitted by responders.
Connections the default only, which is the number of connections detected on the monitored
network (Connections). This is the only option for traffic profile graphs.
KBytes Per Second the default only, which is the total kilobytes per second transmitted on the
monitored network (Total KBytes Per Second)
Unique Application the default only, which is the number of unique application protocols on the
Protocols monitored network (Unique Application Protocols)
Unique Users the default only, which is the number of unique users logged into session initiators
on the monitored network (Unique Initiator Users)
Regardless of the default time window setting, you can manually change the time window during your event
analysis by clicking the time range at the top of the page, which displays the Date/Time pop-up window.
Depending on the number of time windows you configured and the type of appliance you are using, you can
also use the Date/Time window to change the default time window for the type of event you are viewing.
Finally, you can pause the time window while looking at a sliding or expanding workflow. See Pause the
Time Window to Temporarily Freeze the Data Set, on page 653.
Related Topics
Configuring Event View Settings, on page 192
Using Connection and Security-Related Connection Event Tables, on page 733
Note Manual time window settings are valid for only the current session. When you log out and then log back in,
time windows are reset to the default.
Depending on the number of time windows you configured, changing the time window for one workflow may
affect other workflows on the appliance. For example, if you have a single, global time window, changing
the time window for one workflow changes it for all other workflows on the appliance. On the other hand, if
you are using multiple time windows, changing the audit log or health event workflow time windows has no
effect on any other time window, while changing the time window for other kinds of events affects all events
that can be constrained by time (with the exception of audit events and health events).
Note that because not all workflows can be constrained by time, time window settings have no effect on
workflows based on hosts, host attributes, applications, application details, vulnerabilities, users, or allow list
violations.
Use the Time Window tab on the Date/Time window to manually configure a time window. Depending on
the number of time windows you configured in your default time window settings, the tab’s title is one of the
following:
• Events Time Window, if you configured multiple time windows and are setting the time window for a
workflow other than the audit log or health events workflow
• Health Monitoring Time Window, if you configured multiple time windows and are setting the time
window for the health events workflow
• Audit Log Time Window, if you configured multiple time windows and are setting the time window
for the audit log
• Global Time Window, if you configured a single time window
The first decision you must make when configuring a time window is the type of time window you want to
use:
• A static time window displays all the events generated from a specific start time to a specific end time.
• An expanding time window displays all the events generated from a specific start time to the present; as
time moves forward, the time window expands and new events are added to the event view.
• A sliding time window displays all the events generated from a specific start time (for example, one
week ago) to the present; when you refresh the page, the time window “slides” so that you see only the
events in the time range you configured (in this example, for the last week). To temporarily prevent the
data set from updating while you are examining it, see Pause the Time Window to Temporarily Freeze
the Data Set, on page 653.
Depending on what type you select, the Date/Time window changes to give you different configuration options.
Note The system uses a 24-hour clock based on the time you specified in your time zone preferences.
time window type drop-down n/a Select the type of time window you want to use: static, expanding, or sliding.
list
Note that events that were generated outside the appliance's configured time
window (whether global or event-specific) may appear in an event view if
you constrain the event view by time. This may occur even if you configured
a sliding time window for the appliance.
Start Time calendar static and expanding Specify a start date and time for your time window. The maximum time
range for all time windows is from midnight on January 1, 1970 (UTC) to
3:14:07 AM on January 19, 2038 (UTC).
Instead of using the calendar, you can use the Presets options, described
below.
End Time calendar static Specify an end date and time for your time window. The maximum time
range for all time windows is from midnight on January 1, 1970 (UTC) to
3:14:07 AM on January 19, 2038 (UTC).
Note that if you are using an expanding time window, the End Time calendar
is grayed out and specifies that the end time is “Now.”
Instead of using the calendar, you can use the Presets options, described
below.
Show the Last field and sliding Configure the length of the sliding time window.
drop-down list
Presets: Last all Click one of the time ranges in the list to change the time window, based
on the local time of the appliance. For example, clicking 1 week changes
the time window to reflect the last week. Clicking a preset changes the
calendars to reflect the preset you choose.
Presets: Current static and expanding Click one of the time ranges in the list to change the time window, based
on the local time and date of the appliance. Clicking a preset changes the
calendars to reflect the preset you choose.
Note that:
• the current day begins at midnight
• the current week begins at midnight Sunday
• the current month begins at midnight on the first of the month
Presets: Synchronize with all (not available if you Click one of:
are using a global time
• Events Time Window to synchronize the current time window with
window)
the events time window
• Health Monitoring Time Window to synchronize the current time
window with the health monitoring time window
• Audit Log Time Window to synchronize the current time window
with the audit log time window
Procedure
Step 1 On a workflow constrained by time, click Time Range ( ) to go to the Date/Time window.
Step 2 On Events Time Window, set the time window as described in Time Window Settings, on page 652.
Tip Click Reset to change the time window back to the default settings.
Procedure
Preference Description
Refresh Interval Sets the refresh interval for event views, in minutes. Entering zero disables the refresh option.
Number of Time Windows Specify how many time windows you want to use:
• Select Multiple to configure separate default time windows for the audit log, for health events,
and for workflows based on events that can be constrained by time.
• Select Single to use a global time window that applies to all events.
Default Time Window: Show This setting allows you to configure a sliding default time window of the length you specify.
the Last - Sliding
The appliance displays all the events generated from a specific start time (for example, 1 hour ago)
to the present. As you change event views, the time window “slides” so that you always see events
from the last hour.
Preference Description
Default Time Window: Show This setting allows you to configure either a static or expanding default time window of the length
the Last - Static/Expanding you specify.
For static time windows (enable the Use End Time check box), the appliance displays all the events
generated from a specific start time (for example, 1 hour ago), to the time when you first viewed the
events. As you change event views, the time window stays fixed so that you see only the events that
occurred during the static time window.
For expanding time windows (disable the Use End Time check box), the appliance displays all the
events generated from a specific start time (for example, 1 hour ago), to the present. As you change
event views, the time window expands to the present time.
Default Time Window: This setting allows you to configure either a static or expanding default time window for the current
Current Day - day. The current day begins at midnight, based on the time zone setting for your current session.
Static/Expanding
For static time windows (enable the Use End Time check box), the appliance displays all the events
generated from midnight to the time when you first viewed the events. As you change event views,
the time window stays fixed so that you see only the events that occurred during the static time
window.
For expanding time windows (disable the Use End Time check box), the appliance displays all the
events generated from midnight to the present. As you change event views, the time window expands
to the present time. Note that if your analysis continues for over 24 hours before you log out, this
time window can be more than 24 hours.
Default Time Window: This setting allows you to configure either a static or expanding default time window for the current
Current Week - week. The current week begins at midnight on the previous Sunday, based on the time zone setting
Static/Expanding for your current session.
For static time windows (enable the Use End Time check box), the appliance displays all the events
generated from midnight to the time when you first viewed the events. As you change event views,
the time window stays fixed so that you see only the events that occurred during the static time
window.
For expanding time windows (disable the Use End Time check box), the appliance displays all the
events generated from midnight Sunday to the present. As you change event views, the time window
expands to the present time. Note that if your analysis continues for over 1 week before you log out,
this time window can be more than 1 week.
Procedure
Step 1 On a workflow constrained by time, click Time Range ( ) to go to the Date/Time window.
Step 2 Click Preferences and change your preferences, as described in Default Time Window Options for Event
Types, on page 654.
Step 3 Click Save Preferences.
Step 4 You have two options:
• To apply your new default time window settings to the event view you are using, click Apply to close
the Date/Time window and refresh the event view.
• To continue with your analysis without applying the default time window settings, close the Date/Time
window without clicking Apply.
Note If you select a row with multiple non-count values and click View, you create a compound constraint.
There is a third method for constraining data in a workflow. To constrain the page to the rows with values
that you selected and also add the selected value to the list of constraints at the top of the page, click a value
within a row on the page. For example, if you are viewing a list of logged connections and want to constrain
the list to only those you allowed using access control, click Allow in the Action column. As another example,
if you are viewing intrusion events and want to constrain the list to only events where the destination port is
80, click 80 (http)/tcp in the Destination Port/ICMP Code column.
Tip The procedure for constraining connection events based on Monitor rule criteria is slightly different and you
may need to take some extra steps. Additionally, you cannot constrain connection events by associated file
or intrusion information.
You can also use searches to constrain the information in a workflow. Use this feature when you want to
constrain against multiple values in a single column. For example, if you want to view the events related to
two IP addresses, click Edit Search, then modify the appropriate IP address field on the Search page to include
both addresses, and then click Search.
The search criteria you enter on the search page are listed as the constraints at the top of the page, with the
resulting events constrained accordingly. On the management center, the current constraints are also applied
when navigating to other workflows, unless they are compound constraints.
When searching, you must pay careful attention to whether your search constraints apply to the table you are
searching. For example, client data is not available in connection summaries. If you search for connection
events based on the detected client in the connection and then view the results in a connection summary event
view, the management center displays connection data as if you had not constrained it at all. Invalid constraints
are labeled as not applicable (N/A) and are marked with a strikethrough.
Constraining Events
Procedure
Step 1 Access a workflow by choosing the appropriate menu path and option as described in Workflow Selection,
on page 636.
Step 2 In any workflow, you have the following options:
• To constrain the view to events that match a single value, click the desired value within a row on the
page.
• To constrain the view to events that match multiple values, check the check boxes for events with those
values, and click View.
Note A compound constraint is added if the row contains multiple non-count values.
• To remove a constraint, click the Search Constraints Expand Arrow ( ) and click the name of the
constraint in the expanded Search Constraints list.
• To edit constraints using the Search page, click Edit Search.
• To save constraints as a saved search, click Save Search and give the query a name.
Note You cannot save queries containing compound constraints.
• To use the same constraints with another event view, click Jump to and choose the event view.
Note You do not retain compound constraints when you switch to another workflow.
• To toggle the display of constraints click the Search Constraints Expand Arrow ( ) or the Search
Constraints Collapse Arrow ( ). This is useful when the list of constraints is large and takes up most
of the screen.
When you combine compound constraints with simple constraints, the simple constraints are distributed across
each set of compound constraints. If, for example, you added a simple constraint for a protocol value of tcp
to the compound constraints listed above, you retrieve all of the following:
• Events that have a source IP address of 10.10.31.17 AND a destination IP address of 10.10.31.15 AND
a protocol of tcp
OR
• Events that have a source IP address of 172.10.31.17 AND a destination IP address of 172.10.31.15 AND
a protocol of tcp
You cannot perform a search or save a search on a compound constraint. You also cannot retain compound
constraints when you use the event view links or click (switch workflow) to switch to another workflow. If
you bookmark an event view with compound constraints applied, the constraints are not saved with the
bookmark.
Procedure
Step 1 Access a workflow by choosing the appropriate menu path and option as described in Workflow Selection,
on page 636.
Step 2 To manage compound constraints, you have the following options:
• To create a compound constraint, choose one or more rows with multiple non-count values and click
View.
• To clear compound constraints, click the Search Constraints Expand Arrow ( ) and click Compound
Constraints.
Inter-Workflow Navigation
You can navigate to other workflows using the links in the Jump to... drop-down list on a workflow page.
Select the drop-down list to view and select additional workflows.
When you select a new workflow, properties shared by the rows you select and the constraints you set are
used in the new workflow, if they are applicable. If configured constraints or event properties do not map to
fields in the new workflow, they are dropped. In addition, compound constraints are not retained when you
switch from one workflow to another. In addition, constraints from the captured files workflow only transfer
to file and malware event workflows.
Note When you view event counts over a time range, the total number of events may not reflect the number of
events for which more detailed data is available. This occurs because the system sometimes prunes older event
details to manage disk space usage. To minimize the occurrence of event detail pruning, you can fine-tune
event logging to log only those events most important to your deployment.
Note that unless you have either paused the time window or have configured a static time window, the time
window changes when you change workflows.
This feature enhances your ability to investigate suspicious activity. For example, if you are viewing connection
data and notice that an internal host is transmitting an abnormally large amount of data to an external site,
you can select the responder IP address and the port as constraints and then jump to the Applications workflow.
The applications workflow will use the responder IP address and port as IP Address and Port constraints and
display additional information about the application, such as what kind of application it is. You can also click
Hosts at the top of the page to view the host profile for the remote host.
After finding more information about the application, you can select Correlation Events to return to the
connection data workflow, remove the Responder IP from the constraints, add the Initiator IP to constraints,
and select Application Details to see what client the user on the initiating host used when transferring data
to the remote host. Note that the Port constraint is not transferred to the Application Details page. While
keeping the local host as a constraint, you can also use other navigation buttons to find additional information:
• To discover if any policies have been violated by the local host, keep the IP address as a constraint and
select Correlation Events from the Jump to drop-down list.
• To find out if an intrusion rule triggered against the host, indicating a compromise, select Intrusion
Events from the Jump to drop-down list.
• To view the host profile for the local host and determine if the host is susceptible to any vulnerabilities
that may have been exploited, select Hosts from the Jump to drop-down list.
Procedure
Bookmarks
Create a bookmark if you want to return quickly to a specific location and time in an event analysis. Bookmarks
retain information about:
• the workflow you are using
• the part of the workflow you are viewing
• the page number within the workflow
• any search constraints
• any disabled columns
• the time range you are using
The bookmarks you create are available to all user accounts with bookmark access. This means that if you
uncover a set of events that require more in-depth analysis, you can easily create a bookmark and turn over
the investigation to another user with the appropriate privileges.
Note If the events that appear in a bookmark are deleted (either directly by a user or by automatic database cleanup),
the bookmark no longer displays the original set of events.
Creating Bookmarks
In a multidomain deployment, you can only view bookmarks created in the current domain.
Procedure
Step 1 During an event analysis, with the events of interest displayed, click Bookmark This Page.
Step 2 In the Bookmark Name field, enter a name.
Step 3 Click Save Bookmark.
Viewing Bookmarks
In a multidomain deployment, you can only view bookmarks created in the current domain.
Procedure
• Click on click View Bookmarks and on the View Bookmarks page, click on the desired bookmark name
or View ( ) next to it.
Note If the events that originally appeared in a bookmark are deleted (either directly by a user or
by automatic database cleanup), the bookmark no longer displays the original set of events.
IPS Events Datastore 7.1 The intrusion incidents and event clipboard pages are deprecated.
Replacement
Deprecated pages:
• Analysis > Intrusions > Clipboard
• Analysis > Intrusions > Incidents
Unified event viewer 7.0 View and work in a single table with multiple event types: Connection (including Security Intelligence)
intrusion, file, and malware.
New/Modified pages: New page under Analysis > Unified Events.
Supported platforms: management center
Work with events stored 7.0 You can work in management center with connection events stored on a Secure Network Analytics
remotely appliance. The system automatically uses the most appropriate data source, or you can explicitly choos
the source. This option appears only if you have completed the Security Analytics and Logging (On
Premises) wizard.
New/Modified pages: Any of the following that display connection events: Workflow tables under th
Analysis menu; dashboard, context explorer, and reports.
Supported platforms: management center
Improved loading speed of 6.6 Tables on workflow pages now show a Count column for rows that are identical only when no more
workflow tables in certain than six columns are displayed. This minimizes the amount of calculation required and thus improve
cases table loading speed.
New/Modified pages: All pages under the Analysis menu that display workflow tables.
Supported platforms: management center
Event Searches
The system generates information that is stored as events in database tables. Events contain multiple fields
that describe the activity that caused the appliance to generate the event. You can create and save searches
customized for your environment for any of the different event types and save them to reuse later.
When you save a search you give it a name and specify whether the search will be available to you alone or
to all users of the appliance. If you want to use the search as a data restriction for a custom user role, you
must save it as a private search. If you previously saved a search, you can load it, make any necessary
modifications, and then start the search. Custom analysis dashboard widgets, report templates, and custom
roles can also use saved searches. If you have saved searches, you can delete them from the Search page.
For some event types, the system provides predefined searches that serve as examples and can provide quick
access to important information about your network. You can modify fields within the predefined searches
for your network environment, then save the searches to reuse later.
The search criteria you can use depends on the type of search, but the mechanics are the same. Searches return
only records that match the search criteria specified for all fields.
Related Topics
Searching Custom Tables, on page 685
Search Constraints
Each database table has its own search page where you can enter search constraint values to apply to fields
defined for the table. Depending on the type of field, special syntax may be used to specify criteria such as
wildcard characters or a range of numeric values.
Search results appear on workflow pages displaying each table field in columnar layout. Some database tables
can additionally be searched using fields that are not displayed as columns on workflow pages. To determine
whether such a constraint applies to your search results when viewing the results on a workflow page, click
Expand Arrow ( ) to view the active search constraints.
• Specify n/a in any field to identify events where information is not available for that field; use !n/a to
identify the events where that field is populated.
• You can precede many numeric fields with greater than (>), greater than or equal to (>=), less than (<),
less than or equal to (<=), equal to (=), or not equal to (<>) operators.
Tip When searching a field with long complicated values (such as SHA-256 hash values), you can copy the search
criteria value from source material and paste it into the appropriate field on the search page.
If you want to search for non-alphanumeric characters (including the asterisk character), enclose the search
string in quotation marks. For example, to search for the string:
enter:
today at 12:45pm
You can precede a time value with one of the following operators:
< < 2006-03-22 Returns events with a timestamp before 2:23 PM, March 22,
14:22:59 2006.
> > today at Returns events with a timestamp later than today at 2:45 PM.
2:45pm
IP Addresses in Searches
When specifying IP addresses in searches, you can enter an individual IP address, a comma-separated list of
addresses, an address block, or a range of IP addresses separated with a hyphen (-). You can also use negation.
For searches that support IPv6 (such as intrusion event, connection data, and correlation event searches) you
can enter IPv4 and IPv6 addresses and CIDR/prefix length address blocks in any combination. When you
search for hosts by IP address, the results include all hosts for which at least one IP address matches your
search conditions, that is, a search for an IPv6 address may return hosts whose primary address in IPv4.
When you use CIDR or prefix length notation to specify a block of IP addresses, the system uses only the
portion of the network IP address specified by the mask or prefix length. For example, if you type 10.1.2.3/8,
the system uses 10.0.0.0/8.
Because IP addresses can be represented by network objects, you can also click the add network Object ( )
that appears next to an IP address search field to use a network object as an IP address search criterion.
2001:db8::abcd
a range of IP addresses that can be the IP address block in IPv4 CIDR or 192.168.1.0/24
specified with a CIDR block or prefix IPv6 prefix length notation.
This specifies any IP in the 192.168.1.0 network
length
with a subnet mask of 255.255.255.0, that is,
192.168.1.0 through 192.168.1.255.
a range of IP addresses that cannot be the IP address range using a hyphen. Do 192.168.1.1-192.168.1.5
specified with a CIDR block or prefix not add a space before or after the
2001:db8::0202-2001:db8::8329
hyphen.
negation of any of the other ways to an exclamation point in front of the IP 192.168.0.0/32,!192.168.1.10
specify IP addresses or ranges of IP address, block, or range.
!2001:db8::/32
addresses
!192.168.1.10,!2001:db8::/32
hosts that are blocked or monitored (but In connection and Security Intelligence --
would have been blocked) events, in Initiator IP and Responder IP
fields:
See Host Profile Icons, on page 640.
• block
• monitor
Related Topics
IP Address Conventions, on page 26
URLs in Searches
When searching for URLs, include wildcards. For example, use *example.com* to find all variations of
the domain, such as https://example.com and division.example.com and
example.com/division/.
Ports in Searches
The system accepts specific syntax for port numbers in searches. You can enter:
• a single port number
• a comma-separated list of port numbers
• two port numbers separated by a dash to represent a range of port numbers
• a port number followed by a protocol abbreviation, separated by a forward slash (only when searching
for intrusion events)
• a port number or range of port numbers preceded by an exclamation mark to indicate a negation of the
specified ports
Example Description
21 Returns all events on port 21, including TCP and UDP events.
Performing a Search
You must have Admin or Security Analyst privileges to perform a search.
Procedure
Step 2 From the table drop-down list, select the type of event or data to search.
Step 3 Enter your search criteria in the appropriate fields. See the following sections for detailed information on the
search criteria you can use:
• Search Constraints, on page 663
• Audit Log Workflow Fields, on page 384
• Application Data Fields, on page 878
• Application Detail Data Fields, on page 880
Step 4 If you want to use the search again in the future, save the search as described in Saving a Search, on page 669.
Step 5 Click Search to start the search. Your search results appear in the default workflow for the table you are
searching, constrained by time (if applicable).
What to do next
• To analyze the search results using workflows, see Using Workflows, on page 634.
Related Topics
Configuring Event View Settings, on page 192
Saving a Search
You must have Admin or Security Analyst privileges to save a search.
In a multidomain deployment, the system displays saved searches created in the current domain, which you
can edit. It also displays searches saved in ancestor domains, which you cannot edit. To view and edit searches
created in a lower domain, switch to that domain.
Procedure
Step 1 From the Search page, if you want to save the search as private so only you can access it, check the Private
checkbox.
Tip If you want to use the search as a data restriction for a custom user role, you must save it as a
private search.
Procedure
Step 2 From the table drop-down list, choose the type of event or data to search.
Step 3 Choose the search you want to load from the Custom Searches list or the Predefined Searches list.
Step 4 If you want to use different search criteria, change the search constraints.
Step 5 If you want to use a changed search again in the future, save the search as described in Saving a Search, on
page 669.
Step 6 Click Search.
Note Leaving the search page in the web interface does not stop a query. Queries that take a long time to return
results impact overall system performance while the query is running.
Option Description
-l, --list [minutes] Lists all queries taking longer than passed-in minutes. By default
it will show all queries taking longer than 1 minute.
-k, --kill query_id [...] Kills the query with the passed-in id. The option can take multiple
ids.
--kill-all minutes Kills all queries taking longer than passed-in minutes.
Caution For system security reasons, Cisco strongly recommends that you not establish additional Linux shell users
on any appliance.
Procedure
Partial-match searches in 6.6 For example, when searching for URLs, use *example.com* to find all variations of example.com.
many fields now require
This behavior change applies to searches on the Analysis > Search page, when searching for connection
wildcards
or Security Intelligence events. This search page can also be accessed via links on other pages.
In fields that do not require wildcards for partial-match searches, they can optionally be used.
Affected Platforms: management center
Tip You can set a custom workflow as the default workflow for any event type.
Events by Priority and This workflow lists events and their type in order of event priority, along with a count showing how
Classification many times each event has occurred.
This workflow is based on the Intrusion Events custom table.
Hosts with Servers Default You can use this workflow to quickly view the basic information in the Hosts with Servers custom
Workflow table.
This workflow is based on the Hosts with Servers custom table.
Server and Host Details You can use this workflow to determine what servers are most frequently used on your network and
which hosts are running those servers.
This workflow is based on the Hosts with Servers custom table.
Tip Instead of creating a new custom workflow, you can export a custom workflow from another appliance and
then import it onto your appliance. You can then edit the imported workflow to suit your needs.
You can add table view pages in any position in the sequence of workflow pages. They do not have any
editable properties, such as a page name, sort order, or user-definable column positions.
Note You must add at least one drill-down page or a table view of events to a custom workflow.
Note If you selected Vulnerabilities as the table type, then add IP Address as a table column, the IP Address
column does not appear when you are viewing vulnerabilities using your custom workflow, unless you use
the search feature to constrain the workflow to view a specific IP address or block of addresses.
The final page of a custom workflow depends on the table on which you base the workflow, as described in
the following table. These final pages are added by default when you create the workflow.
Users Users
The system does not add a final page to custom workflows based on other kinds of events (for example, audit
log or malware events).
Custom workflows based on connection data are like other custom workflows, except you can include drill-down
pages containing connection summary data, and connection data graph pages as well as drill-down pages
containing data for individual connections and table view pages.
Procedure
For example, to create a page showing the destination ports that are targeted, and to sort the page by count,
choose 2 from the Sort Priority drop-down list and Destination Port/ICMP Code from the Field drop-down
list.
Step 9 Continue choosing fields to include and setting their sort priority until you have specified all the fields you
want to appear on the page.
Step 10 If you want to add a table view page to the workflow, click Add Table View.
Step 11 Click Save.
Procedure
Step 7 Enter a name for the page in the Page Name field.
Step 8 Under Column 1, choose a sort priority and a table column. This column will appear in the leftmost column
of the page.
Step 9 Continue choosing fields to include and setting their sort priority until you have specified all the fields you
want to appear on the page.
Example:
For example, to create a page showing the amount of traffic transmitted over your monitored network and to
sort the page by the responders that transmitted the most traffic, choose 1 from the Sort Priority drop-down
list and Responder Bytes from the Field drop-down list.
Step 10 If you want to add one or more graph pages to the workflow, click Add Graph.
Step 11 Enter a name for the page in the Graph Name field.
Step 12 Choose the type of graph you want to include on the page:
Step 13 Specify what kind of data you want to graph by choosing the x- and y-axes of the graph.
On a pie chart, the x-axis represents the independent variable and the y-axis represents the dependent variable.
Step 15 If you want to add a table view of connection data, click Add Table View.
Table views are not configurable.
Tip You can set a custom workflow as the default workflow for any event type.
Procedure
Step 1 Choose the appropriate menu path and option for the table on which you based your custom workflow, as
described in the Workflow Selection, on page 636.
Step 2 To use a different workflow, including a custom workflow, click (switch workflow) next to the current
workflow title.
Step 3 If no events appear and the workflow can be constrained by time, you may need to adjust the time range; see
Event Time Constraints, on page 650.
Procedure
Procedure
Table Description
Hosts with Servers Includes fields from the Hosts and Servers tables, providing you with
information about the detected applications running on your network, as
well as basic operating system information about the hosts running those
applications.
Hosts • Applications
• Correlation Events
• Intrusion Events
• Connection Summary Data
• Host Attributes
• Application Details
• Discovery Events
• Servers
• Allow List Events
Servers • Applications
• Intrusion Events
• Connection Summary Data
• Host Attributes
• Hosts
Sometimes a field in one table maps to more than one field in another table.
When you create a new custom table, a default workflow that displays all the columns in the table is
automatically created. Also, just as with predefined tables, you can search custom tables for data that you
want to use in your network analysis. You can also generate reports based on custom tables, as you can with
predefined tables.
Tip Instead of creating a new custom table, you can export a custom table from another management center, then
import it onto your management center.
To create a custom table, decide which predefined tables contain the fields you want to include in your custom
table. You can then choose which fields you want to include and, if necessary, configure field mappings for
any common fields.
Tip Data involving the Hosts table allows you to view data associated with all IP addresses from one host, rather
than one specific IP address.
For example, consider a custom table that combines fields from the Correlation Events table and the Hosts
table. You can use this custom table to get detailed information about the hosts involved in violations of any
of your correlation policies. Note that you must decide whether to display data from the Hosts table that
matches the source IP address or the destination IP address in the Correlation Events table.
If you view the table view of events for this custom table, it displays correlation events, one per row. You can
configure the custom table to include the following information:
• the date and time the event was generated
• the name of the correlation policy that was violated
• the name of the rule that triggered the violation
• the IP address associated with the source, or initiating, host involved in the correlation event
• the source host’s NetBIOS name
• the operating system and version the source host is running
• the source host criticality
Tip You could create a similar custom table that displays the same information for destination, or responding,
hosts.
Example:
For example, you might enter Correlation Events with Host Information (Src IP).
Step 4 From the Tables drop-down list, choose Correlation Events.
Step 5 Under Fields, chooseTime and click Add to add the date and time when a correlation event was generated.
Step 6 Repeat step 5 to add the Policy and Rule fields.
Tip You can use Ctrl or Shift while clicking to choose multiple fields. You can also click and drag
to choose multiple adjacent values. However, if you want to specify the order the fields appear
in the table view of events associated with the table, add the fields one at a time.
Procedure
Step 3 Optionally, remove fields from the table by clicking Delete ( ) next to the fields you want to remove.
Note If you delete fields currently in use in reports, the system will prompt you to confirm that you
want to remove the sections using those fields from those reports.
Procedure
Step 2 Click Delete ( ) next to the custom table you want to delete.
If the controls are dimmed, the configuration belongs to an ancestor domain, or you do not have permission
to modify the configuration.
Tip If you create a custom workflow based on a custom table, you can specify it as the default workflow for that
table.
You can use the same techniques to view events in your custom table that you use for event views based on
predefined tables.
In a multidomain deployment, the system displays custom tables created in the current domain, which you
can edit. It also displays custom tables created in ancestor domains, which you cannot edit. To view and edit
custom tables in a lower domain, switch to that domain.
Procedure
Procedure
Step 5 Optionally, if you plan to save the search, you can check the Private check box to save the search as private
so only you can access it. Otherwise, leave the check box clear to save the search for all users.
Tip If you want to use the search as a data restriction for a custom user role, you must save it as a
private search.
Step 6 Optionally, you can save the search to be used again in the future. You have the following options:
• Click Save to save the search criteria. The search is visible only to your account if you checked the
Private check box.
• Click Save As New to save a new search or assign a name to a search you created by altering a
previously-saved search. The search is saved and visible only to your account if you checked the Private
check box.
Support for connection 6.6 You can no longer create custom tables that include connection events.
events in custom tables was
If you upgraded to version 6.6: Existing tables with connection events will be listed as deprecated an
removed
will show no data, and you cannot export or edit them. Existing reports, custom workflows, and
dashboards may include deprecated tables; you may want to review these.
Modified screens: Analysis > Advanced > Custom Tables and the page for adding or editing custom
tables.
Affected Platforms: management center
Log connections according to the security and compliance needs of your organization. When setting up
connection logging, keep in mind that the system can log a connection for multiple reasons, and that disabling
logging in one place does not mean that matching connections will not be logged.
The information in a connection event depends on several factors, including traffic characteristics, the
configuration that ultimately handled the connection, and so on.
Note You can supplement the connection logs gathered by your managed devices with connection data generated
from exported NetFlow records. This is especially useful if you have NetFlow-enabled routers or other devices
deployed on networks that your managed devices cannot monitor.
Note File events generated by inspecting NetBIOS-SSN (SMB) traffic do not immediately generate connection
events because the client and server establish a persistent connection. The system generates connection events
after the client or server ends the session.
Monitored Connections
The system always logs the ends of connections for monitored traffic, even if the traffic matches no other
rules and you do not enable default action logging. For more information, see Logging for Monitored
Connections, on page 694.
You can also log connections handled by policy default actions. Depending on the rule or default action (and
for access control, a rule's inspection configuration), your logging options differ.
Fastpathed traffic bypasses the rest of access control and QoS, so connection events for fastpathed connections
contain limited information.
The system does not generate a separate event each time a single connection matches a Monitor rule. Because
a single connection can match multiple Monitor rules, each connection event can include and display information
on the first eight Monitor access control rules that the connection matches, as well as the first matching SSL
Monitor rule.
Similarly, if you send connection events to an external syslog or SNMP trap server, the system does not send
a separate alert each time a single connection matches a Monitor rule. Rather, the alert that the system sends
at the end of the connection contains information on the Monitor rules the connection matched.
Note Although you can log trusted connections, we recommend you do not do so because trusted connections are
not subject to deep inspection or discovery, so connection events for trusted connections contain limited
information.
TCP connections detected by a Trust rule on the first packet generate only an end-of-connection event. The
system generates the event one hour after the final session packet.
• Prefilter rules—Block
• Prefilter default action—Block all tunnel traffic
• Security Intelligence—Block lists not set to Monitor (also generates a Security Intelligence event)
• Decryption rules—Block and Block with reset
• SSL default action—Block and Block with reset
• Access control rules—Block, Block with reset, and Interactive Block
• Access control default action—Block All Traffic
Only devices deployed inline (that is, using routed, switched, or transparent interfaces, or inline interface
pairs) can block traffic. Because blocked connections are not actually blocked in passive deployments, the
system may report multiple beginning-of-connection events for each blocked connection.
Caution Logging blocked TCP connections during a Denial of Service (DoS) attack can affect system performance
and overwhelm the database with multiple similar events. Before you enable logging for an Block rule, consider
whether the rule monitors traffic on an Internet-facing interface or other interface vulnerable to DoS attack.
Enabling logging for these configurations ensures the connection is logged, while also permitting (or specifying)
the next phase of inspection and traffic handling. SSL logging is always end-of-connection; access control
configurations also allow beginning-of-connection logging.
Although the Analyze action in tunnel and prefilter rules also allows connections to continue with access
control, logging is disabled for rules with this action. Matching connections may still be logged by other
configurations. Allowed tunnels might have their encapsulated sessions evaluated and logged individually.
When you allow traffic with an access control rule or default action, you can use an associated intrusion policy
to further inspect traffic and block intrusions. For access control rules, you can also use a file policy to detect
and block prohibited files, incuding malware. Unless you disable connection event storage, the system
automatically logs most allowed connections associated with intrusion, file, and malware events. For detailed
information, see Connections That Are Always Logged, on page 692.
Connections with encrypted payloads are not subject to deep inspection, so connection events for encrypted
connections contain limited information.
You can disable this logging on a per-access-control-rule basis. You can also disable file and malware event
storage entirely.
Note We recommend you leave file and malware event logging enabled.
To optimize performance, log either the beginning or the end of any connection, but not both. Monitoring a
connection for any reason forces end-of-connection logging. For a single non-blocked connection, the
end-of-connection event contains all of the information in the beginning-of-connection event, as well as
information gathered over the duration of the session.
