Configuring Firepower Threat Defense interfaces in Routed mode

Introduction

This document describes the configuration, verification, and background operation of an Inline Pair Interface on a Firepower Threat Defense (FTD) appliance.

Prerequisites

Requirements

There are not specific requirements for this document.

Components Used

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.

Related Products

This document can also be used with these hardware and software versions:

Background Information

FTD provides two Deployment modes and six Interface modes:

2 Deployment Modes:

6 Interface Modes:

Note: You can mix interface modes on a single FTD appliance.

High level overview of the various FTD deployment and interface modes:

FTD interface mode FTD Deployment mode Description Traffic can be dropped
Routed Routed Full LINA engine and Snort-engine checks Yes
Switched Transparent Full LINA engine and Snort-engine checks Yes
Inline Pair Routed or Transparent Partial LINA engine and full Snort-engine checks Yes
Inline Pair with Tap Routed or Transparent Partial LINA engine and full Snort-engine checks No
Passive Routed or Transparent Partial LINA engine and full Snort-engine checks No
Passive (ERSPAN) Routed Partial LINA engine and full Snort-engine checks No

Configure

Network Diagram

A diagram shows two routers connected to a Cisco NGFW appliance. Router-1 has an interface G0/0.201 with IP address 192.168.201.x. Router-2 has an interface G0/1 with IP address 192.168.202.x. The NGFW is positioned between them.

Configure a Routed Interface and a Subinterface

Configure subinterface G0/0.201 and interface G0/1 as per these requirements:

Interface G0/0.201 G0/1
Name INSIDE OUTSIDE
Security Zone INSIDE_ZONE OUTSIDE_ZONE
Description INTERNAL EXTERNAL
Sub interface ID 201 -
VLAN ID 201 -
IPv4 192.168.201.1/24 192.168.202.1/24
Duplex/Speed Auto Auto

Solution

Step 1. Configure the Logical Interface

Navigate to Devices > Device Management, select the appropriate device and select the Edit icon.

A screenshot shows the Cisco FTD device management interface. The user needs to select 'Add Interfaces' and then 'Sub Interface'.

Configure the subinterface settings as per requirements:

Add Sub Interface

Under the General tab:

Under the IPv4 tab:

Under the physical interface (GigabitEthernet0/0) specify the Duplex and Speed settings:

Enable the physical interface (G0/0 in this case):

Edit Physical Interface

Under the Hardware Configuration tab for the physical interface:

Step 2. Configure the Physical Interface

Edit the GigabitEthernet0/1 physical interface as per requirements:

Edit Physical Interface

Under the IPv4 tab:

Key points for Routed interfaces:

Select Save and Deploy.

Verification

From the FMC GUI:

A table shows interfaces configured in the FMC. GigabitEthernet0/0 is physical, OUTSIDE, OUTSIDE_ZONE, 192.168.202.1/24(Static). GigabitEthernet0/0.201 is a subinterface, INSIDE, INSIDE_ZONE, 192.168.201.1/24(Static).

From the FTD CLI:

show interface ip brief output shows interface details including IP addresses, status, and protocol.

show ip output shows system IP addresses and current IP addresses for interfaces.

FMC GUI and FTD CLI correlation:

A screenshot shows the 'Edit Sub Interface' window with Name: INSIDE, Security Zone: INSIDE_ZONE, Description: INTERNAL. The IPv4 tab shows IP Type: Use Static IP, IP Address: 192.168.201.1/24.

A CLI command output show running-config interface g0/0.201 shows the configuration for the subinterface, including description, VLAN, nameif, security level, and IP address.

A CLI command output show interface g0/0.201 shows the status of the interface, including its name, description, MAC address, MTU, and IP address.

A CLI command output show interface g0/1 shows the status of the GigabitEthernet0/1 interface, including its name, description, MAC address, MTU, IP address, and duplex/speed settings.

FTD Routed Interface Operation

Verify the FTD packet flow when Routed interfaces are in use.