The following table details the differences between beginning and end-of-connection events, including the
advantages to logging each.
Can be generated... When the system detects the beginning of a When the system:
connection (or, after the first few packets if
• Detects the close of a connection.
event generation depends on application or
URL identification). • Does not detect the end of a connection
of time.
• Can no longer track the session due to m
constraints.
Can be logged for... All connections except those blocked by the Most connections.
decryption policy.
Contain... Only information that can be determined in the All information in the beginning-of-connect
first packet (or the first few packets, if event information determined by examining traffic
generation depends on application or URL duration of the session; for example, the total
identification). transmitted or the timestamp of the last pack
connection.
The number of events the management center can store depends on its model.
Note To use these features, you must log connections (and in most cases, the end of those connections rather than
the beginning). This is why the system automatically logs critical connections—those associated with logged
intrusions, prohibited files, and malware.
You can also log events to an external syslog or SNMP trap server, or to other external tools, using the
following:
• For external logging on any device:
A connection you configure called an alert response.
• For external logging on threat defense devices:
See About Configuring Syslog and Configure SNMP Traps in the Cisco Secure Firewall Management
Center Device Configuration Guide.
• For additional options related to external logging:
Related Topics
Secure Firewall Management Center Alert Responses, on page 523
If a connection event does not contain the information you think it should, see Requirements for Populating
Connection Event Fields, on page 728 and Information Available in Connection Event Fields, on page 729.
• Some connections associated with detected files, malware, intrusions, and Intelligent Application Bypass
(IAB).
For more information, see Connections That Are Always Logged, on page 692.
• Monitored connections.
For more information, see Logging for Monitored Connections, on page 694.
(As previously mentioned, you can still monitor this traffic for threats.)
As discussed in Connections That Are Always Logged, on page 692, even if you disable logging for the
preceding, intrusion events, malware, and IAB are still logged.
Supported Domains
Any
User Roles
• Admin
• Access Admin
• Network Admin
Procedure
Step 1 In the prefilter policy editor, click Edit ( ) next to the rule where you want to configure logging.
If View ( ) appears instead, the configuration belongs to an ancestor domain, or you do not have permission
to modify the configuration.
What to do next
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
Step 1 In the decryption policy editor, click Edit ( ) next to the rule where you want to configure logging.
If View ( ) appears instead, the configuration belongs to an ancestor domain, or you do not have permission
to modify the configuration.
What to do next
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
Procedure
Step 2 Click Logging ( ) to enable Security Intelligenge logging using the following critera:
• By IP address—Click logging next to Networks.
• By URL—Click logging next to URLs.
• By Domain Name—Click logging next to the DNS Policy drop-down list.
If the controls are dimmed, settings are inherited from an ancestor policy, or you do not have permission to
modify the configuration. If the configuration is unlocked, uncheck Inherit from base policy to enable editing.
What to do next
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
Procedure
Step 1 In the access control policy editor, click Edit ( ) next to the rule where you want to configure logging.
If View ( ) appears instead, the configuration is inherited from an ancestor policy, belongs to an ancestor
domain, or you do not have permission to modify the configuration.
Step 4 (Optional) Check the Log Files check box to log file and malware events associated with the connection.
Cisco recommends you leave this option enabled.
• Syslog Server: Send connection events to the syslog server configured in the Logging tab in Access
Control Policy, unless overridden.
Show Overrides: Displays the options to override the settings configured in the access control policy.
• Override Severity: When you choose this option and select a severity for the rule, connection
events for this rule will have the selected severity regardless of the severity configured in the Logging
tab in Access Control Policy.
• Override Default Syslog Destination: Send the syslog generated for the connection event for this
rule to destination specified in this alert.
• SNMP Trap: Connection events are sent to the selected SNMP trap.
What to do next
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
Procedure
Step 1 In the policy editor, click Logging ( ) next to the Default Action drop-down list.
Step 2 Specify when you want to log matching connections:
• Log at Beginning of Connection—Not supported for SSL default actions.
• Log at End of Connection—Not supported if you choose the access control Block All Traffic default
action or the prefilter Block all tunnel traffic default action.
To optimize performance, log either the beginning or the end of any connection, but not both.
If the controls are dimmed, the configuration belongs to an ancestor domain, or you do not have permission
to modify the configuration. In an access control policy, the configuration may also be inherited from an
ancestor policy.
What to do next
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
Procedure
Step 1 In the access control policy editor, click Advanced, then click Edit ( ) next to General Settings.
If View ( ) appears instead, the configuration is inherited from an ancestor policy, belongs to an ancestor
domain, or you do not have permission to modify the configuration. If the configuration is unlocked, uncheck
Inherit from base policy to enable editing.
What to do next
• Deploy configuration changes; see the Cisco Secure Firewall Management Center Device Configuration
Guide.
Settings in rules and policies give you granular control over which connections you log, when you log them,
and where you store the data.
For detailed information, see Connection Logging, on page 691.
Related Topics
About Security Intelligence
Note In this guide, information about connection events also pertains to Security-Related connection events, unless
otherwise noted.
NetFlow Connections
To supplement the connection data gathered by your managed devices, you can use records broadcast by
NetFlow exporters to generate connection events. This is especially useful if the NetFlow exporters are
monitoring different networks than those monitored by your managed devices.
The system logs NetFlow records as unidirectional end-of-connection events in the Secure Firewall Management
Center database. The available information for these connections differs somewhat from connections detected
by your access control policy; see Differences between NetFlow and Managed Device Data.
Related Topics
Netflow Data
Each connection summary includes total traffic statistics, as well as the number of connections in the summary.
Because NetFlow exporters generate unidirectional connections, a summary’s connection count is incremented
by two for every connection based on NetFlow data.
Note that connection summaries do not contain all of the information associated with the summaries’ aggregated
connections. For example, because client information is not used to aggregate connections into connection
summaries, summaries do not contain client information.
Long-Running Connections
If a monitored session spans two or more five-minute intervals over which connection data is aggregated, the
connection is considered a long-running connection. When calculating the number of connections in a
connection summary, the system increments the count only for the five-minute interval in which a long-running
connection was initiated.
Also, when calculating the number of packets and bytes transmitted by the initiator and responder in a
long-running connection, the system does not report the number of packets and bytes that were actually
transmitted during each five-minute interval. Instead, the system assumes a constant rate of transmission and
calculates estimated figures based on the total number of packets and bytes transmitted, the length of the
connection, and what portion of the connection occurred during each five-minute interval.
When viewing connection summaries in the Analysis > Connections submenu pages, and when working with
connection graphs, the system displays external instead of an IP address for the non-monitored hosts.
As a consequence of this aggregation, if you attempt to drill down to the table view of connection data (that
is, access data on individual connections) from a connection summary or graph that involves an external
responder, the table view contains no information.
Note You cannot use the connection/Security-Related connection events Search page to search for events associated
with a connection.
If the connection matched one Monitor rule, the Secure Firewall Management Center displays the name
of the rule that handled the connection, followed by the Monitor rule name. If the connection matched
more than one Monitor rule, the number of matching Monitor rules is displayed, for example, Default
Action + 2 Monitor Rules.
To display a pop-up window with a list of the first eight Monitor rules matched by the connection, click
N Monitor Rules.
Action (Syslog: AccessControlRuleAction)
The action associated with the configuration that logged the connection.
For Security Intelligence-monitored connections, the action is that of the first non-Monitor access control
rule triggered by the connection, or the default action. Similarly, because traffic matching a Monitor rule
is always handled by a subsequent rule or by the default action, the action associated with a connection
logged due to a Monitor rule is never Monitor. However, you can still trigger correlation policy violations
on connections that match Monitor rules.
Action Description
Allow Connections either allowed by access control explicitly, or allowed because a user
bypassed an interactive block.
For connections where the system blocks an intrusion or file, system displays
Block, even though you use access control Allow rules to invoke deep inspection.
Fastpath Non-encrypted tunnels and other connections fastpathed by the prefilter policy.
Interactive Block, Connections logged when the system initially blocks a user’s HTTP request using
Interactive Block an Interactive Block rule. If the user clicks through the warning page that the
with reset system displays, additional connections logged for the session have an action of
Allow.
Trust Connections trusted by access control. The system logs trusted TCP connections
differently depending on the device model.
Default Action Connections handled by the access control policy's default action.
(Blank/empty) The connection closed before enough packets had passed to match a rule.
This can happen only if a facility other than access control, such as intrusion
prevention, causes the connection to be logged.
The application protocol, which represents communications between hosts, detected in the connection.
Application Protocol Category and Tag
Criteria that characterize the application to help you understand the application's function.
Application Risk
The risk associated with the application traffic detected in the connection: Very High, High, Medium,
Low, or Very Low. Each type of application detected in the connection has an associated risk; this field
displays the highest of those.
Business Relevance
The business relevance associated with the application traffic detected in the connection: Very High,
High, Medium, Low, or Very Low. Each type of application detected in the connection has an associated
business relevance; this field displays the lowest (least relevant) of those.
Client and Client Version (Syslog: Client, ClientVersion)
The client application and version of that client detected in the connection.
If the system cannot identify the specific client used in the connection, the field displays the word "client"
appended to the application protocol name to provide a generic name, for example, FTP client.
Client Category and Tag
Criteria that characterize the application to help you understand the application's function.
Connection Counter (Syslog Only)
A counter that distinguishes one connection from another simultaneous connection. This field has no
significance on its own.
The following fields collectively uniquely identify a connection event: DeviceUUID, First Packet Time,
Connection Instance ID, and Connection Counter.
Connection Instance ID (Syslog Only)
The Snort instance that processed the connection event. This field has no significance on its own.
The following fields collectively uniquely identify a connection event: DeviceUUID, First Packet Time,
Connection Instance ID, and Connection Counter.
ConnectionDuration (Syslog Only)
This field exists ONLY as a syslog field; it does not exist in the Secure Firewall Management Center
web interface. (The web interface conveys this information using the First Packet and Last Packet
columns.)
This field has a value only when logging occurs at the end of the connection. For a start-of-connection
syslog message, this field is not output, as it is not known at that time.
For an end-of-connection syslog message, this field indicates the number of seconds between the first
packet and the last packet, which may be zero for a short connection. For example, if the timestamp of
the syslog is 12:34:56 and the ConnectionDuration is 5, then the first packet was seen at 12:34:51.
Connections
The number of connections in a connection summary. For long-running connections, that is, connections
that span multiple connection summary intervals, only the first connection summary interval is
incremented. To view meaningful results for searches using the Connections criterion, use a custom
workflow that has a connection summary page.
Count
The number of connections that match the information that appears in each row. Note that the Count
field appears only after you apply a constraint that creates two or more identical rows. If you create a
custom workflow and do not add the Count column to a drill-down page, each connection is listed
individually and packets and bytes are not summed.
Decrypt Peer
The IP address of the VPN peer (peer’s IKE address) which decrypts the packet for the associated
connection.
You must enable logging setting for access control policy rule to log at the beginning of connection and
end of connection to view the VPN peer IP address. If you enable the bypass Access Control Policy for
decrypted traffic (sysopt connection permit-vpn) option, you cannot view details for decrypted traffic.
Detection Type (Syslog: DetectionType)
This field shows the source of detection of a client application. It can be AppID or Encrypted Visibility.
Destination Port/ICMP Code (Syslog: Separate fields - DstPort, ICMPCode)
In the Secure Firewall Management Center web interface, these values constrain summaries and graphs.
The port or ICMP code used by the session responder.
DestinationSecurityGroup (Syslog Only)
This field holds the text value associated with the numeric value in DestinationSecurityGroupTag, if
available. If the group name is not available as a text value, then this field contains the same integer value
as the DestinationSecurityGroupTag field.
DestinationSecurityGroupType (Syslog Only)
This field displays the source from which a security group tag was obtained.
Value Description
Session Directory Destination SGT value is from ISE via session directory topic
For rezoned encapsulated connections, the ingress field displays the tunnel zone you assigned, instead
of the original ingress security zone. The egress field is blank.
Ingress Virtual Router/Egress Virtual Router (Syslog: IngressVRF, EgressVRF)
In networks using virtual routing, the names of the virtual routers through which traffic entered and
exited the network.
Initiator/Responder Bytes (Syslog: InitiatorBytes, ResponderBytes)
The total number of bytes transmitted by the session initiator or received by the session responder.
Initiator/Responder Continent
When a routable IP is detected, the continent associated with the IP address for the session initiator or
responder.
Initiator/Responder Country
When a routable IP is detected, the country associated with the IP address of the session initiator or
responder. The system displays an icon of the country’s flag, and the country’s ISO 3166-1 alpha-3
country code. Hover your pointer over the flag icon to view the country’s full name.
Initiator/Responder IP (Syslog: SrcIP, DstIP)
In the Secure Firewall Management Center web interface, these values constrain summaries and graphs.
The IP address (and host name, if DNS resolution is enabled) of the session initiator or responder.
See also A Note About Initiator/Responder, Source/Destination, and Sender/Receiver Fields, on page
725.
In the Secure Firewall Management Center web interface, the host icon identifies the IP address that
caused the connection to be blocked.
For plaintext, passthrough tunnels either blocked or fastpathed by the prefilter policy, initiator and
responder IP addresses represent the tunnel endpoints—the routed interfaces of the network devices on
either side of the tunnel.
Initiator/Responder Packets (Syslog: InitiatorPackets, ResponderPackets)
The total number of packets transmitted by the session initiator or received by the session responder.
Initiator User (Syslog: User)
In the Secure Firewall Management Center web interface, this value constrains summaries and graphs.
The user logged into the session initiator. If this field is populated with No Authentication, the user
traffic:
• matched an access control policy without an associated identity policy
• did not match any rules in the identity policy
In the Secure Firewall Management Center web interface, the View Intrusion Events icon links to a
list of events.
IOC
Whether the event triggered an indication of compromise (IOC) against a host involved in the connection.
NAT Source/Destination IP (Syslog: NAT_InitiatorIP, NAT_ResponderIP)
The NAT translated IP address of the session initiator or responder.
NAT Source/Destination Port (Syslog: NAT_InitiatorPort, NAT_ResponderPort)
The NAT translated port of the session initiator or responder.
NetBIOS Domain (Syslog: NetBIOSDomain)
The NetBIOS domain used in the session.
NetFlow SNMP Input/Output
For connections generated from NetFlow data, the interface index for the interface where connection
traffic entered or exited the NetFlow exporter.
NetFlow Source/Destination Autonomous System
For connections generated from NetFlow data, the border gateway protocol autonomous system number
for the source or destination of traffic in the connection.
NetFlow Source/Destination Prefix
For connections generated from NetFlow data, the source or destination IP address ANDed with the
source or destination prefix mask.
NetFlow Source/Destination TOS
For connections generated from NetFlow data, the setting for the type-of-service (TOS) byte when
connection traffic entered or exited the NetFlow exporter.
Network Analysis Policy (Syslog: NAPPolicy)
The network analysis policy (NAP), if any, associated with the generation of the event.
Original Client Country
The country where the original client IP address belongs. To obtain this value, the system extracts the
original client IP address from an X-Forwarded-For (XFF), True-Client-IP, or custom-defined HTTP
header, then maps it to the country using the geolocation database (GeoDB). To populate this field, you
must enable an access control rule that handles proxied traffic based on its original client.
Original Client IP (Syslog: originalClientSrcIP )
The original client IP address from an X-Forwarded-For (XFF), True-Client-IP, or custom-defined HTTP
header. To populate this field, you must enable an access control rule that handles proxied traffic based
on its original client.
Prefilter Policy (Syslog: Prefilter Policy)
The prefilter policy that handled the connection.
Protocol (Syslog: Protocol)
In the Secure Firewall Management Center web interface:
• This value constrains summaries and graphs.
The transport protocol used in the connection. To search for a specific protocol, use the name or number
protocol as listed in http://www.iana.org/assignments/protocol-numbers.
QoS-Applied Interface
For rate-limited connections, the name of the interface where you applied rate limiting.
QoS-Dropped Initiator/Responder Bytes
The number of bytes dropped from the session initiator or session responder due to rate limiting.
QoS-Dropped Initiator/Responder Packets
The number of packets dropped from the session initiator or session responder due to rate limiting.
QoS Policy
The QoS policy that rate limited the connection.
QoS Rule
The QoS rule that rate limited the connection.
Reason (Syslog: AccessControlRuleReason)
The reason or reasons the connection was logged, in many situations. For a full list, see Connection Event
Reasons, on page 726.
Connections with a Reason of IP Block, DNS Block, and URL Block have a threshold of 15 seconds per
unique initiator-responder pair. After the system blocks one of those connections, it does not generate
connection events for additional blocked connections between those two hosts for the next 15 seconds,
regardless of port or protocol.
Referenced Host (Syslog: ReferencedHost)
If the protocol in the connection is HTTP or HTTPS, this field displays the host name that the respective
protocol was using.
SecIntMatchingIP (Syslog Only)
Which IP address matched.
Possible values: None, Destination, or Source.
Security Context (Syslog: Context)
For connections handled by ASA FirePOWER in multiple context mode, the metadata identifying the
virtual firewall group through which the traffic passed.
Security Intelligence Category (Syslog: URLSICategory, DNSSICategory , IPReputationSICategory)
The name of the object that represents or contains the blocked URL, domain, or IP address in the
connection. The Security Intelligence category can be the name of a network object or group, a Block
list, a custom Security Intelligence list or feed, a TID category related to an observation, or one of the
categories in the Intelligence Feed.
In the Secure Firewall Management Center web interface, DNS, Network (IP address), and URL Security
Intelligence connection events are combined into a single category field. In syslog messages, those events
are specific by type.
For more information about the categories in the Intelligence Feed, see Security Intelligence Categories.
Source Device
In the Secure Firewall Management Center web interface, this value constrains summaries and graphs.
The IP address of the NetFlow exporter that broadcast the data used to generate for the connection. If
the connection was detected by a managed device, this field displays Firepower.
Source Port/ICMP Type (Syslog: SrcPort, ICMPType)
In the Secure Firewall Management Center web interface, these values constrain summaries and graphs.
The port or ICMP type used by the session initiator.
SourceSecurityGroup (Syslog Only)
This field holds the text value associated with the numeric value in SourceSecurityGroupTag, if
available. If the group name is not available as a text value, then this field contains the same integer value
as the SourceSecurityGroupTag field. Tags can be obtained from inline devices (no source SGT name
specified) or from ISE (which specifies a source).
SourceSecurityGroupType (Syslog Only)
This field displays the source from which a security group tag was obtained.
Value Description
Session Directory Source SGT value is from ISE via session directory topic
Action Description
Decrypt Represents an outgoing connection decrypted using a self-signed server certificate with
(Replace a substituted public key.
Key)
Action Description
If undecryptable traffic matches an SSL rule, this field displays Not Checked.
SSL Cipher Suite (Syslog: SSSLCipherSuite)
A macro value representing a cipher suite used to encrypt the connection. See https://www.iana.org/
assignments/tls-parameters/tls-parameters.xhtml for cipher suite value designations.
Field values are displayed in the SSL Status field on the search workflow pages.
SSL Flow Error
The error name and hexadecimal code if an error occurred during the TLS/SSL session; Success if no
error occurred.
SSL Flow Flags
The first ten debugging level flags for an encrypted connection. On a workflow page, to view all flags,
click the ellipsis (...).
The message OVER_SUBSCRIBED is displayed if your managed device is overloaded. For more
information, see Troubleshoot TLS/SSL Oversubscription.
SSL Flow Messages
The keywords below indicate encrypted traffic is associated with the specified message type exchanged
between client and server during the TLS/SSL handshake. See http://tools.ietf.org/html/rfc5246 for more
information.
• HELLO_REQUEST
• CLIENT_ALERT
• SERVER_ALERT
• CLIENT_HELLO
• SERVER_HELLO
• SERVER_CERTIFICATE
• SERVER_KEY_EXCHANGE
• CERTIFICATE_REQUEST
• SERVER_HELLO_DONE
• CLIENT_CERTIFICATE
• CLIENT_KEY_EXCHANGE
• CERTIFICATE_VERIFY
• CLIENT_CHANGE_CIPHER_SPEC
• CLIENT_FINISHED
• SERVER_CHANGE_CIPHER_SPEC
• SERVER_FINISHED
• NEW_SESSION_TICKET
• HANDSHAKE_OTHER
• APP_DATA_FROM_CLIENT
• APP_DATA_FROM_SERVER
• SERVER_NAME_MISMATCH
The server certificate seen in the session has a Common Name or SAN values not corresponding
to the destined domain name.
• CERTIFICATE_CACHE_HIT
A certificate matching the destined domain name was found in the cache.
• CERTIFICATE_CACHE_MISS
A certificate matching the destined domain name was not found in the cache.
The message HEARTBEAT is displayed if applications are using the TLS/SSL heartbeat extension. For
more information, see About TLS Heartbeat.
SSL Policy (Syslog: SSLPolicy)
The SSL policy that handled the connection.
If TLS server identity discovery is enabled in the access control policy advanced settings, and there is
no SSL policy associated with the access control policy, this field holds none for all SSL events.
SSL Rule (Syslog: SSLRuleName)
The SSL rule or default action that handled the connection, as well as the first Monitor rule matched by
that connection. If the connection matched a Monitor rule, the field displays the name of the rule that
handled the connection, followed by the Monitor rule name.
SSLServerName (Syslog Only)
This field exists ONLY as a syslog field; it does not exist in the Secure Firewall Management Center
web interface.
Hostname of the server with which the client established an encrypted connection.
SSL Session ID (Syslog: SSLSessionID)
The hexadecimal Session ID negotiated between the client and server during the TLS/SSL handshake.
SSL Status
The action associated with the SSL Actual Action (SSL rule, default action, or undecryptable traffic
action) that logged the encrypted connection. The Lock icon links to SSL certificate details. If the
certificate is unavailable (for example, for connections blocked due to TLS/SSL handshake error), the
lock icon is dimmed.
If the system fails to decrypt an encrypted connection, it displays the SSL Actual Action (undecryptable
traffic action) taken, as well as the SSL Failure Reason. For example, if the system detects traffic
encrypted with an unknown cipher suite and allows it without further inspection, this field displays Do
Not Decrypt (Unknown Cipher Suite).
If the SSL handshake of an encrypted connection is incomplete and the system fails to decrypt the traffic,
SSL Status field displays Unknown (Incomplete Handshake).
When searching this field, enter one or more of the SSL Actual Action and SSL Failure Reason values
to view encrypted traffic the system handled or failed to decrypt.
SSL Subject/Issuer Country
This field is available only in the Secure Firewall Management Center web interface, and only as a search
field.
A two-character ISO 3166-1 alpha-2 country code for the subject or issuer country associated with the
encryption certificate.
SSL Ticket ID (Syslog: SSLTicketID)
A hexadecimal hash value of the session ticket information sent during the TLS/SSL handshake.
SSLURLCategory (Syslog Only)
URL categories for the URL visited in the encrypted connection.
This field exists ONLY as a syslog field; in the Secure Firewall Management Center web interface, values
in this field are included in the URL Category column.
See also URL.
SSL Version (Syslog: SSLVersion)
The TLS/SSL protocol version used to encrypt the connection:
• Unknown
• SSLv2.0
• SSLv3.0
• TLSv1.0
• TLSv1.1
• TLSv1.2
• TLSv1.3
If the web application does not match the URL for the event, the traffic is probably referred traffic, such
as advertisement traffic. If the system detects referred traffic, it stores the referring application (if available)
and lists that application as the web application.
If the system cannot identify the specific web application in HTTP traffic, this field displays Web
Browsing.
Web Application Category and Tag
Criteria that characterize the application to help you understand the application's function.
Note For each Security-Related connection event, there is an identical, separately stored connection event. All
Security-Related connection event have a populated Security Intelligence Category field.
The information available for any individual event can vary depending on how, why, and when the system
logged the connection.
Search Constraints
Fields marked with an asterisk (*) on search pages constrain connection graphs and connection summaries.
Because connection graphs are based on connection summaries, the same criteria that constrain connection
summaries also constrain connection graphs. If you search connection summaries using invalid search
constraints and view your results using a connection summary page in a custom workflow, the invalid constraints
are labeled as not applicable (N/A) and are marked with a strikethrough.
Syslog Fields
Most fields appear both in the Secure Firewall Management Center web interface and as syslog messages.
Fields without a listed syslog equivalent are not available in syslog messages. A few fields are syslog-only,
as noted, and few others are separate fields in syslog messages but are consolidated fields in the web interface
or vice-versa.
Reason Description
Content Restriction The system modified the packet to enforce content restrictions related to the Safe Search
feature.
DNS Block The system denied the connection without inspection, based on the domain name and
Security Intelligence data. A reason of DNS Block is paired with an action of Block,
Domain not found, or Sinkhole, depending on the DNS rule action.
DNS Monitor The system would have denied the connection based on the domain name and Security
Intelligence data, but you configured the system to monitor, rather than deny, the
connection.
Elephant Flow The connection is large enough to be considered an elephant flow, which is a flow that
can be large enough to affect overall system performance. By default, elephant flows
are larger than 1GB/10 seconds. You can adjust the byte and time thresholds for
identifying elephant flows in the threat defense CLI using the system support
elephant-flow-detection command. For more information, see the Cisco Secure Firewall
Threat Defense Command Reference.
Note A flow is considered as elephant flow only when both the byte and time
thresholds are surpassed.
You can create a custom dashboard to correlate elephant flows and other interrelated
metrics, for example, CPU metrics such as Snort, System, and Physical Cores. For more
information, see the System Monitoring and Troubleshooting chapter.
Elephant Flow If an elephant flow is detected and it matches the L4 ACL rules that are defined for
Exempted flows that must be exempted from remediation.
File Block The connection contained a file or malware file that the system prevented from being
transmitted. File Block reason is always paired with an action of Block.
File Custom The connection contained a file on the custom detection list that the system prevented
Detection from being transmitted.
File Monitor The system detected a particular type of file in the connection.
Reason Description
File Resume Allow File transmission was originally blocked by a Block Files or Block Malware file rule.
After a new access control policy allowing the file was deployed, the HTTP session
automatically resumed. This reason only appears in inline deployments.
File Resume Block File transmission was originally allowed by a Detect Files or Malware Cloud Lookup
file rule. After a new access control policy blocking the file was deployed, the HTTP
session automatically stopped. This reason only appears in inline deployments.
Intrusion Block Snort2 Engine—The system blocked or would have blocked an exploit (intrusion policy
violation) detected in the connection. A reason of Intrusion Block is paired with an
action of Block for blocked exploits and Allow for would-have-blocked exploits.
Snort3 Engine—When there is a "would have dropped" result, the connection event
reason is blank, instead of "Intrusion block". The "would have dropped" event is treated
the same as “Allow” in regards to the connection event reason being populated.
Intrusion Monitor The system detected, but did not block, an exploit detected in the connection. This
occurs when the state of the triggered intrusion rule is set to Generate Events.
IP Block The system denied the connection without inspection, based on the IP address and
Security Intelligence data. A reason of IP Block is always paired with an action of
Block.
IP Monitor The system would have denied the connection based on the IP address and Security
Intelligence data, but you configured the system to monitor, rather than deny, the
connection.
SSL Block The system blocked an encrypted connection based on the TLS/SSL inspection
configuration. A reason of SSL Block is always paired with an action of Block.
URL Block The system denied the connection without inspection, based on the URL and Security
Intelligence data. A reason of URL Block is always paired with an action of Block.
URL Monitor The system would have denied the connection based on the URL and Security
Intelligence data, but you configured the system to monitor, rather than deny, the
connection.
User Bypass The system initially blocked a user’s HTTP request, but the user clicked through a
warning page to view the site. A reason of User Bypass is always paired with an action
of Allow.
Traffic Characteristics
The system only reports information present (and detectable) in network traffic. For example, there could be
no user associated with an initiator host, or no referenced host detected in a connection where the protocol is
not DNS, HTTP, or HTTPS.
Evaluation Stage
Each type of traffic inspection and control occurs where it makes the most sense for maximum flexibility and
performance.
For example, the system enforces Security Intelligence before more resource-intensive evaluations. When a
connection is blocked by Security Intelligence, the resulting event does not contain the information that the
system would have gathered from subsequent evaluation, for example, user identity.
Other Configurations
Other configurations that affect connection logging include, but are not limited to:
• ISE-related fields are populated only if you configure ISE, in connections associated with users who
authenticate via an Active Directory domain controller. Connection events do not contain ISE data for
users who authenticate via LDAP, RADIUS, or RSA domain controllers.
• The Security Group Tag (SGT) fields are populated only if you configure ISE as an identity source or
add custom SGT rule conditions.
• Prefilter-related fields (including tunnel zone information in security zone fields) are populated only in
connections handled by a prefilter policy.
• TLS/SSL-related fields are populated only in encrypted connections handled by a decryption policy. You
can view the values of the fields using a Do Not Decrypt rule action if you do not need to decrypt the
traffic.
• File information fields are populated only in connections logged by access control rules associated with
file policies.
• Intrusion information fields are populated only in connections logged by access control rules either
associated with intrusion policies or using the default action.
• QoS-related fields are populated only in connections subject to rate limiting.
• The Reason field is populated only in specific situations, such as when a user bypasses an Interactive
Block configuration.
• The Domain field is only present if you have ever configured the Secure Firewall Management Center
for multitenancy.
• An advanced setting in the access control policy controls the number of characters the system stores in
the connection log for each URL requested by monitored hosts in HTTP sessions. If you use this setting
to disable URL logging, the system does not display individual URLs in the connection log, although
you can still view category and reputation data, if it exists.
• For the connection event to display URL category and reputation, you must include the applicable URL
rules in an access control policy and configure the rule with URL category and URL reputation under
the URLs tab. URL category and reputation do not appear in an event if the connection is processed
before it matches a URL rule.
Related Topics
Differences between NetFlow and Managed Device Data
A "yes" in the table does not mean that the system must populate a connection event field, rather, that it can.
The system only reports information present (and detectable) in network traffic. For example, TLS/SSL-related
fields are populated only for records of encrypted connections handled by a decryption policy.
Connection Event Field Origin: Direct Origin: NetFlow Logging: Start Logging: End
Connection Event Field Origin: Direct Origin: NetFlow Logging: Start Logging: End
Connection Event Field Origin: Direct Origin: NetFlow Logging: Start Logging: End
Connection Event Field Origin: Direct Origin: NetFlow Logging: Start Logging: End
Procedure
Note If a connection graph appears instead of a table, click (switch workflow) by the workflow title,
and choose the predefined Connection Events workflow, or a custom workflow. Note that all
predefined connection event workflows—including connection graphs—terminate in a table view
of connections.
• Additional information — To view data in available sources external to your system, right-click an event
value. The options you see depend on the data type and include public sources; other sources depend on
the resources you have configured. For information, see Event Investigation Using Web-Based Resources,
on page 598
• External intelligence — To gather intelligence about an event, right-click an event value in the table and
choose from a Cisco or third-party intelligence source. For example, you can get details about a suspicious
IP address from Cisco Talos. The options you see depend on the data type and the integrations that are
configured on your system. For more information, see Event Investigation Using Web-Based Resources,
on page 598.
• Host Profile — To view the host profile for an IP address, click Host Profile or, for hosts with active
indications of compromise (IOC) tags, Compromised Host that appears next to the IP address.
• User Profile — To view user identity information, click the user icon that appears next to the User
Identity, or for users associated with IOCs,Red User.
• Files and Malware —To view the files, including malware, detected or blocked in a connection, click
View Files and proceed as described in Viewing Files and Malware Detected in a Connection, on page
735.
• Intrusion Events — To view the intrusion events associated with a connection, as well as their priority
and impact, click Intrusion Events in the Intrusion Events column and proceed as described in Viewing
Intrusion Events Associated with a Connection, on page 736.
Tip To quickly view intrusion, file, or malware events associated with one or more connections,
check the connections using the check boxes in the table, then choose the appropriate option
from the Jump to drop-down list. Note that because they are blocked before access control
rule evaluation, there can be no files or intrusions associated with connections blocked by
Security Intelligence. You can only see this information for a Security Intelligence event if
you configured Security Intelligence to monitor, rather than block, connections.
• Certificate — To view details about an available certificate used to encrypt a connection, click Enabled
Lock in the SSL Status column.
• Constrain — To constrain the columns that appear, click Close ( ) in the column heading that you
want to hide. In the pop-up window that appears, click Apply.
Tip To hide or show other columns, check or clear the appropriate check boxes before you click
Apply. To add a disabled column back to the view, expand the search constraints, then click
the column name under Disabled Columns.
• Delete Events — (Security-Related connection event tables only) To delete some or all items in the
current constrained view, check the check boxes next to items you want to delete and click Delete or
click Delete All.
• Drill Down — See Using Drill-Down Pages, on page 642.
Tip To drill down using one of several Monitor rules that matched a logged connection, click
an N Monitor Rules value. In the pop-up window that appears, click the Monitor rule you
want to use to constrain connection events.
• Navigate This Page — See Workflow Page Traversal Tools, on page 639.
• Navigate Between Pages — To navigate between pages in the current workflow, keeping the current
constraints, click the appropriate page link at the top left of the workflow page.
• Navigate Between Event Views — To navigate to other event views to view associated events, click
Jump to and choose the event view from the drop-down list.
• Sort — To sort data in a workflow, click the column title. Click the column title again to reverse the sort
order.
Related Topics
Overview: Workflows, on page 625
Configuring Event View Settings, on page 192
Center displays view files ( ) in the Files column. The number on the view files indicates the number of
files (including malware files) detected or blocked in that connection.
Not all file and malware events are associated with connections. Specifically:
• Malware events detected by Secure Endpoint ("endpoint-based malware events" ) are not associated with
connections. Those events are imported from your Secure Endpoint deployment.
• Many IMAP-capable email clients use a single IMAP session, which ends only when the user exits the
application. Although long-running connections are logged by the system, files downloaded in the session
are not associated with the connection until the session ends.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Procedure
Related Topics
Overview: Workflows, on page 625
Configuring Event View Settings, on page 192
Procedure
Related Topics
Overview: Workflows, on page 625
Configuring Event View Settings, on page 192
Attribute Description
Subject/Issuer Common Name The host and domain name of the certificate subject or certificate issuer.
Subject/Issuer Organization Unit The organizational unit of the certificate subject or certificate issuer.
Certificate Fingerprint The SHA hash value used to authenticate the certificate.
Public Key Fingerprint The SHA hash value used to authenticate the public key contained within
the certificate.
Related Topics
Overview: Workflows, on page 625
Configuring Event View Settings, on page 192
Procedure
Related Topics
Enable User Role Escalation, on page 186
New Connection Event 7.1 See Connection Event Reasons, on page 726.
Reason - Elephant Flow.
NAT Translated IP 7.1 Four new fields are added to the connection and security intelligence event table:
Address and Port
• NAT Source IP
• NAT Destination IP
• NAT Source Port
• NAT Destination Port
Ability to choose a data 7.0 See History for Workflows, on page 661.
source when working with
certain events stored
remotely
Removal of support for 6.6 You can no longer create custom tables for connection events. If you upgrade, any pre-existing custom
custom tables for tables for connection events are still available but always return no results.
connection events
There is no change to other types of custom tables.
New/Modified screens: The Tables option on Analysis > Advanced > Custom Tables
Platform: management center
Removal of ability to 6.6 The Delete and Delete All buttons have been removed from connection events table pages.
Delete and Delete All
To purge all connection events, see Data Purge and Storage, on page 487.
connection events
New/Modified screens: Analysis > Connections > Events
Platform: management center
New fields for VRF and 6.6 • Ingress Virtual Router (Syslog: IngressVRF)
SGT
• Egress Virtual Router (Syslog: EgressVRF)
• DestinationSecurityGroupType (Syslog only)
• SourceSecurityGroupType (Syslog only)
New and changed Security 6.5 Changes to fields in the management center web interface:
Group Tag fields
• Changed fields: Security Group Tag is now Source SGT
• New fields: Destination SGT
New syslog field: Event 6.5 This field identifies connection events as High priority when they are associated with intrusion, file,
Priority malware, or Security Intelligence events.
Unique identifier for 6.4.0.4 The following syslog fields collectively uniquely identify a connection event: DeviceUUID, First
connection event in syslogs Packet Time, Connection Instance ID, and Connection Counter.
• Text-based and graphical reports that you can generate for any time period you choose; you can also
design your own reports and configure them to run at scheduled intervals
• An incident-handling tool that you can use to gather event data related to an attack; you can also add
notes to help you track your investigation and response
• Automated alerting that you can configure for SNMP, email, and syslog
• Automated correlation policies that you can use to respond to and remediate specific intrusion events
• Predefined and custom workflows that you can use to drill down through the data to identify the events
that you want to investigate further
• External tools for managing and analyzing data. You can send data to those tools using syslog or eStreamer.
For more information, see Event Analysis Using External Tools, on page 589
Additionally, you can use publicly-available information such as the predefined resources on the Analysis >
Advanced > Contextual Cross-Launch page to learn more about malicious entities.
To search for a particular message string and retrieve documentation for the rule that generated an event, see
https://www.snort.org/rule_docs/.
Classic License
Protection
Supported Domains
Any
User Roles
• Admin
• Intrusion Admin
Procedure
Related Topics
Using the Intrusion Event Packet View, on page 765
Syslog fields are indicated in the list below; fields without a listed syslog equivalent are not available in syslog
messages.
When searching intrusion events, keep in mind that the information available for any individual event can
vary depending on how, why, and when system logged the event. For example, only intrusion events triggered
on decrypted traffic contain TLS/SSL information.
Note In the Secure Firewall Management Center web interface, some fields in the table view of intrusion events
are disabled by default. To enable a field for the duration of your session, expand the search constraints, then
click the column name under Disabled Columns.
Application Risk
The risk associated with detected applications in the traffic that triggered the intrusion event: Very High,
High, Medium, Low, and Very Low. Each type of application detected in a connection has an associated risk;
this field displays the highest risk of those.
Business Relevance
The business relevance associated with detected applications in the traffic that triggered the intrusion event:
Very High, High, Medium, Low, and Very Low. Each type of application detected in a connection has an
associated business relevance; this field displays the lowest (least relevant) of those.
Count
The number of events that match the information that appears in each row. Note that the Count field appears
only after you apply a constraint that creates two or more identical rows. This field is not searchable.
CVE ID
This field is a search field only.
Search by the identification number associated with the vulnerability in MITRE’s Common Vulnerabilities
and Exposures (CVE) database (https://cve.mitre.org/).
Destination Continent
The continent of the receiving host involved in the intrusion event.
Destination Country
The country of the receiving host involved in the intrusion event.
Destination User
The username associated with the Responder IP of the connection event. This host may or may not be the
host receiving the exploit. This value is typically known only for users on your network.
.
See also A Note About Initiator/Responder, Source/Destination, and Sender/Receiver Fields, on page 725.
Device
The managed device where the access control policy was deployed.
Domain
The domain of the device that detected the intrusion. This field is only present if you have ever configured
the management center for multitenancy.
Email Attachments
The MIME attachment file name that was extracted from the MIME Content-Disposition header. To display
attachment file names, you must enable the SMTP preprocessor Log MIME Attachment Names option.
Multiple attachment file names are supported.
Email Headers
This field is a search field only.
The data that was extracted from the email header.
To associate email headers with intrusion events for SMTP traffic, you must enable the SMTP preprocessor
Log Headers option.
Email Recipient
The address of the email recipient that was extracted from the SMTP RCPT TO command. To display a value
for this field, you must enable the SMTP preprocessor Log To Addresses option. Multiple recipient addresses
are supported.
Email Sender
The address of the email sender that was extracted from the SMTP MAIL FROM command. To display a
value for this field, you must enable the SMTP preprocessor Log From Address option. Multiple sender
addresses are supported.
Generator
The component that generated the event.
See also information about the following intrusion event fields: GID, Message, and Snort ID.
HTTP Hostname
The host name, if present, that was extracted from the HTTP request Host header. Note that request packets
do not always include the host name.
To associate host names with intrusion events for HTTP client traffic, you must enable the HTTP Inspect
preprocessor Log Hostname option.
In table views, this column displays the first fifty characters of the extracted host name. You can hover your
pointer over the displayed portion of an abbreviated host name to display the complete name, up to 256 bytes.
You can also display the complete host name, up to 256 bytes, in the packet view.
HTTP URI
The raw URI, if present, associated with the HTTP request packet that triggered the intrusion event. Note that
request packets do not always include a URI.
To associate URIs with intrusion events for HTTP traffic, you must enable the HTTP Inspect preprocessor
Log URI option.
To see the associated HTTP URI in intrusion events triggered by HTTP responses, you should configure
HTTP server ports in the Perform Stream Reassembly on Both Ports option; note, however, that this
increases resource demands for traffic reassembly.
This column displays the first fifty characters of the extracted URI. You can hover your pointer over the
displayed portion of an abbreviated URI to display the complete URI, up to 2048 bytes. You can also display
the complete URI, up to 2048 bytes, in the packet view.
Impact
The impact level in this field indicates the correlation between intrusion data, network discovery data, and
vulnerability information.
When searching this field, do not specify impact icon colors or partial strings. For example, do not use blue,
level 1, or 0. Valid case-insensitive values are:
• Impact 0, Impact Level 0
• Impact 1, Impact Level 1
• Impact 2, Impact Level 2
• Impact 3, Impact Level 3
• Impact 4, Impact Level 4
Because no operating system information is available for hosts added to the network map from NetFlow data,
the system cannot assign Vulnerable (impact level 1: red) impact levels for intrusion events involving those
hosts. In such cases, use the host input feature to manually set the operating system identity for the hosts.
Table 97: Inline Result Field Contents in Workflow and Table Views
IPS would have dropped the packet if you enabled the Drop when Inline intrusion
policy option (in an inline deployment), or if a Drop and Generate rule generated
the event while the system was pruning.
IPS may have transmitted or delivered the packet to the destination, but the
connection that contained this packet is now blocked.
No icon (blank) The triggered rule was not set to Drop and Generate Events
The following table lists the possible reasons for the inline results — Would have dropped and Partially
dropped.
Would Have Dropped Interface in Passive or Tap mode You have configured the interfaces
in inline tap or passive mode.
Partially Dropped Connection Closed (0x01) While creating a new flow, if the
allocated flows are more than the
allowed number of flows, the Snort
inspection engine prunes the least
recently used flows.
In a passive deployment, the system does not drop packets, including when an inline interface is in tap mode,
regardless of the rule state or the inline drop behavior of the intrusion policy.
When searching this field, enter either of the following:
• dropped to specify whether the packet is dropped in an inline deployment.
• would have dropped to specify whether the packet would have dropped if the intrusion policy had
been set to drop packets in an inline deployment.
• partially dropped to specify whether the packet is transmitted or delivered to the destination, but
the connection that contained this packet is now blocked.
MITRE
A count of techniques that you can click to bring up a modal, which shows the full list of MITRE tactics and
techniques within that hierarchy.
Original Client IP
The original client IP address that was extracted from an X-Forwarded-For (XFF), True-Client-IP, or
custom-defined HTTP header.
To display a value for this field, you must enable the HTTP preprocessor Extract Original Client IP Address
option in the network analysis policy. Optionally, in the same area of the network analysis policy, you can
also specify up to six custom client IP headers, as well as set the priority order in which the system selects
the value for the Original Client IP event field.
Reviewed By
The name of the user who reviewed the event. When searching this field, you can enter unreviewed to
search for events that have not been reviewed.
Rule Group
A count of non-MITRE rule groups that you can click to bring up a modal, which shows the full list of rule
groups.
Snort ID
This field is a search field only.
(For the syslog field, see SID.)
When performing your search: Specify the Snort ID (SID) of the rule that generated the event or, optionally,
specify the combination Generator ID (GID) and SID of the rule, where the GID and SID are separated with
a colon (:) in the format GID:SID. You can specify any of the values in the following table:
Value Example
The SID of the events you are viewing is listed in the Message column. For more information, see the
description in this section for the Message field.
Source Continent
The continent of the sending host involved in the intrusion event.
Source Country
The country of the sending host involved in the intrusion event.
Field values are displayed in the SSL Status field on the search workflow pages.
SSL Status
The action associated with the SSL Actual Action (Decryption rule, default action, or undecryptable traffic
action) that logged the encrypted connection.
If the system fails to decrypt an encrypted connection, it displays the SSL Actual Action (undecryptable
traffic action) taken, as well as the SSL Failure Reason. For example, if the system detects traffic encrypted
with an unknown cipher suite and allows it without further inspection, this field displays Do Not Decrypt
(Unknown Cipher Suite).
Time
The date and time of the event. This field is not searchable.
Note Because no operating system information is available for hosts added to the network map from NetFlow data,
the system cannot assign Vulnerable (impact level 1: red) impact levels for intrusion events involving those
hosts. In such cases, use the host input feature to manually set the operating system identity for the hosts.
The following table describes the possible values for the impact levels.
Unknown Unknown gray Neither the source nor the destination host is on a
network that is monitored by network discovery.
( )
Vulnerable Vulnerable red Either:
( ) • the source or the destination host is in the
network map, and a vulnerability is mapped to
the host
• the source or destination host is potentially
compromised by a virus, trojan, or other piece
of malicious software
Potentially Potentially orange Either the source or the destination host is in the
Vulnerable Vulnerable network map and one of the following is true:
( ) • for port-oriented traffic, the port is running a
server application protocol
• for non-port-oriented traffic, the host uses the
protocol
Currently Not Currently Not yellow Either the source or the destination host is in the
Vulnerable Vulnerable network map and one of the following is true:
( ) • for port-oriented traffic (for example, TCP or
UDP), the port is not open
• for non-port-oriented traffic (for example,
ICMP), the host does not use the protocol
Unknown Unknown Target blue Either the source or destination host is on a monitored
network, but there is no entry for the host in the
Target ( )
network map.
Viewing associated data is most useful when navigating between table views of events.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Procedure
Related Topics
Logging for Allowed Connections, on page 696
Using Intrusion Event Workflows, on page 762
Using Connection and Security-Related Connection Event Tables, on page 733
Procedure
Related Topics
Using Intrusion Event Workflows, on page 762
Procedure
Related Topics
Using Intrusion Event Workflows, on page 762
Procedure
Preprocessor Events
Preprocessors provide two functions: performing the specified action on the packet (for example, decoding
and normalizing HTTP traffic) and reporting the execution of specified preprocessor options by generating
an event whenever a packet triggers that preprocessor option and the associated preprocessor rule is enabled.
For example, you can enable the Double Encoding HTTP Inspect option and the associated preprocessor rule
with the HTTP Inspect Generator (GID) 119 and the Snort ID (SID) 2 to generate an event when the
preprocessor encounters IIS double-encoded traffic.
Generating events to report the execution of preprocessors helps you detect anomalous protocol exploits. For
example, attackers can craft overlapping IP fragments to cause a DoS attack on a host. The IP defragmentation
preprocessor can detect this type of attack and generate an intrusion event for it.
Preprocessor events differ from rule events in that the packet display does not include a detailed rule description
for the event. Instead, the packet display shows the event message, the GID, SID, the packet header data, and
the packet payload. This allows you to analyze the packet’s header information, determine if its header options
are being used and if they can exploit your system, and inspect the packet payload. After the preprocessors
analyze each packet, the rules engine executes appropriate rules against it (if the preprocessor was able to
defragment it and establish it as part of a valid session) to further analyze potential content-level threats and
report on them.
Note Events generated by standard text rules have a generator ID of 1 (Global domain or legacy GID) or 1000 -
2000 (descendant domains). For shared object rules, the events have a generator ID of 3. For both, the event’s
SID indicates which specific rule triggered.
The following table describes the types of events that generate each GID.
ID Component Description
1 Standard Text Rule The event was generated when the packet triggered a standard text rule (Global domain
or legacy GID).
2 Tagged Packets The event was generated by the Tag generator, which generates packets from a tagged
session. This occurs when the tag rule option is used.
3 Shared Object Rule The event was generated when the packet triggered a shared object rule.
102 HTTP Decoder The decoder engine decoded HTTP data within the packet.
105 Back Orifice Detector The Back Orifice Detector identified a Back Orifice attack associated with the packet.
116 Packet Decoder The event was generated by the packet decoder.
119, 120 HTTP Inspect Preprocessor The event was generated by the HTTP Inspect preprocessor. GID 120 rules relate to
server-specific HTTP traffic.
122 Portscan Detector The event was generated by the portscan flow detector.
123 IP Defragmentor The event was generated when a fragmented IP datagram could not be properly
reassembled.
ID Component Description
124 SMTP Decoder The event was generated when the SMTP preprocessor detected an exploit against an
SMTP verb.
125 FTP Decoder The event was generated when the FTP/Telnet decoder detected an exploit within FTP
traffic.
126 Telnet Decoder The event was generated when the FTP/Telnet decoder detected an exploit within telnet
traffic.
128 SSH Preprocessor The event was generated when the SSH preprocessor detected an exploit within SSH
traffic.
129 Stream Preprocessor The event was generated during stream preprocessing by the stream preprocessor.
131 DNS Preprocessor The event was generated by the DNS preprocessor.
133 DCE/RPC Preprocessor The event was generated by the DCE/RPC preprocessor.
134 Rule Latency The event was generated when rule latency suspended (134:1) or re-enabled (134:2) a
group of intrusion rules, or when the system stopped inspecting a packet because the
Packet Latency
packet latency threshold was exceeded (134:3).
135 Rate-Based Attack Detector The event was generated when a rate-based attack detector identified excessive
connections to hosts on the network.
137 SSL Preprocessor The event was generated by the TLS/SSL preprocessor.
138, 139 Sensitive Data Preprocessor The event was generated by the sensitive data preprocessor.
140 SIP Preprocessor The event was generated by the SIP preprocessor.
141 IMAP Preprocessor The event was generated by the IMAP preprocessor.
142 POP Preprocessor The event was generated by the POP preprocessor.
143 GTP Preprocessor The event was generated by the GTP preprocessor.
144 Modbus Preprocessor The event was generated by the Modbus SCADA preprocessor.
145 DNP3 Preprocessor The event was generated by the DNP3 SCADA preprocessor.
148 CIP Preprocessor The event was generated by the CIP SCADA preprocessor.
149 S7Commplus preprocessor The event was generated by the S7Commplus SCADA preprocessor.
1000 - Standard Text Rule The event was generated when the packet triggered a standard text rule (descendant
2000 domains).
Drill-down pages generally include two or more columns in a table (and, for some drill-down views, more
than one table) that allow you to view one specific type of information.
When you “drill down” to find more information for one or more destination ports, you automatically select
those events and the next page in the workflow appears. In this way, drill-down tables help you reduce the
number of events you are analyzing at one time.
The initial table view of intrusion events lists each intrusion event in its own row. The columns in the table
list information such as the time, the source IP address and port, the destination IP address and port, the event
priority, the event message, and more.
When you select events on a table view, instead of selecting events and displaying the next page in the
workflow, you add to what are called constraints. Constraints are limits that you impose on the types of events
that you want to analyze.
For example, if you click Close ( ) in any column and clear Time from the drop-down list, you can remove
Time as one of the columns. To narrow the list of events in your analysis, you can click the link for a value
in one of the rows in the table view. For example, to limit your analysis to the events generated from one of
the source IP addresses (presumably, a potential attacker), click the IP address in the Source IP Address
column.
If you select one or more rows in a table view and then click View, the packet view appears. A packet view
provides information about the packet that triggered the rule or the preprocessor that generated the event.
Each section of the packet view contains information about a specific layer in the packet. You can expand
collapsed sections to see more information.
Note Because each portscan event is triggered by multiple packets, portscan events use a special version of the
packet view.
If the predefined workflows do not meet your specific needs, you can create custom workflows that display
only the information you are interested in. Custom intrusion event workflows can include drill-down pages,
a table view of events, or both; the system automatically includes a packet view as the last page. You can
easily switch between the predefined workflows and your own custom workflows depending on how you
want to investigate events.
Tip At any point in the process, you can save the constraints as a set of search criteria. For example, if you find
that over the course of a few days your network is being probed by an attacker from a single IP address, you
can save your constraints during your investigation and then use them again later. You cannot, however, save
compound constraints as a set of search criteria.
Procedure
Step 1 Access an intrusion event workflow using Analysis > Intrusions > Events.
Step 2 Optionally, constrain the number of intrusion events that appear on the event views as described in Intrusion
Event Drill-Down Page Constraints, on page 763 or Intrusion Event Table View Constraints, on page 764.
Step 3 You have the following choices:
• To learn more about the columns that appear, see Intrusion Event Fields, on page 744.
• To view a host’s profile, click Host Profile that appears next to the host IP address.
• To view geolocation details, click flag that appears in the Source Country or Destination Country columns.
• To view data in available sources external to your system, right-click an event value. The options you
see depend on the data type and include public sources; other sources depend on the resources you have
configured. For information, see Event Investigation Using Web-Based Resources, on page 598
• To gather general intelligence about an event, right-click an event value in the table and choose from a
Cisco or third-party intelligence source. For example, you can get details about a suspicious IP address
from Cisco Talos. The options you see depend on the data type and the integrations that are configured
on your system. For more information, see Event Investigation Using Web-Based Resources, on page
598.
• To modify the time and date range for displayed events, see Changing the Time Window, on page 653.
Tip If no intrusion events appear on the event views, adjusting the specified time range might
return results. If you specified an older time range, events in that time range might have
been deleted. Adjusting the rule thresholding configuration might generate events.
Note Events generated outside the appliance's configured time window (whether global or
event-specific) may appear in an event view if you constrain the event view by time. This
may occur even if you configured a sliding time window for the appliance.
• To sort events on the current workflow page or navigate within the current workflow page, see Using
Workflows, on page 634.
• To navigate between pages in the current workflow, keeping the current constraints, click the appropriate
page link at the top left of the workflow page.
• To delete events from the event database, check the check boxes next to events you want to delete, then
click Delete, or click Delete All.
• To mark events reviewed to remove them from intrusion event pages, but not the event database, see
Marking Intrusion Events Reviewed, on page 757.
• To download a local copy of the packet (a packet capture file in libpcap format) that triggered each
selected event, check the check boxes next to events triggered by the packets you want to download,
then click Download Packets, or click Download All Packets. Captured packets are saved in libpcap
format. This format is used by several popular protocol analyzers.
• To navigate to other event views to view associated events, see Inter-Workflow Navigation, on page 658.
• To temporarily use a different workflow, click (switch workflow).
• To bookmark the current page so that you can quickly return to it, click Bookmark This Page.
• To view the Intrusion Events section of the Summary Dashboard, click Dashboards.
• To navigate to the bookmark management page, click View Bookmarks.
• To generate a report based on the data in the current view, see Creating a Report Template from an Event
View, on page 501.
Related Topics
Event Searches, on page 663
Bookmarks, on page 660
drill down to the next select the check boxes next to the events you want to view on the next workflow page, then click
workflow page constraining View.
on selected events
For example, on the Destination Port workflow, to constrain the events to those with destination ports
20/tcp and 21/tcp, select the check boxes next to the rows for those ports and click View. The next
page of the workflow, Events, appears and contains only port 20/tcp and 21/tcp events.
Note that if you constrain on multiple rows and the table has more than one column (not including a
Count column), you build what is called a compound constraint. Compound constraints ensure that
you do not include more events in your constraint than you mean to. For example, if you use the
Event and Destination workflow, each row that you select on the first drill-down page creates a
compound constraint. If you pick event 1:100 with a destination IP address of 10.10.10.100 and you
also pick event 1:200 with a destination IP address of 192.168.10.100, the compound constraint
ensures that you do not also select events with 1:100 as the event type and 192.168.10.100 as the
destination IP address or events with 1:200 as the event type and 10.10.10.100 as the destination IP
address.
Tip The packet view on a Secure Firewall Management Center does not contain packet information when the
Transfer Packet option is disabled for the device detecting the event.
The packet view indicates why a specific packet was captured by providing information about the intrusion
event that the packet triggered, including the event’s time stamp, message, classification, priority, and, if the
event was generated by a standard text rule, the rule that generated the event. The packet view also provides
general information about the packet, such as its size.
In addition, the packet view has a section that describes each layer in the packet: data link, network, and
transport, as well as a section that describes the bytes that comprise the packet. If the system decrypted the
packet, you can view the decrypted bytes. You can expand collapsed sections to display detailed information.
Note Because each portscan event is triggered by multiple packets, portscan events use a special version of the
packet view.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Procedure
Step 1 On the table view of intrusion events, choose packets to view as described in Intrusion Event Table View
Constraints, on page 764.
Step 2 Optionally, if you chose more than one event, you can page through the packets in the packet view by using
the page numbers at the bottom of the page.
Step 3 You also have the following options:
• Adjust — To modify the date and time range in the packet views, see Changing the Time Window, on
page 653.
• Configure — To configure the intrusion rule that triggered the event, click the arrow next to Actions and
continue as described in Configuring Intrusion Rules within the Packet View, on page 769.
• Delete — To delete an event from the database, click Delete to delete the event whose packet you are
viewing or click Delete All to delete all the events whose packets you previously selected.
• Download — To download a local copy of the packet (a packet capture file in libpcap format) that
triggered the event, click Download Packet to save a copy of the captured packet for the event you are
viewing or click Download All Packets to save copies of the captured packets for all the events whose
packets you previously selected. The captured packet is saved in libpcap format. This format is used by
several popular protocol analyzers.
Note You cannot download a portscan packet because single portscan events are based on multiple
packets; however, the portscan view provides all usable packet information. You must have
at least 15% available disk space in order to download.
• Mark reviewed — To mark an event reviewed to remove it from event views, but not the event database,
click Review to mark the event whose packet you are viewing or click Review All to mark all the events
whose packets you previously selected. For more information, see Marking Intrusion Events Reviewed,
on page 757.
• View additional information — To expand or collapse a page section, click the arrow next to the section.
For details, see Event Information Fields, on page 766, Frame Information Fields, on page 772, and Data
Link Layer Information Fields, on page 773.
• View network layer information — See Viewing Network Layer Information, on page 774.
• View packet byte information — See Viewing Packet Byte Information, on page 779.
• View transport layer information — See Viewing Transport Layer Information, on page 776
Related Topics
Portscan Detection
Event
The event message. For rule-based events, this corresponds to the rule message. For other events, this is
determined by the decoder or preprocessor.
The ID for the event is appended to the message in the format (GID:SID:Rev). GID is the generator ID of the
rules engine, the decoder, or the preprocessor that generated the event. SID is the identifier for the rule, decoder
message, or preprocessor message. Rev is the revision number of the rule.
Timestamp
The time that the packet was captured, in UTC time zone.
Classification
The event classification. For rule-based events, this corresponds to the rule classification. For other events,
this is determined by the decoder or preprocessor.
Priority
The event priority. For rule-based events, this corresponds to either the value of the priority keyword or the
value for the classtype keyword. For other events, this is determined by the decoder or preprocessor.
Domain
The domain where the managed device belongs. This field is only present if you have ever configured the
management center for multitenancy.
Device
The managed device where the access control policy was deployed.
Security Context
The metadata identifying the virtual firewall group through which the traffic passed. Note that the system
only populates this field for ASA FirePOWER in multiple context mode.
Ingress Interface
The ingress interface of the packet that triggered the event. Only this interface column is populated for a
passive interface.
Egress Interface
For an inline set, the egress interface of the packet that triggered the event.
Source/Destination IP
The host IP address or domain name where the packet that triggered the event (source) originated, or the target
(destination) host of the traffic that triggered the event.
Email Headers
The data that was extracted from the email header. Note that email headers do not appear in the table view of
intrusion events, but you can use email header data as a search criterion.
To associate email headers with intrusion events for SMTP traffic, you must enable the SMTP preprocessor
Log Headers option. For rule-based events, this row appears when email data is extracted.
HTTP Hostname
The host name, if present, extracted from the HTTP request Host header. This row displays the complete host
name, up to 256 bytes. You can expand the complete host name if it is longer than a single row.
To display host names, you must enable the HTTP Inspect preprocessor Log Hostname option.
Note that HTTP request packets do not always include a host name. For rule-based events, this row appears
when the packet contains the HTTP host name or the HTTP URI.
HTTP URI
The raw URI, if present, associated with the HTTP request packet that triggered the intrusion event. This row
displays the complete URI, up to 2048 bytes. You can expand the complete URI if it is longer than a single
row.
To display the URI, you must enable the HTTP Inspect preprocessor Log URI option.
Note that HTTP request packets do not always include a URI. For rule-based events, this row appears when
the packet contains the HTTP host name or the HTTP URI.
To see the associated HTTP URI in intrusion events triggered by HTTP responses, you should configure
HTTP server ports in the Perform Stream Reassembly on Both Ports option; note, however, that this
increases resource demands for traffic reassembly.
Intrusion Policy
The intrusion policy, if present, where the intrusion, preprocessor, or decoder rule that generated the intrusion
event was enabled. You can choose an intrusion policy as the default action for an access control policy or
associate an intrusion policy with an access control rule.
Rule
For standard text rule events, the rule that generated the event.
Note that if the event is based on a shared object rule, a decoder, or a preprocessor, the rule is not available.
Because rule data may contain sensitive information about your network, administrators may toggle users’
ability to view rule information in the packet view with the View Local Rules permission in the user role
editor.
Actions
For standard text and custom rule events, expand Actions to take any of the following actions on the rule that
triggered the event:
• edit the rule
• view documentation for the revision of the rule; for standard text rules only, after clicking View
Documentation under Actions, you can click Rule Documentation in the documentation pop-up
window to view more-specific rule details.
• add a comment to the rule
• change the state of the rule
• set a threshold for the rule
Note that if the event is based on a shared object rule, a decoder, or a preprocessor, the rule is not available.
Procedure
Step 1 Within the packet view of an intrusion event that was generated by an intrusion rule, expand Actions in the
Event Information section.
Step 2 You have the following choices:
• Comment — For standard text rule events, click Rule Comment to add a text comment to the rule that
generated the event. This allows you to provide additional context and information about the rule and
the exploit or policy violation it identifies. You can also add and view rule comments in the intrusion
rules editor.
• Disable — To disable this rule, click one of the following options:
• Disable this rule in the current Snort 2 policy (<policy_name>)
• Disable this rule in all locally created Snort 2 policies
If this event is generated by a standard text rule, you can disable the rule, if necessary. You can set the
rule in all policies that you can edit locally. Alternately, you can set the rule only in the current policy
(that is, the policy that generated the event) if you can edit the current policy locally.
Note that the current policy option appears only when you can edit the current policy; for example, you
can edit a custom policy, but you cannot edit a default policy provided by the system.
Note You cannot disable shared object rules from the packet view, nor can you disable rules in
the default policies.
• Drop packets and generate an event — To set the rule to drop packets that trigger it and generate an
event, click one of the following options:
• Set this rule to drop the triggering packet and generate an event in the current Snort 2 policy
(<policy_name>)
• Set this rule to drop the triggering packet and generate an event in all locally created Snort
2 inline policies
If your managed device is deployed inline on your network, you can set the rule that triggered the event
to drop packets that trigger the rule in all policies that you can edit locally. Alternately, you can set the
rule only in the current policy (that is, the policy that generated the event) if you can edit the current
policy locally.
Note that the current policy option appears only when you can edit the current policy; for example, you
can edit a custom policy, but you cannot edit a default policy provided by the system. Note also that this
option appears only when Drop when Inline is enabled in the current policy.
• Edit — For standard text rule events, click Edit (to edit the Snort 2 rule) or Edit Snort 3 Rule to modify
the rule that generated the event. If the event is based on a shared object rule, a decoder, or a preprocessor,
the rule is not available.
Note If you edit a system-provided rule (as opposed to a custom standard text rule), you actually
create a new local rule. Make sure you set the local rule to generate events and also disable
the original rule in the current intrusion policy. Note, however, that you cannot enable local
rules in the default policies.
• Generate events — Click Set this rule to generate events in all locally created Snort 2 policies to set
the rule to generate events.
If this event is generated by a standard text rule, you can set the rule to generate events in all policies
that you can edit locally.
Note that the current policy option appears only when you can edit the current policy; for example, you
can edit a custom policy, but you cannot edit a default policy provided by the system.
Note You cannot set shared object rules to generate events from the packet view, nor can you
disable rules in the default policies.
• Set suppression options — Expand Set Suppression Options and continue as described in Setting
Suppression Options within the Packet View, on page 771.
You can use this option to suppress the rule that triggered this event in all policies that you can edit
locally. Alternately, you can suppress the rule only in the current policy (that is, the policy that generated
the event) if you can edit the current policy locally.
Note that the current policy option appears only when you can edit the current policy; for example, you
can edit a custom policy, but you cannot edit a default policy provided by Cisco.
• Set threshold options — Expand Set Thresholding Options and continue as described in Setting Threshold
Options within the Packet View, on page 770.
You can use this option to create a threshold for the rule that triggered this even in all policies that you
can edit locally. Alternately, you create a threshold only for the current policy (that is, the policy that
generated the event) if you can edit the current policy locally.
Note that the current policy option appears only when you can edit the current policy; for example, you
can edit a custom policy, but you cannot edit a default intrusion policy provided by the system.
• View documentation — Click View Documentation to learn more about the rule that generated the
event. Optionally, then click Rule Documentation to view more-specific rule details.
Procedure
Step 1 Within the packet view of an intrusion event that was generated by an intrusion rule, expand Actions in the
Event Information section.
Step 2 Expand Set Thresholding Options and choose one of the two possible options:
• in the current Snort 2 policy (<policy_name>)
• in all locally created Snort 2 policies
Step 4 Click the appropriate threshold to indicate whether you want the event instances tracked by Source or
Destination IP address.
Step 5 In the Count field, enter the number of event instances you want to use as your threshold.
Step 6 In the Seconds field, enter a number between 1 and 86400 that specifies the time period for which event
instances are tracked.
Step 7 If you want to override any current thresholds for this rule in existing intrusion policies, check the Override
any existing settings for this rule check box.
Step 8 Click Save Thresholding.
Procedure
Step 1 Within the packet view of an intrusion event that was generated by an intrusion rule, expand Actions in the
Event Information section.
Step 2 Expand Set Suppression Options and click one of the two possible options:
• in the current Snort 2 policy (<policy_name>)
• in all locally created Snort 2 policies
Note The current policy option appears only when you can edit the current policy; for example, you
can edit a custom policy, but you cannot edit a default policy provided by Cisco.
• Click Source to suppress events generated by packets originating from a specified source IP address.
• Click Destination to suppress events generated by packets going to a specified destination IP address.
• Click Rule to completely suppress events for the rule that triggered this event.
Step 4 In the IP address or CIDR block field, enter the IP address or CIDR block/prefix length you want to specify
as the source or destination IP address.