Solution

FTD Architectural overview

A high-level overview of the FTD data plane is shown in a diagram. It illustrates the packet flow through the ASA engine, Snort engine, and back through the ASA engine, from ingress to egress interface.

A diagram shows the checks performed within each engine. It details the Fast Path and the various security checks like Decrypt, Blacklist, Malware, etc., with options for DROP or ALLOW verdicts.

Key points

FTD Routed Interface Overview

The packet flow through the LINA and Snort engines is visualized as:

G0/0 -- LINA engine -- Snort engine -- LINA engine -- G0/1

Verify

Trace a Packet on FTD Routed Interface

Network Diagram

A diagram shows Router-1 connected to the NGFW's G0/0.201 interface (192.168.201.x) and the NGFW's G0/1 interface (192.168.202.x) connected to Router-2.

Use packet-tracer with the these parameters to see the applied policies:

Solution

When a Routed interface is used, the packet is processed similarly to a classic ASA Routed interface. Checks like Route Lookup, Modular Policy Framework (MPF), NAT, ARP lookup, etc., take place in the LINA engine Data Path. Additionally, if the Access Control Policy requires it, the packet is inspected by the Snort engine, where a verdict is generated and returned to the LINA engine.

The following CLI command is used:

packet-tracer input INSIDE tcp 192.168.201.100 11111 192.168.202.100 80

The output details the packet processing phases:

Results:

Note: In phase 4 the packet is checked against a TCP map called UM_STATIC_TCP_MAP. This is the default TCP Map on FTD.

The CLI command show run all tcp-map displays the configuration for TCP maps, including UM_STATIC_TCP_MAP with various settings like no check-retransmission, checksum-verification, etc.

Related Information

PDF preview unavailable. Download the PDF instead.

200908-configuring-firepower-threat-defense-int iText 5.5.12 ©2000-2017 iText Group NV (AGPL-version)

Related Documents

Preview Cisco Firepower Compatibility Guide
Comprehensive guide detailing Cisco Firepower software and hardware compatibility, including operating system and hosting environment requirements for various models and versions.
Preview Cisco Secure Firewall Migration Tool Compatibility Guide
This guide provides Cisco Secure Firewall software and hardware compatibility, including operating system and hosting environment requirements for migrating from various firewall platforms to Cisco Secure Firewall.
Preview Cisco ASA Compatibility Guide: Software and Hardware Matrix
Comprehensive compatibility guide for Cisco ASA (Adaptive Security Appliance) software and hardware, including ASDM, FXOS, ASAv, Firepower, and various modules. Updated October 5, 2016.
Preview Reset Admin Password for Cisco Firepower System
Comprehensive guide on how to reset the admin password for various Cisco Firepower system components, including Firepower Threat Defense (FTD), ASA FirePOWER Services modules, Firepower Management Centers (FMC), and NGIPSv devices. Covers procedures for lost passwords, CLI and web interface access, and different device models.
Preview Cisco Secure Firewall Threat Defense Compatibility Guide
This guide provides software and hardware compatibility information for Cisco Secure Firewall Threat Defense, covering various hardware models, software versions, and integrated products.
Preview Cisco ASA Series General Operations ASDM Configuration Guide
Comprehensive guide detailing the configuration of Cisco ASA Series devices using the Adaptive Security Device Manager (ASDM), covering general operations, setup, interfaces, security policies, VPNs, and more.
Preview Cisco IOS XE and Viptela SDWAN Software Support Timeline and EoL Guidelines
This document details the support timelines and End-of-Life (EoL) guidelines for Cisco IOS XE Software releases (16.x.x, 17.x.x) and Viptela SDWAN Software releases (19.x.x, 20.x.x), covering release models, naming conventions, support types, and EoL milestones.
Preview Cisco ASR 1000 Series Release Notes for IOS XE Amsterdam 17.3.x
Detailed release notes for Cisco ASR 1000 Series routers running Cisco IOS XE Amsterdam 17.3.x, covering new software features, resolved bugs, and ROMmon release requirements.