Step 5 Click Save Suppression.
Related Topics
IP Address Conventions, on page 26
Frame n
The captured frame, where n is 1 for single-frame packets and the incremental frame number for multi-frame
packets. The number of captured bytes in the frame is appended to the frame number.
Arrival Time
The date and time the frame was captured.
Frame Number
The incremental frame number.
Frame Length
The length of the frame in bytes.
Capture Length
The length of the captured frame in bytes.
Frame is marked
Whether the frame is marked (true or false).
Protocols in frame
The protocols included in the frame.
Related Topics
The tag Keyword
TCP Stream Reassembly
Note Note that this example discusses Ethernet link layer information; other protocols may also appear.
The packet view reflects the protocol used at the data link layer. The following listing describes the information
you might see for an Ethernet II or IEEE 802.3 Ethernet packet in the packet view.
Destination
The MAC address for the destination host.
Note Ethernet can also use multicast and broadcast addresses as the destination address.
Source
The MAC address for the source host.
Type
For Ethernet II packets, the type of packet that is encapsulated in the Ethernet frame; for example, IPv6 or
ARP datagrams. Note that this item only appears for Ethernet II packets.
Length
For IEEE 802.3 Ethernet packets, the total length of the packet, in bytes, not including the checksum. Note
that this item only appears for IEEE 802.3 Ethernet packets.
Procedure
On the packet view, click the arrow next to the network layer protocol (for example, Internet Protocol) to
view more detailed information about network layer information related to the packet.
Note Note that this example discusses IP packets; other protocols may also appear.
Version
The Internet Protocol version number.
Header Length
The number of bytes in the header, including any IP options. An IP header with no options is 20 bytes long.
Total Length
The length of the IP packet, in bytes, minus the IP header.
Identification
The value that uniquely identifies an IP datagram sent by the source host. This value is used to trace fragments
of the same datagram.
Flags
The values that control IP fragmentation, where:
values for the Last Fragment flag indicate whether there are more fragments associated with the datagram:
• 0 — there are no more fragments associated with the datagram
• 1 — there are more fragments associated with the datagram
values for the Don’t Fragment flag control whether the datagram can be fragmented:
Fragment Offset
The value for the fragment offset from the beginning of the datagram.
Protocol
The transport protocol that is encapsulated in the IP datagram; for example, ICMP, IGMP, TCP, or UDP.
Header Checksum
The indicator for whether the IP checksum is valid. If the checksum is invalid, the datagram may have been
corrupted during transit or may be being used in an intrusion evasion attempt.
Source/Destination
The IP address or domain name for the source (or destination) host.
Note that to display the domain name, you must enable IP address resolution.
Click the address or domain name to view the context menu, then select Whois to do a whois search on the
host, View Host Profile to view host information, or choose an option to add the address to a global Block
list or Do-Not-Block list.
Traffic Class
An experimental 8-bit field in the IPv6 header for identifying IPv6 packet classes or priorities similar to the
differentiated services functionality provided for IPv4. When unused, this field is set to zero.
Flow Label
A optional 20-bit IPv6 hexadecimal value 1 to FFFFF that identifies a special flow such as non-default quality
of service or real-time service. When unused, this field is set to zero.
Payload Length
A 16-bit field identifying the number of octets in the IPv6 payload, which is comprised of all of the packet
following the IPv6 header, including any extension headers.
Next Header
An 8-bit field identifying the type of header immediately following the IPv6 header, using the same values
as the IPv4 Protocol field.
Hop Limit
An 8-bit decimal integer that each node that forwards the packet decrements by one. The packet is discarded
if the decremented value reaches zero.
Source
The 128-bit IPv6 address for the source host.
Destination
The 128-bit IPv6 address for the destination host.
Procedure
Step 1 On the packet view, click the arrow next to the transport layer protocol (for example, TCP, UDP, or ICMP).
Step 2 Optionally, click Data when present to view the first twenty-four bytes of the payload for the protocol
immediately above it in the Packet Information section of the packet view.
Step 3 View the contents of the transport layer for TCP, UDP, and ICMP protocols as described in TCP Packet View
Fields, on page 776, UDP Packet View Fields, on page 777, or ICMP Packet View Fields, on page 778.
Note Note that these examples discuss TCP, UDP, and ICMP packets; other protocols may also appear.
Source port
The number that identifies the originating application protocol.
Destination port
The number that identifies the receiving application protocol.
Sequence number
The value for the first byte in the current TCP segment, keyed to initial sequence number in the TCP stream.
Acknowledgement number
The TCP acknowledgement, which is keyed to the sequence number of the previously accepted data.
Header Length
The number of bytes in the header.
Flags
The six bits that indicate the TCP segment’s transmission state:
• U — the urgent pointer is valid
• A — the acknowledgement number is valid
• P — the receiver should push data
• R — reset the connection
• S — synchronize sequence numbers to start a new connection
• F — the sender has finished sending data
Window size
The amount of unacknowledged data, in bytes, that the receiving host will accept.
Checksum
The indicator for whether the TCP checksum is valid. If the checksum is invalid, the datagram may have been
corrupted during transit or may be being used in an in evasion attempt.
Urgent Pointer
The position, if present, in the TCP segment where the urgent data ends. Used in conjunction with the U flag.
Options
The values, if present, for TCP options.
Source port
The number that identifies the originating application protocol.
Destination port
The number that identifies the receiving application protocol.
Length
The combined length of the UDP header and data.
Checksum
The indicator for whether the UDP checksum is valid. If the checksum is invalid, the datagram may have been
corrupted during transit.
Type
The type of ICMP message:
• 0 — echo reply
• 3 — destination unreachable
• 4 — source quench
• 5 — redirect
• 8 — echo request
• 9 — router advertisement
• 10 — router solicitation
• 11 — time exceeded
• 12 — parameter problem
• 13 — timestamp request
• 14 — timestamp reply
• 15 — information request (obsolete)
• 16 — information reply (obsolete)
• 17 — address mask request
• 18 — address mask reply
Code
The accompanying code for the ICMP message type. ICMP message types 3, 5, 11, and 12 have corresponding
codes as described in RFC 792.
Checksum
The indicator for whether the ICMP checksum is valid. If the checksum is invalid, the datagram may have
been corrupted during transit.
Procedure
On the packet view, click the arrow next to Packet Bytes to view hexadecimal and ASCII versions of the
bytes that comprise the packet. If the system decrypted traffic, you can view the decrypted packet bytes.
Procedure
Host Statistics
The Host Statistics section of the Intrusion Event Statistics page provides information about the appliance
itself. On the Secure Firewall Management Center, this section also provides information about any managed
devices.
This information includes the following:
Time
The current time on the appliance.
Uptime
The number of days, hours, and minutes since the appliance itself was restarted. On the Secure Firewall
Management Center, the uptime also shows the last time each managed device was rebooted, the number
of users logged in, and the load average.
Disk Usage
The percentage of the disk that is being used.
Memory Usage
The percentage of system memory that is being used.
Load Average
The average number of processes in the CPU queue for the past 1 minute, 5 minutes, and 15 minutes.
Event Overview
The Event Overview section of the Intrusion Event Statistics page provides an overview of the information
in the intrusion event database.
These statistics include the following:
Events
The number of events in the intrusion event database.
Events in Time Range
The currently selected time range as well as the number and percentage of events from the database that
fall within the time range.
First Event
The event message for the first event in the event database.
Last Event
The event message for the last event in the event database.
Note If you select a managed device while viewing intrusion event data on the Secure Firewall Management Center,
the Event Overview section for that device appears instead.
Event Statistics
The Event Statistics section of the Intrusion Event Statistics page provides more specific information about
of the information in the intrusion event database.
This information includes details on:
• the top 10 event types
• the top 10 source IP addressees
• the top 10 destination IP addresses
• the top 10 destination ports
• the protocols, ingress and egress security zones, and devices with the greatest number of events
Note In a multidomain deployment, the system builds a separate network map for each leaf domain. As a result, a
leaf domain can contain an IP address that is unique within its network, but identical to an IP address in another
leaf domain. When you view event statistics in an ancestor domain, the system may display multiple instances
of that repeated IP address. At first glance, they might appear to be duplicate entries. However, if you drill
down to the host profile information for each IP address, the system shows that they belong to different leaf
domains.
Note New data is accumulated for statistics graphs every five minutes. Therefore, if you reload a graph quickly,
the data may not change until the next five-minute increment occurs. Each graph displays average values in
the intervals shown (day, hour, or five minutes) for the selected time period (last month, week, day, or hour).
Decimal values are displayed when the average is less than one.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Procedure
Step 3 From the Select Graph(s) list, choose the type of graph you want to create as described in Intrusion Event
Performance Statistics Graph Types, on page 782.
Step 4 From the Select Time Range list, choose the time range you would like to use for the graph.
Step 5 Click Graph.
Step 6 To save the graph, right-click it and follow the instructions for your browser to save the image.
Avg Bytes/Packet n/a the average number of bytes included in each packet. no
ECN Flags Normalized in enable Explicit Congestion the number of packets for which ECN flags have been yes
TCP Traffic/Packet Notification and select Packet cleared on a per-packet basis regardless of negotiation.
ECN Flags Normalized in enable Explicit Congestion the number of times that ECN flags have been cleared yes
TCP Traffic/Session Notification and select Stream on a per-stream basis when ECN use was not
negotiated.
ICMPv4 Echo enable Normalize ICMPv4 the number of ICMPv4 packets for which the 8-bit yes
Normalizations Code field in Echo (Request) or Echo Reply messages
were cleared.
ICMPv6 Echo enable Normalize ICMPv6 the number of ICMPv6 packets for which the 8-bit yes
Normalizations Code field in Echo (Request) or Echo Reply messages
was cleared.
IPv4 DF Flag enable Normalize IPv4 and the number of IPv4 packets for which the single-bit yes
Normalizations Normalize Don’t Fragment Don’t Fragment subfield of the IPv4 Flags header
Bit field was cleared.
IPv4 Options enable Normalize IPv4 the number of IPv4 packets for which the option octet yes
Normalizations was set to 1 (No Operation).
IPv4 Reserved Flag enable Normalize IPv4 and the number of IPv4 packets for which the single-bit yes
Normalizations Normalize Reserved Bit Reserved subfield of the IPv4 Flags header field was
cleared.
IPv4 Resize Normalizations enable Normalize IPv4 the number of IPv4 packets with excessive-length yes
payload that have been truncated to the datagram
length specified in the IP header.
IPv4 TOS Normalizations enable Normalize IPv4 and the number of IPv4 packets for which the one-byte yes
Normalize TOS Bit Differentiated Services (DS) field (formerly known
as the Type of Service (TOS) field) was cleared.
IPv4 TTL Normalizations enable Normalize IPv4, the number of IPv4 Time to Live normalizations. yes
Maximum TTL, and Reset
TTL
IPv6 Options enable Normalize IPv6 the number of IPv6 packets for which the Option Type yes
Normalizations field in the Hop-by-Hop Options or Destination
Options extension header was set to 00 (Skip and
continue processing).
IPv6 TTL Normalizations enable Normalize IPv6, the number of IPv6 Hop Limit (TTL) normalizations. yes
Minimum TTL, and Reset
TTL
Packet Resized to Fit MSS enable Trim Data to MSS the number of packets for which the payload was yes
Normalizations longer than the TCP Data field, so the payload was
trimmed to the Maximum Segment Size.
Packet Resized to Fit TCP enable Trim Data to Window the number of packets for which the TCP Data field yes
Window Normalizations was trimmed to fit the receiving host’s TCP window.
Percent Packets Dropped n/a the average percentage of uninspected packets across no
all selected devices. For example, if you select two
devices, then an average of 50% may indicate that
one device has a 90% drop rate and the other has a
10% drop rate. It may also indicate that both devices
have a drop rate of 50%. The graph only represents
the total % drop when you select a single device.
RST Packets With Data enable Remove Data on RST the number of packets for which data was removed yes
Stripped Normalizations from a TCP reset (RST) packet.
SYN Packets With Data enable Remove Data on SYN the number of packets for which data was removed yes
Stripped Normalizations from SYN packets when the TCP operating system
was not Mac OS.
TCP Header Padding enable Normalize/Clear the number of TCP packets in which option padding yes
Normalizations Option Padding Bytes bytes were set to 0.
TCP No Option enable Allow These TCP the number of packets from which the Time Stamp yes
Normalizations Options and set to an option option was stripped.
other than any
TCP NS Flag enable Explicit Congestion the number of ECN Nonce Sum (NS) option yes
Normalizations Notification and select Packet normalizations.
TCP Options enable Allow These TCP the number of options (excluding MSS, Window yes
Normalizations Options and set to an option Scale, Time Stamp, and explicitly allowed options)
other than any for which the option field is set to No Operation (TCP
Option 1).
TCP Packets Blocked By enable Normalize TCP the number of packets dropped because the TCP yes
Normalizations Payload (segment reassembly segments could not be properly reassembled.
must fail)
TCP Reserved Flags enable Normalize/Clear the number of TCP packets where the Reserved bits yes
Normalizations Reserved Bits have been cleared.
TCP Segment Reassembly enable Normalize TCP the number of packets for which the TCP Data field yes
Normalizations Payload (segment reassembly was normalized to ensure consistency in retransmitted
must be successful) data (any segments that cannot be properly
reassembled are dropped).
TCP SYN Option enable Allow These TCP the number of options for which the Maximum yes
Normalizations Options and set to an option Segment Size or Window Scale option was set to No
other than any Operation (TCP Option 1) because the SYN control
bit was not set.
TCP Timestamp ECR enable Allow These TCP the number of packets for which the Time Stamp Echo yes
Normalizations Options and set to an option Reply (TSecr) option field was cleared because the
other than any Acknowledgment (ACK) control bit was not set.
TCP Urgent Pointer enable Normalize Urgent the number of packets for which the two-byte TCP yes
Normalizations Pointer header Urgent Pointer field was greater than the
payload length and was set to the payload length.
Total Blocked Packets configure Inline Mode or Drop the total number of dropped packets, including rule, no
when Inline decoder, and preprocessor drops.
Total Injected Packets configure Inline Mode the number of packets that were resized before being no
retransmitted.
Total TCP Filtered Packets configure TCP Stream the number of packets skipped by the stream because no
Preprocessing of TCP port filtering.
Total UDP Filtered Packets configure UDP Stream the number of packets skipped by the stream because no
Preprocessing of UDP port filtering.
Urgent Flag Cleared enable Clear URG if Urgent the number of packets for which the TCP header URG yes
Normalizations Pointer is Not Set control bit was cleared because the urgent pointer was
not set.
Urgent Pointer and Urgent enable Clear Urgent the number of packets for which the TCP header yes
Flag Cleared Normalizations Pointer/URG on Empty Urgent Pointer field and the URG control bit have
Payload been cleared because there was no payload.
Urgent Pointer Cleared enable Clear Urgent Pointer the number of packets for which the 16-bit TCP yes
Normalizations if URG=0 header Urgent Pointer field was cleared because the
urgent (URG) control bit was not set.
Related Topics
The Inline Normalization Preprocessor
Preprocessor Traffic Modification in Inline Deployments
Drop Behavior in an Inline Deployment
Procedure
Step 4 Under Select Time Range, choose the time range for the graph:
• Last Hour
• Last Day
• Last Week
• Last Month
IPS Events Datastore 7.1 • Intrusion incidents, the intrusion event clipboard, and default custom tables (that use the intrusion
Replacement event columns - Intrusion Events with Source Criticality and Intrusion Events with Destination
Criticality) are deprecated.
You can no longer add events to the clipboard using the Copy and Copy All buttons.
Deprecated pages:
• Analysis > Intrusions > Clipboard
• Analysis > Intrusions > Incidents
• Two new fields are added to the main intrusion event table - Source Host Criticality and
Destination Host Criticality.
Unique identifier for 6.4.0.4 The following syslog fields collectively uniquely identify a connection event and appear in syslogs for
connection event in syslogs intrusion events: DeviceUUID, First Packet Time, Connection Instance ID, and Connection Counter.
IntrusionPolicy field is 6.4 Intrusion event syslogs now specify the intrusion policy that triggered the event.
now included in syslog
New intrusion event search 6.4 You can now search by MITRE’s Common Vulnerabilities and Exposures identification number
field: CVE ID
Modified screens: Analysis > Intrusions > Events > Edit Search
Supported Platforms: All.
The Context Explorer, dashboards, and reporting features can also aid a deeper understanding of the files and
malware detected, captured, and blocked. You can also use events to trigger correlation policy violations, or
alert you via email, SMTP, or syslog.
Note To configure your system to detect malware and generate file and malware events, see Network Malware
Protection and File Policies in the Cisco Secure Firewall Management Center Device Configuration Guide.
Note • Files identified as malware by malware defense generate both a file event and a malware event. Malware
events generated by Secure Endpoint do not have corresponding file events.
• File events generated by inspecting NetBIOS-ssn (SMB) traffic do not immediately generate connection
events because the client and server establish a persistent connection. The system generates connection
events after the client or server ends the session.
• The system supports the display and input of file names that use Unicode (UTF-8) characters. However,
Unicode file names appear in PDF reports in transliterated form. Additionally, the SMB protocol replaces
unprintable characters in file names with periods.
Malware Events
The system (specifically the malware defense feature) generates malware events when it detects malware in
network traffic as part of your overall access control configuration. Malware events contain the disposition
of the resulting event and contextual data about how, where, and when the malware was detected.
File Rule Action File Disposition File Action in the Malware Event
Selected
• The Secure Firewall Management Center changes the file disposition for previously detected files with
the retrospective event’s associated SHA-256 hash value.
If a file’s disposition changes to Malware, the Secure Firewall Management Center logs a new malware
event to its database. Except for the new disposition, the information in this new malware event is identical
to that in the file event generated when the file was initially detected.
If a file’s disposition changes to Clean, the Secure Firewall Management Center does not delete the
malware event. Instead, the event reflects the change in disposition. This means that files with clean
dispositions can appear in the malware table, but only if they were originally thought to be malware.
Files that were never identified as malware appear only in the files table.
When a file is positively identified as malware, the AMP cloud sends the threat identification to the Secure
Firewall Management Center. The AMP cloud can also send other kinds of information to the Secure Firewall
Management Center, including data on scans, quarantines, blocked executions, and cloud recalls. The Secure
Firewall Management Center logs this information as malware events.
Note The IP addresses reported in malware events generated by Secure Endpoint may not be in your network
map—and may not even be in your monitored network at all. Depending on your deployment, level of
compliance, and other factors, endpoints in your organization monitored by Secure Endpoint may not be the
same hosts as those monitored by malware defense.
To configure the above functionality, see Integrate Firepower and Secure Endpoint in the Cisco Secure
Firewall Management Center Device Configuration Guide.
Note Depending on your deployment, endpoints monitored by Secure Endpoint may not be the same hosts as those
monitored by malware defense. For this reason, malware events generated by Secure Endpoint do not add
hosts to the network map. However, the system uses IP and MAC address data to tag monitored hosts with
indications of compromise obtained from your Secure Endpoint deployment. If two different hosts monitored
by different malware solutions have the same IP and MAC address, the system can incorrectly tag monitored
hosts with Secure Endpoint IOCs.
The following table summarizes the differences between the event data generated by Firepower when using
a Malware Defense license, and event data generated by Secure Endpoint.
Events generated File events, captured files, malware events, and Malware events
retrospective malware events
Information in malware Basic malware event information, plus connection In-depth malware event information; no
events data (IP address, port, and application protocol) connection data
Network file trajectory management center-based management center and the Secure Endpoint
management console each have a network file
trajectory. Both are useful.
Related Topics
Integrate Firepower and Secure Endpoint in the Cisco Secure Firewall Management Center Device
Configuration Guide
Procedure
Tip To quickly view the connections where specific files were detected, choose the files using the
check boxes in the table, then choose Connections Events from the Jump to drop-down list.
Tip Right-click an item in the table to see options. (Not every column offers options.)
Related Topics
File and Malware Event Fields, on page 793
Predefined File Workflows, on page 627
Predefined Malware Workflows, on page 627
Configuring Event View Settings, on page 192
Note Files identified as malware by malware defense generate both a file event and a malware event. Malware
events generated by Secure Endpoint do not have corresponding file events, and file events do not have Secure
Endpoint-related fields.
Syslog messages are populated with initial values and do not update, even if the equivalent field in the
management center web interface is updated, for example with a retrospective verdict.
AMP Cloud
The name of the AMP cloud where the AMP for Endpoints event originated.
Application Risk
The risk associated with the application traffic detected in the connection: Very High, High, Medium, Low,
or Very Low. Each type of application detected in the connection has an associated risk; this field displays
the highest of those.
Business Relevance
The business relevance associated with the application traffic detected in the connection: Very High, High,
Medium, Low, or Very Low. Each type of application detected in the connection has an associated business
relevance; this field displays the lowest (least relevant) of those.
Count
After you apply a constraint that creates two or more identical rows, the number of events that match the
information in each row.
Detection Name
The name of the detected malware.
Detector
The AMP for Endpoints detector that identified the malware, such as ClamAV, Spero, or SHA.
Device
For file events and for malware events generated by Firepower devices, the name of the device that detected
the file.
For malware events generated by AMP for Endpoints and for retrospective malware events generated by the
AMP cloud, the name of the management center.
Clean
Indicates that the AMP cloud categorized the file as clean, or that a user added the file to the clean list.
Clean files appear in the malware table only if they were changed to clean.
Unknown
Indicates that the system queried the AMP cloud, but the file has not been assigned a disposition; in other
words, the AMP cloud has not categorized the file.
Custom Detection
Indicates that a user added the file to the custom detection list.
Unavailable
Indicates that the system could not query the AMP cloud. You may see a small percentage of events with
this disposition; this is expected behavior.
N/A
Indicates a Detect Files or Block Files rule handled the file and the Secure Firewall Management Center
did not query the AMP cloud.
File dispositions appear only for files for which the system queried the AMP cloud.
Syslog fields reflect only the initial disposition; they do not update to reflect retrospective verdicts.
Domain
For file events and for malware events generated by Firepower devices, the domain of the device that detected
the file. For malware events generated by AMP for Endpoints and for retrospective malware events generated
by the AMP cloud, the domain associated with the AMP cloud connection that reported the event.
This field is only present if you have ever configured the management center for multitenancy.
Event Subtype
The AMP for Endpoints action that led to malware detection, for example, Create, Execute, Move, or Scan.
Event Type
The sub-type of malware event.
File Path
The file path of the malware file detected by AMP for Endpoints, not including the file name.
File Timestamp
The time and date that AMP for Endpoints detected the malware file was created.
IOC
Whether the malware event triggered an indication of compromise (IOC) against a host involved in the
connection. When AMP for Endpoints data triggers an IOC rule, a full malware event is generated, with the
type AMP IOC.
Message
Additional information associated with a malware event. For file events and for malware events generated by
Firepower devices, this field is populated only for files whose disposition has changed, that is, that have an
associated retrospective event.
MITRE
A count of techniques that you can click to bring up a modal, which shows the full list of MITRE tactics and
techniques within that heirarchy.
Receiving Continent
The continent of the host receiving the file.
Receiving Country
The country of the host receiving the file.
Receiving IP
In the management center web interface, for file events and for malware events generated by Firepower
devices, the IP address of the host receiving the file. See also A Note About Initiator/Responder,
Source/Destination, and Sender/Receiver Fields, on page 725.
For malware events generated by AMP for Endpoints, the IP address of the endpoint whose connector reported
the event.
For syslog equivalents (events generated by Firepower devices only), see DstIP and SrcIP.
Receiving Port
In the management center web interface, the destination port used by the traffic where the file was detected.
For syslog equivalents, see DstIP and SrcIP and DstPort and SrcPort.
Sending Continent
The continent of the host sending the file.
Sending Country
The country of the host sending the file.
Sending IP
In the management center web interface, the IP address of the host sending the file. See also A Note About
Initiator/Responder, Source/Destination, and Sender/Receiver Fields, on page 725.
For syslog equivalents, see DstIP and SrcIP.
Sending Port
In the management center web interface, the source port used by the traffic where the file was detected.
For syslog equivalents, see DstIP and SrcIP and DstPort and SrcPort.
This column also displays a network file trajectory icon that represents the most recently detected file event
and file disposition, and that links to the network file trajectory.
Note that if the system determines the file type of a file before the file is fully received, the file size may not
be calculated. In this case, this field is blank.
Field values are displayed in the SSL Status field on the search workflow pages.
SSL Status
The action associated with the SSL Actual Action (Decryption rule, default action, or undecryptable traffic
action) that logged the encrypted connection. The Lock icon links to TLS/SSL certificate details. If the
certificate is unavailable (for example, for connections blocked due to TLS/SSL handshake error), the lock
icon is grayed out.
If the system fails to decrypt an encrypted connection, it displays the SSL Actual Action (undecryptable
traffic action) taken, as well as the SSL Failure Reason. For example, if the system detects traffic encrypted
with an unknown cipher suite and allows it without further inspection, this field displays Do Not Decrypt
(Unknown Cipher Suite).
When searching this field, type one or more of the SSL Actual Action and SSL Failure Reason values to
view encrypted traffic the system handled or failed to decrypt.
Time
The date and time the event was generated. This field is not searchable.
In syslog messages, see FirstPacketSecond.
Malware Event Subtype/Search Value malware defense Secure Endpoint File Trajectory
Malware Event Subtype/Search Value malware defense Secure Endpoint File Trajectory
Detector no no no yes
Tip To see additional options, right-click a file SHA in a table on an event page. For information, see Event
Investigation Using Web-Based Resources, on page 598.
Procedure
The Secure Firewall Management Center caches a file’s threat score for the same amount of time as the file’s
disposition. If the system later detects these files, it displays the cached threat scores instead of re-querying
the Secure Malware Analytics Cloud or Secure Malware Analytics Appliance. You can automatically assign
a malware file disposition to any file with a threat score that exceeds the defined malware threshold threat
score.
Procedure
Step 1 Access the Secure Malware Analytics Cloud portal at the address provided in your Secure Malware Analytics
documentation.
Step 2 Sign in with the account credentials that you used to create the association in the prerequisites to this task.
Step 3 View files submitted by your organization, or search for a particular file using its SHA.
If you have questions, see the Secure Malware Analytics documentation.
Note If a device captures a file containing malware, the device generates two events: a file event when it detects
the file, and a malware event when it identifies malware.
Use this procedure to view a list of captured files in a table and manipulate the event view depending on the
information relevant to your analysis. The page you see when you access captured files differs depending on
the workflow, which is simply a series of pages you can use to evaluate events by moving from a broad to a
more focused view. You can also create a custom workflow that displays only the information that matches
your specific needs.
If the system recaptures a file after a configuration change, such as an updated file policy, it updates existing
information for that file.
For example, if you configure a file policy to capture files with a Malware Cloud Lookup action, the system
stores the file disposition and threat score along with the file. Then, if you update your file policy, and the
system recaptures the same file due to a new Detect Files action, the system updates the file's Last Changed
value. However, the system does not remove the existing disposition and threat score, even though you did
not perform another malware cloud lookup.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Procedure
Tip In the table view of events, several fields are hidden by default. To show a hidden field in an
event view, expand the search constraints, then click the field name under Disabled Columns.
Related Topics
Captured File Fields, on page 810
Predefined Captured File Workflows, on page 628
Configuring Event View Settings, on page 192
Field Description
To view the contents of an archive file, right-click on its row in the table to bring up the context menu,
then choose View Archive Contents.
Category The general categories of file type, for example: Office Documents, Archive, Multimedia, Executables,
PDF files, Encoded, Graphics, or System Files.
Field Description
Domain The domain where the captured file was detected. This field is only present if you have ever configured
the management center for multitenancy.
Dynamic Analysis One or more of the following values indicating whether the file was submitted for dynamic analysis:
Status
• Analysis Complete — file submitted for dynamic analysis that received a threat score and dynamic
analysis summary report
• Capacity Handled — file stored because it could not be submitted currently
• Capacity Handled (Network Issue) — file stored because it could not be submitted due to a network
connectivity issue
• Capacity Handled (Rate Limit) — file stored because it could not be submitted due to the maximum
number of submissions reached
• Device Not Activated — file not submitted because the device is not activated on the on-premises
Secure Malware Analytics Appliance. If you see this status, contact Support.
• Failure (Analysis Timeout) — file submitted for which the AMP cloud has yet to return a result
• Failure (Cannot Run File) — file submitted that the AMP cloud could not run in the test environment
• Failure (Network Issue) — file that did not get submitted due to a network connectivity failure
• Not Sent for Analysis — file not submitted
• Not Suspicious (Not Sent For Analysis) — file pre-classified as non-malware
• Previously Analyzed — file with a cached threat score, indicating that it has been previously sent
• Rejected for Analysis — based on static analysis, the file is unlikely to pose a risk, for example because
it includes no dynamic elements.
• Sent for Analysis — file pre-classified as malware and queued for dynamic analysis
Field Description
Dynamic Analysis The last time the file's dynamic analysis status changed.
Status Changed
File Name The most recently detected file name associated with the file’s SHA-256 hash value.
Last Changed The last time the information associated with this file was updated.
Last Sent The time the file was most recently submitted to the AMP cloud for dynamic analysis.
Local Malware One of the following values indicating whether the system performed local malware analysis on a file:
Analysis Status
• Analysis Complete — the system inspected the file using local malware analysis and pre-classified
the file
• Analysis Failed — the system attempted to inspect the file using local malware analysis and failed
• Manual Request Submitted — a user submitted a file for local malware analysis
• Not Analyzed — the system did not inspect the file with local malware analysis
SHA256 The SHA-256 hash value of the file, as well as a network file trajectory icon representing the most recently
detected file event and file disposition. To view the network file trajectory, click the trajectory icon.
Threat Score The threat score most recently associated with this file.
To view the Dynamic Analysis Summary report, click the threat score icon.
Caution Cisco strongly recommends you do not download malware, as it can cause adverse consequences. Exercise
caution when downloading any file, as it may contain malware. Ensure you have taken any necessary precautions
to secure the download destination before downloading files.
Note The system checks the AMP cloud for updates (no more than once a day) to the list of file types eligible for
dynamic analysis and the minimum and maximum file sizes you can submit.
Depending on the situation, there are two ways to submit files for analysis:
Procedure
Tip To view related file events, click a field value link. The first page in the File Events default workflow opens
in a new window, displaying all file events that also contain the selected value.
Name Description
Archive Contents For inspected archive files, the number of files the archive contains.
Event Count The number of events seen on the network associated with the file, and the number of events displayed
in the map if there are more than 250 detected events.
File Category The general categories of file type, for example, Office Documents or System Files.
File Names The names of the file associated with the event, as seen on the network.
If multiple file names are associated with a SHA-256 hash value, the most recent detected file name is
listed. You can expand this to view the remaining file names by clicking more.
Name Description
File Type The file type of the file, for example, HTML or MSEXE.
First Seen The first time malware defense or Secure Endpoint detected the file, as well as the IP address of the
host that first uploaded the file and identifying information for the user involved.
Last Seen The most recent time malware defense or Secure Endpoint detected the file, as well as the IP address
of the host that last downloaded the file and identifying information for the user involved.
Parent Application The client application accessing the malware file when detection occurred by Secure Endpoint. These
applications are not tied to network discovery or application control.
Seen On The number of hosts that either sent or received the file. Because one host can upload and download a
file at different times, the total number of hosts may not match the total number of senders plus the total
number of receivers in the Seen On Breakdown field.
Seen On Breakdown The number of hosts that sent the file, followed by the number of hosts that received the file.
Threat Name Name of the threat associated with the detected malware by AMP for Endpoints.
• any malware events generated by Secure Endpoint ("endpoint-based malware events") involving the
associated IP address
• if another IP address was involved, all file transfers in which that associated IP address was either sender
or receiver
• if another IP address was involved, any malware events generated by Secure Endpoint ("endpoint-based
malware events") involving the other IP address
All IP addresses and timestamps associated with any highlighted data point are also highlighted. The
corresponding event in the Events table is also highlighted. If a path includes truncated events, the path itself
is highlighted with a dotted line. Truncated events might intersect the path, but are not displayed in the map.
Tip If your organization has deployed Secure Endpoint, that product also has a network file trajectory feature. To
pivot from management center to Secure Endpoint, see Work with Event Data in the Secure Endpoint Console,
on page 818. For details about the file trajectory feature in Secure Endpoint, see the Secure Endpoint
documentation.
Procedure
• Download a file — To download a file, click Download ( ), and if prompted, confirm you want to
download the file. If the file is unavailable for download, this download file is dimmed.
• Report — Click threat score to view the Dynamic Analysis Summary report.
• Submit for dynamic analysis — Click AMP Cloud to submit the file for dynamic analysis. If the file is
unavailable for submission or you cannot connect to the AMP cloud, this AMP cloud is dimmed.
• View archive contents — To view information about an archive file’s contents, click View ( ).
• View file composition — To view a file's composition, click File List. If the system has not generated
a file composition report, this file list is dimmed.
• View captured files with same threat score — Click the threat score link to view all captured files with
that threat score.
Note Cisco strongly recommends you do not download malware, as it can cause adverse consequences.
Exercise caution when downloading any file, as it may contain malware. Ensure you have taken
any necessary precautions to secure the download destination before downloading files.
Tip For information about using Secure Endpoint and its console, see the online help in the console or other
documentation available from https://www.cisco.com/c/en/us/support/security/fireamp-endpoints/
tsd-products-support-series-home.html
To access the Secure Endpoint console from the Secure Firewall Management Center, do one of the following:
Procedure
Step 1 Method 1:
a) Choose Integration > AMP > AMP Management.
b) Click the cloud name in the table.
Step 2 Method 2:
a) Navigate to a malware event in a table under Analysis > Files.
b) Right-click a file SHA and choose the Secure Endpoint option.
History for File and Malware Events and Network File Trajectory
Feature Version Details
MITRE information in file 7.4 The system now includes MITRE information (from local malware analysis) in file and
and malware events. malware events. You can view MITRE information in both the classic and unified events
views. Note that the MITRE column is hidden by default in both event views.
Minimum threat defense: 7.4
Improved preclassification 6.7 Additional assessment avoids unnecessary sending of files for dynamic analysis. The
of files for dynamic new Dynamic Analysis Status for files not sent to the cloud based on this assessment
analysis. is Rejected for Analysis.
New/modified screens: Analysis > Captured Files > Table View of Captured Files
Unique identifier for 6.4.0.4 The following syslog fields collectively uniquely identify a connection event and appear
connection events in in syslogs for file and malware events: DeviceUUID, First Packet Time, Connection
syslogs. Instance ID, and Connection Counter.
Send file and malware 6.4 Field descriptions in this chapter specify the fields included in syslog messages.
events via syslog.
For configuration information, see Configuration Locations for Syslogs for File and
Malware Events, on page 609.
Supported Domains
Any
User Roles
• Admin
• Security Analyst
Host Profiles
A host profile provides a complete view of all the information the system has gathered about a single host.
To access a host profile:
• navigate from any network map view.
• navigate from any event view that includes the IP addresses of hosts on monitored networks.
Host profiles provide basic information about detected hosts or devices, such as the host name or MAC
addresses. Depending on your licenses and system configuration, host profiles can also provide you with the
following information:
• the operating system running on a host
• the servers running on a host
• the clients and web applications running on a host
• the protocols running on a host
• the indications of compromise (IOC) tags on a host
• the VLAN tags on a host
• the last twenty-four hours of user activity on your network
• the compliance allow violations associated with a host
• the most recent malware events for a host
• the vulnerabilities associated with a host
• the Nmap scan results for a host
Host attributes are also listed in the profile. You can use host attributes to classify hosts in ways that are
important to your network environment. For example, you can:
• assign a host attribute that indicates the building where the host is located
• use the host criticality attribute to designate the business criticality of a given host and tailor correlation
policies and alerts based on host criticality
From a host profile, you can view the existing host attributes applied to that host and modify the host attribute
values.
If you use adaptive profile updates as part of a passive intrusion prevention deployment, you can tailor the
way the system processes traffic so it best fits the type of operating system on the host and the servers and
clients the host is running.
Optionally, you can perform an Nmap scan from the host profile to augment the server and operating system
information in your host profile. The Nmap scanner actively probes the host to obtain information about the
operating system and servers running on the host. The results of the scan are added to the list of operating
system and server identities for the host.
Related Topics
Viewing Host Profiles, on page 823
Unavailable Information
The information displayed in a host profile may vary according to the type of host and the information
available about the host.
For example:
• If your system detects a host using a non-IP-based protocol like STP, SNAP, or IPX, the host is
added to the network map as a MAC host and much less information is available than for an IP host.
• The system can add hosts to the network map from exported NetFlow records, but the available
information for these hosts is limited; see Differences between NetFlow and Managed Device Data.
Domain
The domain associated with the host.
IP Addresses
All IP addresses (both IPv4 and IPv6) associated with the host. The system detects IP addresses associated
with hosts and, where supported, groups multiple IP addresses used by the same host. IPv6 hosts often have
at least two IPv6 addresses (local-only and globally routable), and may also have IPv4 addresses. IPv4-only
hosts may have multiple IPv4 addresses.
The host profile lists all detected IP addresses associated with that host. Where available, routable host IP
addresses also include a flag icon and country code indicating the geolocation data associated with that address.
Note that only the first three addresses are shown by default. Click show all to show all addresses for a host.
Hostname
The fully qualified domain name of the host, if known.
NetBIOS Name
The NetBIOS name of the host, if available. Microsoft Windows hosts, as well as Macintosh, Linux, or other
platforms configured to use NetBIOS, can have a NetBIOS name. For example, Linux hosts configured as
Samba servers have NetBIOS names.
Device (Hops)
Either:
• the reporting device for the network where the host resides, as defined in the network discovery policy,
or
• the device that processed the NetFlow data that added the host to the network map
The number of network hops between the device that detected the host and the host itself follows the device
name, in parentheses. If multiple devices can see the host, the reporting device is displayed in bold.
If this field is blank, either:
• the host was added to the network map by a device that is not explicitly monitoring the network where
the host resides, as defined in the network discovery policy, or
• the host was added using the host input feature and has not also been detected by the system.
Host Type
The type of device that the system detected: host, mobile device, jailbroken mobile device, router, bridge,
NAT device, or load balancer.
The methods the system uses to distinguish network devices include:
• the analysis of Cisco Discovery Protocol (CDP) messages, which can identify network devices and their
type (Cisco devices only)
• the detection of the Spanning Tree Protocol (STP), which identifies a device as a switch or bridge
• the detection of multiple hosts using the same MAC address, which identifies the MAC address as
belonging to a router
• the detection of TTL value changes from the client side, or TTL values that change more frequently than
a typical boot time, which identify NAT devices and load balancers
• The methods the system uses to distinguish mobile devices include:
• analysis of User-Agent strings in HTTP traffic from the mobile device’s mobile browser
• monitoring of HTTP traffic of specific mobile applications
Last Seen
The date and time that any of a host’s IP addresses was last detected.
Current User
The user most recently logged into this host.
Note that a non-authoritative user logging into a host only registers as the current user on the host if the existing
current user is not an authoritative user.
View
Links to views of connection, discovery, malware, and intrusion event data, using the default workflow for
that event type and constrained to show events related to the host; where possible, these events include all IP
addresses associated with the host.
Because the operating system affects the vulnerabilities list for the host and the event impact correlation for
events targeting the host, you may want to manually supply more specific operating system information. In
addition, you can indicate that fixes have been applied to the operating system, such as service packs and
updates, and invalidate any vulnerabilities addressed by the fixes.
For example, if the system identifies a host’s operating system as Microsoft Windows 2003, but you know
that the host is actually running Microsoft Windows XP Professional with Service Pack 2, you can set the
operating system identity accordingly. Setting a more specific operating system identity refines the list of
vulnerabilities for the host, so your impact correlation for that host is more focused and accurate.
If the system detects operating system information for a host and that information conflicts with a current
operating system identity that was supplied by an active source, an identity conflict occurs. When an identity
conflict is in effect, the system uses both identities for vulnerabilities and impact correlation.
You can configure the network discovery policy to add discovery data to the network map for hosts monitored
by NetFlow exporters. However, there is no operating system data available for these hosts, unless you set
the use the host input feature to set the operating system identity.
If a host is running an operating system that violates a compliance allow list in an activated network discovery
policy, the management center marks the operating system information with the allow list Violation. In
addition, if a jailbroken mobile device violates an active allow list, the icon appears next to the operating
system for the device.
You can set a custom display string for the host’s operating system identity. That display string is then used
in the host profile.
Note Changing the operating system information for a host may change its compliance with a compliance allow
list.
In the host profile for a network device, the label for the Operating Systems section changes to Systems and
an additional Hardware column appears. If a value for a hardware platform is listed under Systems, that system
represents a mobile device or devices detected behind the network device. Note that mobile devices may or
may not have hardware platform information, but hardware platform information is never detected for systems
that are not mobile devices.
Descriptions of the operating system information fields displayed in the host profile follow.
Hardware
The hardware platform for a mobile device.
OS Vendor/Vendor
The operating system vendor.
OS Product/Product
One of the following values:
• the operating system determined most likely to be running on the host, based on the identity data collected
from all sources
• Pending if the system has not yet identified an operating system and no other identity data is available
• unknown if the system cannot identify the operating system and no other identity data is available for the
operating system
Note If the host’s operating system is not one the system is capable of detecting, see .
OS Version/Version
The operating system version. If a host is a jailbroken mobile device, Jailbroken is indicated in parentheses
after the version.
Source
One of the following values:
• User: user_name
• Application: app_name
• Scanner: scanner_type (Nmap or other scanner)
• Firepower
The system may reconcile data from multiple sources to determine the identity of an operating system.
Procedure
Step 1 Click View in the Operating System or Operating System Conflicts section of a host profile.
Step 2 View the information described in Operating Systems in the Host Profile, on page 825.
This system removes the identity from the Operating System Identity Information pop-up window and, if
applicable, updates the current identity for the operating system in the host profile.
impact correlation. However, if the system detects a conflicting operating system identity for the host after
you edit the operating system, an operating system conflict occurs. Both operating systems are then considered
current until you resolve the conflict.
Procedure
Step 3 Optionally, choose Use Custom Display String and modify the custom strings you want to display in the
Vendor String, Product String, and Version String fields.
Step 4 Optionally, to change to an operating system from a different vendor, choose from the Vendor and Product
drop-down lists.
Step 5 Optionally, to configure the operating system product release level, choose from the Major, Minor, Revision,
Build, Patch, and Extension drop-down lists.
Step 6 Optionally, if you want to indicate that fixes for the operating system have been applied, click Configure
Fixes.
Step 7 Choose the applicable fixes in the drop-down list, and click Add.
Step 8 Optionally, add the relevant patches and extensions using the Patch and Extension drop-down lists.
Step 9 Click Finish.
Related Topics
Operating System Identity Conflicts, on page 828
Procedure
• Click Make Current next to the operating system identity you want to set as the operating system for
the host.
• If the identity that you do not want as the current identity came from an active source, delete the unwanted
identity.
Procedure
Step 1 Click Resolve in the Operating System Conflicts section of a host profile.
Step 2 You have the following choices:
• Choose Current Definition from the OS Definition drop-down list to confirm the current operating
system identity through host input, then skip to step 6.
• Choose a variation on one of the conflicting operating system identities from the OS Definition drop-down
list, then skip to step 6.
• Choose User-Defined from the OS Definition drop-down list, then continue with step 3.
Step 3 Optionally, choose Use Custom Display String and enter the custom strings you want to display in the
Vendor String, Product String, and Version String fields.
Step 4 Optionally, to change to an operating system from a different vendor, choose from the Vendor and Product
drop-down lists.
Step 5 Optionally, to configure the operating system product release level, choose from the Major, Minor, Revision,
Build, Patch, and Extension drop-down lists.
Step 6 Optionally, if you want to indicate that fixes for the operating system have been applied, click Configure
Fixes.
Step 7 Add the fixes you have applied to the fixes list.
Step 8 Click Finish.
Note The system can add hosts to the network map from exported NetFlow records, but the available information
for these hosts is limited; see Differences between NetFlow and Managed Device Data.
The process for working with servers in the host profile differs depending on how you access the profile:
• If you access the host profile by drilling down through the network map, the details for that server appear
with the server name highlighted in bold. If you want to view the details for any other server on the host,
click View ( ) next to that server name.
• If you access the host profile in any other way, expand the Servers section and click View ( ) next to
the server whose details you want to see.
Note If the host is running a server that violates a compliance allow list in an activated correlation policy, the
management center marks the non-compliant server with the allow list Violation.
Protocol
The name of the protocol the server uses.
Port
The port where the server runs.
Application Protocol
One of:
• the name of the application protocol
• pending if the system cannot positively or negatively identify the application protocol for one of several
reasons
• unknown if the system cannot identify the application protocol based on known application protocol
fingerprints, or if the server was added through host input by adding a vulnerability with port information
without adding a corresponding server
When you hover the mouse on an application protocol name, the tags display.
detects multiple vendors or versions of that server. For example, a load balancer between your managed device
and your web server farm may cause your system to identify multiple passive identities for HTTP if your web
servers are not running the same version of the server software. Note that the management center does not
limit the number of server identities from active sources such as user input, scanners, or other applications.
The management center displays the current identity in bold. The system uses the current identity of a server
for multiple purposes, including assigning vulnerabilities to a host, impact assessment, evaluating correlation
rules written against host profile qualifications and compliance allow lists, and so on.
The server detail may also display updated sub-server information known about the selected server.
The server detail may also display the server banner, which appears below the server details when you view
a server from the host profile. Server banners provide additional information about a server that may help you
identify the server. The system cannot identify or detect a misidentified server when an attacker purposely
alters the server banner string. The server banner displays the first 256 bytes of the first packet detected for
the server. It is collected only once, the first time the server is detected by the system. Banner content is listed
in two columns, with a hexadecimal representation on the left and a corresponding ASCII representation on
the right.
Note To view server banners, you must enable the Capture Banners check box in the network discovery policy.
This option is disabled by default.
The server details section of the host profile includes the following information:
Protocol
The name of the protocol the server uses.
Port
The port where the server runs.
Hits
The number of times the server was detected by a managed device or an Nmap scanner. The number of
hits is 0 for servers imported through host input, unless the system detects traffic for that server.
Last Used
The time and date the server was last detected. The last used time for host input data reflects the initial
data import time unless the system detects new traffic for that server. Scanner and application data
imported through the host input feature times out according to settings in the management center
configuration, but user input through the management center web interface does not time out.
Application Protocol
The name of the application protocol used by the server, if known.
Vendor
The server vendor. This field does not appear if the vendor is unknown.
Version
The server version. This field does not appear if the version is unknown.
Source
One of the following values:
• User: user_name
• Application: app_name
• Scanner: scanner_type (Nmap or other scanner)
• Firepower, Firepower Port Match, or Firepower Pattern Match for applications
detected by the system
• NetFlow for servers added to the network map from NetFlow records
The system may reconcile data from multiple sources to determine the identity of a server.
Procedure
Step 3 To delete a server identity, click Delete ( ) next to the server identity you want to remove.
Step 4 To modify a server identity, click Edit ( ) next to the server in the servers list.
Step 5 You have two choices:
• Choose the current definition from the Select Server Type drop-down list.
• Choose the type of server from the Select Server Type drop-down list.
Step 6 Optionally, to only list vendors and products for that server type, choose the Restrict by Server Type check
box.
Step 7 Optionally, to customize the name and version of the server, choose the Use Custom Display String, and
enter a Vendor String and Version String.
Step 8 In the Product Mappings section, choose the operating system, product, and versions you want to use.
Example:
For example, if you want the server to map to Red Hat Linux 9, choose Redhat, Inc. as the vendor, Redhat
Linux as the product, and 9 as the version.
Step 9 If you want to indicate that fixes for the server have been applied, click Configure Fixes, and add the patches
you want to apply for that server to the fixes list.
Step 10 Click Finish.
Procedure
The section lists up to 16 clients running on the host. After that limit is reached, new client information from
any source, whether active or passive, is discarded until you delete a client application from the host or the
system deletes the client from the host profile due to inactivity (the client times out).
Additionally, for each detected web browser, the system displays the first 100 web applications accessed.
After that limit is reached, new web applications associated with that browser from any source, whether active
or passive, are discarded until either:
• the web browser client application times out, or
• you delete application information associated with a web application from the host profile
If the host is running an application that violates a compliance allow list in an activated correlation policy,
the management center marks the non-compliant application with the allow list Violation.
Tip
To analyze the connection events associated with a particular application on the host, click Logging ( )
next to the application. The first page of your preferred workflow for connection events appears, showing
connection events constrained by the type, product, and version of the application, as well as the IP address(es)
of the host. If you do not have a preferred workflow for connection events, you must select one.
Application Protocol
Displays the application protocol used by the application (HTTP browser, DNS client, and so on).
Client
Client information derived from payload if identified by the system, captured by Nmap, or acquired via the
host input feature. The field is blank if none of the available sources provides an identification.
Version
Displays the version of the client.
Web Application
For web browsers, the content detected by the system in the http traffic. Web application information indicates
the specific type of content (for example, WMV or QuickTime) identified by the system, captured by Nmap,
or acquired via the host input feature. The field is blank if none of the available sources provides an
identification.
Note If the system detects the application again, it re-adds it to the network map and the host profile.
Procedure
Note If the system detects the protocol again, it re-adds it to the network map and the host profile.
To configure the system to tag indications of compromise, see Enabling Indications of Compromise Rules in
the Cisco Secure Firewall Management Center Device Configuration Guide.
For more information about working with indications of compromise, see Indications of Compromise Data,
on page 869 and the subtopics under that topic.
If VLAN tags are nested within the packet, the system processes and the management center displays the
innermost VLAN tag. The system collects and displays VLAN tag information only for MAC addresses that
it identifies through ARP and DHCP traffic.
VLAN tag information can be useful, for example, if you have a VLAN composed entirely of printers and
the system detects a Microsoft Windows 2000 operating system in that VLAN. VLAN information also helps
the system generate more accurate network maps.
After you set a predefined host attribute or create a user-defined host attribute, you must assign a host attribute
value.
Note Host attributes can be defined at any domain level. You can assign host attributes created in current and
ancestor domains.
You cannot edit the value of an allow list host attribute or delete an allow list host attribute.
• Assign a Responsible Party Identifier that indicates which system administrator is responsible for a given
host. You can then craft correlation rules and policies to send alerts to the correct system administrator
when problems related to a host are detected.
• Automatically assign values to hosts from a predefined list based on the hosts’ IP addresses. This feature
can be useful to assign values to new hosts when they appear on your network for the first time.
User-defined host attributes appear in the host profile page, where you can assign values on a per-host basis.
You can also:
• Use the attributes in correlation policies and searches.
• View the attributes on the host attribute table view of events and generate reports based on them.
Step 5 Choose the Type of attribute that you want to create as described in User-Defined Host Attributes, on page
837
Step 6 Click Save.
Procedure
Procedure
Step 11 Repeat steps 6 through 10 to add additional values to the list and assign them automatically to new hosts that
fall within an IP address block.
Step 12 Click Save.
Procedure
Allow List
The name of the allow list associated with the violation.
Second, in the sections associated with operating systems, applications, protocols, and servers, the management
center marks non-compliant elements with the allow list Violation. For example, for an allow list that allows
only Microsoft Windows hosts, the host profile displays the allow list violation icon next to the operating
system information for that host.
Note You can use a host’s profile to create a shared host profile for compliance allow lists.
Procedure
Related Topics
Building Allow List Host Profiles, on page 924
Time
The date and time the event was generated.
For an event where the file was retrospectively identified as malware, note that this is the time of the original
event, not the time when the malware was identified.
Host Role
The host’s role in the transmission of detected malware, either sender or receiver. Note that for malware events
generated by Secure Endpoint ("endpoint-based malware events"), the host is always the receiver.
Threat Name
The name of the detected malware.
File Name
The name of the malware file.
File Type
The type of file; for example, PDF or MSEXE.
Name
The name of the vulnerability.
Remote
Indicates whether the vulnerability can be remotely exploited. If this column is blank, the vulnerability
definition does not include this information.
Component
The name of the operating system, application protocol, or client associated with the vulnerability.
Port
A port number, if the vulnerability is associated with an application protocol running on a specific port.
Related Topics
Vulnerability Data Fields, on page 881
Vulnerability Deactivation, on page 883
Procedure
Step 1 Access the host profile of a host for which you want to download a patch.
Step 2 Expand the Vulnerabilities section.
Step 3 Click the name of the vulnerability you want to patch.
Step 4 Expand the Fixes section to display the list of patches for the vulnerability.
Step 5 Click Download next to the patch you want to download.
Step 6 Download the patch and apply it to your affected systems.
Procedure
What to do next
• Optionally, activate the vulnerability for the host by moving it from the Invalid Vulnerabilities list to
the Valid Vulnerabilities list.
Related Topics
Deactivating Individual Vulnerabilities, on page 844
Deactivating Multiple Vulnerabilities, on page 885
Procedure
Step 3 Confirm that you want to change the Impact Qualification value for all hosts on the network map.
Step 4 Click Done.
What to do next
• Optionally, activate the vulnerability by choosing Enabled from the Impact Qualification drop-down
list while performing the steps above.
Related Topics
Deactivating Vulnerabilities for Individual Hosts, on page 843
Deactivating Multiple Vulnerabilities, on page 885
Operating System Identity Conflicts, on page 828
Caution Nmap-supplied server and operating system data remains static until you run another Nmap scan or override
it with higher priority host input. If you plan to scan a host using Nmap, regularly schedule scans.
Procedure
Related Topics
Nmap Scan Automation, on page 465
Limitation when using 6.6 If virtual routing and forwarding is used in your environment, a single IP address may represent multiple
VRF hosts because VRF may include overlapping network spaces.
Supported Platforms: management center
Supported Domains
Any
User Roles
• Admin
• Security Analyst
events that your system generates. You can also create custom workflows that display only the information
that matches your specific needs.
To collect and store network discovery and identity data for analysis, you must configure network discovery
and identity policies. After you configure an identity policy, you must invoke it in your access control policy
and deploy it to the devices you want to use to monitor traffic.
Your network discovery policy provides host, application, and non-authoritative user data. Your identity
policy provides authoritative user data.
The following discovery event tables are located under the Analysis > Hosts and Analysis > Users menus.
Discovery Event Table Populated With Discovery Populated With Identity Data?
Data?
Hosts Yes No
Applications Yes No
Servers Yes No
Vulnerabilities Yes No
Procedure
Related Topics
The Event Breakdown Section, on page 850
The Protocol Breakdown Section, on page 850
The Application Protocol Breakdown Section, on page 851
The OS Breakdown Section, on page 851
Total Events
Total number of discovery events stored on the management center.
Total IP Hosts
Total number of detected hosts identified by unique IP address.
Total Routers
Total number of detected nodes identified as routers.
Total Bridges
Total number of detected nodes identified as bridges.
Note If the host limit is reached and a host is deleted, the host will not reappear on the network map you purge
discovery data.
Procedure
Processed Events/Sec
Displays a graph that represents the number of events that the Data Correlator processes per second
Processed Connections/Sec
Displays a graph that represents the number of connections that the Data Correlator processes per second
Generated Events/Sec
Displays a graph that represents the number of events that the system generates per second
Mbits/Sec
Displays a graph that represents the number of megabits of traffic that are analyzed by the discovery process
per second
Avg Bytes/Packet
Displays a graph that represents the average number of bytes included in each packet analyzed by the discovery
process
K Packets/Sec
Displays a graph that represents the number of packets analyzed by the discovery process per second, in
thousands
Procedure
Step 2 To access a custom workflow, choose Analysis > Advanced > Custom Workflows.
Step 3 To access a workflow based on a custom table, choose Analysis > Advanced > Custom Tables.
Step 4 Perform any of the following actions, which are common to all of the pages accessed in the network discovery
workflows:
• Constrain Columns — To constrain the columns that display, click Close ( ) in the column heading
that you want to hide. In the pop-up window that appears, click Apply.
Tip To hide or show other columns, check or clear the appropriate check boxes before you click
Apply. To add a disabled column back to the view, click the expand arrow to expand the
search constraints, then click the column name under Disabled Columns.
• Delete — To delete some or all items in the current constrained view, check the check boxes next to
items you want to delete and click Delete, or click Delete All. These items remain deleted until the
system’s discovery function is restarted, when they may be detected again.
Caution Before you delete a non-VPN session on the Analysis > Users > Active Sessions page,
verify that the session is actually closed. After you delete the active session, an applicable
policy will not be able to detect the session on the device, and therefore the session will not
be monitored or blocked even if the policy was configured to perform those actions.
Note For more information about VPN sessions on the Analysis > Users > Active Sessions page,
see Viewing Remote Access VPN Current Users.
Note You cannot delete Cisco (as opposed to third-party) vulnerabilities; you can, however, mark
them reviewed.
• Drill Down — To drill down to the next page in the workflow, see Using Drill-Down Pages, on page
642.
• Navigate Current Page — To navigate within the current workflow page, see Workflow Page Navigation
Tools, on page 639.
• Navigate within a Workflow — To navigate between pages in the current workflow, keeping the current
constraints, click the appropriate page link at the top left of the workflow page.
• Navigate to Other Workflows — To navigate to other event views to examine associated events, see
Inter-Workflow Navigation, on page 658.
• Sort Data — To sort data in a workflow, click the column title. Click the column title again to reverse
the sort order.
• View Host Profile — To view the host profile for an IP address, click Host Profile or, for hosts with
active indications of compromise (IOC) tags, the Compromised Host that appears next to the IP address.
• View User Profile — To view user identity information, click the user icon that appears next to the User
Identity, or for users associated with IOCs,Red User.
Related Topics
Using Workflows, on page 634
Purging Data from the Management Center Database, on page 488
Client Timeout
This event is generated when the system drops a client from the database due to inactivity.
Client Update
This event is generated when the system detects a payload (that is, a specific type of content, such as audio,
video, or webmail) in HTTP traffic.
Hops Change
This event is generated when the system detects a change in the number of network hops between a host and
the device that detects the host. This may happen if:
• The device sees host traffic through different routers and is able to make a better determination of the
host’s location.
• The device detects an ARP transmission from the host, indicating that the host is on a local segment.
Host Timeout
This event is generated when a host is dropped from the network map because the host has not produced
traffic within the interval defined in the network discovery policy. Note that individual host IP addresses and
MAC addresses time out individually; a host does not disappear from the network map unless all of its
associated addresses have timed out.
If you change the networks you want to monitor in your network discovery policy, you may want to manually
delete old hosts from the network map so that they do not count against your host limit.
Identity Conflict
This event is generated when the system detects a new server or operating system identity that conflicts with
a current active identity for that server or operating system.
If you want to resolve identity conflicts by rescanning the host to obtain newer active identity data, you can
use Identity Conflict events to trigger an Nmap remediation.
Identity Timeout
This event is generated when server or operating system identity data from an active source times out.
If you want to refresh identity data by rescanning the host to obtain newer active identity data, you can use
Identity Conflict events to trigger an Nmap remediation.
New Client
This event is generated when the system detects a new client.
Note To collect and store client data for analysis, make sure that you enable application detection in your discovery
rules in the network discovery policy.
New Host
This event is generated when the system detects a new host running on the network.
This event can also be generated when a device processes NetFlow data that involves a new host. To generate
an event in this case, configure the network discovery rule that manages NetFlow data to discover hosts.
New OS
This event is generated when the system either detects a new operating system for a host, or a change in a
host’s operating system.
Add Client
This event is generated when a user adds a client.
Add Host
This event is generated when a user adds a host.
Add Protocol
This event is generated when a user adds a protocol.
Add Port
This event is generated when a user adds a server port.
Delete Client
This event is generated when a user deletes a client from the system.
Delete Host/Network
This event is generated when a user deletes an IP address or subnet from the system.
Delete Protocol
This event is generated when a user deletes a protocol from the system.
Delete Port
This event is generated when a user deletes a server port or group of server ports from the system.
Procedure
Related Topics
Using Discovery and Identity Workflows, on page 852
Time
The time that the system generated the event.
Event
The discovery event type or host input event type.
IP Address
The IP address associated with the host involved in the event.
User
The last user to log into the host involved in the event before the event was generated. If only non-authoritative
users log in after an authoritative user, the authoritative user remains the current user for the host unless another
authoritative user logs in.
MAC Address
The MAC address of the NIC used by the network traffic that triggered the discovery event. This MAC address
can be either the actual MAC address of the host involved in the event, or the MAC address of a network
device that the traffic passed through.
MAC Vendor
The MAC hardware vendor of the NIC used by the network traffic that triggered the discovery event.
When searching this field, enter virtual_mac_vendor to match events that involve virtual hosts.
Port
The port used by the traffic that triggered the event, if applicable.
Description
The text description of the event.
Domain
The domain of the device that discovered the host. This field is only present if you have ever configured the
management center for multitenancy.
Device
The name of the managed device that generated the event. For new host and new server events based on
NetFlow data, this is the managed device that processed the data.
Related Topics
Event Searches, on page 663
Host Data
The system generates an event when it detects a host and collects information about it to build the host profile.
You can use the management center web interface to view, search, and delete hosts.
While viewing hosts, you can create traffic profiles and compliance allow lists based on selected hosts. You
can also assign host attributes, including host criticality values (which designate business criticality) to groups
of hosts. You can then use these criticality values, allow lists, and traffic profiles within correlation rules and
policies.
The system can add hosts to the network map from exported NetFlow records, but the available information
for these hosts is limited; see Differences between NetFlow and Managed Device Data.
Procedure
Last Seen
The date and time any of the host’s IP addresses was last detected by the system. The Last Seen value is
updated at least as often as the update interval you configured in the network discovery policy, as well as
when the system generates a new host event for any of the host’s IP addresses.
For hosts with operating system data updated using the host input feature, the Last Seen value indicates the
date and time when the data was originally added.
IP Address
The IP addresses associated with the host.
MAC Address
The host’s detected MAC address of the NIC.
The MAC Address field appears in the Table View of Hosts, which you can find in the Hosts workflow. You
can also add the MAC Address field to:
• custom tables that include fields from the Hosts table
• drill-down pages in custom workflows based on the Hosts table
MAC Vendor
The host’s detected MAC hardware vendor of the NIC.
The MAC Vendor field appears in the Table View of Hosts, which you can find in the Hosts workflow. You
can also add the MAC Vendor field to:
• custom tables that include fields from the Hosts table
• drill-down pages in custom workflows based on the Hosts table
When searching this field, enter virtual_mac_vendor to match events that involve virtual hosts.
Current User
The user identity (username) of the currently logged in user on the host.
Note that when a non-authoritative user logs into a host, that login is recorded in the user and host history. If
no authoritative user is associated with the host, a non-authoritative user can be the current user for the host.
However, after an authoritative user logs into the host, only a login by another authoritative user changes the
current user. In addition, when a non-authoritative user is the current user on a host, that user still cannot be
used for user control.
Host Criticality
The user-specified criticality value assigned to the host.
NetBIOS Name
The NetBIOS name of the host. Only hosts running the NetBIOS protocol will have a NetBIOS name.
VLAN ID
VLAN ID used by the host.
Hops
The number of network hops from the device that detected the host to the host.
Host Type
The type of host. Can be any of the following: host, mobile device, jailbroken mobile device, router, bridge,
NAT device, and load balancer.
The methods the system uses to distinguish network devices include:
• the analysis of Cisco Discovery Protocol (CDP) messages, which can identify network devices and their
type (Cisco devices only)
• the detection of the Spanning Tree Protocol (STP), which identifies a device as a switch or bridge
• the detection of multiple hosts using the same MAC address, which identifies the MAC address as
belonging to a router
• the detection of TTL value changes from the client side, or TTL values that change more frequently than
a typical boot time, which identify NAT devices and load balancers
Hardware
The hardware platform for a mobile device.
OS
One of the following:
• The operating system (name, vendor, and version) either detected on the host or updated using Nmap or
the host input feature
• unknown if the operating system does not match any known fingerprint
• pending if the system has not yet gathered enough information to identify the operating system
If the system detects multiple identities, it displays those identities in a comma-separated list.
This field appears when you invoke the hosts event view from the Custom Analysis widget on the dashboard.
It is also a field option in custom tables based on the Hosts table.
When searching this field, enter n/a to include hosts where the operating system has not yet been identified.
OS Conflict
This field is search only.
OS Vendor
One of the following:
• The vendor of the operating system detected on the host or updated using Nmap or the host input feature
• unknown if the operating system does not match any known fingerprint
• pending if the system has not yet gathered enough information to identify the operating system
If the system detects multiple vendors, it displays those vendors in a comma-separated list.
When searching this field, enter n/a to include hosts where the operating system has not yet been identified.
OS Name
One of the following:
• The operating system detected on the host or updated using Nmap or the host input feature
• unknown if the operating system does not match any known fingerprint
• pending if the system has not yet gathered enough information to identify the operating system
If the system detects multiple names, it displays those names in a comma-separated list.
When searching this field, enter n/a to include hosts where the operating system has not yet been identified.
OS Version
One of the following:
• The version of the operating system detected on the host or updated using Nmap or the host input feature
• unknown if the operating system does not match any known fingerprint
• pending if the system has not yet gathered enough information to identify the operating system
If the system detects multiple versions, it displays those versions in a comma-separated list.
When searching this field, enter n/a to include hosts where the operating system has not yet been identified.
Source Type
The type of source used to establish the host’s operating system identity:
• User: user_name
• Application: app_name
• Scanner: scanner_type (Nmap or scanner added through network discovery configuration)
• Firepower for operating systems detected by the system
The system may reconcile data from multiple sources to determine the identity of an operating system.
Confidence
One of the following:
• the percentage of confidence that the system has in the identity of the operating system running on the
host, for hosts detected by the system
• 100%, for operating systems identified by an active source, such as the host input feature or Nmap scanner
• unknown, for hosts for which the system cannot determine an operating system identity, and for hosts
added to the network map based on NetFlow data
When searching this field, enter n/a to include hosts added to the network map based on NetFlow data.
Notes
The user-defined content of the Notes host attribute.
Domain
The domain associated with the host. This field is only present if you have ever configured the management
center for multitenancy.
Device
Either the managed device that detected the traffic or the device that processed NetFlow or host input data.
If this field is blank, either of the following conditions is true:
• The host was added to the network map by a device that is not explicitly monitoring the network where
the host resides, as defined in the network discovery policy.
• The host was added using the host input feature and has not also been detected by the system.
Count
The number of events that match the information that appears in each row. This field appears only after you
apply a constraint that creates two or more identical rows.
Related Topics
Event Searches, on page 663
Operating System Identity Conflicts, on page 828
Procedure
Step 1 On a table view in the hosts workflow, check the check boxes next to the hosts for which you want to create
a traffic profile.
Step 2 At the bottom of the page, click Create Traffic Profile.
Step 3 Modify and save the traffic profile according to your specific needs.
Related Topics
Introduction to Traffic Profiles, on page 967
Procedure
Step 1 On a table view in the hosts workflow, check the check boxes next to the hosts for which you want to create
an allow list.
Step 2 At the bottom of the page, click CreateAllow List.
Step 3 Modify and save the allow list according to your specific needs.
Related Topics
Introduction to Compliance Allow Lists, on page 917
Procedure
IP Address
The IP addresses associated with a host.
Current User
The user identity (username) of the currently logged in user on the host.
Note that when a non-authoritative user logs into a host, that login is recorded in the user and host history. If
no authoritative user is associated with the host, a non-authoritative user can be the current user for the host.
However, after an authoritative user logs into the host, only a login by another authoritative user changes the
current user. In addition, when a non-authoritative user is the current user on a host, that user still cannot be
used for user control.
Host Criticality
The user-assigned importance of a host to your enterprise. You can use the host criticality in correlation rules
and policies to tailor policy violations and their responses to the importance of a host involved in an event.
You can assign a host criticality of low, medium, high, or none.
Notes
Information about the host that you want other analysts to view.
Any user-defined host attribute, including those for compliance allow lists
The value of the user-defined host attribute. The host attributes table contains a field for each user-defined
host attribute.
Domain
The domain associated with the host. This field is only present if you have ever configured the management
center for multitenancy.
Count
The number of events that match the information that appears in each row. Note that the Count field appears
only after you apply a constraint that creates two or more identical rows.
Related Topics
Event Searches, on page 663
Procedure
Step 1 In a host workflow, check the check boxes next to the hosts to which you want to add a host attribute.
Tip Use the sort and search features to isolate the hosts to which you want to assign particular attributes.
(IOC) tags on affected hosts. The IP addresses of these hosts appear in event views with a Red Compromised
Host icon .
When a host is identified as potentially compromised, the user associated with that compromise is also tagged.
These users appear in event views with a Red User icon.
If a file containing malware is seen again within 300 seconds of being tagged as an IOC, another IOC is not
generated. If the same file is seen more than 300 seconds later, a new IOC will be generated.
To configure the system to tag events as indications of compromise, see Enabling Indications of Compromise
Rules in the Cisco Secure Firewall Management Center Device Configuration Guide.
Related Topics
Editing Server Identities, on page 832
Procedure
Step 1 Determine which location in the web interface presents information that meets your needs.
You can use the following locations to view or work with Indication of Compromise data:
• Event Viewer (under the Analysis menu) — Connection, Security Intelligence, intrusion, malware, and
IOC discovery event views indicate whether an event triggered an IOC. Note that malware events
generated by Secure Endpoint that trigger IOC rules have the event type AMP IOC and appear with an
event subtype that specifies the compromise.
• Dashboard — In the dashboard, Threats of the Summary Dashboard displays, by default, IOC tags by
host and by user. The Custom Analysis widget offers presets based on IOC data.
• Context Explorer — The Indications of Compromise section of the Context Explorer displays graphs of
hosts by IOC category and IOC categories by host.
• Network Map page — The Indications of Compromise under Analysis > Hosts > Network Map groups
potentially compromised hosts on your network by type of compromise and IP address.
• Network File Trajectory details page — The details pages for files listed under Analysis > Files > Network
File Trajectory let you track indications of compromise on your network.
• Host Indications of Compromise page — The Host Indications of Compromise page under the Analysis
> Hosts menu lists monitored hosts, grouped by IOC tag. Use the workflows on this page to drill down
into your data.
• User Indications of Compromise page — The User Indications of Compromise page under the Analysis
> Users menu lists users associated with potential IOC events, grouped by IOC tag. Use the workflows
on this page to drill down into your data.
• Host Profile page — The host profile for a potentially compromised host displays all IOC tags associated
with that host, and lets you resolve IOC tags and configure IOC rule states.
• User Profile page — The user profile for a user associated with a potential IOC event displays all IOC
tags associated with that user, and lets you resolve IOC tags and configure IOC rule states. (The user
profile is labeled "User Identity" in the management center web interface.)
Step 2 If applicable, do one of the following and use the rest of the steps in this procedure:
Option Description
To research IOCs on hosts: • If you are using the predefined workflow, choose Analysis > Hosts >
Indications of Compromise.
• If you are using a custom workflow that does not include the Host
IOC table view, click (switch workflow), then choose Host
Indications of Compromise .
To research IOCs associated with • If you are using the predefined workflow, choose Analysis > Users
users: > Indications of Compromise.
• If you are using a custom workflow that does not include the User
IOC table view, click (switch workflow), then choose User
Indications of Compromise.
Category
Brief description of the type of compromise indicated, such as Malware Executed or Impact 1
Attack.
Event Type
Identifier associated with a specific IOC, referring to the event that triggered it.
Description
Description of the impact on the potentially compromised host, such as This host may be under
remote control or Malware has been executed on this host.
Domain
The domain of the host that triggered the IOC. This field is only present if you have ever configured the
management center for multitenancy.
Related Topics
Event Searches, on page 663
Procedure
Step 3 In the Enabled column for a rule, click the slider to enable or disable it.
Step 4 Click Save.
Procedure
Procedure
• To mark an individual IOC tag resolved, click Delete ( ) to the right of the tag you want to resolve.
• To mark all IOC tags on the profile resolved, click Mark All Resolved.
Server Data
The system collects information about all servers running on hosts on monitored network segments. This
information includes:
When the system detects a server, it generates a discovery event unless the associated host has already reached
its maximum number of servers. You can use the management center web interface to view, search, and delete
server events.
You can also base correlation rules on server events. For example, you could trigger a correlation rule when
the system detects a chat server, such as ircd, running on one of your hosts.
The system can add hosts to the network map from exported NetFlow records, but the available information
for these hosts is limited; see Differences between NetFlow and Managed Device Data.
Procedure
Last Used
The date and time the server was last used on the network or the date and time that the server was originally
updated using the host input feature. The Last Used value is updated at least as often as the update interval
you configured in the network discovery policy, as well as when the system detects a server information
update.
IP Address
The IP address associated with the host running the server.
Port
The port where the server is running.
Protocol
The network or transport protocol used by the server.
Application Protocol
One of the following:
• the name of the application protocol for the server
• pending if the system cannot positively or negatively identify the server for one of several reasons
• unknown if the system cannot identify the server based on known server fingerprints or if the server was
added through host input and did not include the application protocol
Vendor
One of the following:
• the server vendor as identified by the system, Nmap or another active source, or that you specified using
the host input feature
• blank, if the system cannot identify its vendor based on known server fingerprints, or if the server was
added to the network map using NetFlow data
Version
One of the following:
• the server version as identified by the system, Nmap or another active source, or that you specified using
the host input feature
• blank, if the system cannot identify its version based on known server fingerprints, or if the server was
added to the network map using NetFlow data
Web Application
The web application based on the payload content detected by the system in the HTTP traffic. Note that if the
system detects an application protocol of HTTP but cannot detect a specific web application, the system supplies
a generic web browsing designation.
Hits
The number of times the server was accessed. For servers added using the host input feature, this value is
always 0.
Source Type
One of the following values:
• User: user_name
• Application: app_name
• Scanner: scanner_type (Nmap or scanner added through network discovery configuration)
• Firepower, Firepower Port Match, or Firepower Pattern Match for servers detected by the system
• NetFlow for servers added using NetFlow data
Domain
The domain of the host running the server. This field is only present if you have ever configured the management
center for multitenancy.
Device
Either the managed device that detected the traffic or the device that processed NetFlow or host input data.
Current User
The user identity (username) of the currently logged in user on the host.
When a non-authoritative user logs into a host, that login is recorded in the user and host history. If no
authoritative user is associated with the host, a non-authoritative user can be the current user for the host.
However, after an authoritative user logs into the host, only a login by another authoritative user changes the
current user. In addition, when a non-authoritative user is the current user on a host, that user still cannot be
used for user control.
Count
The number of events that match the information that appears in each row. This field appears only after you
apply a constraint that creates two or more identical rows.
Related Topics
Event Searches, on page 663
Procedure
Cisco Talos. The options you see depend on the data type and the integrations that are configured on
your system. For more information, see Event Investigation Using Web-Based Resources, on page 598.
Application
The name of the detected application.
IP Address
The IP address associated with the host using the application.
Type
The type of application:
Application Protocols
Represents communications between hosts.
Client Applications
Represents software running on a host.
Web Applications
Represents the content or requested URL for HTTP traffic.
Category
A general classification for the application that describes its most essential function. Each application belongs
to at least one category.
Tag
Additional information about the application. Applications can have any number of tags, including none.
Risk
How likely the application is to be used for purposes that might be against your organization’s security policy.
An application’s risk can range from Very Low to Very High.
Of Application Protocol Risk, Client Risk, and Web Application Risk, the highest of the three detected, when
available, in the traffic that triggered the intrusion event.
Business Relevance
The likelihood that the application is used within the context of your organization’s business operations, as
opposed to recreationally. An application’s business relevance can range from Very Low to Very High.
Of Application Protocol Business Relevance, Client Business Relevance, and Web Application Business
Relevance, the lowest of the three detected, when available, in the traffic that triggered the intrusion event.
Current User
The user identity (username) of the currently logged in user on the host.
Note that when a non-authoritative user logs into a host, that login is recorded in the user and host history. If
no authoritative user is associated with the host, a non-authoritative user can be the current user for the host.
However, after an authoritative user logs into the host, only a login by another authoritative user changes the
current user. In addition, when a non-authoritative user is the current user on a host, that user still cannot be
used for user control.
Domain
The domain of the host using the application. This field is only present if you have ever configured the
management center for multitenancy.
Count
The number of events that match the information that appears in each row. Note that the Count field appears
only after you apply a constraint that creates two or more identical rows.
Related Topics
Event Searches, on page 663
Procedure
• View data in available sources external to your system, by right-clicking an event value. The options
you see depend on the data type and include public sources; other sources depend on the resources you
have configured. For information, see Event Investigation Using Web-Based Resources, on page 598
• Gather intelligence about an event by right-clicking an event value in the table and choosing from a Cisco
or third-party intelligence source. For example, you can get details about a suspicious IP address from
Cisco Talos. The options you see depend on the data type and the integrations that are configured on
your system. For more information, see Event Investigation Using Web-Based Resources, on page 598.
Last Used
The time that the application was last used or the time that the application data was updated using the host
input feature. The Last Used value is updated at least as often as the update interval you configured in the
network discovery policy, as well as when the system detects an application information update.
IP Address
The IP address associated with the host using the application.
Client
The name of the application. Note that if the system detected an application protocol but could not detect a
specific client, client is appended to the application protocol name to provide a generic name.
Version
The version of the application.
Category, Tags, Risk, or Business Relevance for Clients, Application Protocols, and Web Applications
The categories, tags, risk level, and business relevance assigned to the application. These filters can be used
to focus on a specific set of data.
Application Protocol
The application protocol used by the application. Note that if the system detected an application protocol but
could not detect a specific client, client is appended to the application protocol name to provide a generic
name.
Web Application
The web application based on the payload content or URL detected by the system in the HTTP traffic. Note
that if the system detects an application protocol of HTTP but cannot detect a specific web application, the
system supplies a generic web browsing designation here.
Hits
The number of times the system detected the application in use. For applications added using the host input
feature, this value is always 0.
Domain
The domain of the host using the application. This field is only present if you have ever configured the
management center for multitenancy.
Device
The device that generated the discovery event containing the application detail.
Current User
The user identity (username) of the currently logged in user on the host.
Note that when a non-authoritative user logs into a host, that login is recorded in the user and host history. If
no authoritative user is associated with the host, a non-authoritative user can be the current user for the host.
However, after an authoritative user logs into the host, only a login by another authoritative user changes the
current user. In addition, when a non-authoritative user is the current user on a host, that user still cannot be
used for user control.
Count
The number of events that match the information that appears in each row. Note that the Count field appears
only after you apply a constraint that creates two or more identical rows.
Related Topics
Event Searches, on page 663
Vulnerability Data
The system includes its own vulnerability tracking database which is used, in conjunction with the system’s
fingerprinting capability, to identify the vulnerabilities associated with the hosts on your network. The operating
systems, servers, and clients running on your hosts have different sets of associated vulnerabilities.
You can use the management center to:
• Track and review the vulnerabilities for each host.
• Deactivate vulnerabilities for a host after you patch the host or otherwise judge it immune to a vulnerability.
Vulnerabilities for vendorless and versionless servers are not mapped unless the applications protocols used
by the servers are mapped in the management center configuration. Vulnerabilities for vendorless and
versionless clients cannot be mapped.
Related Topics
Mapping Vulnerabilities for Servers, on page 101
Count
The number of events that match the information that appears in each row. Note that the Count field appears
only after you apply a constraint that creates two or more identical rows.
CVE ID
The identification number associated with the vulnerability in MITRE’s Common Vulnerabilities and Exposures
(CVE) database (https://cve.mitre.org/).
To view details about this vulnerability in the National Vulnerability Database (NVD), right-click the CVE
ID and choose View description in NVD.
Date Published
The date the vulnerability was published.
Description
A brief description of the vulnerability, from the National Vulnerability Database (NVD).
For the complete description, right-click the CVE ID and choose View description in NVD to view details
in the National Vulnerability Database (NVD).
Impact
See "Vulnerability Impact" (below.)
Impact Qualification
This field is available only on the Vulnerability Details page.
Use the drop-down list to enable or disable a vulnerability. The management center ignores disabled
vulnerabilities in its impact correlations.
The setting you specify here determines how the vulnerability is treated on a system-wide basis and is not
limited to the host profile where you select the value.
Remote
Indicates whether the vulnerability is remotely exploitable (TRUE/FALSE).
Severity
The base score and Common Vulnerability Scoring System score (CVSS) from the National Vulnerability
Database (NVD).
Snort ID
The identification number associated with the vulnerability in the Snort ID (SID) database. That is, if an
intrusion rule can detect network traffic that exploits a particular vulnerability, that vulnerability is associated
with the intrusion rule’s SID.
Note that a vulnerability can be associated with more than one SID (or no SIDs at all). If a vulnerability is
associated with more than one SID, the vulnerabilities table includes a row for each SID.
SVID
The vulnerability identification number that the system uses to track vulnerabilities.
To view details for this vulnerability, click View ( ).
Vulnerability Impact/Impact
The severity of the vulnerability on a scale of 0 to 10, with 10 being the most severe.
Related Topics
Event Searches, on page 663
Vulnerability Deactivation
Deactivating a vulnerability prevents the system from using that vulnerability to evaluate intrusion impact
correlations. You can deactivate a vulnerability after you patch the hosts on your network or otherwise judge
them immune. Note that if the system discovers a new host that is affected by that vulnerability, the vulnerability
is considered valid (and is not automatically deactivated) for that host.
Deactivating a vulnerability within a vulnerabilities workflow that is not constrained by IP addresses deactivates
the vulnerability for all detected hosts on your network. You can deactivate vulnerabilities within the
vulnerabilities workflow only on:
• the second page of the default vulnerabilities workflow, Vulnerabilities on the Network, which shows
only the vulnerabilities that apply to the hosts on your network
• a page in a vulnerabilities workflow, custom or predefined, that you constrained based on IP address
using a search.
You can deactivate a vulnerability for a single host using the network map, using the host’s host profile, or
by constraining the vulnerabilities workflow based on the IP addresses of the host or hosts for which you want
to deactivate vulnerabilities. For hosts with multiple associated IP addresses, this function applies only to the
single, selected IP address of that host.
In a multidomain deployment, deactivating a vulnerability in an ancestor domain deactivates it in all descendant
domains. Leaf domains can activate or deactivate a vulnerability for their devices if the vulnerability is activated
in the ancestor domain.
Related Topics
Deactivating Vulnerabilities for Individual Hosts, on page 843
Deactivating Individual Vulnerabilities, on page 844
Deactivating Multiple Vulnerabilities, on page 885
vulnerability detail view, which contains a detailed description for every vulnerability that meets your
constraints.
Tip If you want to see the vulnerabilities that apply to a single host or set of hosts, perform a search for
vulnerabilities, specifying an IP address or range of IP addresses for the hosts.
You can also create a custom workflow that displays only the information that matches your specific needs.
The table of vulnerabilities is not restricted by domain in a multidomain deployment.
Procedure
Procedure
Procedure
Related Topics
Deactivating Vulnerabilities for Individual Hosts, on page 843
Deactivating Individual Vulnerabilities, on page 844
Procedure
Vulnerability Source
The source of the third-party vulnerabilities, for example, QualysGuard or NeXpose.
Vulnerability ID
The ID number associated with the vulnerability for its source.
IP Address
The IP address associated with the host affected by the vulnerability.
Port
A port number, if the vulnerability is associated with a server running on a specific port.
Bugtraq ID
The identification number associated with the vulnerability in the Bugtraq database.
(http://www.securityfocus.com/bid/)
CVE ID
The identification number associated with the vulnerability in MITRE’s Common Vulnerabilities and Exposures
(CVE) database (https://cve.mitre.org/).
SVID
The legacy vulnerability identification number that the system uses to track vulnerabilities
Snort ID
The identification number associated with the vulnerability in the Snort ID (SID) database. That is, if an
intrusion rule can detect network traffic that exploits a particular vulnerability, that vulnerability is associated
with the intrusion rule’s SID.
Note that a vulnerability can be associated with more than one SID (or no SIDs at all). If a vulnerability is
associated with more than one SID, the vulnerabilities table includes a row for each SID.
Title
The title of the vulnerability.
Description
A brief description of the vulnerability.
Domain
The domain of the host with the vulnerability. This field is only present if you have ever configured the
management center for multitenancy.
Count
The number of events that match the information that appears in each row. Note that the Count field appears
only after you apply a constraint that creates two or more identical rows.
Related Topics
Event Searches, on page 663
For more information about the user identity sources that populate these workflows, see the Cisco Secure
Firewall Management Center Device Configuration Guide.
User-Related Fields
User-related data is displayed in the active sessions, users, and user activity tables.
Table 112: Active Sessions, Users, and User Activity Field Descriptions
Active Session The number of active sessions associated with the user. No Yes No
Count
Available for A value of Yes means the user was retrieved from the No Yes No
Policy user store (for example, Active Directory).
A value of No means the management center received
a report of a login for that user but the user is not in the
user store. One way this can happen is if a user in an
excluded group logs in to the user store. You can exclude
groups from being downloaded when you configure a
realm.
Users not available for policy are recorded in the
management center but are not sent to managed devices.
Count Note The Count field is displayed only after Yes Yes Yes
you apply a constraint that creates two or
more identical rows.
Current IP The IP address associated with the host that the user is Yes Yes No
logged into.
This field is blank in the Users table if there are no active
sessions for a user.
Discovery The application or protocol used to detect the user. Yes Yes Yes
Application
• For user activity detected by traffic-based detection,
one of the following: ldap, pop3, imap, oracle, sip,
http, ftp, mdns, or aim.
Note Users are not added to the database
based on SMTP logins.
Current IP In the Active Sessions table, the multitenancy domain Yes Yes Yes
Domain/Domain where the user activity was detected.
In the Users table, the multitenancy domain associated
with the user's realm.
In the User Activity table, the multitenancy domain
where the user activity was detected.
This field is only present if you have ever configured
the management center for multitenancy.
E-Mail The user’s email address. This field is blank if: Yes Yes No
• The user was added to the database via an AIM
login.
• The user was added to the database via an LDAP
login and there is no email address associated with
the user on your LDAP servers.
End Port If the user was reported by the TS Agent and their Yes No Yes
session is currently active, this field identifies the end
value for the port range assigned to the user. This field
is blank if the user's TS Agent session is inactive or if
the user was reported by another identity source.
Endpoint The IP address of the network device that used ISE to No No Yes
Location authenticate the user, as identified by ISE. If you do not
configure ISE, this field is blank.
Endpoint Profile The user's endpoint device type, as identified by Cisco No No Yes
ISE. If you do not configure ISE, this field is blank.
First Name The user’s first name, as obtained by a realm. This field Yes Yes No
is blank if:
• You have not configured a realm.
• The management center cannot correlate the user
in the management center database with an LDAP
record (for example, for users added to the database
via an AIM, Oracle, or SIP login).
• There is no first name associated with the user on
your servers.
IP Address For User Login user activity, the IP address or internal No No Yes
IP address involved in the login:
• LDAP, POP3, IMAP, FTP, HTTP, MDNS, and
AIM logins — the address of the user’s host
• SMTP and Oracle logins — the address of the
server
• SIP logins — the address of the session originator
Last Name The user’s last name, as obtained by a realm. This field Yes Yes No
is blank if:
• You have not configured a realm.
• The management center cannot correlate the user
in the management center database with an LDAP
record (for example, for users added to the database
via an AIM, Oracle, or SIP login).
• There is no last name associated with the user on
your servers.
Last Seen The date and time that a session was last initiated (or Yes Yes No
user data was updated) for the user.
Login Time The date and time that the session was initiated for the Yes No No
user.
Realm The identity realm associated with the user. Yes Yes Yes
Note Active sessions for Azure AD realm users
appear only in the Active Sessions new UI
layout and not in the legacy UI.
Security Group The Security Group Tag (SGT) attribute applied by No No Yes
Tag Cisco TrustSec as the packet entered a trusted TrustSec
network. If you do not configure ISE, this field is blank.
Session The duration of the user session, calculated from the Yes No No
Duration Login Time and the current time.
Start Port If the user was reported by the TS Agent and their Yes No Yes
session is currently active, this field identifies the start
value for the port range assigned to the user. This field
is blank if the user's TS Agent session is inactive or if
the user was reported by another identity source.
Time The time that the system detected the user activity. No No Yes
User At minimum, this field displays the user's realm and Yes Yes No
username. For example, Lobby\jsmith, where Lobby
is the realm and jsmith is the username.
If a realm downloads additional user data from an LDAP
server and the system associates it with a user, this field
also displays the user's first name, last name, and type.
For example, John Smith (Lobby\jsmith,
LDAP), where John Smith is the user's name and LDAP
is the type.
Note Because traffic-based detection can record
unsuccessful AIM logins, the management
center may store invalid AIM users (for
example, if a user misspelled his or her
username).
Username The username associated with the user. Yes Yes Yes
VPN Bytes In For Remote Access VPN-reported user activity, the total No No Yes
number of bytes received from the remote peer or client
by the threat defense.
Note You can view the total number of bytes
received once the user's VPN session is
terminated. For ongoing VPN sessions,
this is not a dynamic counter.
VPN Bytes Out For Remote Access VPN-reported user activity, the total No No Yes
number of bytes transmitted to the remote peer or client
by the threat defense.
Note You can view the total number of bytes
transmitted once the user's VPN session is
terminated. For ongoing VPN sessions,
this is not a dynamic counter.
VPN Client For Remote Access VPN-reported user activity, the Yes No Yes
Application remote user's AnyConnect VPN module of Cisco Secure
Client application.
For other types of user activity, this field is blank.
VPN Client For Remote Access VPN-reported user activity, the No No Yes
Country country name as reported by the Secure Client VPN.
For other types of user activity, this field is blank.
VPN Client OS For Remote Access VPN-reported user activity, the Yes No Yes
remote user's endpoint operating system as reported by
the Secure Client VPN.
For other types of user activity, this field is blank.
VPN Client For Remote Access VPN-reported user activity, the Yes No Yes
Public IP publicly routable IP address of the Secure Client VPN
device.
For other types of user activity, this field is blank.
VPN Connection For Remote Access VPN-reported user activity, the total No No Yes
Duration time (HH:MM:SS) that the session was active.
For other types of user activity, this field is blank.
VPN Connection For Remote Access VPN-reported user activity, the Yes No Yes
Profile name of the connection profile (tunnel group) used by
the VPN session. Connection profiles are part of a
Remote Access VPN Policy.
For other types of user activity, this field is blank.
VPN Group For Remote Access VPN-reported user activity, the Yes No Yes
Policy name of the group policy assigned to the client when
the VPN session is established; either the
statically-assigned group policy associated with the VPN
Connection Profile, or the dynamically-assigned group
policy if RADIUS is used for authentication. If assigned
by the RADIUS server, this group policy overrides the
static policy configured for the VPN Connection Profile.
Group policies configure common attributes for groups
of users in Remote Access VPN policies.
For other types of user activity, this field is blank.
VPN Session For Remote Access VPN-reported user activity, the type Yes No Yes
Type of session: LAN-to-LAN or Remote.
For other types of user activity, this field is blank.
For more information about the user and user activity data stored by the system, see User Data, on page 895
and User Activity Data, on page 898.
For information about general user-related event troubleshooting and Remote Access VPN Troubleshooting,
see the Troubleshoot Realms and User Downloads and VPN Troubleshooting in the Cisco Secure Firewall
Management Center Device Configuration Guide.
Procedure
User Data
When an identity source reports a user login for a user who is not already in the database, the user is added
to the database, unless you have specifically restricted that login type.
The system updates the users database when one of the following occurs:
• A user on the management center manually deletes a non-authoritative user from the Users table.
• An identity source reports a logoff by that user.
• A realm ends the user session as specified by the realm's User Session Timeout: Authenticated Users,
User Session Timeout: Failed Authentication Users, or User Session Timeout: Guest Users setting.
Note If you have ISE/ISE-PIC configured, you may see host data in the users table. Because host detection by
ISE/ISE-PIC is not fully supported, you cannot perform user control using ISE-reported host data.
The type of user login that the system detected determines what information is stored about the new user.
POP3 • username
IMAP • current IP address
• email address
• type (pop3 or imap)
Note No data about Microsoft Azure Active Directory users is displayed in this table.
If you configure a realm to automatically download users, the management center queries the servers based
on the interval you specified. It may take five to ten minutes for the management center database to update
with user metadata after the system detects a new user login. The management center obtains the following
information and metadata about each user:
• username
• first and last names
• email address
• department
• telephone number
• current IP address
• Security Group Tag (SGT), if available
• endpoint profile, if available
• endpoint location, if available
• start port, if available
• end port, if available
The number of users the management center can store in its database depends on your management center
model. When a non-authoritative user login to a host is detected, that login is recorded in the user and host
history. If no authoritative user is associated with the host, a non-authoritative user can be the current user
for the host. However, after an authoritative user login is detected for that host, only another authoritative
user login changes the current user.
Note that traffic-based detection of AIM, Oracle, and SIP logins create duplicate user records because they
are not associated with any of the user metadata that the system obtains from LDAP servers. To prevent
overuse of user count because of duplicate user records from these protocols, configure traffic-based detection
to ignore those protocols.
You can search, view, and delete users from the database; you can also purge all users from the database.
For information about general user-related event troubleshooting, see Cisco Secure Firewall Management
Center Device Configuration Guide.
Procedure
Note If you have ISE/ISE-PIC configured, you may see host data in the users table. Because host detection by
ISE/ISE-PIC is not fully supported, you cannot perform user control using ISE-reported host data.
User Login
This type of event is generated when any of the following occur:
• Captive portal performs a successful or failed user authentication.
• Traffic-based detection detects a successful or failed user login.
Note SMTP logins detected by traffic-based detection are not recorded unless there is already a user with a matching
email address in the database.
When a non-authoritative user logs into a host, that login is recorded in the user and host history. If no
authoritative user is associated with the host, a non-authoritative user can be the current user for the host.
However, after an authoritative user logs into the host, only a login by another authoritative user changes the
current user.
If you are using captive portal or traffic-based detection, note the following about failed user login and failed
user authentication data:
• Failed logins reported by traffic-based detection (LDAP, IMAP, FTP, and POP3 traffic) are displayed
in the table view of user activity, but not in the table view of users. If a known user failed to log in, the
system identifies them by their username. If an unknown user failed to log in, the system uses Failed
Authentication as their username.
• Failed authentications reported by captive portal are displayed in both the table view of user activity and
the table view of users. If a known user failed to authenticate, the system identifies them by their username.
If an unknown user failed to authenticate, the system identifies them by the username they entered.
For information about general user-related event troubleshooting, see the Cisco Secure Firewall Management
Center Device Configuration Guide.
Procedure
• If you are using a custom workflow that does not include the table view of user activity, click (switch
workflow), then choose User Activity.
Tip If no events appear, you may need to adjust the time range; see Changing the Time Window, on
page 653.
User information also appears in the terminating page for users workflows.
The user data you see is the same as you would see in the table view of users.
Indications of Compromise Section
For information about this section, see:
• Indications of Compromise in the Cisco Secure Firewall Management Center Device Configuration
Guide
• Indications of Compromise Data Fields, on page 872
• Editing Indication of Compromise Rule States for a Single Host or User, on page 872
• Resolving Indication of Compromise Tags, on page 873
• Viewing Source Events for Indication of Compromise Tags, on page 873
The data used to generate the host history is stored in the user history database, which by default stores 10
million user login events. If you do not see any data in the host history for a particular user, either that user
is inactive, or you may need to increase the database limit.
Related Topics
User Data Fields
Procedure
Vulnerabilities pages changes 6.7 Bugtraq and its vulnerability data are no longer
available. The following changes have been made:
• Most vulnerability data now comes from the
National Vulnerability Database (NVD).
• Obsolete and redundant fields have been
removed.
• A new CVE ID column has been added to table
views, and a new Severity field has been added
to tables and details pages.
• You can now right-click the CVE ID in tables to
view details about that vulnerability in the NVD.
• The Vulnerability Impact column in tables has
been renamed to Impact. (No change to the field
name in Detail views.)
• When viewing vulnerabilities in host profiles
under Analysis > Hosts > Network Map > Hosts,
details for vulnerabilities (excluding third-party
vulnerabilities) use the new set of fields.
• The Bugtraq option has been removed from the
Vulnerabilities options on the Analysis > Hosts
> Network Map > Vulnerabilities page.
Modified screens:
• All pages under Analysis > Hosts >
Vulnerabilities
• Hosts and Vulnerabilities tabs on Analysis >
Hosts > Network Map pages
Note When a compliance allow list within an active correlation policy triggers, the system generates an allow list
event.
You can view a table of correlation events, then manipulate the event view depending on the information you
are looking for.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
The page you see when you access correlation events differs depending on the workflow you use. You can
use the predefined workflow, which includes the table view of correlation events. You can also create a custom
workflow that displays only the information that matches your specific needs.
Procedure
Tip If you are using a custom workflow that does not include the table view of correlation events,
click (switch workflow), then choose Correlation Events.
Step 2 Optionally, adjust the time range as described in Changing the Time Window, on page 653.
Step 3 Perform any of the following actions:
• To learn more about the columns that appear, see Correlation Event Fields, on page 904.
• To view the host profile for an IP address, click host profile that appears next to the IP address.
• To view user identity information, click the user icon that appears next to the User Identity, or for users
associated with IOCs,Red User.
• To sort and constrain events or to navigate within the current workflow page, see Using Workflows, on
page 634.
• To navigate between pages in the current workflow, keeping the current constraints, click the appropriate
page link at the top left of the workflow page.
• To drill down to the next page in the Workflows, constraining on a specific value, see Using Drill-Down
Pages, on page 642.
• To delete some or all correlation events, check the check boxes next to the events you want to delete and
click Delete, or click Delete All and confirm you want to delete all the events in the current constrained
view.
• To navigate to other event views to view associated events, see Inter-Workflow Navigation, on page 658.
• To view data in available sources external to your system, right-click an event value. The options you
see depend on the data type and include public sources; other sources depend on the resources you have
configured. For information, see Event Investigation Using Web-Based Resources, on page 598
• To gather intelligence about an event, right-click an event value in the table and choose from a Cisco or
third-party intelligence source. For example, you can get details about a suspicious IP address from Cisco
Talos. The options you see depend on the data type and the integrations that are configured on your
system. For more information, see Event Investigation Using Web-Based Resources, on page 598.
Related Topics
Database Event Limits, on page 54
Workflow Pages, on page 638
Field Description
Description The description of the correlation event. The information in the description depends on how the
rule was triggered.
For example, if the rule was triggered by an operating system information update event, the new
operating system name and confidence level appears.
Device The name of the device that generated the event that triggered the policy violation.
Domain The domain of the device whose monitored traffic triggered the policy violation. This field is
only present if you have ever configured the management center for multitenancy.
Impact The impact level assigned to the correlation event based on the correlation between intrusion
data, discovery data, and vulnerability information.
When searching this field, valid case-insensitive values are Impact 0, Impact Level 0, Impact
1, Impact Level 1, Impact 2, Impact Level 2, Impact 3, Impact Level 3, Impact 4, and
Impact Level 4. Do not use impact icon colors or partial strings (for example, do not use blue,
level 1, or 0).
Ingress Interface or Egress The ingress or egress interface in the intrusion or connection event that triggered the policy
Interface violation.
Ingress Security Zone or Egress The ingress or egress security zone in the intrusion or connection event that triggered the policy
Security Zone violation.
When using this field to search for policy violations triggered by intrusion events, type either:
• dropped, to specify whether the packet was dropped in an inline, switched, or routed
deployment
• would have dropped, to specify whether the packet would have dropped if the intrusion
policy had been set to drop packets in an inline, switched, or routed deployment
Note that the system does not drop packets in a passive deployment, including when an inline
set is in tap mode, regardless of the rule state or the drop behavior of the intrusion policy.
Priority The priority of the correlation event, which is determined by the priority of either the triggered
rule or the violated correlation policy. When searching this field, enter none for no priority.
Rule The name of the rule that triggered the policy violation.
Field Description
Security Intelligence Category The name of the object that represents or contains the blocked IP address in the event that triggered
the policy violation.
When searching this field, specify the Security Intelligence category associated with the correlation
event that triggered the policy violation. The Security Intelligence category can be the name of
a Security Intelligence object, the global Block list, a custom Security Intelligence list or feed,
or one of the categories in the Intelligence Feed.
Source Continent or Destination The continent associated with the source or destination host IP addresses in the event that triggered
Continent the policy violation.
Source Country or Destination The country associated with the source or destination IP address in the event that triggered the
Country policy violation.
Source Host Criticality or The user-assigned host criticality of the source or destination host involved in the correlation
Destination Host Criticality event: None, Low, Medium, or High.
Note that only correlation events generated by rules based on discovery events, host input events,
or connection events contain a source host criticality.
Source IP or Destination IP The IP address of the source or destination host in the event that triggered the policy violation.
Source Port/ICMP Type or The source port or ICMP type for the source traffic or the destination port or ICMP code for
Destination Port/ICMP Code destination traffic associated with the event that triggered the policy violation.
Source User or Destination User The name of the user logged in to the source or destination host in the event that triggered the
policy violation.
Time The date and time that the correlation event was generated. This field is not searchable.
Count The number of events that match the information that appears in each row. Note that the Count
field appears only after you apply a constraint that creates two or more identical rows. This field
is not searchable
Related Topics
Event Searches, on page 663
Procedure
Step 1 Access an allow list workflow using the Analysis > Correlation menu.
Step 2 You have the following options:
• Switch Workflow — To use a different workflow, including a custom workflow, click (switch workflow).
• Time Range — To adjust the time range, which is useful if no events appear, see Changing the Time
Window, on page 653.
• Host Profile — To view the host profile for an IP address, click Host Profile() or, for hosts with active
indications of compromise (IOC) tags, the Compromised Host that appears next to the IP address.
• User Profile (events only) — To view user identity information, click the user icon that appears next to
the User Identity, or for users associated with IOCs,Red User.
• Constrain — To constrain the columns that appear, click Close ( ) in the column heading that you
want to hide. In the pop-up window that appears, click Apply.
Tip To hide or show other columns, select or clear the appropriate check boxes before you click
Apply. To add a disabled column back to the view, expand the search constraints, then click
the column name under Disabled Columns.
Related Topics
Workflow Pages, on page 638
Configuring Event View Settings, on page 192
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
The page you see when you access allow list events differs depending on the workflow you use. You can use
a predefined workflow, which terminates in a table view of events. You can also create a custom workflow
that displays only the information that matches your specific needs.
Procedure
Device
The name of the managed device that detected the allow list violation.
Description
A description of how the allow list was violated. For example:
Client “AOL Instant Messenger” is not allowed.
Violations that involve an application protocol indicate the application protocol name and version, as well as
the port and protocol (TCP or UDP) it is using. If you restrict prohibitions to a particular operating system,
the description includes the operating system name. For example:
Server "ssh / 22 TCP (OpenSSH 3.6.1p2)" is not allowed on Operating System
“Linux Linux 2.4 or 2.6”.
Domain
The domain of the host that has become non-compliant with the allow list. This field is only present if you
have ever configured the management center for multitenancy.
Host Criticality
The user-assigned host criticality of the source host that is out of compliance with the allow list: None, Low,
Medium, or High.
IP Address
The IP address of the host that has become non-compliant with the allow list.
Policy
The name of the correlation policy that was violated, that is, the correlation policy that includes the allow list.
Port
The port, if any, associated with the discovery event that triggered an application protocol allow list violation
(a violation that occurred as a result of a non-compliant application protocol). For other types of allow list
violations, this field is blank.
Priority
The priority specified by the policy or allow list that triggered the policy violation. This is determined either
by the priority of the allow list in a correlation policy or by the priority of the correlation policy itself. Note
that the allow list priority overrides the priority of its policy. When searching this field, enter none for no
priority.
Time
The date and time that the allow list event was generated. This field is not searchable.
User
The identity of any known user logged in to the host that has become non-compliant with the allow list.
Allow List
The name of the allow list.
Count
The number of events that match the information that appears in each row. Note that the Count field appears
only after you apply a constraint that creates two or more identical rows. This field is not searchable.
constraints. You can also create a custom workflow that displays only the information that matches your
specific needs.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Procedure
Domain
The domain where the non-compliant host resides. This field is only present if you have ever configured the
management center for multitenancy.
Information
Any available vendor, product, or version information associated with the allow list violation. For protocols
that violate an allow list, this field also indicates whether the violation is due to a network or transport protocol.
IP Address
The IP address of the non-compliant host.
Port
The port, if any, associated with the event that triggered an application protocol allow list violation (a violation
that occurred as a result of a non-compliant application protocol). For other types of allow list violations, this
field is blank.
Protocol
The protocol, if any, associated with the event that triggered an application protocol allow list violation (a
violation that occurred as a result of a non-compliant application protocol). For other types of allow list
violations, this field is blank.
Time
The date and time that the allow list violation was detected.
Type
The type of allow list violation, that is, whether the violation occurred as a result of a non-compliant:
• operating system (os) (When searching this field, enter os or operating system.)
• application protocol (server)
• client
• protocol
• web application (web) (When searching this field, enter web application.)
Allow List
The name of the allow list that was violated.
Count
The number of events that match the information that appears in each row. Note that the Count field appears
only after you apply a constraint that creates two or more identical rows. This field is not searchable.
Procedure
Step 2 Optionally, adjust the time range as described in Changing the Time Window, on page 653.
Step 3 Optionally, to use a different workflow, including a custom workflow, click (switch workflow) by the workflow
title.
Tip If you are using a custom workflow that does not include the table view of remediations, click
(switch workflow) menu by the workflow title, then choose Remediation Status.
Related Topics
Using Workflows, on page 634
Field Description
Domain The domain of the device whose monitored traffic triggered the policy violation,
that in turn triggered the remediation. This field is only present if you have ever
configured the management center for multitenancy.
Policy The name of the correlation policy that was violated and triggered the remediation.
Field Description
Result Message A message that describes what happened when the remediation was launched. Status
messages include:
• Successful completion of remediation
• Unknown/unexpected error
If custom remediation modules are installed, you may see additional status messages
that are implemented by the custom module.
Rule The name of the correlation rule that triggered the remediation.
Time The date and time that the management center launched the remediation
Count The number of events that match the information that appears in each row. Note
that the Count field appears only after you apply a constraint that creates two or
more identical rows. This field is not searchable.
Related Topics
Event Searches, on page 663
Tip Table views always include “Table View” in the page name.
In a multidomain deployment, you can view data for the current domain and for any descendant domains.
You cannot view data from higher level or sibling domains.
Procedure
The Talos Intelligence Group provides a default allow list with recommended settings. You can also create
custom allow lists. A simple custom list might allow only hosts running a certain operating system. A more
complex list might allow all operating systems, but specify which operating system a host must use to run a
certain application protocol on a specific port.
Note The system can add hosts to the network map from exported NetFlow records, but the available information
for these hosts is limited; see Differences between NetFlow and Managed Device Data. This limitation may
affect the way you build compliance allow lists.
Note To delete the host attribute, delete its corresponding allow list. Deactivating, deleting, or removing an allow
list from a correlation policy does not delete the host attribute, nor does it change the attribute’s value for
each host.
After its initial evaluation, the system generates an allow list event whenever a monitored host goes out of
compliance with an active allow list; it also records an allow list violation.
You can use workflows, dashboards, and network maps to monitor system-wide compliance activity and
determine when and how an individual host violates your allow lists. You can also automatically respond to
such violations with remediations and alerts.
Related Topics
Configuring Correlation Policies, on page 933
Consider a scenario where you are a Global domain administrator, and you want to apply the same compliance
criteria to web servers across the entire deployment. You can create one allow list in the Global domain that
defines the compliance criteria. Then, constrain the allow list with target networks that specify the IP space
(or individual IP addresses) of the web servers in each leaf domain.
Note In addition to targeting IP addresses and ranges in leaf domains, you can also constrain a target network using
a higher-level domain. Targeting a subnet in a higher-level domain targets the same subnet in each of the
descendant leaf domains. The system builds a separate network map for each leaf domain. In a multidomain
deployment, using literal IP addresses to constrain this configuration can have unexpected results.
operating-system specific is listed in plain text specifies what is allowed to run on target hosts of a
particular operating system
Note Unidentified hosts remain in compliance with all allow lists until they are identified. You can, however, create
an allow list host profile for unknown hosts. Unidentified hosts are hosts about which the system has not yet
gathered enough information to identify their operating systems. Unknown hosts are hosts whose operating
systems do not match known fingerprints.
Note If you modify a shared host profile (including built-ins), or modify a built-in application protocol, protocol,
or client, your change affects every allow list that uses it. If you make unintended changes to or delete these
built-in elements, you can reset to factory defaults.
In addition, you can trigger a compliance change for a host by using the host input feature or the host profile
to:
• add a client, protocol, or server to a host
• delete a client, protocol, or server from a host
• set the operating system definition for a host
• change a host attribute for a host so that the host is no longer a valid target
Note To avoid overwhelming you with events, the system does not generate allow list events for non-compliant
hosts on its initial evaluation, nor hosts made non-compliant as a result of you modifying an active allow list
or shared host profile. The violations, however, are still recorded. If you want to generate allow list events
for all non-compliant targets, purge discovery data. Rediscovering network assets may trigger allow list events.
Supported Domains
Any
User Roles
• Admin
Procedure
Note After you choose a domain for the target network, you cannot change it. Targeting a subnet in a
higher-level domain targets the same subnet in each of the descendant leaf domains. The system
builds a separate network map for each leaf domain. In a multidomain deployment, using literal
IP addresses to constrain this configuration can have unexpected results.
Step 5 Optionally, enter a new Name and Description for the allow list.
Step 6 Optionally, Allow Jailbroken Mobile Devices on your network. Disabling this option causes jailbroken
devices to generate allow list violations.
Step 7 Add at least one Target Network to the allow list, as described in Setting Target Networks for a Compliance
Allow List, on page 923.
Step 8 Characterize compliant hosts using Allowed Host Profiles:
• Global Host Profile—To edit the allow list’s global host profile, click Any Operating System and
proceed as described in Building Allow List Host Profiles, on page 924.
• Edit Surveyed Profiles—To edit an existing operating system-specific host profile created by a network
survey, click its name and proceed as described in Building Allow List Host Profiles, on page 924.
• Create New Profiles—To create a new operating system-specific host profile for this allow list, click
Add ( ) next to Allowed Host Profiles, and proceed as described in Building Allow List Host Profiles,
on page 924.
• Add Shared Host Profile—To add an existing shared host profile to the allow list, click Add Shared
Host Profile, select the shared host profile you want to add, then click OK. Shared host profiles appear
in italics.
What to do next
• Add the allow list to an active correlation policy as described in Configuring Correlation Policies, on
page 933. The system immediately starts evaluating the allow list and generating violations.
Related Topics
Compliance Allow List Target Networks, on page 918
Creating a Compliance Allow List Based on Selected Hosts, on page 867
IP Address Conventions, on page 26
the clients, application protocols, web applications, and protocols that the system has detected on the applicable
operating systems.
Procedure
Step 1 In the compliance allow list editor, click Add Target Network.
Step 2 Enter the IP Address and Netmask for the target network.
Step 3 In a multidomain deployment, choose the Domain where the target network resides.
Note After you choose a domain for the target network, you cannot change it. Targeting a subnet in a
higher-level domain targets the same subnet in each of the descendant leaf domains. The system
builds a separate network map for each leaf domain. In a multidomain deployment, using literal
IP addresses to constrain this configuration can have unexpected results.
• Add Networks — To target additional hosts, click Add ( ), then enter the IP Address and Netmask.
To exclude the network from allow list compliance, select Exclude.
• Add Host Attributes — To target hosts with a specific host attribute, click Add ( ), then specify the
Attribute and its Value.
• Add VLANs — To target a VLAN, click Add ( ), then type a VLAN number (for 802.1q VLANs).
Step 6 To immediately implement all changes made since the last time you saved, click SaveAllow List.
Related Topics
Compliance Allow List Target Networks, on page 918
IP Address Conventions, on page 26
Note If you modify a shared host profile (including built-ins), or modify a built-in application protocol, protocol,
or client, your change affects every allow list that uses it. If you make unintended changes to or delete these
built-in elements, you can reset to factory defaults.
Procedure
Step 1 In the compliance allow list host profile editor, configure a host profile:
• Name — Type a Name.
• Operating System — To restrict the host profile to a specific operating system, use the OS Vendor, OS
Name, and Version drop-down lists. Because its purpose is to apply to hosts running any operating
system, you cannot restrict a global host profile.
• Application Protocol — To allow an application protocol, click Add ( ) and proceed as described in
Adding an Application Protocol to a Compliance Allow List, on page 926.
• Client — To allow a client, click Add ( ) and proceed as described in Adding a Client to a Compliance
Allow List, on page 926.
• Web Application — To allow a web application, click Add ( ) and proceed as described in Adding a
Web Application to a Compliance Allow List, on page 927.
• Protocol — To allow a protocol, click Add ( ) and proceed as described in Adding a Protocol to a
Compliance Allow List, on page 927.
Tip Select the appropriate Allow all... check box to allow all application protocols, clients, or web
applications for hosts matching this profile.
Step 2 To immediately implement all changes made since the last time you saved, click SaveAllow List (or Save
All Profiles if you are editing a shared host profile).
Procedure
Step 1 While you are creating or modifying a compliance allow list host profile, click Add ( ) next to Allowed
Application Protocols (or next to Globally Allowed Application Protocols if you are modifying the global
host profile).
Step 2 You have two options:
• If the application protocols you want to allow are listed, select them. The web interface lists application
protocols that have been allowed or are currently allowed by the allow list.
• To allow an application protocol not in the list, select <New Application Protocol> and click OK to
display the application protocol editor. Select the application protocol Type and Protocol you want to
allow. Optionally, restrict the application protocol by port, Vendor, and Version.
Note You must type the vendor and version exactly as they would appear in a table view of
applications. If you do not specify a vendor or version, the allow list allows all vendors and
versions as long as the type and protocol match.
Procedure
Step 1 While you are creating or modifying a compliance allow list host profile, click Add ( ) next to Allowed
Clients (or next to Globally Allowed Clients if you are modifying the global host profile).
Step 2 You have two options:
• If the clients you want to allow are listed, select them. The web interface lists clients that have been
allowed or are currently allowed by the allow list.
• To allow a client not in the list, select <New Client> and click OK to display the client editor. Select
the Client you want to allow from the drop-down list, and, optionally, restrict the client to an allowed
Version.
Note You must type the version exactly as it would appear in a table view of clients. If you do
not specify a version, all versions are allowed.
Procedure
Step 1 While you are creating or modifying a compliance allow list host profile, click Add ( ) next to Allowed
Web Applications (or next to Globally Allowed Web Applications if you are modifying the global host
profile).
Step 2 Select the web applications you want to allow.
Step 3 Click OK
Step 4 To immediately implement all changes made since the last time you saved, click SaveAllow List.
Procedure
Step 1 While you are creating or modifying a compliance allow list host profile, click Add ( ) next to Allowed
Protocols (or next to Globally Allowed Protocols if you are modifying the global host profile).
Step 2 You have two options:
• If the protocols you want to allow are listed, select them. The web interface lists protocols that have been
allowed or are currently allowed by the allow list.
• To allow a protocol not in the list, select <New Protocol> and click OK to display the protocol editor.
From the Type drop-down list, select the protocol type ( Network or Transport), then select the Protocol
from the drop-down list.
Tip Select Other (manual entry) to specify a protocol that is not in the list. For network
protocols, type the appropriate number as listed in
http://www.iana.org/assignments/ethernet-numbers/. For transport protocols, type the
appropriate number as listed in http://www.iana.org/assignments/protocol-numbers/.
Note The system does not display configurations from ancestor domains if the configurations expose information
about unrelated domains, including names, managed devices, and so on. The default allow list is only available
in the Global domain.
Procedure
• Delete — To delete an allow list that is not in use, click Delete ( ), then confirm you want to delete
the allow list. Deleting an allow list also removes its associated host attribute from all hosts on your
network. If the controls are dimmed, the configuration belongs to an ancestor domain, or you do not have
permission to modify the configuration.
• Edit — To modify an existing allow list, click Edit ( ) and proceed as described in Editing a Compliance
Allow List, on page 928. If View ( ) appears instead, the configuration belongs to an ancestor domain,
or you do not have permission to modify the configuration.
• Shared Host Profiles — To manage your allow lists’ shared host profiles, click Edit Shared Profiles
and proceed as described in Managing Shared Host Profiles, on page 930.
Procedure
• Add Target Network — To add a new target network without surveying its hosts, click Add ( ) next
to Target Networks and proceed as described in Setting Target Networks for a Compliance Allow List,
on page 923.
• Delete Host Profile — To delete a shared or operating-system specific host profile from the allow list,
click Delete ( ) next to the host profile, then confirm your choice. Deleting a shared host profile removes
it from the allow list, but does not delete the profile or remove it from any other allow lists that use it.
You cannot delete an allow list’s global host profile.
• Delete Target Network — To remove a target network from the allow list, click Delete ( ) next to the
network, then confirm your choice.
• Edit Global Host Profile — To edit the allow list’s global host profile, click Any Operating System and
proceed as described in Building Allow List Host Profiles, on page 924.
• Edit Other Host Profile — To edit a shared or operating-system specific host profile, click the host
profile’s name and proceed as described in Building Allow List Host Profiles, on page 924.
• Edit Target Network — To edit a target network, click the network’s name and proceed as directed in
Setting Target Networks for a Compliance Allow List, on page 923.
Step 4 To immediately implement all changes made since the last time you saved, click SaveAllow List.
Note If you modify a shared host profile (including built-ins), or modify a built-in application protocol, protocol,
or client, your change affects every allow list that uses it. If you make unintended changes to or delete these
built-in elements, you can reset to factory defaults.
Procedure
• Delete — To delete a shared host profile, click Delete ( ), then confirm your choice.
• Edit — To modify an existing shared host profile (including a built-in shared host profile), click its name
and proceed as described in Building Allow List Host Profiles, on page 924.
• Reset Built-In Host Profiles — To reset all built-in host profiles to factory defaults, click Built-in Host
Profiles, then click Reset to Factory Defaults and confirm your choice.
Step 4 To immediately implement all changes made since the last time you saved, click Save All Profiles.
Correlation Rules
When a correlation rule in an active correlation policy triggers, the system generates a correlation event.
Correlation rules can trigger when:
• The system generates a specific type of event (connection, intrusion, malware, discovery, user activity,
and so on).
• Your network traffic deviates from its normal profile.
• Add snooze periods. When a correlation rule triggers, a snooze period causes that rule not to trigger again
for a specified interval. After the snooze period elapses, the rule can trigger again and start a new snooze
period.
• Add inactive periods. During inactive periods, correlation rules do not trigger.
Although you can configure correlation rules without licensing your deployment, rules that use unlicensed
components do not trigger.
Correlation Responses
Responses to correlation policy violations include simple alerts and various remediations (such as scanning
a host). You can associate each correlation rule or allow list with a single response or group of responses.
If network traffic triggers multiple rules or allow lists, the system launches all the responses associated with
each rule and allow list.
Note The system builds a separate network map for each leaf domain. Using literal configurations (such as IP
addresses, VLAN tags, and usernames) to constrain cross-domain correlation rules can have unexpected
results.
Related Topics
Introduction to Compliance Allow Lists, on page 917
Secure Firewall Management Center Alert Responses, on page 523
Introduction to Remediations, on page 979
Supported Domains
Any
User Roles
• Admin
Procedure
Step 7 Add responses to rules and allow lists as described in Adding Responses to Rules and Allow Lists, on page
933.
Step 8 Click Save.
What to do next
• Activate the policy by clicking the slider.
and allow list. Note that an Nmap remediation does not launch when used as a response to a traffic profile
change.
In a multidomain deployment, you can use responses created in the current domain or in ancestor domains.
Procedure
Step 1 In the correlation policy editor, next to a rule or allow list where you want to add responses, click Responses
( ).
Step 2 Under Unassigned Responses, choose the responses you want to launch when the rule or allow list triggers,
and click the up arrow (^).
Step 3 Click Update.
Related Topics
Secure Firewall Management Center Alert Responses, on page 523
Introduction to Remediations, on page 979
Note The system does not display configurations from ancestor domains if the configurations expose information
about unrelated domains, including names, managed devices, and so on.
Procedure
• Delete — Click Delete ( ). If the controls are dimmed, the configuration belongs to an ancestor domain,
or you do not have permission to modify the configuration.
Note In a multidomain deployment, constraining a correlation rule by an ancestor domain matches events reported
by that domain's descendants.
Procedure
Step 6 Optionally, further constrain the correlation rule by adding any or all of the following:
• Host Profile Qualification—Click Add Host Profile Qualification; see Syntax for Correlation Host
Profile Qualifications, on page 950.
• Connection Tracker—Click Add Connection Tracker; see Connection Trackers, on page 953.
• User Qualification—Click Add User Qualification; see Syntax for User Qualifications, on page 952.
• Snooze Period—Under Rule Options, use the Snooze text field and drop-down list to specify the interval
that the system should wait to trigger a correlation rule again, after the rule triggers.
• Inactive Period—Under Rule Options, click Add Inactive Period. Using the text field and drop-down
lists, specify when and how often you want the system to refrain from evaluating network traffic against
the correlation rule.
Tip To remove a snooze period, specify an interval of 0 (seconds, minutes, or hours).
What to do next
• Use the rule in correlation policies as described in Configuring Correlation Policies, on page 933.
Related Topics
Managing Correlation Rules, on page 964
Correlation Rule Building Mechanics, on page 961
Snooze and Inactive Periods, on page 961
Differences between NetFlow and Managed Device Data
Access Control Policy Choose one or more access control policies that use the intrusion policy that generated the intrusion
event.
Access Control Rule Name Enter all or part of the name of the access control rule that uses the intrusion policy that generated
the intrusion event.
Application Protocol Choose one or more application protocols associated with the intrusion event.
Client Choose one or more clients associated with the intrusion event.
Destination Country or Source Choose one or more countries associated with the source or destination IP address in the intrusion
Country event.
Destination IP, Source IP, Both Enter a single IP address or address block.
Source IP and Destination IP,
or Either Source IP or
Destination IP
Destination Port/ICMP Code or Enter the port number or ICMP type for source traffic or the port number or ICMP code for
Source Port/ICMP Type destination traffic.
Device Choose one or more devices that may have generated the event.
Domain Choose one or more domains. In a multidomain deployment, constraining by an ancestor domain
matches data reported by that domain's descendants. This field is only present if you have ever
configured the management center for multitenancy.
Egress Security Zone or Ingress Choose one or more security zones or tunnel zones.
Security Zone
Impact Flag Choose the impact level assigned to the intrusion event.
Because no operating system information is available for hosts added to the network map from
NetFlow data, the system cannot assign Vulnerable (impact level 1: red) impact levels for intrusion
events involving those hosts. In such cases, use the host input feature to manually set the operating
system identity for the hosts.
Inline Result Choose whether the system dropped or would have dropped packets as a result of the intrusion
policy violation.
The system can drop packets in an inline, switched, or routed deployment. It does not drop packets
in a passive deployment, including when an inline set is in tap mode, regardless of intrusion rule
state or the drop behavior of the intrusion policy.
Intrusion Policy Choose one or more intrusion policies that generated the intrusion event.
IOC Tag Choose whether an indication of compromise tag was set as a result of the intrusion event.
Rule SID Enter a single Snort ID (SID) or multiple SIDs separated by commas.
If you choose is in or is not in as the operator, you cannot use the multi-selection pop-up window.
You must enter a comma-separated list of SIDs.
SSL Actual Action Choose the SSL rule action that indicates how the system handled an encrypted connection.
SSL Certificate Fingerprint Enter the fingerprint of the certificate used to encrypt the traffic, or choose a subject common name
associated with the fingerprint.
SSL Certificate Subject Enter all or part of the subject common name of the certificate used to encrypt the session.
Common Name (CN)
SSL Certificate Subject Country Choose one or more subject country codes of the certificate used to encrypt the session.
(C)
SSL Certificate Subject Enter all or part of the subject organization name of the certificate used to encrypt the session.
Organization (O)
SSL Certificate Subject Enter all or part of the subject organizational unit name of the certificate used to encrypt the session.
Organizational Unit (OU)
SSL Flow Status Choose one or more statuses based on the result of the system’s attempt to decrypt the traffic.
Username Enter the username of the user logged into the source host in the intrusion event.
VLAN ID Enter the innermost VLAN ID associated with the packet that triggered the intrusion event
Web Application Choose one or more web applications associated with the intrusion event.
Related Topics
Intrusion Event Fields, on page 744
IP Address Conventions, on page 26
The following table describes how to build a correlation rule condition when you choose a malware event as
the base event.
Application Protocol Choose one or more application protocols associated with the malware event.
Client Choose one or more clients associated with the malware event.
Destination Country or Choose one or more countries associated with the source or destination IP address in the malware
Source Country event.
Destination Port/ICMP Code Enter the port number or ICMP code for destination traffic.
Domain Choose one or more domains. In a multidomain deployment, constraining by an ancestor domain
matches data reported by that domain's descendants. This field is only present if you have ever
configured the management center for multitenancy.
Event Type Choose one or more event types associated with the malware event detected by Secure Endpoint.
IOC Tag Choose whether an indication of compromise tag is or is not set as a result of the malware event.
SSL Actual Action Choose the SSL rule action that indicates how the system handled an encrypted connection.
SSL Certificate Fingerprint Enter the fingerprint of the certificate used to encrypt the traffic, or choose a subject common name
associated with the fingerprint.
SSL Certificate Subject Enter all or part of the subject common name of the certificate used to encrypt the session.
Common Name (CN)
SSL Certificate Subject Choose one or more subject country codes of the certificate used to encrypt the session.
Country (C)
SSL Certificate Subject Enter all or part of the subject organization name of the certificate used to encrypt the session.
Organization (O)
SSL Certificate Subject Enter all or part of the subject organizational unit name of the certificate used to encrypt the session.
Organizational Unit (OU)
SSL Flow Status Choose one or more statuses based on the result of the system’s attempt to decrypt the traffic.
Source Port/ICMP Type Enter the port number or ICMP type for source traffic.
Web Application Choose one or more web applications associated with the malware event.
Related Topics
File and Malware Event Fields, on page 793
IP Address Conventions, on page 26
a host is deleted because the host limit was reached Host Deleted: Host Limit Reached
the OS or server identity for a host has timed out Identity Timeout
there is new information about a TCP server TCP Server Information Update
there is new information about a UDP server UDP Server Information Update
The following table describes how to build a correlation rule condition when you choose a discovery event
as the base event.
Device Choose one or more devices that may have generated the discovery event.
Domain Choose one or more domains. In a multidomain deployment, constraining by an ancestor domain
matches data reported by that domain's descendants. This field is only present if you have ever
configured the management center for multitenancy.
Hardware Enter the hardware model for the mobile device. For example, to match all Apple iPhones, enter
iPhone.
Host Type Choose one or more host types. You can choose between a host or one of several types of network
device.
Jailbroken Choose Yes to indicate that the host in the event is a jailbroken mobile device or No to indicate that
it is not.
MAC Address Enter all or part of the MAC address of the host.
For example, if you know that devices from a certain hardware manufacturer have MAC addresses
that begin with 0A:12:34, you could choose begins with as the operator, then enter 0A:12:34 as
the value.
MAC Type Choose whether the MAC address was ARP/DHCP Detected.
That is, choose whether the system positively identified the MAC address as belonging to the host
(is ARP/DHCP Detected), or whether the system is seeing many hosts with that MAC address
because, for example, there is a router between the managed device and the host (is not ARP/DHCP
Detected).
MAC Vendor Enter all or part of the name of the MAC hardware vendor of the NIC used by the network traffic
that triggered the discovery event.
Mobile Choose Yes to indicate that the host in the event is a mobile device or No to indicate that it is not.
Protocol or Transport Enter the name or number of the transport protocol as listed in
Protocol http://www.iana.org/assignments/protocol-numbers.
Source Choose the source of the host input data (for operating system and server identity changes and
timeouts).
Source Type Choose the type of the source for the host input data (for operating system and server identity changes
and timeouts).
Related Topics
Discovery Event Types, on page 854
Discovery Event Fields, on page 860
IP Address Conventions, on page 26
Device Choose one or more devices that may have detected the user activity.
Domain Choose one or more domains. In a multidomain deployment, constraining by an ancestor domain
matches data reported by that domain's descendants. This field is only present if you have ever
configured the management center for multitenancy.
Related Topics
User Activity Data Fields
IP Address Conventions, on page 26
Table 122: Correlation Rule Trigger Criteria vs Host Input Event Types
The following table describes how to build a correlation rule condition when you choose a host input event
as the base event.
Domain Choose one or more domains. In a multidomain deployment, constraining by an ancestor domain
matches data reported by that domain's descendants. This field is only present if you have ever
configured the management center for multitenancy.
Source Type Choose the type of the source for the host input data.
Related Topics
Host Input Event Types, on page 858
Discovery Event Fields, on page 860
IP Address Conventions, on page 26
The following table describes how to build a correlation rule condition when you choose a connection event
as the base event.
Access Control Policy Choose one or more access control policies that logged the connection.
Access Control Rule Action Choose one or more actions associated with the access control rule that logged the connection.
Choose Monitor to trigger correlation events when network traffic matches the conditions of any
Monitor rule, regardless of the rule or default action that later handles the connection.
Access Control Rule Enter all or part of the name of the access control rule that logged the connection.
You can enter the name of any Monitor rule whose conditions were matched by a connection,
regardless of the rule or default action that later handled the connection.
Application Protocol Choose one or more application protocols associated with the connection.
Connection Type Specify whether you want to trigger the correlation rule based on how the connection information
was obtained:
• Choose is and Netflow for connection events generated from exported NetFlow data.
• Choose is not and Netflow for connection events detected by a managed device.
Destination Country or Source Choose one or more countries associated with the source or destination IP address in the connection
Country event.
Device Choose one or more devices that either detected the connection, or that processed the connection
(for connection data from exported NetFlow records).
Domain Choose one or more domains. In a multidomain deployment, constraining by an ancestor domain
matches data reported by that domain's descendants. This field is only present if you have ever
configured the management center for multitenancy.
Egress Security Zone or Ingress Choose one or more security zones or tunnel zones.
Security Zone
Initiator IP, Responder IP, Both Specify a single IP address or address block.
Initiator and Responder IP, or
Either Initiator IP or Responder
IP
Initiator Port/ICMP Type or Enter the port number or ICMP type for initiator traffic or the port number or ICMP code for
Responder Port/ICMP Code responder traffic.
IOC Tag Specify whether an indication of compromise tag is or is not set due to the connection event.
NetBIOS Name Enter the NetBIOS name of the monitored host in the connection.
NetFlow Device Choose the IP address of the NetFlow exporter you want to use to trigger the correlation rule. If
you did not add any NetFlow exporters to the network discovery policy, the NetFlow Device
drop-down list is blank.
Prefilter Policy Choose one or more prefilter policies that handled the connection.
Reason Choose one or more reasons associated with the connection event.
Security Intelligence Category Choose one or more Security Intelligence categories associated with the connection event.
To use Security Intelligence Category as a condition for end-of-connection events, set that category
to Monitor instead of Block in your access control policy.
SSL Actual Action Specify the SSL rule action that indicates how the system handled an encrypted connection.
SSL Certificate Fingerprint Enter the fingerprint of the certificate used to encrypt the traffic, or choose a subject common name
associated with the fingerprint.
SSL Certificate Status Choose one or more statuses associated with the certificate used to encrypt the session.
SSL Certificate Subject Enter all or part of the subject common name of the certificate used to encrypt the session.
Common Name (CN)
SSL Certificate Subject Country Choose one or more subject country codes of the certificate used to encrypt the session.
(C)
SSL Certificate Subject Enter all or part of the subject organization name of the certificate used to encrypt the session.
Organization (O)
SSL Certificate Subject Enter all or part of the subject organizational unit name of the certificate used to encrypt the session.
Organizational Unit (OU)
SSL Cipher Suite Choose one or more cipher suites used to encrypt the session.
SSL Flow Status Choose one or more statuses based on the result of the system’s attempt to decrypt the traffic.
SSL Policy Choose one or more SSL policies that logged the encrypted connection.
SSL Rule Name Enter all or part of the name of the SSL rule that logged the encrypted connection.
SSL Server Name Enter all or part of the name of the server with which the client established an encrypted connection.
SSL URL Category Choose one or more URL categories for the URL visited in the encrypted connection.
SSL Version Choose one or more SSL or TLS versions used to encrypt the session.
TCP Flags Choose a TCP flag that a connection event must contain in order to trigger the correlation rule.
Only connection data generated from NetFlow records contains TCP flags.
Transport Protocol Enter the transport protocol used by the connection: TCP or UDP.
Tunnel/Prefilter Rule Enter all or part of the name of the tunnel or prefilter rule that handled the connection.
URL Category Choose one or more URL categories for the URL visited in the connection.
URL Reputation Choose one or more URL reputation values for the URL visited in the connection.
Username Enter the username of the user logged in to either host in the connection.
Web Application Choose one or more web applications associated with the connection.
Related Topics
Connection and Security-Related Connection Event Fields, on page 709
IP Address Conventions, on page 26
To create a rule that triggers when the number of bytes traversing is greater than a certain number of
standard deviations above the mean, use only the first condition shown in the graphic.
To create a rule that triggers when the number of bytes traversing is greater than a certain number of
standard deviations below the mean, use only the second condition.
Check the use velocity data check box to trigger the correlation rule based on rates of change between data
points. If you wanted to use velocity data in the above example, you could specify that the rule triggers if
either:
• the change in the number of bytes traversing your network spikes above or below a certain number of
standard deviations above the mean rate of change
• the change in the number of bytes traversing your network spikes above a certain number of bytes
The following table describes how to build a condition in a correlation rule when you choose a traffic profile
change as the base event.
If you specify... Choose an operator, then enter... Then choose one of...
or
the number of standard deviations either above or below the mean
that one of the above criteria must be in to trigger the rule
or
the number of standard deviations either above or below the mean
that one of the above criteria must be in trigger the rule
Unique Initiators the number of unique hosts that initiated sessions initiators
or standard deviation(s)
the number of standard deviations either above or below the mean
that the number of unique initiators detected must be to trigger
the rule
If you specify... Choose an operator, then enter... Then choose one of...
Unique Responders the number of unique hosts that responded to sessions responders
or standard deviation(s)
the number of standard deviations either above or below the mean
that the number of unique responders detected must be to trigger
the rule
The following table describes how to build a host profile qualification for a correlation rule.
Domain Choose one or more domains. In a multidomain deployment, constraining by an ancestor domain
matches data reported by that domain's descendants.This field is only present if you have ever
configured the management center for multitenancy.
Hardware Enter the hardware model for the mobile device. For example, to match all Apple iPhones, enter
iPhone.
Host Type Choose one or more host types. You can choose between a normal host or one of several types of
network device.
Jailbroken Choose Yes to indicate that the host in the event is a jailbroken mobile device or No to indicate that
it is not.
MAC Address > MAC Address Enter all or part of the MAC address of the host.
MAC Address > MAC Type Choose whether the MAC type is ARP/DHCP detected:
• the system positively identified the MAC address as belonging to the host (is ARP/DHCP
Detected)
• the system is seeing many hosts with that MAC address because, for example, there is a router
between the device and the host (is not ARP/DHCP Detected)
• the MAC type is irrelevant (is any)
MAC Vendor Enter all or part of the MAC vendor of hardware used by the host.
Mobile Choose Yes to indicate that the host in the event is a mobile device or No to indicate that it is not.
Operating System > OS Vendor Choose one or more operating system vendor names.
Operating System > OS Name Choose one or more operating system names.
Transport Protocol Enter the name or number of the transport protocol as listed in
http://www.iana.org/assignments/protocol-numbers.
any available host attribute, Enter or choose the appropriate value, depending on the host attribute type.
including the default
compliance allow list host
attribute
Related Topics
Host Data Fields, on page 862
The following table describes how to build a user qualification for a correlation rule.
Authentication Protocol Choose the authentication protocol (or user type) protocol used to detect the user.
Domain Choose one or more domains. In a multidomain deployment, constraining by an ancestor domain matches
data reported by that domain's descendants. This field is only present if you have ever configured the
management center for multitenancy.
Related Topics
User Data Fields
Connection Trackers
A connection tracker constrains a correlation rule so that after the rule’s initial criteria are met (including host
profile and user qualifications), the system begins tracking certain connections. The system generates a
correlation event for the rule if the tracked connections meet additional criteria gathered over a time period
that you specify.
Tip Connection trackers typically monitor very specific traffic and, when triggered, run only for a finite, specified
time. Compare connection trackers with traffic profiles, which typically monitor a broad range of network
traffic and run persistently.
However, if time expires before network traffic meets the conditions in the connection tracker, the system
does not generate a correlation event, and also stops tracking connections for that rule instance.
For example, a connection tracker can serve as a kind of event threshold by generating a correlation event
only if a certain type of connection occurs more than a specific number of times within a specific time period.
Or, you can generate a correlation event only if the system detects excessive data transfer after an initial
connection.
Procedure
Access Control Policy Choose one or more access control policies that handled the connections you want to track.
Access Control Rule Action Choose one or more access control rule actions associated with the access control rule that logged
the connections you want to track.
Choose Monitor to track connections that match the conditions of any Monitor rule, regardless
of the rule or default action that later handles the connections.
Access Control Rule Name Enter all or part of the name of the access control rule that logged the connections you want to
track.
To track connections that match a Monitor rule, enter the name of the Monitor rule. The system
tracks the connections, regardless of the rule or default action that later handles them.
Connection Type Specify whether you want to trigger the correlation rule based on how the connection information
was obtained:
• Choose is and Netflow for connection events generated from exported NetFlow records.
• Choose is not and Netflow for connection events detected by a managed device.
Device Choose one or more devices whose detected connections you want to track. If you want to track
NetFlow connections, choose the devices that process the connection data from exported NetFlow
records.
Ingress Security Zone or Egress Choose one or more security zones or tunnel zones.
Security Zone
Initiator Port/ICMP Type or Enter the port number or ICMP type for initiator traffic or the port number or ICMP code for
Responder Port/ICMP Code responder traffic.
NETBIOS Name Enter the NetBIOS name of the monitored host in the connection.
NetFlow Device Choose the IP address of the NetFlow exporter you want to track. If you did not add any NetFlow
exporters to the network discovery policy, the NetFlow Device drop-down list is blank.
Prefilter Policy Choose one or more prefilter policies that handled the connections you want to track.
Reason Choose one or more reasons associated with the connections you want to track.
Security Intelligence Category Choose one or more Security Intelligence categories associated with the connections you want
to track.
TCP Flags Choose the TCP flag that connections must contain in order to track them. Only connections
generated from exported NetFlow records contain TCP flag data.
URL Enter all or part of the URL visited in the connections you want to track.
URL Category Choose one or more URL categories for the URL visited in the connections you want to track.
URL Reputation Choose one or more URL reputation values for the URL visited in the connections you want to
track
Username Enter the username of the user logged into either host in the connections you want to track.
Tip To track connections for a specific IP address or block of IP addresses, click switch to manual entry to
manually specify the IP. Click switch to event fields to go back to using the IP address in the event.
Related Topics
Connection and Security-Related Connection Event Fields, on page 709
IP Address Conventions, on page 26
Number of SSL Encrypted the total number of SSL- or TLS-encrypted sessions detected
Sessions
The rule shown in the following graphic specifies that when a connection occurs from outside the 10.1.0.0/16
network to inside the network, the system begins tracking connections that meet that criterion. The system
then generates a correlation event if the system detects four connections (including the original connection)
within two minutes that match that signature.
The following diagram shows how network traffic can trigger the above correlation rule.
In this example, the system detected a connection that met the basic conditions of the correlation rule, that is,
the system detected a connection from a host outside the 10.1.0.0/16 network to a host inside the network.
This created a connection tracker.
The connection tracker is processed in the following stages:
• First, the system starts tracking connections when it detects a connection from Host A outside the network
to Host 1 inside the network.
• The system detects two more connections that match the connection tracker signature: Host B to Host 2
and Host C to Host 1.
• The system detects a fourth qualifying connection when Host A connects to Host 3 within the two-minute
time limit. The rule conditions are met.
• Finally, the system generates a correlation event and the system stops tracking connections.
The following diagram shows how network traffic can trigger the above correlation rule.
In this example, the system detected the BitTorrent TCP application protocol on two different hosts: Host 1
and Host 2. These two hosts transmitted data via BitTorrent to four other hosts: Host A, Host B, Host C, and
Host D.
This connection tracker is processed in the following stages:
• First, the system starts tracking connections at the 0-second marker when the system detects the BitTorrent
application protocol on Host 1. Note that the connection tracker will expire if the system does not detect
7MB of BitTorrent TCP data being transmitted in the next 5 minutes (by the 300-second marker).
• At 5 seconds, Host 1 has transmitted 3MB of data that matches the signature:
• 1MB from Host 1 to Host A, at the 1-second marker (1MB total BitTorrent traffic counted towards
fulfilling the connection tracker)
• 2MB from Host 1 to Host B, at the 5-second marker (3MB total)
• At 7 seconds, the system detects the BitTorrent application protocol on Host 2 and starts tracking
BitTorrent connections for that host as well.
• At 20 seconds, the system has detected additional data matching the signature being transmitted from
both Host 1 and Host 2:
• 1MB from Host 2 to Host A, at the 10-second marker (4MB total)
• 2MB from Host 1 to Host C, at the 15-second marker (6MB total)
• 1MB from Host 2 to Host B, at the 20-second marker (7MB total)
• Although Host 1 and Host 2 have now transmitted a combined 7MB of BitTorrent data, the rule does
not trigger because the total number of bytes transmitted must be more than 7MB (Responder Bytes
are greater than 7340032). At this point, if the system were to detect no additional BitTorrent transfers
for the remaining 280 seconds in the tracker’s timeout period, the tracker would expire and the system
would not generate a correlation event.
• However, at 30 seconds, the system detects another BitTorrent transfer, and the rule conditions are met:
• 2MB from Host 1 to Host D at the 30-second marker (9MB total)
• Finally, the system generates a correlation event. The system also stops tracking connections for this
connection tracker instance, even though the 5-minute period has not expired. If the system detects a
new connection using the BitTorrent TCP application protocol at this point, it will create a new connection
tracker. Note that the system generates the correlation event after Host 1 transmits the entire 2MB to
Host D, because it does not tally connection data until the session terminates.
For example, if you want to generate a correlation event every time a new host is detected, you can create a
simple rule with no conditions.
If you want to further constrain the rule and generate an event only if that new host was detected on the 10.4.x.x
network, you can add a single condition.
When your construct includes more than one condition, you must link them with an AND or an OR operator.
Conditions on the same level are evaluated together:
• The AND operator requires that all conditions on the level it controls must be met.
• The OR operator requires that at least one of the conditions on the level it controls must be met.
The following rule, which detects SSH activity on a nonstandard port on the 10.4.x.x network and the
192.168.x.x network, has four conditions, with the bottom two constituting a complex condition.
C IP Address is in 10.0.0.0/8
D IP Address is in 196.168.0.0/16
Caution Evaluating complex correlation rules that trigger on frequently occurring events can degrade system
performance. For example, a multicondition rule that the system must evaluate against every logged connection
can cause resource overload.
Procedure
Step 2 Link conditions by choosing the AND or OR operator from the drop-down list to the left of the conditions.
The following graphic shows a correlation rule with one simple condition and one complex condition,
joined by the OR operator. The complex condition comprises two simple conditions joined by the
AND operator.
Procedure
Step 1 In the correlation rule editor, build a condition, choosing is in or is not in as the operator.
Step 2 Click anywhere in the text field or on the Edit link.
Step 3 Under Available, choose multiple values. You can also click and drag to choose multiple adjacent values.
Step 4 Click the right arrow (>) to move the selected entries to Selected.
Step 5 Click OK.
Note The system does not display configurations from ancestor domains if the configurations expose information
about unrelated domains, including names, managed devices, and so on.
Procedure
Procedure
Step 5 Choose the Available Responses to group. then click the right arrow (>) to move them to the Responses in
Group. To move responses the other way, use the left arrow (<).
Step 6 Click Save.
What to do next
• If you did not activate the group upon creation and you want to activate it now, click the slider.
Related Topics
Secure Firewall Management Center Alert Responses, on page 523
Procedure
Tip Cisco recommends that the PTW include at least 100 data points. Configure your PTW and sampling rate so
that your traffic profiles contain enough data to be statistically meaningful.
The following graphic shows a traffic profile with a PTW of one day and a sampling rate of five minutes.
You can also set up inactive periods in traffic profile. Traffic profiles collect data during inactive periods, but
do not use that data when calculating profile statistics. Traffic profile graphs plotted over time show inactive
periods as a shaded region.
For example, consider a network infrastructure where all the workstations are backed up at midnight every
night. The backup takes about 30 minutes and spikes the network traffic. You could configure recurring
inactive period for your traffic profile to coincide with the scheduled backups.
Note The system uses end-of-connection data to create connection graphs and traffic profiles. To use traffic profiles,
make sure you log end-of-connection events to the management center database.
Profile conditions can also constrain traffic profiles using criteria based on connection data. For example, you
could set the profile conditions so that the traffic profile only profiles sessions using a specific port, protocol,
or application.
Finally, you can also constrain traffic profiles using information about the tracked hosts. This constraint is
called a host profile qualification. For example, you could collect connection data only for hosts with high
criticality.
Note Constraining a traffic profile to a higher-level domain aggregates and profiles the same type of traffic in each
of the descendant leaf domains. The system builds a separate network map for each leaf domain. In a
multidomain deployment, profiling traffic across domains can have unexpected results.
Related Topics
Introduction to Correlation Policies and Rules, on page 931
For a host profile qualification, you must also specify whether you are constraining the traffic profile using
information data about the initiating or responding hosts.
When your construct includes more than one condition, you must link them with an AND or an OR operator.
Conditions on the same level are evaluated together:
• The AND operator requires that all conditions on the level it controls must be met.
• The OR operator requires that at least one of the conditions on the level it controls must be met.
In contrast, the following traffic profile, which collects connection data for HTTP activity in either
of two subnets, has three conditions, with the last constituting a complex condition.
(A and (B or C))
B IP Address is in 10.4.0.0/16
C IP Address is in 192.168.0.0/16
Supported Domains
Any
User Roles
• Admin
• Discovery Admin
Note The system does not display traffic profiles from ancestor domains if the profiles' conditions expose information
about unrelated domains, including names, managed devices, and so on.
Procedure
• Activate/Deactivate — To activate or deactivate a traffic profile, click the slider. Deactivating a traffic
profile deletes its associated data. If you reactivate the profile, you must wait the length of its PTW before
rules written against it will trigger.
• Create — To create a new traffic profile, click New Profile and proceed as described in Configuring
Traffic Profiles, on page 972. You can also click Copy ( ) to edit a copy of an existing traffic profile.
• Delete — To delete a traffic profile, click Delete ( ), then confirm your choice.
• Edit — To modify an existing traffic profile, click Edit ( ) and proceed as described in Configuring
Traffic Profiles, on page 972. If a traffic profile is active you can only change its name and description.
• Graph — To view the traffic profile as a graph, click Graph ( ). In a multidomain deployment, you
cannot view the graph for a traffic profile that belongs to an ancestor domain if the graph exposes
information about unrelated domains.
Procedure
Step 1 In the traffic profile editor, under Profile Conditions, click Add condition or Add complex condition for
each condition you want to add. Conditions on the same level are evaluated together.
• To require that all conditions on the level that the operator controls are met, choose AND.
• To require that only one of the conditions on the level that the operator controls is met, choose OR.
Step 2 Specify a category, operator, and value for each condition as described in Syntax for Traffic Profile Conditions,
on page 974 and Traffic Profile Conditions, on page 969.
If you choose is in or is not in as the operator, you can select multiple values in a single condition as described
in Using Multiple Values in a Traffic Profile Condition, on page 977.
When the category represents an IP address, choosing is in or is not in as the operator allows you to specify
whether the IP address is in or is not in a range of IP addresses.
Example
The following traffic profile collects information on a specific subnet. The category of the condition
is Initiator/Responder IP, the operator is is in, and the value is 10.4.0.0/16.
Related Topics
IP Address Conventions, on page 26
Step 1 In the traffic profile editor, click Add Host Profile Qualification.
Step 2 Under Host Profile Qualification, click Add condition or Add complex condition for each condition you
want to add. Conditions on the same level are evaluated together.
• To require that all conditions on the level that the operator controls are met, choose AND.
• To require that only one of the conditions on the level that the operator controls is met, choose OR.
Step 3 Specify a host type, category, operator, and value for each condition as described in Syntax for Host Profile
Qualifications in a Traffic Profile, on page 975and Traffic Profile Conditions, on page 969.
If you choose is in or is not in as the operator, you can select multiple values in a single condition as described
in Using Multiple Values in a Traffic Profile Condition, on page 977.
Example
The following host profile qualification constrains a traffic profile such that it collects connection
data only if the responding host in the detected connection is running a version of Microsoft Windows.
Connection Type Choose whether the profile uses connection data from traffic monitored by managed devices or from
exported NetFlow records.
If you do not specify a connection type, the traffic profile includes both.
Domain Choose one or more domains. In a multidomain deployment, constraining by an ancestor domain
matches data reported by that domain's descendants.
NetFlow Device Choose the NetFlow exporter whose data you want to use to create the traffic profile.
Related Topics
Requirements for Populating Connection Event Fields, on page 728
IP Address Conventions, on page 26
Domain Choose one or more domains. In a multidomain deployment, constraining by an ancestor domain
matches data reported by that domain's descendants.
Hardware Enter a mobile device hardware model. For example, to match all Apple iPhones, enter iPhone.
Host Type Choose one or more host types. You can choose between a normal host or one of several types of
network device.
Jailbroken Choose Yes to indicate that the host in the event is a jailbroken mobile device or No to indicate that
it is not.
MAC Address > MAC Address Enter all or part of the MAC address of the host.
MAC Address > MAC Type Choose whether the MAC type is ARP/DHCP Detected, that is, whether:
• The system positively identified the MAC address as belonging to the host (is ARP/DHCP
Detected)
• The system is seeing many hosts with that MAC address because, for example, there is a router
between the device and the host (is not ARP/DHCP Detected)
• The MAC type is irrelevant (is any)
MAC Vendor Enter all or part of the MAC vendor of hardware used by the host.
Mobile Choose Yes to indicate that the host in the event is a mobile device or No to indicate that it is not.
Operating System > OS Vendor Choose one or more operating system vendor names.
Operating System > OS Name Choose one or more operating system names.
Transport Protocol Enter the name or number of the transport protocol as listed in
http://www.iana.org/assignments/protocol-numbers.
any available host attribute, Specify the appropriate value, which depends on the type of host attribute you choose:
including the default
• If the host attribute type is Integer, enter an integer value in the range defined for the attribute.
compliance allow list host
attribute • If the host attribute type is Text, enter a text value.
• If the host attribute type is List, choose a valid list string.
• If the host attribute type is URL, enter a URL value.
Procedure
Step 1 While building a traffic profile or host profile qualification condition, choose is in or is not in as the operator.
The drop-down list changes to a text field.
Step 2 Click anywhere in the text field or on the Edit link.
Step 3 Under Available, choose multiple values.
Step 4 Click the right arrow to move the selected entries to Selected.
Step 5 Click OK.
Supported Domains
Any
User Roles
• Admin
• Discovery Admin
Introduction to Remediations
A remediation is a program that the system launches in response to a correlation policy violation.
When a remediation runs, the system generates a remediation status event. Remediation status events include
details such as the remediation name, the correlation policy and rule that triggered it, and the exit status
message.
The system supports several remediation modules:
• Cisco ISE Adaptive Network Control (ANC) — applies or clears ISE-configured ANC policies involved
in a correlation policy violation
• Cisco IOS Null Route — blocks traffic sent to a host or network involved in a correlation policy violation
(requires Cisco IOS Version 12.0 or higher)
• Nmap Scanning — scans hosts to determine running operating systems and servers
• Set Attribute Value — sets a host attribute on a host involved in a correlation policy violation
Tip You can install custom modules that perform other tasks; see the Firepower System Remediation API Guide.
Implementing Remediations
To implement a remediation, first create at least one instance for the module you choose. You can create
multiple instances per module, where each instance is configured differently. For example, to communicate
with multiple routers using the Cisco IOS Null Route remediation module, configure multiples instances of
that module.
You can then add multiple remediations to each instance that describe the actions you want to perform when
a policy is violated.
Finally, associate remediations with rules in correlation policies, so that the system launches the remediations
in response to correlation policy violations.
You can also exempt specific IP addresses from ISE EPS remediation.
Note Your ISE version and configuration impact how you can use ISE. For example, you cannot use ISE-PIC to
perform ISE EPS remediations. For more information, see the User Control with ISE/ISE-PIC chapter in the
Cisco Secure Firewall Management Center Device Configuration Guide.
For more information about ISE EPS actions, see the Cisco Identity Services Engine User Guide.
Procedure
What to do next
• Assign remediations as responses to correlation policy violations as described in Adding Responses to
Rules and Allow Lists, on page 933.
Procedure
What to do next
• Create an ISE EPS remediation as described in Adding Set Attribute Value Remediations, on page 988.
Related Topics
IP Address Conventions, on page 26
Procedure
What to do next
• Assign remediations as responses to correlation policy violations; see Adding Responses to Rules and
Allow Lists, on page 933.
Note Do not use a destination-based remediation as a response to a correlation rule that is based on a discovery or
host input event. These events are associated with source hosts.
Caution When a Cisco IOS remediation is activated, there is no timeout period. To unblock the IP address or network,
you must manually clear the routing change from the router.
Note Do not use a destination-based remediation as a response to a correlation rule that is based on a discovery or
host input event. These events are associated with source hosts.
Caution When a Cisco IOS remediation is activated, there is no timeout period. To unblock the IP address or network,
you must manually clear the routing change from the router.
Procedure
Step 1 Enable Telnet on the Cisco router as described in the documentation provided with your Cisco router or IOS
software.
Step 2 On the management center, add a Cisco IOS Null Route instance for each Cisco IOS router you plan to use;
see Adding a Cisco IOS Instance, on page 984.
Step 3 Create remediations for each instance, based on the type of response you want to elicit on the router when
correlation policies are violated:
• Adding Cisco IOS Block Destination Remediations, on page 984
• Adding Cisco IOS Block Destination Network Remediations, on page 985
• Adding Cisco IOS Block Source Remediations, on page 986
• Adding Cisco IOS Block Source Network Remediations, on page 987
What to do next
• Assign remediations as responses to correlation policy violations; see Adding Responses to Rules and
Allow Lists, on page 933.
Procedure
What to do next
• Add specific remediations to be used by correlation policies as described in Adding Cisco IOS Block
Destination Remediations, on page 984, Adding Cisco IOS Block Destination Network Remediations,
on page 985, Adding Cisco IOS Block Source Remediations, on page 986, and Adding Cisco IOS Block
Source Network Remediations, on page 987.
Related Topics
IP Address Conventions, on page 26
In a multidomain deployment, you cannot add a remediation to an instance created in an ancestor domain.
Procedure
What to do next
• Assign remediations as responses to correlation policy violations; see Adding Responses to Rules and
Allow Lists, on page 933.
Procedure
For example, to block traffic to an entire Class C network when a single host triggered a rule (this is not
recommended), use 255.255.255.0 or 24 as the netmask.
As another example, to block traffic to 30 addresses that include the triggering IP address, specify
255.255.255.224 or 27 as the netmask. In this case, if the IP address 10.1.1.15 triggers the remediation, all
IP addresses between 10.1.1.1 and 10.1.1.30 are blocked. To block only the triggering IP address, leave
the field blank, enter 32, or enter 255.255.255.255.
What to do next
• Assign remediations as responses to correlation policy violations; see Adding Responses to Rules and
Allow Lists, on page 933.
Related Topics
IP Address Conventions, on page 26
Procedure
What to do next
• Assign remediations as responses to correlation policy violations; see Adding Responses to Rules and
Allow Lists, on page 933.
Procedure
What to do next
• Assign remediations as responses to correlation policy violations; see Adding Responses to Rules and
Allow Lists, on page 933.
Related Topics
IP Address Conventions, on page 26
Procedure
What to do next
• Assign remediations as responses to correlation policy violations; see Adding Responses to Rules and
Allow Lists, on page 933.
Related Topics
Predefined Host Attributes, on page 837
User-Defined Host Attributes, on page 837
Procedure
What to do next
• Create a set attribute remediation as described in Adding Set Attribute Value Remediations, on page 988.
Procedure
What to do next
• Assign remediations as responses to correlation policy violations; see Adding Responses to Rules and
Allow Lists, on page 933.
Procedure
• Delete — To delete a custom module that is not in use, click Delete ( ). You cannot delete
system-provided modules.
• Install — To install a custom module, click Choose File, browse to the module, and click Install. For
more information, see the Firepower System Remediation API Guide.
Procedure
For help adding a custom module, see the documentation for that module, if available.
• Configure—To configure instance details and add remediations to the instance, click View ( ).
• Delete—To delete an instance that is not in use, click Delete ( ).
or edit instances in the current domain for a module installed in an ancestor domain. Instead, use the Instances
page ( Policies > Actions > Instances); see Managing Remediation Instances, on page 990 .
Procedure
For help adding an instance for a custom module, see the documentation for that module, if available.
• Configure — To configure instance details and add remediations to the instance, click View ( ).
• Delete — To delete an instance that is not in use, click Delete ( ).
Note For Secure Firewall Threat Defense, see the Cisco Secure Firewall Threat Defense Command Reference.
Caution We strongly recommend that you do not access the Linux shell unless directed by Cisco TAC or explicit
instructions in the Firepower user documentation.
Caution Users with Linux shell access can obtain root privileges, which can present a security risk. For system security
reasons, we strongly recommend:
• If you establish external authentication, make sure that you restrict the list of users with Linux shell
access appropriately.
• Do not establish Linux shell users in addition to the pre-defined admin user.
You can use the commands described in this appendix to view and troubleshoot your Secure Firewall
Management Center, as well as perform limited configuration operations.
When you enter a mode, the CLI prompt changes to reflect the current mode. For example, to display version
information about system components, you can enter the full command at the standard CLI prompt:
> show version
If you have previously entered show mode, you can enter the command without the show keyword at the show
mode CLI prompt:
show> version
exit
Moves the CLI context up to the next highest CLI context level. Issuing this command from the default mode
logs the user out of the current CLI session.
Syntax
exit
Example
system> exit
>
expert
Invokes the Linux shell.
Syntax
expert
Example
> expert
? (question mark)
Displays context-sensitive help for CLI commands and parameters. Use the question mark (?) command as
follows:
• To display help for the commands that are available within the current CLI context, enter a question
mark (?) at the command prompt.
• To display a list of the available commands that start with a particular character set, enter the abbreviated
command immediately followed by a question mark (?).
• To display help for a command’s legal arguments, enter a question mark (?) in place of an argument at
the command prompt.
Note that the question mark (?) is not echoed back to the console.
Syntax
?
abbreviated_command ?
command [arguments] ?
Example
> ?
version
Displays the product version and build.
Syntax
show version
Example
password
Allows the current CLI user to change their password.
Caution For system security reasons, we strongly recommend that you do not establish Linux shell users in addition
to the pre-defined admin on any appliance.
Note The password command is not supported in export mode. To reset password of an admin user on a secure
firewall system, see Learn more. If you use password command in expert mode to reset admin password, we
recommend you to reconfigure the password using configure user admin password command. After you
reconfigure the password, switch to expert mode and ensure that the password hash for admin user is same
in /opt/cisco/config/db/sam.config and /etc/shadow files.
After issuing the command, the CLI prompts the user for their current (or old) password, then prompts the
user to enter the new password twice.
Syntax
configure password
Example
generate-troubleshoot
Generates troubleshooting data for analysis by Cisco.
Syntax
Example
lockdown
Removes the expert command and access to the Linux shell on the device.
Caution This command is irreversible without a hotfix from Support. Use with care.
Syntax
system lockdown
Example
reboot
Reboots the appliance.
Syntax
system reboot
Example
restart
Restarts the appliance application.
Syntax
system restart
Example
shutdown
Shuts down the appliance.
Syntax
system shutdown
Example
Automatic CLI access for 6.5 When you use SSH to log into the management center, you automatically access the CLI. Although
the management center strongly discouraged, you can then use the CLI expert command to access the Linux shell.
Note This feature deprecates the Version 6.3 ability to enable and disable CLI access for
the management center. As a consequence of deprecating this option, the virtual
management center no longer displays the System > Configuration > Console
Configuration page, which still appears on physical management centers.
• configure password
• system generate-troubleshoot
• system lockdown
• system reboot
• system restart
• system shutdown
Security Requirements
To safeguard the Secure Firewall Management Center, you should install it on a protected internal network.
Although the management center is configured to have only the necessary services and ports available, you
must make sure that attacks cannot reach it (or any managed devices) from outside the firewall.
If the management center and its managed devices reside on the same network, you can connect the management
interfaces on the devices to the same protected internal network as the management center. This allows you
to securely control the devices from the management center. You can also configure multiple management
interfaces to allow the management center to manage and isolate traffic from devices on other networks.
Regardless of how you deploy your appliances, inter-appliance communication is encrypted. However, you
must still take steps to ensure that communications between appliances cannot be interrupted, blocked, or
tampered with; for example, with a distributed denial of service (DDoS) or man-in-the-middle attack.
Cisco Clouds
The management center communicates with resources in the Cisco cloud for the following features:
• Advanced Malware Protection
The public cloud is configured by default; to make changes, see Change AMP Options in the Cisco Secure
Firewall Management Center Device Configuration Guide.
• URL filtering
For more information, see the URL filtering chapter in the Cisco Secure Firewall Management Center
Device Configuration Guide.
Malware defense Malware cloud lookups. Both peers perform lookups. See Required Server Addresses for
Proper Cisco Secure Endpoint &
Malware Analytics Operations.
Download signature updates for file Active peer downloads, syncs to updates.vrt.sourcefire.com
preclassification and local malware standby.
amp.updates.vrt.sourcefire.com
analysis.
Submit files for dynamic analysis Both peers query for dynamic fmc.api.threatgrid.com
(managed devices). analysis reports.
fmc.api.threatgrid.eu
Query for dynamic analysis results
(management center).
AMP for Endpoints Receive malware events detected Both peers receive events. See Required Server Addresses for
by AMP for Endpoints from the Proper Cisco Secure Endpoint &
You must also configure the cloud
AMP cloud. Malware Analytics Operations.
connection on both peers
Display malware events detected (configuration is not synced).
by the system in AMP for
Endpoints.
Use centralized file Block and
Allow lists created in AMP for
Endpoints to override dispositions
from the AMP cloud.
Security intelligence Download security intelligence Active peer downloads, syncs to intelligence.sourcefire.com
feeds. standby.
URL filtering Download URL category and Active peer downloads, syncs to URLs:
reputation data. standby.
• regsvc.sco.cisco.com
Manually query (look up) URL
category and reputation data. • est.sco.cisco.com
IPV4 blocks:
• 146.112.62.0/24
• 146.112.63.0/24
• 146.112.255.0/24
• 146.112.59.0/24
IPv6 blocks:
• 2a04:e4c7:ffff::/48
• 2a04:e4c7:fffe::/48
Cisco Secure Get packages from the Amazon Get field images on the active peer, https://public.ecr.aws
Dynamic Attributes Elastic Container Registry (Amazon which then syncs to the standby.
https://csdac-cosign.s3.us-west-1.
Connector ECR)
amazonaws.com
Cisco Smart Communicate with the Cisco Smart Active peer communicates. tools.cisco.com:443
Licensing Software Manager.
www.cisco.com
Cisco Success Transmit usage information and Active peer communicates. api-sse.cisco.com:8989
Network statistics.
dex.sse.itd.cisco.com
dex.eu.sse.itd.cisco.com
Cisco Support Accepts authorized requests and Active peer communicates. api-sse.cisco.com:8989
Diagnostics transmits usage information and
statistics.
System updates Download updates directly from Update intrusion rules, the VDB, amazonaws.com
Cisco to the management center: and the GeoDB on the active peer,
cisco.com
which then syncs to the standby.
• System software
Upgrade the system software
• Intrusion rules independently on each peer.
• Vulnerability database (VDB)
• Geolocation database
(GeoDB)
Time synchronization Synchronize time in your Any appliance using an external time.cisco.com
deployment. NTP server must have internet
access.
Not supported with a proxy server.
RSS feeds Display the Cisco Threat Research Any appliance displaying RSS blog.talosintelligence.com
Blog on the dashboard. feeds must have internet access.
Whois Request whois information for an Any appliance requesting whois The whois client tries to guess the
external host. information must have internet right server to query. If it cannot
access. guess, it uses:
Not supported with a proxy server.
• NIC handles:
whois.networksolutions.com
• IPv4 addresses and network
names: whois.arin.net
161/udp SNMP Management Center Inbound Allow access to MIBs via SNMP polling.
Threat Defense
443/tcp Remote access VPN Threat Defense Inbound Allow secure VPN connections to your
(SSL/IPSec) network from remote users.
500/udp Remote access VPN Threat Defense Inbound Allow secure VPN connections to your
(IKEv2) network from remote users.
4500/udp
443/tcp HTTPS Management Center Inbound Communicate with integrated and third-party
products using the Firepower REST API,
Threat Defense
including Cisco Terminal Services (TS)
Agent.
443/tcp HTTPS Outbound Send and receive data from the internet.
For details, see Internet Access Requirements,
on page 1004.
443 HTTPS Management Center both Integrate with AMP for Endpoints
885/tcp Captive portal Threat Defense Inbound Communicate with a captive portal identity
source.
1500/tcp Database access Management Center Inbound Allow read-only access to the event database
by a third-party client.
2000/tcp
8307/tcp Host input client Management Center Inbound Communicate with a host input client.
Related Topics
Add an LDAP External Authentication Object for Management Center, on page 117
Add a RADIUS External Authentication Object for Management Center, on page 125